Delete WINDOWS.OLD on Windows Server

 

After performing an in-place upgrade on a Windows machine, you will find a WINDOWS.OLD folder in the root of C:. This folder will have a backup of your old program files, appdata and Windows folder… just in case you need to revert back or recover something that might have been lost during the upgrade. When you try to delete it though you are told you don’t have permissions. Just a small point here, it is generally not recommended to do in-place upgrades on servers. In fact there are some products (e.g. Exchange, ConfigMgr) that explicitly state they do not support upgrading the Operating System. There is of course a difference between “what works” and “what is supported”, but we do suggest where possible you do a clean Server install and migrate your application to the new server. Anyway, let’s assume you’ve understand all the risks and have done a successful in-place upgrade, you now find the old WINDOWS.OLD folder of several GB in size sitting there. If all is well, then you might as well just delete it.

SOLUTION

On Desktop OS version, you can just use the disk cleanup tool to remove it, but that is not available (by default) on Servers, so there are a couple of approaches.

Command line tools to take ownership and delete the folder. Make sure to “run as administrator”

How can I delete the windows.old from an upgraded Windows Server?

For a client OS that’s upgraded, the Disk Cleanup utility can be used to delete the very large windows.old folder containing the old OS. This isn’t available on a server OS without installing the Desktop Experience feature.

To delete, it is necessary to take ownership of the folder, give administrators full control, then delete. This can be done with the commands below:

  •  takeown /F c:\Windows.old\* /R /A /D Y
  •  cacls c:\Windows.old\*.* /T /grant administrators:F
  •  rmdir /S /Q c:\Windows.old

 

Or you can add the “Desktop” features to provide the Disk Cleanup tool:

Step By Step Guide to Enabling “Disk Cleanup Utility”

1. Open The Roles and Features Wizard

To open the roes and feauture wizard. Lauch the “server manager” by pressing the Windows key

and clicking on the server manage please see Screenshot as shown.

Personally, the command line option is less messy and saves having to add features to your server that don’t really need to be there.

2. Click on Add role and Feature

Click on add role and feture to launch the add role and feature wizard.

3.  Choose installation Type

Choose rolebase or feature based installation to install to local machine.

4. Click Next all the way to features

Click “next” all the way to features. Locate “User Interface and Infrastructure”. Click on “Desktop Experience”

and install additional required feature.

5.  Proceed with the installation and Reboot

Make it sure that you reboot the system

6.  Verify that the Utility is indeed installed

Ready to run diskcleanup. See screen shot below.

Disk Cleanup in Action

Below is a sample snapshot of disk cleanup in action.

Windows 10 Pro is a dead end for the enterprise, Gartner says

Recent changes by Microsoft to the Windows 10 support schedule underline why Windows 10 Pro is an ill fit for most companies.

Windows 10 Pro is a dead end for enterprises, a prominent Gartner analyst has argued.

“[We] predict that Microsoft will continue positioning Windows [10] Pro as a release that is not appropriate for enterprises by reducing … support and limiting access to enterprise management features,” Stephen Kleynhans, a research vice president at Gartner and one of the research firm’s resident Windows experts, said in a report he co-authored.

Microsoft’s Windows 10 Pro occupies the middle ground between the consumer-grade Home and the corporate-level Enterprise in features, functionality and price. Because Enterprise versions of Windows have never been available to computer makers, Pro – sometimes, as in Windows 7, tagged Professional instead – has been the most popular pre-installed OS on new business PCs. (Corporations typically re-image new personal computers with Enterprise upon receipt of the devices.)

But although Pro or Professional has a long history in business settings, Microsoft has made numerous decisions in its Windows 10 migration campaign to separate Pro and Enterprise even more, pushing them apart. In Kleynhans’ view, the gap has become unbridgeable.

The last straw was Microsoft’s on-the-fly changes to Windows 10 support.

Last year, the Redmond, Wash. developer announced a six-month support extension for Windows 10 1511, the November 2015 feature upgrade, “to help some early enterprise adopters that are still finishing their transition to Windows as a service.” In February, Microsoft added versions 1609, 1703 and 1709 – released in mid-2016, and in April and October of 2017, respectively – to the extended support list, giving each 24 months of support, not the usual 18.

“Some customers have requested an extension to the standard 18 months of support for Windows 10 releases,” a Microsoft executive said at the time.

There was a catch: Only Windows 10 Enterprise (and Windows 10 Education, a similar version for public and private school districts and universities) qualified for the extra six months of support. Users running Windows 10 Pro were still required to upgrade to a successor SKU (stock-keeping unit) within 18 months to continue receiving security patches and other bug fixes.

Windows 10 Enterprise 1709, for example, and its free “supplemental servicing,” will exhaust support in October 2019. But Windows 10 Pro 1709 runs out of support on April 9, 2019.

“The one thing that really surprised me about the added support,” said Kleynhans in an interview, “was the fact that it didn’t apply to Pro. I think that this telegraphed the fact that, for businesses, Pro is being dead-ended.”

Even though the six-month support extension ended with the 1803 feature upgrade, the one that began reaching some users late last month, in the report Kleynhans co-wrote with Gartner colleague Michael Silver, the duo made clear that they believe Pro is viewed by Microsoft as a second-class citizen.

“Customers currently using Windows 10 Pro should continue to monitor Microsoft’s life cycle announcements because they will eventually need to budget for Windows [10] Enterprise as Windows [10] Pro becomes more ‘pro-sumer’ and small-business oriented,” they wrote in a six-item list of recommendations.

Another component of Microsoft’s current Windows 10 support strategy, something the company has labeled “paid supplemental servicing,” was also out of bounds for those running Windows 10 Pro. The extra support, which Microsoft will sell at an undisclosed price, is available only to Enterprise and Education customers.

Paid supplemental servicing adds 12 months to the 18 months provided free of charge.

“The extensions and paid support option only apply to the Enterprise and Education SKUs,” Kleynhans and Silver said in their report, “Plan and Budget for Short Windows and Office Support Cycles Based on Microsoft’s February 2018 Announcements,” which was published by Gartner last month. “Customers using Windows 10 Pro will still see support end after 18 months. In this way, Microsoft is further reinforcing that it expects enterprise customers to move to the Enterprise edition of Windows 10.”

 

Office 365 to get enhanced Anti-spoofing capabilities

Enhanced anti-spoofing safeguards are rolling out for Office 365.

Microsoft services like OneDrive for Business, SharePoint Online, and Microsoft Teams are closely guarded by ATP (Advanced Threat Protection). Besides, there are numerous feature updates available in Office 365 threat protection service to address the evolution and advances in the threat landscape. The addition of enhanced Anti-Spoofing capability in Office ATP for protecting against spoofed emails from external domains further strengthens this security framework.

Anti-spoofing in Office 365 Advanced Threat Protection

The newest anti-spoof features help protect organizations from external domain spoof.  Office 365 recognizes emails from external domains having proper SPF, DMARC, and DKIM authentication settings as legitimate/authentic and therefore allow them to pass authentication, uninterrupted.

This normal process is however challenged when external domains do not have these settings properly configured. Without enforcement of these settings, domains show a high likelihood of being manipulated and maliciously spoofed, leaving customers vulnerable to phishing or spam attacks. The new external domain anti-spoofing capabilities help detect and block emails from external domains that do not have the following features,

  1. Correct authentication configuration
  2. An email infrastructure source with an unknown history

How does it work?

A newly enhanced filter in ATP first checks if the email from external domains, passes SPF, DKIM, and DMARC test.  If not, the filter thoroughly checks for historical sending patterns of that domain and associated infrastructure. If any suspicious behavior is noted, ATP assumes the sender does not bear a good reputation and as such, proceeds to junk the message.

Also, a feature worth noticing about Anti-spoofing – The filter constantly evolves and enhances itself based on mail flow patterns it observes.  ATP subscribers can access the spoof intelligence report in their Antispam Policy and take necessary actions if required.

What Terms You Need to Know to Get Your Business GDPR-Ready

 

What Is EU GDPR? 

The EU GDPR is a law designed to protect and empower residents of the EU by guiding business usage of personal data. In essence, it is reshaping the way corporations handle personal data by controlling its collection, use, and storage. It will replace the regulations and frameworks of the existing 20-year-old directive (95/46/EC).

 

Who Is the GDPR Protecting and Empowering? 

The data subject: This is any individual that can be directly or indirectly identified or uniquely singled out in a group of individuals, from any stored data.

 

What Is the GDPR Protecting? 

Personal data: This is any information relating to an individual, whether in reference to their private, professional, or public life. It includes things like names, photos, email addresses, location data, online identifiers, a person’s bank details, posts on social networking websites, medical information, work performance details, subscriptions, purchases, tax numbers, education or competencies, locations, usernames and passwords, hobbies, habits, lifestyles, or a person’s computer’s IP address.

 

Who Is the GDPR Regulating? 

The data controller: This is the person who, alone or jointly with others, determines the purposes for, and means of, processing personal data. A data controller is not responsible for the act of processing (this falls to the data processor); they can be defined as the entity that determines motivation, condition, and means of processing.

Generally, the role of the controller is derived from the organization’s functional relation with the individual. That is, a business is the controller for the customer data it processes in relation to its sales, and an employer is the controller for the employee data they process in connection with the employment relationship.

 

Who Else Is the GDPR Regulating? 

Data processors: This is the person who processes personal data on behalf of the controller. Typical processors are IT service providers (including hosting providers) and payroll administrators. The processor is required to process the personal data in accordance with the controller’s instructions and take adequate measures to protect the personal data. The GDPR does not allow data processors to use the personal data for other purposes beyond providing the services requested by the controller.

 

What Does the GDPR Consider “Processing?” 

Processing refers to any operation or set of operations performed upon personal data, whether or not by automatic means—such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure, or destruction. Processing must be fair and lawful, although transparency is significantly strengthened. The processor may not use the personal data for their own purposes.

 

What Rights Do the Data Subjects Have? 

Under the GDPR, data subjects can request the following:

  • To be informed about the data processing
  • To consent to the processing of their personal data (opt in) or object to the processing of their personal data (opt out)
  • To obtain their personal data in a structured and commonly used format in order to transfer that data, in certain circumstances, to another controller (data portability)
  • To not be subject to fully automated data processing or profiling
  • To know what data is processed (right of access)
  • To correct where any data is incorrect
  • To have data erased under certain circumstances, for example, where the retention period has lapsed or where consent for the processing has been withdrawn (referred to commonly as the “right to be forgotten”) and to register a complaint with the supervisory authority

 

Other Key Elements to Consider in Preparing for GDPR

We’re not done yet. There are four more important elements to consider with GDPR as you become ready.

 

1) Data Breach Notification

For controllers, GDPR requires that breach notice must be provided, where feasible, within 72 hours of becoming aware of a breach; processors need to provide notice to controllers without undue delay. Any data breaches must be documented.

2) Data Minimization

This requires the level and type of data being processed to be limited to the minimum amount of data necessary. This requires you to ensure that the purpose in which the data is agreed and the purpose in which the data was collected are materially similar. The processors should ensure that individuals’ privacy is considered at the outset of each new processing, product, service, or application, and only minimum amounts of data are processed for the specific purposes collected and processed.

3) Data Pseudonymization

The GDPR defines pseudonymization as “the processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information.” To pseudonymize data, the “additional information” must be “kept separately and subject to technical and organizational measures to ensure non-attribution to an identified or identifiable person.” In other words, it is a strategy designed to enhance protection and privacy for applicable identifying data.

Although similar, anonymization and pseudonymization are two distinct techniques that permit data controllers and processors to use de-identified data. The difference between the two techniques rests on whether the data can be re-identified.

4) Fair Processing of Personal Data

This requires the processing of personal data to be fair and lawful. Generally, only the level and type of data collected should be limited to the minimum amount of data necessary (see data minimization above). There are a number of methods in which the data may be processed, including: express consent (which may be withdrawn at any time), legitimate interest basis (the subject of which legitimacy may be challenged by the data subject), honoring obligations under the agreement with the data subject, or any other legal basis that may apply.

 

What We Can Do to Help

We know this information can be overwhelming, but taking the proper steps now will save you headaches later. SolarWinds provides products that can help you with getting ready. Our Risk Intelligence software is one of them, providing you with hard data on:

  • A business’ quantified financial risk
  • Personally identifiable information (PII)
  • Protected health information
  • Payment information located in storage
  • Access permissions for sensitive data

Search your ‘data at rest’ for risk areas and start the data mapping you need to get ready for GDPR.

Microsoft announced Attack Simulator for Office 365 Threat Intelligence

 

Admins can send simulated phishing and attack emails to find security and training weaknesses.

A few weeks ago, Microsoft released a public preview for Attack Simulator for Office 365 Threat Intelligence. On April 17th Microsoft announced that Attack Simulator is now generally available. Attack Simulator for Office 365 Threat Intelligence is available to all Office 365 E5 or Office 365 Threat Intelligence customers.

With Attack Simulator, customers can launch simulated attacks on their end users, determine how end users behave in the event of an attack, and update policies and ensure that appropriate security tools are in place to protect the organization from threats.  The GA of Attack Simulator adds a new HTML editor so realistic looking HTML emails can be sent in simulations of spear-phishing.  Also, two spear-phishing templates are available for immediate use in the spear phishing simulation.

Attack Simulator includes the three attack scenarios from our public preview.

Display Name Spear Phishing Attack: Phishing is the generic term for socially engineered attacks designed to harvest credentials or personally identifiable information (PII). Spear phishing is a subset of this phishing and is more targeted, often aimed at a specific group, individual, or organization.  These attacks are customized and tend to leverage a sender name that generates trust with the recipient.

Password Spray Attack: To prevent bad actors from constantly guessing the passwords of user accounts, often there are account lockout policies.  For example, an account will lockout after a certain number of bad passwords are guessed for a user.  However, if you were to take a single password and try it against every single account in an organization, it would not trigger any lockouts.  The password spray attack leverages commonly used passwords and targets many accounts in an organization with the hope that one of the account holder uses a common password that allows a hacker to enter the account and take control of it.  From this compromised account, a hacker can launch more attacks by assuming the identity of account holder.

Brute Force Password Attack: This type of attack consists of a hacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

 

 

This video demonstrates how Attack Simulator can help organizations educate users to become more secure from cyber threats.  With Attack Simulator, admins can train all their end users, and especially those who are attacked most often.  This proactive training is a powerful way to ensure that your organization can prevent the impact from advanced threats.  Over the coming months, more threat simulations will be added to Attack Simulator so organizations can simulate the most prevalent threat types from the modern threat landscape.

Experience the benefits of Attack Simulator for Office 365 Threat Intelligence by beginning an Office 365 E5 trial today.  Also, learn more about how Microsoft leverages threat intelligence and the value of threat intelligence.

What You Need to Know About the Big Chip Security Problem

According to Intel Corp.,most of the processors running the world’s computers and smartphones have a feature that makes them susceptible to hacker attacks. The chipmaker, working with partners and rivals, says it has already issued updates to protect most processor products introduced in the past five years, but the news sparked concern about this fundamental building block of the internet, PCs and corporate networks.

The revelation of the so-called Meltdown and Spectre vulnerabilities spurred a scramble among technology’s biggest players, from Apple Inc. to Amazon.com Inc., to enact fixes and reassure customers they were on top of the problem.

1. What’s the problem?

Modern processors guess what they’ll have to do next and fetch the data they think they’ll need. That makes everything from supercomputers to smartphones operate very fast. Unfortunately, as Google researchers discovered, it also provides a way for bad actors to read data stored in memory that had been thought to be secure. In a worst-case scenario, that would let someone access your passwords.

2. How bad is it?

The vulnerability won’t stop your computer working and doesn’t provide an avenue for hackers to put malicious software on your machine. Though it could put important data at risk, there’s been no report so far of anyone’s computer being attacked in this manner. More broadly, though, the new fears could undermine longtime assurances that hardware and chip-level security is more tamper-proof than software.

3. How was it discovered?

The weakness was discovered last year by folks Google employs to find such issues before the bad guys do. Usually, solutions are developed in private and announced in a coordinated way. This time the news leaked before the companies involved had a chance to get a fix in place.

 

 

4. What’s being done to fix it?

Chipmakers and operating system providers, such as Alphabet Inc.’s Google and Microsoft Corp., are rushing to create software patches that will close the potential window of attack. Intel said that it expects to have issued updates for more than 90 percent of recently introduced processor products. Amazon.com Inc. said “all but a small single-digit percentage” of its servers have already been protected. In a blog post, Google said its security teams immediately “mobilized to defend” its systems and user data. Some customers of Android devices, Google Chromebook laptops and its cloud services still need to take steps to patch security holes, the company said. Patches for Windows devices are out now and the company is securing its cloud services, Microsoft said in a statement.

5. Is this just an Intel problem?

No, though that seems to be what panicky investors initially thought. Intel says it’s an issue for all modern processors. But rival Advanced Micro Devices Inc. stated that its products are at “near-zero risk.” ARM Holdings, which has chip designs that support all smartphones, said that, at worst, the vulnerability could “result in small pieces of data being accessed” and advised users of its technology to keep their software up to date. Google fingered all three companies. Apple said all Mac computers and iOS devices — including iPhones and iPads — were affected, but stressed there were no known exploits impacting users and that steps taken to address the issue haven’t dented performance.

6. What will the fallout be?

Some computers, mostly older ones, could be slowed down by the software patches that will make them more secure. Intel said that in common situations software might be slowed down by as much as 3 percent or not at all. But in other rare situations, performance might be reduced as much as 30 percent. The company doesn’t expect any financial impact and said it thinks customers will keep buying. As the fixes haven’t been widely deployed yet, it’s unclear whether anyone will even notice or whether computer slowdowns will be widespread. Intel has only done lab tests.

Windows 10 SSTP VPN Manual Setup Tutorial

Manual Setup

Step 1

Go to your start menu, and type in “network”.  In the search results click on “Network and Sharing Center”

Step 2

Select Connect to a workplace and click Next

Step 3

Click on Use My Internet Conection (VPN)

Step 4

Enter in the internet address (provided by your IT Professional), Name then Create

Step 5

Network and Sharing Center window should still be opened.  Click on Change Adapter Settings

Step 6

Right Click on the new connection you made, then go to Properties

Step 7

Go to the Security Tab, and change your properties to be the same as the below image. Press OK once done.

Step 8

Right Click the Connection and choose “Connect” option.

Step 9

You will be prompted for your username and password for your VPN. (provided by your IT Professional). Enter them as provided. ex. DOMAIN\username and password.

After a few seconds it will connect and show you “Connected” status.

Step 10

You can also check the VPN status in the Network applet (the icon in your system tray at the bottom right).

Connecting the SSTP on Windows 10

Find the network connections icon in the bottom right corner of the screen (near the clock). The icon can be in the shape of computer display or wireless signal meter (you can see it on Step 10). Click on that icon. In the appeared list click on any network connection.
After that you will see another window with the connection list, click on theVPN connection (the connection name can be different, you have set it up on Step 5).
Click the “Connect” button under the connection name.

Disconnecting the SSTP on Windows 10

Find the network connections icon in the bottom right corner of the screen (near the clock). The icon can be in the shape of computer display or wireless signal meter (you can see it on Step 10). Click on that icon. In the appeared list click on any network connection.
After that you will see another window with the connection list, click on theVPN connection (the connection name can be different, you have set it up on Step 5).
Click the “Disconnect” button under the connection name.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Here are the top features of iOS 11

The 10 best features you won’t be able to live without

Ready for some new iPhone and iPad features? iOS 11 is now out of beta and ready for the public. Here are the best features that came with it.

Get ready to back up your iPhone and iPad: iOS 11 is here. Apple released the latest version of its mobile operating system on Tuesday, introducing us to a handful of brand-new features. In fact, this version of iOS feels like the most ambitious version of iOS that Apple has launched in a while. Here are the best new features that we already can’t live without. 

Siri’s new tricks

Siri is one of those features that keeps getting better with each software upgrade, and iOS 11 is no exception. This time, Siri gets a new voice, plus a super-helpful visual interface that lets you even edit your voice request with text input. And now, Siri is able to translate phrases for you—it can process English to Chinese, French, German, Italian, and Spanish. Apple said that it will add more languages in the months to come.

Customizable Control Center

Currently, Control Center in iOS 10 takes up two panels, so you have to navigate to the second panel to access volume controls. However, iOS 11 brings everything back to a single screen and relies more on 3D Touch. Not only that, but you can also customize which controls you’d like to have on there. You can add new controls to quickly access your Wallet, turn on Low Power Mode, and even start Screen Recording—an all-new feature for iOS.

New Live Photo effects

Apple has given us more reasons to want to take Live Photos, those GIF-like moving images. In iOS 11, you can add effects to your Live Photos after you take them. Find a Live Photo on your camera roll and then swipe up. You will be able to add a looping effect to your photo or make it “bounce” back-and-forth, similar to an Instagram Boomerang. You can also make it a long exposure shot for better photos of low-lit scenarios.

Drag-and-drop on iPad

iOS 11 makes for better multitasking on iPad. Now you can drag-and-drop images, links, and files between apps that are open side-by-side, either in Split View or Side Bar mode. In fact, you can drag-and-drop an app from Dock onto Side Bar mode, and drag that secondary app from the right to the left side of the screen.

Markup your screenshots

Everytime you take a screenshot in iOS 11, it will automatically remain floating on the lower left. You can swipe it offscreen to save it to your camera roll as per usual, or you can tap on it to go into Markup. So now, you can add handwritten notes or comments either with your finger or with your Apple Pencil if you’re using an iPad Pro.

Social profiles in Apple Music

Apple Music gets social in iOS 11. Taking a page from Spotify, Apple Music members now have a profile on the streaming app. You can use your profile page to showcase your favorite playlists, as well as the albums you’ve recently listened to. You can also follow friends on Apple Music, and their profile photo will show up next to the albums they’ve listened to. However, there is currently no way to listen to music on private or secret mode, so be ready for your Apple Music followers to get a glimpse at all your guilty pleasures.

Do Not Disturb While Driving

This feature could be a real life-saver. iOS 11 also introduces “Do Not Disturb While Driving” so that the screen goes totally dark when you’re on the road. You can activate this mode manually via Control Center or have it turn on automatically whenever you’re connected to CarPlay or a car’s Bluetooth. In addition, you can go into your Do Not Disturb Settings to setup an automatic response to all your incoming texts to alert people that you’re driving and will get back to them as soon as you arrive.

Document scanner in Notes

There’s no reason to run to the office scanner anymore, thanks to iOS 11. Using the Notes app you can now press the plus (+) sign to access an all-new document scanner. You can scan several documents at once and apply different filters. The scans can be saved inside your Notes, and you can also export them as PDF files that are Markup-friendly, so you can add your signature and send it back.

Search for handwritten Notes

Another cool feature that iOS 11 brings to Notes is the ability to search for things you’ve written our by hand. If you prefer to take notes using your finger or your Apple Pencil on iPad Pro, they are now searchable. 

QuickType keyboard improvements

iOS 11 also makes significant improvements to the software keyboard. On iPhone, you can press-down on the globe icon and choose one-handed mode. This will bring all the keys closer to either the left or right side of the screen to make it easier to type with one hand. You can also make one-handed mode your default keyboard by going into Settings. For iPad, you can now type numbers, symbols, and punctuation marks without switching to a secondary keyboard. Simply flick down on the key to insert the character you need. 

What we’re still waiting for

Apple previewed a lot of new features for iOS 11, but not all of them are yet available. Here’s a quick look at what’s to come later this fall.

1. Apple Pay Cash for sending or receiving cash within Messages

2. Indoor maps for Apple Maps to help you navigate popular shopping centers and major airports worldwide. 

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

How I deleted Google from my life

I realized handing over my entire life to one platform had its downsides.

I deleted Google from my life, and I can show you how to do it, too.

After being a devoted Googler for many years, I realized putting all my data on one platform had its downsides. A couple of factors in particular drove me to make a clean break.

Deleting Google for privacy and security

The appeal of escaping Google comes down to privacy. Google collects an alarming amount of data about you. It’s safe to say that if you’re not a paying customer then you’re the product being sold, and that’s Google’s business model.

Security goes hand-in-hand with that. I’m sure Google’s servers are closely guarded, but I still didn’t want all my data to be concentrated in one place.

To Google’s credit, the company gives you tools to opt out of the give-us-your-private-data-for-our-services game altogether. We cover the basics in these two articles:

  • How to download your Google data so you can see what’s being recorded.
  • How to delete your Google data to protect yourself.

Deleting Google for social impact

Another reason to get rid of Google is make your choice as a consumer for a healthier, more responsible media. As a working journalist, I’m acutely aware that Google and Facebook jointly dominate the media distribution and discovery landscape. With no strong competitors to Google Search in particular, Google’s algorithms hold unprecedented sway over the discourse in our society.

The importance of search discovery means that publishers and journalists must write stories to match the queries typed in by readers. That means coverage is guided by readers’ preconceived notions about a news event, not by objective reporting. That’s a deeply disturbing state of affairs for any democratic society.

Google outwardly seems as dedicated to responsible stewardship as one could hope, but it’s still concerning enough to merit supporting alternatives and competitors.

How my Google-free experiment started

When I decided to drop Google, I had just left a full-time job at a company that used Google mail and other apps. I stopped using all Google products while I freelanced. Note: If you’re an Android user, this is basically a no-go. Fortunately, I use a combination of Windows PCs, Macs, and iOS devices, so I wasn’t trapped.

Everyone uses Google differently, but I focused on forgoing the services that are core to the experience: Gmail, Docs, Drive, Calendar, Maps, and Search.

Dropping Gmail was easier than expected. I tried Yahoo! Mail, but there were too many ads for my taste. The web interface for Apple Mail at icloud.com was just adequate. I found Microsoft’s overhauled Outlook web interface (and truly excellent mobile app) was the best alternative.

Apple’s iWork for iCloud lets you use its productivity applications and share content across devices.

Instead of Docs, I tried Office 365 and iWork for iCloud. I liked them both better than Docs because I prefer native apps to web apps, and because I think both have more elegant designs—especially iCloud. Apple’s iWork for iCloud is similar to Docs in that it’s online-only, and designed for collaboration. It also has a mobile app. Office 365 will be pretty familiar to anyone who’s worked with Office’s desktop versions.

It was also pretty easy to kick Drive to the curb. Cloud storage competitors abound. I always preferred Dropbox to Drive anyway because I find that its OS X and Windows apps are better-integrated into the OS’s normal file browsing experience. Google Drive feels like it’s meant to be a place to store documents and back up files, not seamlessly augment your local storage—even though it does that in some ways.

Dropbox’s file-sharing features are competitive and in some ways better than those in Google Docs.

Google Calendar has plenty of competition. This is a more personal choice, and people can get very attached—consider the furor when Microsoft shuttered Sunrise Calendar. On the other hand, it inspired us to find third-party alternative calendars, which could also replace Google Calendar.

What didn’t go well

I tried Apple Maps. I tried Waze. Google Maps is still the best.

I couldn’t quit everything Google offered so easily. Google Maps alternatives were a challenge. Your best bets are Waze or Apple Maps, but let’s be honest—they have nothing on Google Maps. Unlike Apple Maps, Waze has a web app, and powerful community-sourced data is its biggest selling point. But guess what? Google uses Waze’s data in Maps! So rather than gaining that feature, you’re just losing all the stuff Maps has that Waze doesn’t.

Google Search rules for a reason. The only two decent alternatives I found were Bing and DuckDuckGo.

Bing is as good or better than Google in many respects, but Google’s algorithms and semantic search win hands-down.

Bing is a strong competitor. Some features, like video search, are even better than what Google offers. But Bing’s algorithm and the semantic search show more cracks than Google’s do.

DuckDuckGo isn’t as full-featured, but it records no user data—that’s the primary selling point of the platform. Both search options were passable, but Google has nailed semantic search with a precision that no one else can touch.

Back in Google’s grasp

I lived Google-free for five months, compromises and all. Then I was hired at a new job that required me to use Google. I considered the experiment a success, to the point that I was dismayed to abandon it at the new gig.

Google has us in its grasp for good reason. Looking back at my life without it, I can honestly say some alternatives couldn’t compare. Your mileage may vary based on which services you value most. If you decide to delete Google from your life, too, let us know how it goes on our Facebook page.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

APPLE WARNS OF WI-FI HACK: Could wipe out iPhones, issues fix

If you use Wi-Fi on your iOS device, get this security update

The tech giant says there is a new cyber threat, but has taken steps to thwart the attack.  According to the reports, “Apple has now issued a critical security patch for all iOS devices and for Mac computers against a potential hack that could come remotely via Wi-Fi.”


The virus is being considered a potentially serious threat, so the company is urging users to install the updates to protect their devices.

The latest cyber threat is also a risk to Android device users, but Google has taken steps as well to block the virus.

“The vulnerability also has the potential to attack Android devices, but Google issued its own security patch earlier this month.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.