Archives June 2017

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 5% on all new purchases of $20 or more. Hurry before the offer expires.

Use promo code rs217a6 in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $20 required. Offer expires Wednesday, July 19, 2017 at midnight (Mountain Time).

Copyright © 2017 BigBeagle.com. All rights reserved.

Outlook issues in the June 2017 security updates

The problems stems from June 2017 security updates. Microsoft is investigating the issues and will update this page when a fix is available. In the meantime, please use the workarounds suggested for each issue. They have categorized it in seven scenarios.

Issue#1: Error when opening an attachment is an email, contact, or task formatted as Rich Text.

This issue affects Outlook 2007 and Outlook 2010.

When you open an attachment in an email, contact, or task formatted as Rich Text you get the following error:outlook-2010-2007-this-program-used-to-create-is-outlook-not-installed

You may also see:

STATUS: WORKAROUND

  • Forward the email to yourself and then open the attachments from the forwarded email.
  • Change the email format to HTML, or Text format.
  • Save the attachments to your computer, using one of the following methods, then open them from the saved location: Drag and drop the attachments to your desktop.
    Go to File > Save Attachments.
    Copy and paste the attachment to your computer.

Issue#2: Opening Mail Attachment warning when opening an attachment that includes consecutive periods

This issue affects Outlook 2007, Outlook 2010, Outlook 2013, and Outlook 2016.

When opening an attachment that includes consecutive periods (…), or an exclamation point (!), the files are blocked and you receive an Opening Mail Attachment warning.

Or if an email message includes an attached email message, and the attached email message’s subject line ends with an unsafe file name extension as listed in the Blocked attachments in Outlook, the email attachment will be blocked for recipients.

STATUS: WORKAROUND

If you get the Opening Mail Attachment warning, and you’re sure the attachment was sent from a trusted source, proceed to Open or Save the attachment.

If the file is blocked because of a potentially unsafe file extension, ask the sender to save the email message to their computer and rename its subject line so that it does not end with an unsafe file name extension. Then, attach it to the email message and resend.

Issue#3: Error when setting ShowLevel1Attach to allow Outlook to display Level 1 attachments

This issue affects Outlook 2013 and Outlook 2016.

If you set ShowLevel1Attach to allow Outlook to display Level 1 attachments, you may see the error: “One or more objects in this file have been disabled due to your policy settings”.

WARNING: Typically, Level 1 attachments are blocked. If you have enabled this policy, users can see Level 1 attachments in Outlook. If you use any of the workarounds to open the files, please make sure they are safe to open. See: Information for administrators about e-mail security settings in Outlook 2007.

If you set ShowLevel1Attach to allow Outlook to display Level 1 attachments, and you send an email with an attachment you may see this message: “This item contains attachments that are potentially unsafe.  Recipients using Microsoft Outlook may not be able to open these attachments.”

STATUS: WORKAROUND

  • Change the email format to HTML, or Text format.
  • Save the attachments to your computer, using one of the following methods, then open them from the saved location:
    • Drag and drop the attachments to your desktop.
    • Go to File > Save Attachments.
    • Copy and paste the attachment to your computer.

Issue#4: VBScript does not run or you receive malicious code warning when using a custom form for Outlook

This issue affects Outlook 2007, Outlook 2010, Outlook 2013, and Outlook 2016.

When you use a custom form that you have created for Outlook, you see the following two symptoms:

  • VBScript does not run.
  • You get a malicious code warning: 

STATUS: INVESTIGATING

We’re investigating this issue and will update this page when a fix is available.

Issue#5: “Something went wrong….” or “Search results may be incomplete” error when searching in Outlook

This issue affects all Outlook versions on Windows 7, Windows 8, Windows 10.

When searching in Outlook, you get this error: “Something went wrong and your search couldn’t be completed.”, or “Search results may be incomplete because items are still being indexed“.

And you’ll see this Event Log warning:

STATUS: WORKAROUND

Until the Windows Update fix release on 6/27, you can set a registry key that will cause Outlook to stop using the local Windows Search service. When this registry key is set, Outlook will use its own built-in search engine. The built-in search will display the message below to indicate it is not using the Windows Search service.

Disable Windows Desktop Search Service for Outlook:

NOTE: The following steps show you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Please make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, see this article.

  • Open Registry Editor.
  • Go to: Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search
  • PreventIndexingOutlook
  • Set DWORD: 1

Detailed Instructions:

  1. Click Start, click Run, type regedit in the Open box, and then click OK.
  2. Locate and then click the following subkey in the registry:
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
  3. On the Edit menu, point to New, and then click New Key and name the key Windows Search.
  4. Click on the new key Windows Search.
  5. On the Edit menu, point to New, and then click DWORD Value.
  6. Type PreventIndexingOutlook for the name of the DWORD, and then press Enter.
  7. Right-click PreventIndexingOutlook, and then click Modify.
  8. In the Value data box, type 1 to enable the registry entry, and then click OK.
  9. Note to disable the PreventIndexingOutlook setting, type 0 (zero), and then click OK.
  10. Exit Registry Editor, and then restart Outlook.

Issue#6: iCloud fails to load properly in Outlook 2007

iCloud fails to load properly in Outlook 2007.

When accessing Calendar, Contacts, or Tasks in Outlook 2007, you get the following error:

The set of folders cannot be opened. MAPI was unable to load the information service C:\PROGRA~2\COMMON~1\Apple\Internet Services\APLZOD.dll. Be sure the service is correctly installed and configured.”

STATUS: WORKAROUND

The loading of unregistered MAPI services has been disabled by default to make Outlook more secure.

WARNING: This workaround may make your computer or your network more vulnerable to attack by malicious users or by malicious software such as viruses. Microsoft does not recommend this workaround but is providing this information so that you can choose to implement this workaround at your own discretion. Use this workaround at your own risk.

If you have trusted applications that depend on being loaded in this manner, you can re-enable those applications by setting the following registry key:

REG_DWORD HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Outlook\Security\AllowUnregisteredMapiServices

You can use the following registry subkey to apply the registry setting as a domain policy:

HKCU\Software\Policies\Microsoft\Office\12.0\Outlook\Security\AllowUnregisteredMapiServices

Value 0 (default): Block loading of unregistered MAPI services. This is the recommended setting to avoid unexpected execution of unknown code.

Value 1: Enable loading of unregistered MAPI services.

IMPORTANT: The following steps show you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Please make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, see this article.

To make these registry changes, follow these steps:

  1. Click Start, click Run, type regedit in the Open box, and then click OK.
  2. Locate and then click the following subkey in the registry:HKCU\Software\Microsoft\Office\12.0\Outlook\Security\
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Type AllowUnregisteredMapiServices for the name of the DWORD, and then press Enter.
  5. Right-click AllowUnregisteredMapiServices, and then click Modify.
  6. In the Value data box, type 1 to enable the registry entry, and then click OK.

    NOTE: To disable the AllowUnregisteredMapiServices setting, type 0 (zero), and then click OK.

  7. Exit Registry Editor, and then restart the computer.

Vulnerability information (applies to all versions)

MAPI does not validate that a provider’s DLL that it is requested to load is registered correctly in MapiSVC.inf or even that it comes from the local machine. This can be exploited by creating a file together with an OLE object in such a way to cause MAPI to load a DLL from a network share when the OLE object is activated. This can allow arbitrary code execution to occur.

Issue#7: When printing a specific iframe or frame in a web page, the print output may be blank, or text is printed with a 404

This issue affects all Outlook versions on Windows 7, Windows 8, Windows 10.

When you print a specific iframe or frame in a web page, the print output may be blank, or text is printed that resembles the following:

NOTE: A frame is a part of a web page or browser window that displays content independent of its container. A frame can load content independently.

This problem has also been observed in both Internet Explorer 11, and in applications that host the IE Web Browser Control.

STATUS: INVESTIGATING

There is currently no workaround for this issue. However, if you print the entire web page, it will print correctly. We’re investigating this issue and will update this page when a fix is available.

Option: Uninstall Recent Microsoft Update

It is not recommended to uninstall the update as it applies to some other issues but if none of the workarounds help then you have this option until a new fix is releases.

For Outlook 2010:

  1. Go to the Control Panel – Programs and features and select view installed updates on the left.
  2. Search or look for KB3203467 and highlight it and uninstall it.

For Outlook 2007:

  1. Go to the Control Panel – Programs and features and select view installed updates on the left.
  2. Search or look for KB3191898 and highlight it and uninstall it.

Have any questions?

Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

New Website Design – Custom Coats Painting

The Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for a painting company, serving the Tri-State area, Custom Coats Painting.

Custom Coats Painting is a full service, fully licensed and insured painting company, serving New Jersey & Pennsylvania. They specialize in interior and exterior house painting as well as pressure washing, wooden deck restoration and wallpaper removal for commercial and residential projects. Custom Coats Painting takes pride in giving the best possible service to each of its customers. They give the best painting service at the best price and above all, do a job that exceeds your expectations.

 

 

Have questions?

Our Web Design team is here to help
Call us at: 856-745-9990 or visit: https://southjerseytechies.net

South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design ServicesServer SupportIT ConsultingVoIP PhonesCloud Solutions Provider and much more. Contact Us Today.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 10% on all new purchases of $40 or more, great products just for you. Hurry before the offer expires.

Use promo code rs217a5 in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $40 required. Offer expires Tuesday, July 11, 2017 at midnight (Mountain Time).

Copyright © 2017 BigBeagle.com. All rights reserved.

Use Windows 7 Event Viewer to track down issues that cause slower boot times

Here’s how to use some of the new features in Windows 7’s Event Viewer to investigate a slow boot time.

Overview

Windows 7’s Event Viewer includes a new category of event logs called Applications and Services Logs, which includes a whole host of subcategories that track key elements of the operating system. The majority of these subcategories contain an event log type called Operational that is designed to track events that can be used for analyzing and diagnosing problems. (Other event log types that can be found in these subcategories are Admin, Analytic, and Debug; however, describing them is beyond the scope of this article.)

Now, within the operating system section is a subcategory titled Diagnostic-Performance with an Operational log that contains a set of a Task Category called Boot Performance Monitoring. The Event IDs in this category are 100 through 110. By investigating all the Event ID 100 events, you will be able to find out exactly how long it took to boot up your system every time since the day you installed Windows 7. By investigating all the Event ID 101 thru 110 events, you will be able to identify all instances where boot time slowed down.

Getting started

You can find and launch Event Viewer by opening the Control Panel, accessing the System and Security category, selecting the Administrative Tools item, and double-clicking the Event Viewer icon. However, you can also simply click the Start button, type Event in the Start Search box, and press Enter once Event Viewer appears and the top of the results display.

Creating a Custom View

Once you have Event Viewer up and running, you can, of course, drill down through the Applications and Services Logs and locate the Diagnostic-Performance Operational log and begin manually looking through the events recorded in the log. However, you can save yourself time and energy by taking advantage of the new Custom View feature, which is essentially a filter that you can create and save.

To do so, pull down the Action menu and select the Create Custom View command. When you see the Create Custom View dialog box, leave the Logged option set at the default value of Any Time and select all the Event level check boxes. Next, select the By Log option button, if it is not already selected, and click the dropdown arrow. Then, drill down through the tree following the path: Applications and Services Logs | Microsoft | Windows | Diagnostics-Performance. When you open the Diagnostics-Performance branch, select the Operational check box, as shown in Figure A.

Figure A

When you get to the Diagnostics-Performance branch, select the Operational check box.

To continue, type 100 in the Includes/Excludes Event IDs box, as shown in Figure B, and then click OK.

Figure B

Event ID 100 records how long it takes to boot up your system.

When you see the Save Filter to Custom View dialog box, enter a name, as shown in Figure C, and click OK.

Figure C

To save the filter as a Custom View, simply provide an appropriate name, such as Boot Time.

You’ll now repeat these steps and create another Custom View, and this time, you’ll type 101-110 in the Includes/Excludes Event IDs box and name it Boot Degradation.

Investigating Boot Time

To investigate your Windows 7 system’s boot time, select Boot Time in the Custom Views tree and then sort the Date and Time column in ascending order. When you do, you’ll see a complete history of every time you have booted your system since the day you installed Windows 7. In Figure D, you can see that we have hidden the Console Tree and the Action Pane to focus on the events.

Figure D

By sorting the Date and Time column in ascending order, you’ll see a complete history of every time you have booted your system since the day you installed Windows 7.

As you can see, the first recorded Boot Time on my sample system was 67479 milliseconds in October 2009. Dividing by 1,000 tells me that it took around 67 seconds to boot up. Of course, this was the first time, and a lot was going on right after installation. For example, drivers were being installed, startup programs were being initialized, and the SuperFetch cache was being built. By December 2009 the average boot time was around 37 seconds.

In any case, by using the Boot Time Custom View, you can scroll through every boot time recorded on your system. Of course, keep in mind that there will be normal occurrences that may lengthen the boot time, such as when updates, drivers, and software is installed.

Now, if you click the Details tab, you’ll see the entire boot process broken down in an incredible amount of detail, as shown in Figure E. (You can find more information about the boot process in the “Windows On/Off Transition Performance Analysis” white paper.) However, for the purposes of tracking the boot time, we can focus on just three of the values listed on the Details tab.

Figure E

The Details tab contains an incredible amount of detail on the boot time.

MainPathBootTime

MainPathBootTime represents the amount of time that elapses between the time the animated Windows logo first appears on the screen and the time that the desktop appears. Keep in mind that even though the system is usable at this point, Windows is still working in the background loading low-priority tasks.

BootPostBootTime

BootPostBootTime represents the amount of time that elapses between the time that the desktop appears and the time that you can actually begin using the system.

BootTime

Of course, BootTime is the same value that on the General tab is called Boot Duration. This number is the sum of MainPathBootTime and BootPostBootTime. Something that we didn’t tell you before is that Microsoft indicates that your actual boot time is about 10 seconds less that the recorded BootTime. The reason is that it usually takes about 10 seconds for the system to reach an 80-percent idle measurement at which time the BootPostBootTime measurement is recorded.

Investigating Boot Degradation

To investigate instances that cause Windows 7 system’s boot time to slow down, select Boot Degradation in the Custom Views tree and then sort Event ID column in ascending order. Each Event ID, 101 through 110, represents a different type of situation that causes degradation of the boot time.

While there are ten different Event IDs here, not all of them occur on all systems and under all circumstances. As such, I’ll focus on the most common ones that we have encountered and explain some possible solutions.

Event ID 101

Event ID 101 indicates that an application took longer than usual to start up. This is typically the result of an update of some sort. As you can see in Figure F, the AVG Resident Shield Service took longer than usual to start up right after an update to the virus database. If you look at the details, you can see that it took about 15 seconds for the application to load (Total Time), and that is about 9 seconds longer than it normally takes (Degradation Time).

Figure F

Event ID 101 indicates that an application took longer than usual to start up.

An occasional degradation is pretty normal; however, if you find that a particular application is being reported on a regular basis or has a large degradation time, chances are that there is a problem of some sort. As such, you may want to look for an updated version, uninstall and reinstall the application, uninstall and stop using the application, or maybe find an alternative.

(In the case of my friend’s Windows 7 system, there were several applications that were identified by Event ID 101 as the cause of his system slowdown. Uninstalling them was the solution, and he is currently seeking alternatives.)

Event ID 102

Event ID 102 indicates that a driver took longer to initialize. Again, this could be the result of an update. However, if it occurs regularly for a certain driver or has a large degradation time, you should definitely look in to a newer version of the driver. If a new version is not available, you should uninstall and reinstall the driver.

Event ID 103

Event ID 103 indicates that a service took longer than expected to start up, as shown in Figure G.

Figure G

Event ID 103 indicates that a service took longer than expected to start up.

Services can occasionally take longer to start up, but they shouldn’t do so on a regular basis. If you encounter a service that is regularly having problems, you can go to the Services tool and experiment with changing the Startup type to Automatic (Delayed Start) or Manual.

Event ID 106

Event ID 106 indicates that a background optimization operation took longer to complete. On all the Windows 7 systems that we investigated, this event identified the BackgroundPrefetchTime as the culprit, as shown in Figure H. Since the Prefetch cache is a work in progress, this should not really represent a problem.

Figure H

Event ID 106 indicates that a background optimization operation took longer to complete.

If you encounter regular or long degradation times related to Prefetch, you may want to investigate clearing this cache and allowing the operating system to rebuild it from scratch. However bear in mind that doing so can be tricky and instructions on doing so are beyond the scope of this article.

Event ID 109

Event ID 109 indicates that a device took longer to initialize. Again, if this is happening occasionally, there shouldn’t be anything to worry about. But if it is occurring regularly, you should make sure that you regularly back up your hard disk and begin investigating replacing the device in question.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

New Website Design – Chen Gray Law Group, LLC

The Website Design team of South Jersey Techies has been constantly working on developing great looking websites using the latest web technologies. The most recent website developed by our team is for an Immigration Law Firm in South Jersey, Chen Gray Law Group LLC

Chen Gray Law Group provides services in all aspects of immigration issues, including non-immigrant and immigrant visa processing; PERM/Labor Certification cases; EB-1 extraordinary individuals with abilities in the arts, sciences, athletics or business; multinational executives; naturalization; waivers; and exchange visitors – to name a few categories. The Chen Gray Law Group is located in Marlton, NJ, is a minority-owned boutique immigration law firm. Firm clients include health care employers and employees, global corporations and local companies, professional athletes, opera stars, high net worth investors, golf courses and resorts along with nonprofit organizations – including temples and shrines across the U.S.

 

 

Have questions?

Our Web Design team is here to help
Call us at: 856-745-9990 or visit: https://southjerseytechies.net

South Jersey Techies, LLC is a full Managed Web and IT Services Company located in Marlton, NJ providing IT Services, Managed IT Services, Website Design ServicesServer SupportIT ConsultingVoIP PhonesCloud Solutions Provider and much more. Contact Us Today.

How to setup a kid-friendly iPad

5 things to do before giving an old iPhone or iPad to your kid

Don’t hand over an aging iOS device to your eager youngster before doing a little kid-proofing first.

Like it or not, little kids love iPhones and iPads. They love to look at them, they love to tap and swipe the screen, they love playing iPhone games, and most of all, they love watching videos on them. (“Curious George” is my daughter’s favorite—for this week at least.)Giving your little ones a hand-me-down iOS device is an easy way to satisfy their desire for a screen of their own—my kid is the proud owner of an iPhone 3GS and a third-generation iPad.That said, you shouldn’t hand over your old iPhone or iPad without doing some kid-proofing first. Read on for five ways to prep an aging iPhone or iPad for your youngster, from wiping your data and setting up a child’s iCloud account to blocking web access and keeping her from racking up in-app charges on your credit card.

Wipe your old data

Before you hand over your old iPhone to your kids, you’ll want to make sure any and all of your personal data has been wiped clean. The best way to do so is to perform a “factory” reset, which wipes the iPhone’s storage and returns it to its factory settings.

Make sure to back up and then wipe your data before handing over your old iPhone to your child.

Naturally, you should first make sure you’ve backed up any old iPhone or iPad data you want to preserve. You may already have taken care of this step if you’ve previously upgraded to a new iPhone or iPad and restored your data from iCloud. If not, tap Settings, tap your iCloud profile, then tap iCloud > Backup > Back Up Now. You can also back up your old iPhone or iPad by connecting it to your Mac or PC and syncing it with iTunes.

Once you’re satisfied that your data is safe and sound, go ahead and wipe the device. Tap Settings > General > Reset > Erase All Content and Settings. Once the reset is complete, your old iPhone or iPad will return to its factory settings, just like the day it came out of the box.

Create a child’s iCloud account

While it may seem a little soon to, say, create an Apple ID for a toddler, take it from me: it won’t be long before your onesie-clad cutie is walking, talking and pleading for an iPhone upgrade—and when that happens, it’ll be easier to migrate her data and apps if she already has her own iCloud account.

Just because your child is under 13 doesn’t mean she can’t have her own iCloud account and Apple ID.

Even if your kid is younger than 13 years old, she can still have her own iCloud account and Apple ID. All you need to do is create the account under iOS’s “Family Sharing” umbrella. With her iCloud account, your child will be able to sign in to an old iPhone or iPad, download apps, and even purchase items from the App Store—only with your approval, of course.

Also, keep in mind that just because she has an iCloud account, your daughter or son won’t be able to start web surfing, tweeting, or posting selfies on Instagram without your say-so. (More on iOS’s parental controls in a moment.)

You can create a child’s iCloud account directly on your own iPhone or iPad. Just tap Settings, tap your iCloud username, then tap Family Sharing > Add Family Member > Create an Apple ID for a child.

You’ll need to enter your kid’s birthday, agree to some disclosures and legalese, choose a payment method for App Store purchases (which, again, you can control and/or block), then choose an Apple ID username and password.

By default, your kid’s new iCloud account won’t let her make App Store purchases without your consent. To double-check the “Ask to Buy” setting, tap Settings, tap your iCloud account name, then tap Family Sharing and your kid’s name.

Control what your kid can—and can’t—do on her iPhone or iPad

Once you’ve got your old iPhone or iPad set up with your child’s new iCloud account, it’s time to make some decisions on which iOS features will be fair game for your kid, and which will be off-limits.

Don’t want your child surfing the web or snapping photos on her hand-me-down iPhone? You can block those activities in iOS’s Restrictions settings.

Tap Settings > General > Restrictions > Enable Restrictions, then create a Restrictions passcode.

Next, scroll down and disable all the iOS features that you’d rather your kid not mess with. You’ll probably want to disable Safari and the iTunes store right away. You may also want to block your child from installing apps, and if you don’t want your little one snapping a million photos of their crib, you might want to nix the Camera app, too.

In the “Allowed Content” section, make sure to disable in-app purchases, as well as block music with explicit music and any grown-up movies, TV shows and books.

In the Privacy section, you can control which apps can access location services, contacts, the microphone, and more on your kid’s iPhone.

At the bottom of the Restrictions screen, you can also disable access to multiplayer games, friend adding, and screen recording for any Game Center-ready games.

Hide Settings, Mail, and other Apple apps

Even after you’ve thoroughly managed all of iOS’s Restrictions settings, you may still see some home-screen icons on your kid’s iPhone or iPad that you’d rather she not mess with. For example, the Settings icon should probably stay out of her hands, as well as the Mail app, Game Center, and the App Store.

You can hide the Mail, App Store, and other Apple apps in a folder, preferably on its own home screen in the back.

Here’s what I did before I gave my daughter my old iPhone: I hid all those various Apple apps in a “Hidden” folder in the very last iOS home screen. To create a home screen folder, drag one app icon on top of another, name the folder, then start dragging other app icons into the newly created folder.

Naturally, older kids who are a bit more iOS savvy may quickly sniff out the “Hidden” folder. My five-year-old, for example, knows exactly where I’ve tucked away the Settings icon, but she doesn’t really care—probably because tapping Settings won’t get her any closer to Curious George.

Turn on Airplane mode

One way to make sure your little one doesn’t wander into a grown-up corner of the Internet on her iPhone is to cut off Internet access altogether, and the easiest way to do that is to turn on Airplane mode. (Of course, you can kiss Airplane mode goodbye once your children start clamoring for the streaming PBS Kids video app, which they’ll do once they hit about 3 or so.)

Just tap Settings, then flip on the Airplane Mode switch.

Turning on Airplane mode is an easy way to keep tiny iPhone users off the Internet.

If your old iPhone or iPad is running on iOS 6 or later, you may also want to disable home-screen and in-app access to Control Center, the flip-up control panel that includes an Airplane Mode button, To do so, tap Settings > Control Center, then switch off the Access on Lock Screen and Access Within Apps settings. That won’t completely disable Control Center, but at least it’ll make it a tad more challenging to find.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Change and customize Windows 7’s Logon screen wallpaper

In this edition of the Windows Vista and Windows 7 Report, we show you how to change Windows 7’s Logon screen wallpaper.

While experimenting with several Microsoft Windows 7 systems recently, we spent a lot of time staring at the Logon screen. During that time, we began to think about changing the Logon screen wallpaper. Now, we have changed the Logon screen wallpaper in just about every version of Windows we’ve used, so we know that there had to be a way to do so.

When we began to investigate the procedure in Windows 7, we discovered that changing the Logon screen wallpaper in the newest version of the Windows operating system is easy, once you know the steps — and you don’t even need any third-party software to do it.

In order to make it easy for OEMs to customize Windows 7, Microsoft built the ability to change the Logon screen wallpaper right in to the operating system. In this edition of the Windows Vista and Windows 7 Report, we’ll show you how to change Windows 7’s Logon screen wallpaper.

A Registry tweak

The process begins with a very minor Registry tweak. Even for those who would not normally feel comfortable editing the Registry, this one’s a piece of cake. To begin, click the Start button and type Regedit in the Search box. Then, select the appropriate result and press [Enter]. When you do, you’ll see the User Account Control, shown in Figure A, and will need to click the Yes button.Note: Editing the Windows Registry file is not without its risks, so be sure you have a verified backup before making any changes.

Figure A

You will encounter a UAC when you launch the Registry Editor.

Once the Registry Editor launches, locate and right-click on HKEY_LOCAL_MACHINE key and select the Find command. When you see the Find dialog box, type OEMBackground in the text box and make sure that only the Values check box is selected, as shown in Figure B.

Figure B

Type OEMBackground in the Find dialog box.

When the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background key opens, locate and double-click the OEMBackground value. When you see the Edit DWORD dialog box, change the value data from 0 to 1, as shown in Figure C. (If the OEMBackground value doesn’t exist in the Background key, you’ll need to pull down the Edit menu from that key and select New | DWORD (32-bit) Value).

Figure C

Change the value data from 0 to 1.

To complete this part of the operation, click OK to close the Edit DWORD dialog box and then close the Registry Editor.

Creating folders

In the second part of the operation, you’ll need to create a couple of folders. To begin, launch Windows Explorer. Then navigate to the C:\Windows\System32\Oobe folder. Once you access the Oobe folder, click the New Folder button in the Windows Explorer toolbar. You’ll see a confirmation dialog box, like the one shown in Figure D. When you click Continue, the new folder will be created and you can name it info.

Figure D

When you click the New Folder button, you’ll encounter a confirmation dialog box.

Then, open the info folder, click the New Folder button again, work through the confirmation dialog box, and then name the second new folder backgrounds.

Configuring the wallpaper

You can use any image that you want for your new Logon screen wallpaper. However, the image has to be in JPG format and you need to name it backgroundDefault.jpg. When you copy your file to the Windows\System32\Oobe\info\backgrounds folder, you’ll encounter and will need to work through a confirmation dialog box similar to the one shown in Figure D.

Two other things to keep in mind: First, the actual file size of backgroundDefault.jpg cannot exceed 256 KB. Second, you’ll want to use an image whose dimensions match the screen resolution that you are using. If you use a file whose dimensions are smaller, the image will be stretched and may appear distorted.

Altering shadows

As you know, the button and the text used to identify your user account on the Logon screen have shadows behind them to give them a 3D-like look, and these shadows work well with the default Logon screen wallpaper. Depending on what image you use for your new Logon screen wallpaper, these shadows might not work so well.

In addition to making it easy to change the Logon screen wallpaper, Microsoft also made it easy to adjust or disable the text and button shadows to accommodate your particular image.

To alter the shadows, launch the Registry Editor again as described above and access the

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI folder

Once you open the LogonUI folder, you’ll create a new DWORD value called ButtonSet, as shown in Figure E. You can then configure the shadow by setting the value data to one of the following numbers:

  • 0 — Light shadow
  • 1 — Dark shadow
  • 2 — No shadow

Figure E

The ButtonSet value allows you to adjust or disable the text and button shadows.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.