Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

End of Support: Server 2003

end windows server 2003

 

A large number of businesses still run Microsoft MSFT -1.71% Windows Server 2003 and it’s unlikely they all will upgrade before Microsoft Corp. ends support on July 14, 2015, say analysts. Companies that don’t upgrade increase their cyber security risks because the company will no longer issue security updates and these systems will be more vulnerable to hackers.

Businesses worldwide run an estimated 23.8 million physical and virtual instances of Windows Server 2003, according to data released by Microsoft in July 2014. Analysts say the technology is more prevalent in industries such as health care, utilities and government. Yet it’s also still used in about 7% of retail point of sale systems, according to a report Thursday by Trend Micro Inc.4704.TO -1.11%

“Microsoft does not plan to extend support for Windows Server 2003 and encourages customers who currently run Windows Server 2003 and have not yet begun migration planning to do so immediately,” said Vivecka Budden, a Microsoft spokesperson, in an email.

South Jersey Techies offers various migration options to include Windows Server 2012 R2, Microsoft Azure, hosting partners and Office 365.

“It is going to be difficult to get this done in time,” said David Mayer, practice director of Microsoft Solutions at Insight Enterprises Inc.NSIT -1.12%, a provider of IT hardware, software and services.

Many of these same industries were impacted by the end of service for the Windows XP operating system on April 8.  Microsoft broadcasts these sorts of moves years in advance, so it shouldn’t come as a surprise to anyone. But, the product was stable and for many companies there simply wasn’t incentive to update.

“In general, everyone has been slow to migrate, especially those with servers that are running applications,” said Rob Helm, vice president of research at Directions on Microsoft consulting firm.

The problem in industries such as health care and utilities is that companies run legacy apps written by vendors who still require Windows Server 2003. For example, there are smaller vendors in health care that have not kept up with development and application modernization, said a health-care CIO who asked not to be identified. A hospital may have an inventory of 100 to 500 different applications and many applications will still require Windows Server 2003, he added.

Electric utilities, for example, widely use Windows Server 2003. There hasn’t been much movement to upgrade those systems, said Patrick C. Miller, founder of the nonprofit Energy Sector Security Consortium and a managing partner at The Anfield Group, a security consulting firm. Instead, utilities are working to better secure and isolate those systems.

“I’m concerned about directory services such as application authentication and user permissions,” said Mr. Miller. “If you compromise an Active Directory server, you get access to everything.”

For now, analysts are recommending that companies work out their risk of exposure and make plans to first migrate those applications that will be most difficult. Companies should make plans to harden servers that can’t be updated. That might entail putting those systems on an isolated network, where they’d be less prone to outside attack, said Mr. Helm.

To protect and upgrade your home or business

 please contact us 856-745-9990 or click here.

 

Mac Office 2011 Support Ends Oct 10

End of support is sneaking up on enterprise employees running Office on a Mac

Companies that have employees running Office for Mac 2011 have just over 100 days to replace the suite’s applications with those from last year’s upgrade, Office for Mac 2016.

Support ends for Office for Mac 2011 on Oct. 10, a date that Microsoft first stamped on the calendar two years ago, but has not widely publicized since. As of that date, the Redmond, Wash., developer will cease supplying patches for security vulnerabilities or fixes for other bugs.

The individual applications — Excel, PowerPoint, Outlook and Word — will continue to operate after support ends, but companies will be taking a risk, however small, that malware exploiting an unpatched flaw will surface and compromise systems.

To receive security and non-security updates after Oct. 10, IT administrators must deploy Office for Mac 2016 or instruct workers covered by Office 365 to download and install the newer suite’s applications from the subscription service’s portal.

Office for Mac 2011’s end-of-support deadline was originally slated for January 2016, approximately five years after the productivity package’s release. But in the summer of 2015, when it was clear that 2011’s successor would not be ready by early 2016, Microsoft extended its lifespan by 21 months. At the time, Microsoft cited the long-standing policy of supporting a to-be-retired product for “2 years after the successor product is released” when it added time to 2011.

Mac users: Steerage Class

The impending cutoff for Office for Mac 2011 is an issue only because Microsoft shortchanges Office for Mac users. Unlike the Windows version of Office, which receives 10 years of security support, those that run on macOS are allotted half that. Microsoft has repeatedly classified Office for Mac as a consumer product to justify the half-measure, even for the edition labeled “Home and Business.”

Nor does Microsoft update and service Office for Mac for corporate customers as it does the far more popular Windows SKU (stock-keeping unit). The latter will be upgraded with new features, Microsoft said in April, twice each year for enterprise subscribers to Office 365 ProPlus, with each release supported for 18 months before giving way to a pair of successors.

Mac editions, however, are refreshed with new tools at irregular intervals, often long after the same feature debuts in the same Windows application. (Recently, for example, Microsoft added a delivery-and/or-read receipt option to the Mac version of Outlook; that functionality has been in Outlook on Windows since 2013.) And because there are no regular, large-scale feature upgrades to Office for Mac, support is not curtailed by the release schedule as with Windows.

The difference between Offices — the behemoth Windows on one side, the niche Mac on the other — has been put into even starker relief recently: Microsoft has adopted March and September dates for launching new upgrades to Windows 10, Office 365 ProPlus, and last week, Windows Server, but made no similar promises for Office for Mac 2016.

It’s clearly the odd app out.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft Dictate Lets You Type by Voice

Dictate with your voice in Office

This feature is available to Office 365 Subscribers only.

 

Dictate in Word or PowerPoint

1) Turn on your microphone and make sure it works. Troubleshoot microphone settings

2) In Word 2016 or PowerPoint 2016, select Home > Dictate.

3) Wait for the icon to turn red.

4) Start talking. As you talk, text appears in your document or slide.

5) Speak clearly and conversationally. Insert punctuation by saying the name of the punctuation mark you want to add.

6) If you make a mistake while dictating, move your cursor to the mistake and fix it with your keyboard. No need to turn off the microphone.

7) When finished, select Dictate again to stop typing.

 

Dictate in Outlook

1) Turn on your microphone and make sure it works. Troubleshoot microphone settings

2) Open a new email message and select Message > Dictate.

3) Wait for the icon to turn red.

4) Start talking. As you talk, text appears in your email message.

5) Speak clearly and conversationally. Insert punctuation, by saying the name of the punctuation mark you want to add.

6) If you make a mistake while dictating, move your cursor to the mistake and fix it with your keyboard. No need to turn off the microphone.

7) When finished, select Dictate again to stop typing.

 

Troubleshooting

I don’t see Dictate, or it’s not working

If Dictate isn’t working, make sure you’re connected to the Internet.

You can enable or disable Dictate by going to File > Options and look for Office intelligent services on the General tab.

 

Important information about Dictate

Dictate is one of the Office Intelligent Services, bringing the power of the cloud to Office apps to help save you time and produce better results.

Your speech utterances will be sent to Microsoft to provide you with this service, and may also be used to improve speech recognition services. For more information see, What are Intelligent Services?

Office Dictate is not HIPAA (Health Insurance Portability and Accountability Act) compliant.

Prevent Computer Overheating Issues

Many people don’t think about the hidden danger of heat to their computers, or how easy computer overheating is to prevent.

A lot of people don’t think about the effects of heat on their personal computer or laptop. The effects of overheating may be subtle, such as causing the computer to run slower or shortening the expected lifespan of the components; or it can be so devastating as to cause a fire. The most common side effect of overheating is having programs freeze or the computer shutting down sporadically.

How Computers Handle Heat
Computer heat is most efficiently handled by fans. The main fan is usually in the back and blows out. In addition there’s usually a heat sink — cooled by another fan or by a coolant system — over the CPU to prevent the processor from overheating. Some computers have additional fans to encourage airflow and help cool off high-heat components, but this varies from computer to computer.

The power supply can cause overheating if it is not properly installed in the case; if the vents aren’t positioned correctly the hot air can end up in the wrong place. The amount of free space inside the computer also matters; if all the hot components are close together, or if the placements of cords/components is impeding airflow, it can cause more heat problems.

What Can Cause Computer Overheating

There are several things that can cause a computer to overheat.

•Dust inside the computer and around the fans acts as an insulator, causing overheating.
•Running the computer in a hot environment also causes overheating.
•Running a lot of unnecessary programs can aid overheating.
•If the fans are obstructed by walls or drapes it can impede airflow.
•If the computer is being overclocked it can cause the components to overheat.
•Leaving the computer on for extended periods of time can cause overheating.
•Having the computer next to a hot device (a hot vent, other machinery, etc) can heat the computer.

How to Prevent Computer Overheating
By looking at the causes of overheating it’s often easy to diagnose and fix the problem that causes it. It’s important to resist the temptation to leave the computer open while running; the typical computer case is designed to conduct airflow, and leaving the computer open may make the overheating worse.
Simple Ways to Increase the Life of Any Computer’s Parts

The easiest way to prevent the computer from overheating is to clean it out. Most retail stores carry compressed air in their computer aisles, and it’s the easiest way to clean dust out of a dirty computer. A vacuum cleaner can also be used to suck the dust out of fans and ports along the outside of the computer. For more in-depth cleaning instructions, Lifehacker offers a step-by-step guide to computer cleaning: Geek to Live: Evacuate PC Dust Bunnies

Keeping the computer off the floor can help keep excess dust and dirt from mucking up the inside of the computer and fans. Also, putting additional fans in the computer can help improve ventilation. Many cases have specific spots for installing these extra fans; make sure that they blow the hot air out.
Don’t keep the computer too close to the wall, or near anything that keeps the hot air around the case rather than dissipating. It’s also helpful to make sure that the computer is free of debris — keeping stuff on top of the computer can insulate the computer as well.

When Nothing Else Works
When nothing else seems to be fixing the problem it may be hardware related: a broken fan or heat sink can cause major heating issues. If there’s a warranty in effect, contacting the manufacturer about any heat problems may be the easiest solution.

An overheated computer can cause any multitude of trouble. Knowing what can cause the overheating is most of the battle, and even the most novice computer user can get inside to clean the parts and check for broken fans.

World’s Largest Meat Supplier Attacked

The breach is the latest targeting of a crucial supply chain and comes three weeks after the Colonial Pipeline hack disrupted fuel operations in the U.S.

Here’s what we know:

What is JBS?
JBS USA is part of JBS Foods, one of the world’s largest food companies. It has operations in 15 countries and has customers in about 100 countries, according to its website. Its customers include supermarkets and fast food outlet McDonald’s and in the US, JBS processes nearly one quarter of the county’s beef and one-fifth of its pork. JBS’s five biggest beef plants are in the US, and the shutdowns have halted a fifth of meat production there, according to Bloomberg.

Its brands include Pilgrim’s, Great Southern and Aberdeen Black. The US headquarters is based in Greeley, Colorado, and it employs more than 66,000 people.

What happened?
Hackers attacked the company’s IT system last weekend, prompting shutdowns at company plants in North America and Australia. IT systems are essential in modern meat processing plants, with computers used at multiple stages including billing and shipping.
JBS hack shuttered nine US beef plants but normal operations to resume Wednesday
The hack, which the White House described Tuesday as ransomware, affected all of JBS’s US meatpacking facilities, according to an official at the United Food and Commercial Workers union that represents JBS employees. The cyberattack resulted in the closure of all nine of the company’s US beef plants, which are located in states including Arizona, Texas, Nebraska, Colorado, Wisconsin, Utah, Michigan and Pennsylvania, the union official said. The company said on Monday that it suspended all affected IT systems as soon as the attack was detected, and that its backup servers were not hacked.

The White House has said that the ransomware attack was likely carried out by a Russia-based criminal organization, and that it is dealing with the Russian government on the matter.
JBS’ operations in Australia were also affected. The Australian Meat Industry Council, a major trade group, said in a statement that “there is no indication whatsoever that this cyberattack will cause a major impact on Australian domestic red meat and pork products supply.”

What is ransomware?
In a ransomware attack, hackers steal an organization’s data and lock its computers. Victims must pay to regain access to their network and prevent the release of sensitive information.
Some sophisticated ransomware hackers, such as the Russian hacker group Darkside, sell their ransomware technology and take a cut of any ransoms paid to their customers.

Experts generally encourage ransomware victims not to pay any ransom. But a company’s ability to get back online without paying hackers may depend on whether it has protected backups of its data. In some cases, hackers can delete their target’s backups before locking its files, leaving the victim organization with no recourse.

JBS did not comment to CNN about details of the ransomware attack, including whether it paid the ransom.

This kind of cyberattack sounds familiar. Where have I heard that?
The hack comes a few weeks after a ransomware attack targeted Colonial Pipeline, which forced a six-day shutdown of one of the United States’ largest fuel pipelines. That May attack resulted in gas shortages, spiking prices and consumer panic. Colonial Pipeline has confirmed it paid a $4.4m (£3.1m) ransom to the cyber-criminal gang responsible.

Similar to JBS, Colonial Pipeline’s systems were hit with ransomware. Once a company has been hit by ransomware, its first course of action is usually to take much or all of its systems offline to isolate the hackers’ access and make sure they can’t move into other parts of the network.
That may be among the reasons why JBS shut down its operations and Colonial shut down its pipeline — to disconnect the companies’ operations from the IT systems that hackers breached. People briefed on the Colonial attack have said that the company halted operations because its billing system was also compromised and feared they wouldn’t be able to determine how much to bill customers for fuel they received.
The pipeline has since returned to normal operations.

Don’t be the next victim of a ransomware attack. Contact South Jersey Techies to discuss how your critical information can be secure.

If you have any questions, please call us at (856) 745-9990.

 

 

Xfinity Wi-Fi Now in Philly & N.J.

Comcast on Monday launched Xfinity Wi-Fi, which will provide free wireless Internet access to customers in Northern New Jersey, areas along the Jersey Shore, and the Philadelphia metro area.

Users who subscribe to Comcast Xfinity Internet service will be able to log-in to more than 2,000 wireless hot spots with their Comcast username and password. The hot spots have been placed in areas like parks, shopping districts, boardwalks, and transit stations.

In Philadelphia, for example, customers can access Wi-Fi at SEPTA’s Suburban and Market East Stations, many train platforms along the Paoli/Landsdale and the Manayunk/Norristown Line, the Wells Fargo Center, and the South Street shopping district.

In New Jersey, access has been enabled in towns like Berkeley Heights, Livingston, Long Branch, Montclair, New Brunswick, Perth Amboy, Red Bank, Rumson, Summit, and Trenton.

Comcast said it would increase the number of hot spots in the NJ-Philadelphia area by year’s end, but does not have plans to expand into other markets or nationally in the near future. Earlier this year, Comcast announced a roaming agreement with Cablevision and Time Warner Cable that lets Xfinity Internet customers access hot spots in the New York Tri-State area.

A map of available hot spots is posted on comcast.com/wifi.

“With the explosion of wireless Internet devices, new platforms and apps, consumers are increasingly looking to enjoy entertainment and communications on the go,” Cathy Avgiris, senior vice president and general manager of communications and data services for Comcast Cable, said in a statement. “We offer some of the fastest Internet speeds in the home and, by offering Xfinity WiFi, we’re also providing a fast wireless Internet experience for our customers when they are outside the home.”


To read the original article in it’s entirety, Click Here

Windows 8 Cisco VPN Error 442 Fix

FAILED TO ENABLE VIRTUAL ADAPTOR –

HOW TO FIX IT

The Cisco VPN client is one of the most popular Cisco tools used by administrators, engineers and end-users to connect to their remote networks and access resources.

With the introduction of Windows 8, Cisco VPN users are faced with a problem – the Cisco VPN software installs correctly but fails to connect to any remote VPN network.

When trying to connect to a VPN network through a Windows 8 operating system (32 or 64 bit), the Cisco VPN client will fail to connect. As soon as the user double-clicks on the selected Connection Entry, the VPN client will begin its negotiation and request the username and password.

As soon as the credentials are provided, the VPN client shows the well-known “Securing communications channel” at the bottom of the windows application:

cisco-vpn-client-windows8-fix-

After a couple of seconds the Cisco VPN client will timeout, fail and eventually the connection is terminated. The user is then greeted by a pop up window explaining that the VPN failed with a Reason 442: Failed to enable Virtual Adaptor error:cisco-vpn-client-windows8-fix

INTRODUCING THE FIX – WORKAROUND

Thankfully the fix to this problem is simple and can be performed even by users with somewhat limited experience.

Here are 4 easy-to-follow steps to the solution:

1. Open your Windows Registry Editor by typing regedit in the Run prompt.

2. Browse to the Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA

3. From the window on the right, select and right-click on DisplayName and choose Modify from the menu. Alternatively, double-click onDisplayName:

cisco-vpn-client-windows8-fix

4. For Windows 8 32bit (x86) operating systems, change the value data from @oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter to Cisco Systems VPN Adapter.

For Windows 8 64bit (x64) operating systems, change the value data from @oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows to Cisco Systems VPN Adapter for 64-bit Windows (shown below):cisco-vpn-client-windows8-fix

When done editing the Value data, click on OK and close the Registry Editor.

You can now run the Cisco VPN Client and connect to your VPN network.  Changes performed do not require a system restart.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Chrome Labels HTTP Sites ‘Not Secure

Google sends a nudge toward the unencrypted web

Starting in July, Google Chrome marked all HTTP sites as “not secure,” according to a blog post published today by Chrome security product manager Emily Schechter. Chrome currently displays a neutral information icon, but starting with version 68, the browser is warning users with an extra notification in the address bar. Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign.

Google has been nudging users away from unencrypted sites for years, but this is the most forceful nudge yet. Google search began down-ranking unencrypted sites in 2015, and the following year, the Chrome team instituted a similar warning for unencrypted password fields.

The Chrome team said the announcement was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and a strong majority of Chrome traffic is already encrypted. “Based on the awesome rate that sites have been migrating to HTTPS and the strong trajectory through this year,” Schechter said, “we think that in July the balance was tipped enough so that we can mark all HTTP sites.”

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one in the middle can tamper with the traffic or spy on what you’re doing. Without that encryption, someone with access to your router or ISP could intercept information sent to websites or inject malware into otherwise legitimate pages.

HTTPS has also become much easier to implement through automated services like Let’s Encrypt, giving sites even less of an excuse not to adopt it. As part of the same post, Google pointed to its own Lighthouse tool, which includes tools for migrating a website to HTTPS.

 

Change Your Windows 7 Login Screen

In this edition of the Windows Vista and Windows 7 Report, we show you how to change Windows 7’s Logon screen wallpaper.

While experimenting with several Microsoft Windows 7 systems recently, we spent a lot of time staring at the Logon screen. During that time, we began to think about changing the Logon screen wallpaper. Now, we have changed the Logon screen wallpaper in just about every version of Windows we’ve used, so we know that there had to be a way to do so.

When we began to investigate the procedure in Windows 7, we discovered that changing the Logon screen wallpaper in the newest version of the Windows operating system is easy, once you know the steps — and you don’t even need any third-party software to do it.

In order to make it easy for OEMs to customize Windows 7, Microsoft built the ability to change the Logon screen wallpaper right in to the operating system. In this edition of the Windows Vista and Windows 7 Report, we’ll show you how to change Windows 7’s Logon screen wallpaper.

A Registry tweak

The process begins with a very minor Registry tweak. Even for those who would not normally feel comfortable editing the Registry, this one’s a piece of cake. To begin, click the Start button and type Regedit in the Search box. Then, select the appropriate result and press [Enter]. When you do, you’ll see the User Account Control, shown in Figure A, and will need to click the Yes button.Note: Editing the Windows Registry file is not without its risks, so be sure you have a verified backup before making any changes.

Figure A

You will encounter a UAC when you launch the Registry Editor.

Once the Registry Editor launches, locate and right-click on HKEY_LOCAL_MACHINE key and select the Find command. When you see the Find dialog box, type OEMBackground in the text box and make sure that only the Values check box is selected, as shown in Figure B.

Figure B

Type OEMBackground in the Find dialog box.

When the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background key opens, locate and double-click the OEMBackground value. When you see the Edit DWORD dialog box, change the value data from 0 to 1, as shown in Figure C. (If the OEMBackground value doesn’t exist in the Background key, you’ll need to pull down the Edit menu from that key and select New | DWORD (32-bit) Value).

Figure C

Change the value data from 0 to 1.

To complete this part of the operation, click OK to close the Edit DWORD dialog box and then close the Registry Editor.

Creating folders

In the second part of the operation, you’ll need to create a couple of folders. To begin, launch Windows Explorer. Then navigate to the C:\Windows\System32\Oobe folder. Once you access the Oobe folder, click the New Folder button in the Windows Explorer toolbar. You’ll see a confirmation dialog box, like the one shown in Figure D. When you click Continue, the new folder will be created and you can name it info.

Figure D

When you click the New Folder button, you’ll encounter a confirmation dialog box.

Then, open the info folder, click the New Folder button again, work through the confirmation dialog box, and then name the second new folder backgrounds.

Configuring the wallpaper

You can use any image that you want for your new Logon screen wallpaper. However, the image has to be in JPG format and you need to name it backgroundDefault.jpg. When you copy your file to the Windows\System32\Oobe\info\backgrounds folder, you’ll encounter and will need to work through a confirmation dialog box similar to the one shown in Figure D.

Two other things to keep in mind: First, the actual file size of backgroundDefault.jpg cannot exceed 256 KB. Second, you’ll want to use an image whose dimensions match the screen resolution that you are using. If you use a file whose dimensions are smaller, the image will be stretched and may appear distorted.

Altering shadows

As you know, the button and the text used to identify your user account on the Logon screen have shadows behind them to give them a 3D-like look, and these shadows work well with the default Logon screen wallpaper. Depending on what image you use for your new Logon screen wallpaper, these shadows might not work so well.

In addition to making it easy to change the Logon screen wallpaper, Microsoft also made it easy to adjust or disable the text and button shadows to accommodate your particular image.

To alter the shadows, launch the Registry Editor again as described above and access the

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI folder

Once you open the LogonUI folder, you’ll create a new DWORD value called ButtonSet, as shown in Figure E. You can then configure the shadow by setting the value data to one of the following numbers:

  • 0 — Light shadow
  • 1 — Dark shadow
  • 2 — No shadow

Figure E

The ButtonSet value allows you to adjust or disable the text and button shadows.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

ABC’s Sandy Relief Giving Event

Sandy Relief: ABC’s “Day of Giving” Will Include Dancing With the Stars, Jimmy Kimmel and More

ABC is giving back.

Today Monday, November 5, 2012, the ABC Network is hosting a “Day of Giving” across the network, which will encourage their viewers to help those impacted by Hurricane Sandy.

ABC’s programming, ranging from Good Morning America in the morning to Dancing With the Stars in the evening, will engage viewers with the relief efforts for Hurricane Sandy.

While Dancing With the Stars is planning to personalize sections of Monday night’s performance show with “Day of Giving” messaging (by including stories of how several of the show’s dancers were impacted by the storm), Good Morning America will kick off the “Day of Giving” by dedicating the 8 a.m. hour to raising money, followed by Live with Kelly and Michael, which will integrate the message into their Halloween episode. (It was postponed due to the storm.)

Next, The View‘s ladies and The Chew will discuss the “Day of Giving” and encourage the audience to donate to the American Red Cross Relief efforts. Katie Couric will engage Katieviewers in the relief efforts as well.

Rounding out the “Day of Giving” will be Nightline, which will devote time to the message and the impact of Hurricane Sandy, and Jimmy Kimmel Live, which will encourage viewers to give to the American Red Cross.

“The effects of Hurricane Sandy have impacted millions of people across the entire North East, including many of our co-workers, friends and families. This unprecedented devastation demanded an unprecedented response, so our team came up with the ‘Day of Giving,” Anne Sweeney, co-chair, Disney Media Networks and president, Disney-ABC Television Group, said in a statement. “This coordinated effort between network and syndicated programming spanning News, Daytime, Primetime and Late-Night will reach tens of millions of viewers with a specific call to action…to do what Americans do best, and pull together in support of those who are suffering. I’m incredibly proud of the team and all of our programs for this amazing response.”

Earlier in the day, ABC announced that it will donate $2 million to Hurricane Sandy relief and rebuilding efforts. ABC will donate $1 million to the American Red Cross for immediate, critical assistance, and another $1 million will be designated for organizations working on rebuilding efforts.

Would you like to help? Text REDCROSS to 90999 ($10 donation) or visit http://redcross.org

To View Full Article Click Here

CALL US NOW!