Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

7 Google Chrome Tweaks for Efficiency

If you spend most of your workday with Google’s browser, you’ll want to put these Chrome tips to work so you can get more done in less time.

Live your best Chrome life

You probably live most of your computing day inside Google’s browser. Despite its tendency to be a resource hog, it’s still the most capable browser for its speed and optimization on the web’s most important sites.

But there’s always room to improve, especially given Chrome’s flexibility and strong feature set. This collection of tips will help you start the day off with just the sites you want, work quicker with keyboard commands, and ensure you can save the stuff you need for later use.

Stick a pin in it

Pinning tabs that you use throughout the day saves you screen real estate and keeps you from having to reopen tabs several times over. Right-click on a tab and select Pin tab to minimize it to the left side of the browser. It’ll be identifiable by the page’s favicon.

Keep in mind, when you close the browser, those tabs will reopen as pinned tabs when you relaunch Chrome. So if you don’t want to start your next session with 10 pinned tabs, you’ll need to unpin them by right-clicking and then selecting Unpin tab before closing the browser.

Reopen that tab you didn’t mean to close

There’s one, specific hotkey command that saves my bacon about 25 times a day: Control-Shift-T, which reopens the last tab closed. When you’ve got 70 or so different tabs open, you’re bound to close the wrong one from time to time.

That’s why it behooves you to memorize this command. Better yet, take a few moments to learn some of the other hotkeys shown here that will help you zip through your tabs, close them all, or quit Chrome altogether. Just as hotkeys help you work faster in Windows, the same level of convenience applies to Chrome.

Grab a Chrome extension

It’s very likely that your favorite desktop software has an accompanying Chrome extension that let’s you perform related tasks within the browser. If so, grab it. After all, the web touches a lot of aspects of the work you do. For example, Microsoft’s OneNote offers a useful Chrome extension for grabbing articles and other bits of the internet for later retrieval. Same goes for Evernote, another popular note-taking solution. And there’s a Chrome extension that notifies you of Skype alerts. Head to the Chrome Web Store to find the extensions you need.

Embrace Google Cloud Print

Google Cloud Print may still have that annoying beta tag, but it’s vastly improved since the service’s early days. It’s now reliable, and the fastest way to print a document without needing to futz with the Windows print menu.

Most printers can be added quite easily, so head to the Cloud Print site to enroll yours. Another great feature is that you can also save files right to Google Drive, helping you keep track of tax-payment confirmations or other key documents.

Know your history

Macs and iOS devices talk together very well through a feature called Handoff. Open a browser tab on the iPhone, and you can pull it up right away on your Mac.

Chrome has created something that’s not quite as seamless, but gets the job done for those of us who live outside of Fortress Apple. Control-H pulls up a list of your most recent tabs from all your devices. Next, touch Tabs from other devices to choose the site you want to check out. You can select what you were just looking at or something from a while back.

Go big (with text)

Save your eyes from strain. You can expand the text on a browser page in a couple of different ways. Hit Control+ to zoom in, and Control- to zoom out. Alternatively, pinching-and-zooming on a PC with a touchscreen will do the trick and gives you a more direct feel for what you want to see.

Control 0 will return you to the normal page size once you’re done with the close inspection.

Start off right

You can get right to work more quickly if you launch your browsing session with the sites you use most often. Go to Settings > On Startup and choose Open a specific page or set of pages.

Then, you can add your favorite pages by typing in the URLs or clicking the button for Use current pages. This’ll ensure that next time you launch Chrome, you can get right to work with the pages you need.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

5 Ways to Prep for Hurricane Season

Hurricane season is from June 1 through November 30.  On October 29, 2012 the East Coast was hit with Hurricane Sandy.  Many businesses are still recovering and rebuilding from the largest Atlantic Hurricane on record.  Power outages, high winds and flooding affected many areas in New Jersey and New York.

The Small Business Administration and Agility Recovery hosted “Protect Your Business This Season” webinar.  

oct29_sat

Below are five steps to protect your business before a disaster like Hurricane Sandy:

Evaluate Risks

All types of risks exist such as environmental disasters, organized disruption, loss of service, equipment failure and many more.  Assess your company building for risks (inside and outside).  Also, assess business losses during and after a disaster strikes.

Calculate the cost of interruption

Calculating for  “post-disaster”  consists of many different scenarios.  Creating a plan for up to six months of interruptions for your company.  Another major concern is to design a backup plan with secondary vendors in case all primary vendors cannot provide their specific services. 

Insurance Coverage

Consult with your agent and an insurance expert when buying insurance for your business.  Insurance policies vary, it is important to design a policy that best fits your needs.

Create a communication plan

Gather primary and secondary e-mail addresses for all employees, contractors, vendors and customers to put an e-mail alert system in place.  Businesses could also use Social Media to alert public before and after a disaster.

Telework Policy

If a disaster strikes, employees may not have the ability to travel to the office.  Setting up a Telework Policy will grant employees access to work from home.  This policy can be for all employees or specific employees.  

Need help preparing for Hurricane season?

Contact us at 856-745-9990 or click here.

 

5 Tips to Stay Cyber-Safe This Season

With more consumers spending money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

Black Friday and Cyber Monday may mark the high points of the holiday shopping season, but they are by no means the end of it. In a still struggling economy, with everyone searching for value, consumers will encounter technology deals that might seem too good to be true.

As reported by the Dow Jones newswires, online shopping may well top $1 billion dollars on a single day this year. With more and more consumers willing to spend money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

So, how can you avoid being taken advantage of?

There are many ways to keep yourself, your privacy, and your money safe this holiday season. But, as the countdown to Christmas grows shorter, many of us abandon our common sense in the desperate pursuit of that one great gift or that one fantastic deal.

Therein lies the problem. The number one way to guard against online scams is to employ some common sense.
For example, many of us will go to extreme lengths to save a few dollars. This often includes venturing off the ‘beaten path’ and looking outside the major retailers on online auction or classified sites such as E-Bay or Craigslist, which the Better Business Bureau has cautioned against. While many of the deals offered on such sites are perfectly legitimate, the likelihood of stumbling into a scam is far greater on these sorts of sites.

Tip #1 — If a deal seems too great, it probably is, especially if it’s from an individual user or a ‘minor’ retailer. Be suspicious of any deal or sale that you can’t believe is real. Maybe you’ve found the best buy of the season, but it’s more likely that you’ve stumbled into a scam set up to defraud you and steal your money or information.
It’s also important to remember that anyone you do business with online knows more about Internet commerce — and its dangers — than you do.

An excellent Tip #2 is to do some research about any online vendor you’re considering making a purchase from. Some vendors believe quality customer service goes hand in hand with turning a profit. Others, however, such as Vitaly Borker, seem to value their bottom line over the satisfaction of their customers.

As reported in the New York Times and on Cnet.com, Borker took advantage of loopholes in credit card policies to refuse refunds and threaten customers. Only when he was in danger of being cut off by Visa and MasterCard did Borker begin meeting his customer’s needs.

Some simple research might have tipped customers off that Borker’s website was one to be avoided.

As heinous as Borker’s actions may seem, they do bring to light Tip #3 for the online shopper: understand your credit cards. Borker and other merchants like him, were able to take advantage of customers because of the rules set up by the credit cards those customers use.

With credit card purchases being the dominant form of online shopping, it’s vital that consumers know the policies of the cards they use and what recourse they have should those policies be abused.

Tip #4 — Consumers would also be wise to investigate other forms of payment, such as PayPal or Bill Me Later, a PayPal service. While alternative methods may not offer the convenience of credit cards, they may provide more security against potential scams and those who know how to abuse the system.

Regardless of where and when you shop online, Tip #5 applies: be cautious. The Internet can be a dangerous place at the best of times. During the often stressful and expensive holiday season the dangers increase exponentially.

Be wary every time you shop online and help to make sure this time remains a time of giving, and not of taking.

To read the original article in it’s entirety please Click Here

5 Disaster Recovery Tools

11971488181629439895barretr_Lifesaver.svg.hiTakeaway:  Five useful tools that are satisfactory for Disaster Recovery.

Quick Disaster Recovery

Quick Disaster Recovery can restrict applications from opening at Startup and re-enabling Windows Administrator tools such as Task Manager and Registry Editor. (Free)

Clonezilla

Clonezilla is compatible with Windows, Mac OS and Linux.  Clonezilla has the capability to perform disk imaging/cloning.

There are two versions available:

  1. Clonezilla live – Backup and restore on a single computer.  (Free)
  2. Clonezilla SE – Backup and restore on 40+ computers simultaneously.  (Free)

Macrium Reflect

Macrium Reflect is compatible with Windows XP, Vista, 7 and 8.  Macrium Reflect has the capability to perform disk imaging/cloning, schedule backups, supports RAID and GPT and has a Linux Rescue CD.

There are three versions available:

  1. Home-use Desktop Version (Free)
  2. Pro Desktop Version ($58.99)
  3. Pro Server Version ($199.99)

DriveImageXML

DriveImageXML has the capability to perform disk imaging/cloning, browse and restore images.  Browsing images allows you to restore files, folders or the entire disk image.

There are three options available:

  1. Home-use license (Free)
  2. 5 user license ($100.00)
  3. 100 user licenses ($500.00)

System Rescue CD

System Rescue CD is a Linux rescue disk compatible with Linux and Windows.  This rescue disk can recover data, manage partitions and edit configuration files. 

The System Rescue CD can be modified to your specific needs by adding specific tools or scripts.  (Free)

For disaster tips for your office or home, click here.

Keep Your Emails Out of Spam: 10 Ways

Takeaway: Legitimate messages that get snagged by spam filters can lead to big problems — such as derailed job searches, hard feelings, and lost business. These tips will help ensure that your messages reach their intended targets.

Most spam filters use a scoring system. Each offense has a value. The higher the sum of a message’s offenses, the more likely a spam filter will reroute the message (or not delivered at all). A lone offense usually isn’t enough to flag a message as spam; it takes a combination of violations to score high enough to meet the level of true spam. But the system isn’t perfect, and sometimes overzealous filters flag legitimate messages as spam. Applying the following do’s and don’ts will help you ensure that your legitimate messages pass the spam filter test and reach their intended Inboxes.

1: Do curtail your excitement

Specific words and phrases are the number one hook for spammers, and that makes them the best tool for catching spam. Discussions of large sums of money and amazing breakthroughs top that list. Offering a money back guarantee or a way to save money — Why pay more? — may be part of a legitimate offer, but it will set off spam alarms. Your message might excite you, but multiple exclamations points will also excite spam filters. All uppercase characters might convey your enthusiasm, but they’ll also set off spam filters. Just using the word urgent is enough to put a spam filter on alert.

Avoid using words and phrases that trigger spam filters. You don’t have to memorize a long list, just visit a few of the Web sites that maintain lists of spam keywords. Use the phrase “spam keywords” in your favorite search engine and you’ll get plenty of hits. Look for current lists, as the keywords are updated regularly. It’s okay to share good news and special offers with associates and clients. Just bypass all the hype.

2: Do use plain text

An email that consists of all HTML or all images and links will trip a spam alarm. HTML is certainly okay, as long as it’s good code and it doesn’t comprise the entire message. Sloppy HTML code is also an easy giveaway for spam.

Go ahead and use good HTML code but also include as much plain text as possible. That’s a clue to the spam filter that the email is legitimate. Besides, you’ll want to accommodate recipients who choose to view the message in plain-text format.

3: Don’t include attachments

Avoid attachments when possible. Spam often contains destructive attachments, so filters tend to overreact to an attachment. Links are a better alternative, if feasible.

4: Do check your sender score

A sender score grades your reputation as a sender. Your average business or personal account probably isn’t going to learn much from this score. Businesses that rely on frequent email campaigns will. If that includes you, check your sender score often and be proactive about repairing damage. A bad reputation can result in email being filtered, regardless of content.

5: Don’t send spam!

If you maintain a large list, for marketing — for any purpose really — make sure the members of your list want your email. Sending spam will get your domain and your business blacklisted and it’s difficult to get off those lists. Once you’re on a blacklist, most spam filters will snag your mail, regardless of its content. Remember, your reputation is important as your message (#4).

Hint: Exchanging business cards is not an invitation to send spam unless that condition is made clear during the exchange.

6: Don’t use colored fonts

Black type seems boring, but in truth, it’s easy to read and looks professional and clean. Don’t be fooled into thinking that colored fonts will create eye-catching opportunities to promote your message. They might, but they’ll also excite spam filters.

7: Do test your recipient list

When you send an email or newsletter to a list, test the message in as many client applications on as many operating systems as possible. Simply send the message to yourself or to a test account and retrieve it on several machines using different operating systems and email clients.

8: Don’t use the word test in your test message

When testing an email or newsletter (#6), don’t use the word test in the subject line. Most server filters will snag the message, regardless of the message’s content. You’ll waste time trying to fix the content when that single word may be the culprit.

9: Do compose a succinct subject

Your subject line should be as specific as possible. Smart filters assume that spammers can write a reasonable subject line. What they’ll lack is detail. The more specific your subject is the better. For example, the subject Tomorrow’s Project Meeting is reasonable but generic. A better subject might mention the time, the meeting room, and so on. Don’t go overboard, but include details if possible.

10: Do rely on professional experts

For most of us, a legitimate message that’s snagged by a spam filter can mean lost business or at the very least, hard feelings. These tips aren’t meant for professional online marketing operations. If you’re considering an online marketing campaign for your business, don’t wing it! You could inadvertently damage your company’s reputation. Hire a professional who specializes in online marketing to keep you on the right side.

To view the original message in it’s entirety Click Here

49% of Businesses Hit by Ransomware

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here’s what you need to know.

Nearly half of businesses report that they were the subject of a cyber-ransom campaign in 2016, according to Radware’s, Global Application and Network Security Report 2016-2017.

Data loss topped the list of IT professionals’ cyber attack concerns, the report found, with 27% of tech leaders reporting this as their greatest worry. It was followed by service outage (19%), reputation loss (16%), and customer or partner loss (9%).

Malware or bot attacks hit half of all organizations surveyed in the last year. One reason for the pervasive attacks? The Internet of Things (IoT). Some 55% of respondents reported that IoT ecosystems had complicated their cybersecurity detection measures, as they create more vulnerabilities.

Ransomware attacks in particular continue to increase rapidly: 41% of respondents reported that ransom was the top motivator behind the cyber attacks they experienced in 2016. Meanwhile, 27% of respondents cited insider threats, 26% said political hacktivism, and 26% said competition.

While large-scale DDoS attacks dominated the headlines of 2016, this report found that only 4% of all attacks were more than 50 Gbps, while more than 83% of DDoS attacks reported were under 1 Gbps.

“One thing is clear: Money is the top motivator in the threat landscape today,” said Carl Herberger, vice president of security solutions at Radware, in a press release. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data.”

Despite the growth in attacks, some 40% of organizations reported that they do not have an incident response plan in place, the survey found.

The report listed five cybersecurity predictions for 2017:

1. IoT will become an even larger risk. The Mirai IoT Botnet code is available to the public, making it more likely that cyber criminals of all experience levels are already strengthening their capabilities. “In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets,” the press release stated. “IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.”

2. Ransomware attacks will continue to grow. These attacks will target phones, laptops, and company computers, and will likely take aim at healthcare devices such as defibrillators in the future, the press release stated.

3. Permanent Denial of Service (PDoS) attacks on data centers and IoT operations will rise. PDoS attacks, sometimes called “phlashing,” damage a system to the degree that it requires hardware replacement or reinstallation. These attacks are not new, but Radware predicts they are likely to become more pervasive in 2017 with the plethora of personal devices on the market.

4. Telephony DoS (TDoS) will become more sophisticated. These attacks, which cut off communications in a crisis, “could impede first responders’ situational awareness, exacerbate suffering and pain, and potentially increase loss of life,” the press release stated.

5. Public transportation system attacks will rise. As cars, trains, and planes become more automated, they also become more vulnerable to hackers, Radware stated.

You help your business avoid ransomware attacks and other cyber threats by keeping software up to date, backing up all information every day to a secure, offsite location, segmenting your network, performing penetration testing, and training staff on cyber security practices.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Is Your Yahoo Password in 450K Leak?

Takeaway: Hackers have posted 450K Yahoo email addresses and passwords online, and hint Gmail, Hotmail, other services are next. How can you check if your users’ accounts are among them?

Hackers posted more than 400,000 Yahoo Voice and email names and passwords and the posting might not be over yet.

Yahoo reps say they are working on the compromised system–not great timing for a beleaguered company enduring what Yahoo chair Alfred Amoroso called a “tumultuous” time for the company. The firm apologized in an online statement and did not comment further at this writing.

Not a Yahoo user? IT pros and security experts worry this most recent hack on Yahoo – allegedly perpetrated by a group calling itself d3dd3 – is likely “way bigger than Yahoo,” said Marcus Carey, in a Reuters report. Hotmail, MSN, Live, Gmail and other personal services are at risk, too, he said.

NOTE: If you want to check your own or other users’ Yahoo emails to see if they are part of the current leak, there’s an easy way to check here at Sucuri Malware Labs. Just type in the email address and search.

Plan for next time

Change passwords. Consider training customers on utilities like Lastpass. IT pros we interviewed across the board said users in enterprises who use open cloud-based email services, or other non-enterprise communication methods like Skype or Google Groups, should, at the very least, be using such utilities, which provide more control and protection in case of events like this one.

With so much data potentially compromised via users relying on such BYOD services as these, “the process (to avoid future attacks) is much easier if (users) have Lastpass,” said John Livingston, a tech pro for the American Red Cross in Savannah, Georgia. “Time to change your Yahoo, Google, Hotmail, and AOL passwords. And with LastPass, each site and service has a unique password, which limits damage if the password does get out. Changing passwords then is quick and easy. Plus if you’re a manager you don’t have to worry about remembering a new password.”

“Once this clears, I will be changing the passwords for Gmail, even though there’s no confirmation on that (hack) yet,” said Brian Geniesse, who works the IT tech desk at his firm in Monominee, Michigan. “Also be careful. Password managers can be hacked just the same.”

Yahoo is to blame ultimately, most IT pros we interviewed told us.

“Shame on Yahoo for not running normal security audits on (its) networks – and services that would have detected the SQL injection vulnerability (reportedly) used in the attack,” adds Dan Phillips, an IT pro in Cambridge, Ontario, Canada.

Geniesse expanded on that with a message that will resound with most IT pros and CTOs. Most people use weak passwords–see below.

“You can preach the use of LastPass and the like until you are blue in the face but users will never change their habits unless you force them,” Geniesse said. And “Yahoo needs to force some kind of password complexity to help protect their users.”

So many folks are checking the hack post, the hackers allegedly responsible are having trouble maintaining traffic load. Due to high traffic on this group’s site, the page with the Yahoo hacked emails and passwords is going up and down. We caught part of it in a cut and paste.

When it was up earlier today, it read in part:

We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call … not as a threat …

There have been many security holes exploited in webservers belonging to Yahoo … ?that have caused far greater damage than our disclosure (today). Please do not take (the posting) lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage …

The author quotes author Jean Vanier from his book, Becoming Human: “Growth begins when we begin to accept our own weakness,” Vanier wrote.

If you’re a Star Wars, Star Trek or comic book fan, just change your passwords right away, other observers add. And talk your users into it to. Check this out: CNET’s Declan McCullagh wrote a program to analyze the most frequently used passwords using data from the post of 450K email addresses and passwords. He listed:

  • 2,295: The number of times a sequential list of numbers was used, with “123456? by far being the most popular password. There were several other instances where the numbers were reversed, or a few letters were added in a token effort to mix things up.
  • 160: The number of times “111111? is used as a password, which is only marginally better than a sequential list of numbers. The similarly creative “000000? is used 71 times.
  • 780: The number of times “password” was used as the password. Apparently, absolutely no thought went into security in these instances.
  • 233: The number of times “password” was used in conjunction with a few numbers behind it. Apparently, the barest minimum of thoughts went into security here.
  • 437: The number of times “welcome” is used. With a password like that, you’re just asking to be hacked.
  • 333: The number of times “ninja” is used. Pirates, unfortunately, didn’t make the list.
  • 137,559: The number of Yahoo credentials that were leaked.
  • 106,873: The number of Gmail credentials that were leaked. Hotmail, which was the next most frequently cited e-mail service, had fewer than half the number of users hit.
  • 161: The number of times “freedom” is used, suggesting a lot of patriotic users. “America” was used 68 times.
  • 161: The number of times the f-word is used in some combination. There are a lot of angry people out there.
  • 133: The number of times “baseball” appears as a password. It’s the most popular sport on the list, proving that it is indeed America’s national pastime. It just may not be the best password.
  • 106: The number of times “superman” is used as a password. That’s nearly double the amount of times “batman” is used and triple the frequency of “spiderman.”
  • 52: The number of times “starwars” is used. The force is not with this password.
  • 56: The number of times “winner” is used.32: The number of times “lakers” appears. It tied with “maverick,” although fortunately “the_heat” or “celtics” weren’t on this list.
  • 27: The number of times “ncc1701? is used as a password. For those of you who aren’t trekkies, that’s the designation code for the Starship Enterprise. “startrek” is used 17 times, while “ncc1701a,” the designation for the Enterprise used in later Star Trek movies, is used 15 times.

4 WAYS TO SPEED UP YOUR PC

Speed Up Computer

How to make a computer faster: 4 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools installed on your computer, plus a few safe and free downloads, to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you’re online.

Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren’t logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses

Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance. To combat spyware, you might want to consider using Malwarebytes. This scan is a free service that helps check for and remove viruses. You should also download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.

2. Free up disk space

The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.

Use Disk Cleanup to:

– Remove temporary Internet files.
– Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
– Empty the Recycle Bin.
– Remove Windows temporary files, such as error reports.
– Delete optional Windows components that you don’t use.
– Delete installed programs that you no longer use.
– Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2. When Disk Cleanup has calculated how much space you can free up, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner, performing better, and potentially increasing your PC speed.  For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, and then click the More Options tab.

Windows Vista users

1. In the Start menu, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup.

2. In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.

3. If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.

4. Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.

5. When you finish selecting the files you want to delete, click OK, and then, to confirm the operation, click Delete files. Disk Cleanup then removes all unnecessary files from your computer. This may take a few minutes.

The More Options tab is available when you choose to clean files from all users on the computer.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2.  In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and potentially performing better.

3. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.

Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:

– You add a large number of files.
– Your free disk space totals 15 percent or less.
– You install new programs or a new version of the Windows operating system.

To use Disk Defragmenter:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.

 

2. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze disk button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might even be set up this way by default.) Under Schedule, it reads Scheduled defragmentation is turned on and then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or to change the time or frequency, click Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Change the settings, and then click OK.

7.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Windows Vista users

1.  Open Disk Defragmenter: Click the Start button, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze diskbutton. After the disk is analyzed, a dialog box appears letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might be set up this way by default.) Click Modify schedule….

7.  In the Disk Defragmenter: Modify Schedule dialog box, choose how often, which day, and at what time of day you want defragmentation to occur, and then click OK.

8.  Click OK again.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment button. Note:In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.  After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you’d like to learn how to schedule these tools and others to run automatically, please read Speed up your PC: Automate your computer maintenance schedule.

4. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

Run the Error Checking utility:

1.  Close all open files.

2.  Click Start, and then click Computer.

3.  In the Computer window (My Computer in Windows XP), right-click the hard disk you want to search for bad sectors, and then click Properties.

4.  In the Properties dialog box, click the Tools tab.

5.  Click the Check Now button.

6.  In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.

7.  If bad sectors are found, choose to fix them.

Tip: Only select the “Automatically fix file system errors” check box if you think that your disk contains bad sectors.

To see the original article in its entirety click here.

3 Ways to Boost Password Security

The must-read IT business eNewsletter

Encrypted passwords

“There is no such thing as perfect security,” says Jim Waldron, Senior Architect for Platform Security at HP. If you can access a website or server, consider it vulnerable to security breaches. That’s why so many businesses account for fraud in their business models—they expect to lose a certain amount each year to security leaks, lost IP, and more.

While you can never be 100% secure from hackers while connected to the internet, there are steps you can take to help protect your personal and professional data. All you need to do is activate features that are increasingly common (or easy to manage) on modern business-class PCs: Multi-factor authentication, client-based user authentication, and password best practices.

Multi-factor authentication
Multi-factor authentication is a simple but effective security system that involves the use of at least two factors (or methods) of authentication. It groups different factors together so that even if one is compromised, the data remains protected. Under this system, factors are divided into three domains:

HP support

 

  • Something you know: Password, PIN, etc.
  • Something you have: ATM card, smartcard, etc.
  • Something you are: Fingerprint, iris, etc.

For multi-factor authentication to be successful, you want to pull from at least two different domains, with a maximum of three domains. A common example of multi-factor authentication is when you withdraw cash from an ATM. To do so, you insert your ATM card (something you have) and enter your PIN (something you know). Without both factors you can’t access your account—and neither should anyone else.

Businesses are taking notice too, and multi-factor authentication’s popularity is rising. In 2014, 37% of enterprise organizations surveyed used multi-factor authentication for the majority of their employees, and that number is expected to grow to 56% by 2016.

What you can do now
If you have a business-grade PC, chances are your PC already includes the technologies you need to start using multi-factor authentication. In fact, HP offers multi-factor authentication on all of its business PCs. Consult your manual or HP Support, and identify the factors your PC supports in addition to traditional passwords, such as fingerprint or smartcard readers. Just make sure to choose factors from separate domains.

Client-based user authentication
Every time you log into a system, your identity needs to be authenticated by that system. This process occurs one of two ways: server-side authentication or client-based authentication. With server-side authentication your unencrypted information—such as your password or fingerprint—is sent to a server where it is compared against that server’s records. With client-based authentication, the authentication process—e.g., “Does this fingerprint match the one in our records?”—is performed on the client device, such as your work PC.

While client-based authentication is not as common as its counterpart, it is far more secure. In fact, “In almost all authentication scenarios it is preferable to perform the direct authentication on the client and then communicate an ‘Identity Assurance’ to the relying party,” says Waldron.

Everyone wins when it comes to client-based authentication. The client no longer has to send unencrypted, private information over the internet or store that information on another party’s server, while the relying party no longer has to store sensitive client information on their server—reducing the amount of information that can be stolen if and when a hack occurs.

What you can do now
One of the easiest ways to use client-based authentication is with a hardened fingerprint sensor. The sensor authenticates your fingerprint directly in the hardware, rather than sending it to a server or hard drive, and returns a key that can be used to decrypt password vaults.

Password best practices
As we’ve mentioned before, passwords aren’t perfect. While implementing and using the above features might not seem practical for some of us, everyone can benefit from following basic password best practices. They are quick to implement, and can save you a lot of hassle down the line.

To make the most of your password security, your passwords should be:

  • Long—at least 16 characters. Use a password manager to store unique passwords and fill out log-in forms so that you don’t have to memorize them.
  • Complex—containing symbols, numbers, uppercase letters, lowercase letters, and spaces (if possible)
  • Unique—only use a password once, don’t recycle or repeat across accounts
  • Short-lived—the National Cyber Security Alliance suggests changing your password every 60 days
  • Difficult to guess—avoid common words found in a dictionary, all or part of your name, repeated letters, or combos that align to your keyboard layout, such as “QWERTY” or “123456”

If you are uncertain whether your password is secure enough or if it meets enough of the criteria above, there are several reliable services that will check your password strength for you. Microsoft’s Safety & Security Center offers a free password checker you can access through your browser, while Mac users can access Apple’s Password Assistant through the Keychain Access utility.

What you can do now
The first thing you can do—right this second—is revise your most important passwords to align with password best practices. That includes your work accounts, personal email, bank accounts, and any other services that contain sensitive data. If you need help remembering your new passwords, consider using a password manager such as HP Password Manager. That way you only have to authenticate once to gain access to all your systems. You can also adopt a system to make your passwords easier to remember. Using acronyms, for example, you can turn the phrase “I was born in 1986 and my parents still live on Lake Street!” into “Iwbi1986ampsloLS!”—creating a strong password that’s easy to remember.

Passwords are changing, and while they will never be perfect, they can still provide an effective first layer of defense against hackers and ne’er do wells. The above features and techniques are increasingly common on modern business PCs, making it easier than ever to protect your private data. All you have to do is use them.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

iOS 9.3: 3 Features Businesses Need

iOS 9.3 offers several features that might appeal to business-oriented Apple users.

Apple introduced a new version of iOS on Monday. The update includes several new features, including updates to CarPlay and HealthKit, as well as a feature to make it easier for iPads to be used in schools for educational purposes. There are several other new features which are particularly appealing to the business-oriented user.

Here are 3 new features business users should check out.

ios93SJTechies

Night Shift

The proliferation of devices like tablets and smartphones means that some sort of screen is never far away. For many, looking at a screen is the first and last thing they do in the morning and evening.

The problem with that is screens emit blue light, which reduces the amount of melatonin produced in the body. Melatonin is a chemical that helps people fall asleep. The light emitted from smartphones can also cause eye strain, which carries symptoms like headaches and blurred vision.

With this latest version of iOS 9, Apple introduced Night Shift, a feature that automatically adjusts the colors of your display at night. You can schedule times for it to go into effect, manually turn it on and off, and adjust colors on a scale of less warm to more warm.

You can access Night Shift through Settings | Display & Brightness, or through the menu that swipes up from the bottom of the device’s screen.

ios9SJTechies

Password-protected Notes

Notes is iOS’ app for taking, well, notes. iOS 9.3 updates it by allowing users a layer of security. Now, users can lock their notes using either a password or the Touch ID, which makes the app that much more useful.

In order to lock a note, tap the button in the top right corner (the one you might use if you were going to email the note) and then tap Lock Note. When prompted, enter a password, confirm it, and decide if you want to enable the Touch ID. A lock button will appear at the top of the note and in the future if you want to open it, enter the password or use the Touch ID.

ios92SJTechies

More personalized News

The News app now offers more personalization for users, and on a range of topics and publications. So for example, you can select a topic like mobile apps or internet privacy. You can access news by opening the News app, or by swiping right from your main screen.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!