Microsoft Offers $40 Windows 8 Pro Upgrade

We set out to make it as easy as possible for everyone to upgrade to Windows 8. Starting at general availability, if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99 in 131 markets. And if you want, you can add Windows Media Center for free through the “add features” option within Windows 8 Pro after your upgrade.

When you use Windows.com to purchase an upgrade to Windows 8 Pro, the Windows 8 Upgrade Assistant makes upgrading simple by walking you through the upgrade process step-by-step from purchase to download and then of course installation.

The Windows 8 Upgrade Assistant will check to make sure your PC is ready for Windows 8. It will provide a detailed compatibility report that lets you know of anything you may have to address before or after the upgrade and outlines actions to take.

It will also inform you of any application or device compatibility issues. It will ask you what you want to keep from your current Windows installation. You will be able to upgrade from any consumer edition of Windows 7 to Windows 8 Pro and bring everything along which includes your Windows settings, personal files, and apps. If you are upgrading from Windows Vista, you will be able to bring along your Windows settings and personal files, and if you are upgrading from Windows XP you will only be able to bring along your personal files. Of course, if you want to start fresh, you can choose to bring nothing along. Or if you prefer to format your hard drive as part of your upgrade experience, you can do so as long as you boot from media and then format your hard drive from within the setup experience for installing Windows 8, not prior to it.

Once you purchase your upgrade, the Windows 8 Upgrade Assistant kicks off your download. It has a built-in download manager that allows you to pause and continue your download at any time as well as a check to ensure your download completes successfully.

After your download finishes, you can choose to proceed with the upgrade (“Install now”) or install later either from your desktop or by creating your own media. If you choose to create your own media, you will be able to create your own bootable USB or .ISO file which can be burned onto a DVD for upgrade and backup purposes. If you prefer, you also have the option of purchasing a backup DVD for $15 plus shipping and handling.

We believe that your upgrade experience in Windows 8 will be a breeze by offering a faster experience, a single upgrade path, and compatibility from prior versions of Windows. We’ve continued to listen to our customers and have expanded the ability to download to over 100 countries and 37 languages. We have simplified the Windows upgrade experience with the Windows 8 Upgrade Assistant which supports you during your upgrade with everything from selecting your language to pausing your download to built-in compatibility checks – it’s seamless. And if you’re an enthusiast you will have the flexibility to download and control how you upgrade.

If you prefer to shop at a local store, a packaged DVD version of the upgrade to Windows 8 Pro will be available for $69.99 during this promotion.

This upgrade promotion for Windows 8 Pro both online and at retail runs through January 31st, 2013.

Oh, and by the way – if you’re not upgrading from a prior version of Windows and are building your own PC or installing Windows 8 in a virtual machine or a separate partition, you will be able to purchase and install the Windows 8 and Windows 8 Pro System Builder product.

Business Case For Supporting Employee Use of Social Media

What’s your company’s policy on employees using social media in the workplace?

Many companies today are still fearful of employees using social media, especially while at work. Employer concerns range from loss of productivity, industry espionage, confidentiality breaches, and public complaints about the company and/or its managers. As a result, some companies have requested access to employee (or potential employee) Facebook profiles, as well as blocked access to social networking sites while at the office.

In contrast, other companies — for example RingCentral — encourage employee engagement on social media. There are multiple benefits to embracing employees using social media in the workplace, as illustrated by the below infographic from SilkRoad, a cloud-based social talent management solution. At RingCentral, we prefer that employees get involved with our social media channels, and we encourage them to share news about the company through their personal social networks. To prevent any confusion, we implemented a social media corporate policy that clarifies the dos and don’ts of participating in social networks as a RingCentral employee. The net net? The benefits of employees on social networks far outweigh the negatives.

Is your company supportive of employees using social media?

Changes to SSL Certificates Industry Wide

SSL Certificate Industry Change

There’s a pretty big change coming for SSL Certificates. And, we think it’s really important to keep you in the loop on these changes.

The biggest change you need to be aware of: if you have an active SSL certificate with an intranet name (e.g.’server1?, ‘mail’, ‘www’, ‘server2.local’, etc.), or a reserved IP address, it’s going to be revoked by October 1, 2016.

Also, on July 1, 2012, customers will no longer be able to purchase, renew, rekey, or manage their SSLs with intranet names or IP addresses that expire past November 1, 2015.

This is an industry-wide decision, not one specific to our company.

For more information on the Certification Authorities Browser Forum guidelines, go here.

For more information on which IPv4 Addresses are reserved, go here. We do not support any certificates using IPv6.

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started now

Would You Trust Facebook With Your Money?

These days, brick and mortar businesses displaying some kind of signage saying “Like us on Facebook,” are nearly as common as those displaying Visa and MasterCard logos. That’s worth considering, when you think about using Faceabook as a way to pay for goods and services in the physical world.

Of course, Facebook users have developed some trust issues with the site over the years. It would be quite interesting to see if a PayPal-like service from Facebook would be widely adopted. It’s one thing to trust a third party with your status updates and photos. It’s another to trust them with your money.

Would you trust Facebook to handle your money?

Last week, Facebook announced that it is getting rid of Facebook Credits, in favor of real money. Facebook users will start paying for virtual goods using their native currencies: Dollars, Pounds, Yen, etc. This represents the beginning of users being able to treat their Facebook account like a bank account, or at least like a PayPal account and paying online. I’m not sure if Facebook is FDIC insured.

While Facebook did not say anything about using currency to pay for things in the physical world, one can simply connect the dots. For one, Facebook has over 900 million users. Many of them carry it around in their pocket all day long. Now, consider that Facebook recently acquired Tagtile, described as “your universal loyalty card,” for which you can “visit local stores, tag the Tagtile Cube with your phone, and get rewarded for being an awesome customer.”

If Facebook is going to offer a digital loyalty card to use at stores, and Facebook is going to have user account balances based on actual money, it seems only logical that users will simply be able to pay with their Facebook accounts, as long as businesses adopt the technology.

Of course it would give Facebook yet another way to compete directly with Google.

Plink co-founder Peter Vogel wrote at TechCrunch, “Last year, 15 million people bought Facebook Credits, according to their S-1 filing, so it’s assumed Facebook has close to 15 million credit cards on file. By the end of this year, once paid apps are added to Facebook’s App Center, it wouldn’t be surprising if 50 million people, or about five percent of Facebook’s users are purchasing apps and other digital good, like movies, music and TV episodes, which means Facebook would have a pool of 50 million people who have entrusted it with their credit card information.”

“At that point it’s a very short distance to a ‘Pay with Facebook’ blue box showing up every time you make an online purchase (on web sites everywhere, not just on Facebook),” he adds. “Why re-enter your credit card number when you already trust Facebook to handle the transaction and bill your card? For Facebook users this could be seen as more convenient and safer than entering their credit card number on multiple sites. Facebook is PayPal on steroids, with the strength of a billion members.”

That’s an incredibly good point. Think about how the Facebook sign-in option already works for many sites in the web (and especially from mobile devices). It is so much more convenient to simply tap the button to sign in with Facebook than having to enter a whole other account name or email address and password. Paying this way could save a lot of time and hassle.

This already exists, you know:

 

 

If Facebook can get people paying online regularly, people may start putting more of their money into Facebook accounts, which will make them a lot more likely to pay for things offline.

The Trust Factor

That trust factor could be a major obstacle for Facebook, however. Privacy issues have been rampant with the the social network’s dealings for years. Last year, as the result of a settlement with the Federal Trade Commission, regarding privacy, Facebook had to agree to regular third-party audits to make sure it remains in compliance. This all came after Facebook was found to have not kept its promises, by not warning users of privacy changes or getting their approval in advance. Essentially, changes were made an an opt out basis, rather than users opting in.

Just this week, the company switched default email addresses of users to Facebook email addresses without warning. This isn’t exactly a privacy issue, but it’s another change being made to users’ personal accounts for them. Things like this tend to irk users, and don’t do much to make users more comfortable with how the company is handling their accounts. A Lifehacker article even goes into all the reasons why the switch to a Facebook user email address is less than beneficial.

Another big Facebook story this week is about a feature that Facebook rolled out called “Find Friends Nearby,” which was quickly pulled after the CEO of Friendthem claimed Facebook has stole their idea, and threatened to sue. If you’ve seen The Social Network or read book it was based on, you’ll know that Facebook has a long history of being accused of such things. That’s not to say whether or not these things have merit, but public perception is a valuable thing. Some people already have a hard enough time trusting banks with their money.

Side note: It’s unclear, by the way, if the Friendthem situation was directly related to Facebook pulling the feature. The company claims it was only a test, and not a formal roll-out anyway. It does appear to be based on the company’s acquisition of social discovery app Glancee.

Another question worth considering is whether or not people want one company to have so much control over their lives. Do you want to keep so much personal information, photos, videos, and money all under one Internet-based account. There are major hacking stories in the news frequently these days, and many may be hesitant based on that very fact.

This month, another prominent social network, LinkedIn, fell victim to a password leak. LulzSec hackers managed to gain access to 10,000 Twitter accounts via a vulnerability in a third-party app. Consider how many third-party apps are connected to Facebook. According to the company, as of March, over 9 million apps and websites were integrated with Facebook users. How much bigger of a target would Facebook be with more people keeping their money tied up in their accounts.

Of course, people are already keeping some amount of money tied up in Facebook, on a much smaller scale than what the future may very well hold.

“People can store their payment information on Facebook in a trusted environment and then make purchases across a range of apps – without having to re-enter their payment information in each app,” Facebook says about its current Payments offering. “Payment options include credit and debit cards, PayPal, mobile payments, gift cards and numerous local payment options around the world.”

If Facebook makes a significant transition to the offline, non-app world (like its peers are also trying to do), will you make the transition along with them? Will you use your Facebook account to buy burgers, gas or other every day items?

Five Must-Have Apps For Your USB Stick

Takeaway: Don’t get caught out in the field without the tools you need. A USB stick equipped with a few essential apps might just save the day.

Ah, the USB stick — one of the IT admin’s best friends. It travels with you and helps you rescue machines, work magic, and make end users sigh with relief. Some of these USB apps you copy to the hard drive and install; others can be run from the USB stick itself. A few of them are full-blown operating systems that can help you completely recover a corrupted or infected platform.

Whatever the style and purpose, there are plenty of portable apps for the USB stick that can be hard to live without. Here are five tools I deem must-haves.

1: SystemRescueCD

SystemRescueCD  is the Linux distribution to have if you’re going to carry one around on a USB stick. With this distribution, you can recover partitions, recover data, image a disk, test a hard disk, edit configuration files, burn a disk, check for rootkits, run an antivirus scan, securely wipe a hard drive, and much more.

2: Portable Firefox

Portable Firefox is there when you need it. Sometimes, a Web browser is a necessity for solving a problem. But when the browser on the desktop won’t run, what do you do? You break out your portable edition of Firefox. This version of Firefox has all the great features you’re used to. In fact, some will be hard-pressed to figure out that Firefox is running from a USB stick.

3: ComboFix

ComboFix makes almost every recovery tool list for me. No admin kit is complete without this powerhouse. It is my go-to tool when I encounter some of the nastier viruses and rootkits. Almost without fail, if an antivirus can’t catch it, ComboFix can. Unlike common antivirus and anti-malware applications, ComboFix will display (upon completion of running) a detailed report of exactly what it took action on. Note: To run ComboFix, you’ll need to copy the .exe over to the computer and install it.

4: FileZilla Portable

FileZilla Portable is the one and only FTP client to carry around with you. Why would you need an FTP client? There will be times when you must load a file from a troubled computer to another machine. The easiest way to do this (when all other methods fail) is by using a portable FTP client. This is especially crucial when the file is too large to fit on a USB drive or if the file must be loaded to a remote machine you do not have physical access to. This application is run directly from the USB drive and isn’t installed on the PC.

5: Explorer++ Portable

Explorer++ Portable is a file manager with all the usual features you’ve grown to expect from a file manager. But why should you carry a file manager with you? Have you ever had to repair a machine where Explorer won’t run? Makes for a major challenge. Having a portable file manager gets around that issue with ease. And why not have a file manager with features like tabs, keyboard shortcuts, a customizable UI, drag-and-drop support, and merging and splitting? In the end, the file manager is one of the most important tools on a PC. Without it, a machine can easily become crippled.

6: PortableApps

You might have noticed some of these apps link directly to the PortableApps site. That is a tool designed to make your life much easier. You can install PortableApps on your USB drive and then have a user-friendly system to add and remove apps to and from that USB drive with ease. I highly recommend this application for any and all IT admins.

Microsoft Surface: iPad knockoff for enterprise?

As I’ve said many times, I barely have any use for the new iPad. Most technologists I know feel the same way about tablets. However, most of us understand that we’re an anomaly. For tens of millions of people, using a tablet like the iPad is infinitely easier and less frustrating that dealing with a Windows laptop. That’s why tablets are eating the bottom out of the PC market, and the trend is accelerating.

Microsoft knows this. It also knows that an alarming number of companies are allowing their employees to use iPads and some are even running trials to hand out the new iPads to lots of highly mobile employees. What’s even worse for Microsoft is that most of these employees are loving it and are gladly chucking their Windows laptops aside.

 

While a lot of these employees will still periodically use Windows machines for some of their work, they’re using them less frequently and that means slower PC upgrades and less urgency to jump to Microsoft Windows 8. We’re still only talking about a fraction of the market — iPad will sell 60 million units in 2012 versus 400 million PCs, according to Gartner. Nevertheless, it has Microsoft freaked out because it’s been just a little over two years since the iPad debuted.

That’s a lot of disruption in a short period of time.

Of course, that brings us to the announcement of the Microsoft Surface tablet this week. Microsoft turned a lot of heads by revealing that it is going to build its own line of Microsoft Windows 8 tablet devices, à la Zune and Xbox. The hardware design for the Surface that Microsoft showed off on Monday was impressive enough to pique the interest of the tech press and the public.

The tablet itself looks a lot like the new iPad and many of the high-end Android tablets, but there were a pair of features that stood out. The first was a sturdy built-in kickstand that stealthily pops out from the back of the tablet. The second is the magnetic cover that doubles as a keyboard and touchpad. When you put these two features together you suddenly have a tablet that easily doubles as a laptop. That eliminates the need for someone to have two devices.

Sure, the hardware of the Microsoft Surface Tablet echoes the iPad. But, Microsoft did use a special magnesium body that makes it light, thin, and durable. Sure, the cover of the Surface is a copy of the iPad’s Smart Cover, but Microsoft did innovate by adding a keyboard on the inside.

There’s plenty about the Microsoft Surface Tablet that screams, “iPad knockoff!” and the failure of Android tablets and the tablet debacles at RIM and HP show that trying to build an iPad competitor for the enterprise can be a brutal business.

Still, the Microsoft Surface Tablet has something going for it that the BlackBerry PlayBook, HP TouchPad, and the parade of Android tablets don’t — it’s going to automatically drop into the Windows networks that most Fortune 500 companies as well as a lot of small and medium businesses already have in place. That’s going to mean a lot fewer worries about compatibility, security, and data protection. In other words, it means a lot less work for IT on the backend and a smoother transition for many users

That doesn’t mean the Microsoft Surface Tablet is a slam dunk. There is still a big question about whether users are going to find the Windows 8 interface as easy to use as the new iPad. And, will spyware and malware become a big problem on the Surface since it’s running the full version of Windows? Above all, how much is it going to cost? The Pro version of the Microsoft Surface Tablet that most businesses are going to want is expected to cost about the same price as an Ultrabook — in the $800-$1000 range.

Ultimately, if you want to think of the Microsoft Surface Tablet as an iPad knockoff with a few key innovations and additions that make it a legitimate option for businesses, that’s fine. A lot of companies will be happy to pay a premium for an iPad look-alike that automatically fits into their current networks and is guaranteed to work with their existing applications.

To View Full Article Click Here

The Microsoft Surface, Windows 8 Tablet From Microsoft

“It embodies hardware and software working together. People want to work and play,” Steve Ballmer said today amid much fanfare at Milk Studios in downtown Los Angeles. Microsoft has officially entered the ring with the Apple IPad. Microsoft views the Windows 8 Surface Tablet  as a “stage for Windows 8.” It’s 9.3mm thin, has full size USB 2.0 ports, a massive kickstand and weighs only 1.5 lbs. The casing is made out of magnesium (specifically, a material Microsoft calls VaporMg) and screen is covered in the Gorilla Glass 2 and optically bonded, a feature for the Microsoft Windows 8 Surface Tablet brags was specifically made for the Surface Tablet. The Microsoft Windows 8 Surface Tablet is directly aimed at consumers, and with that, the iPad.

Windows 8 is at the core of  Microsoft’s Surface Tablet. As such, it’s Metro device but also has access to all the Windows, not to mention Xbox features. Microsoft Surface Tablet is clearly the product Microsoft had in mind when it announced the Xbox SmartGlass feature at E3 earlier in the month.

Microsoft also announced several accessories for the Microsoft Surface Tablet including a clever 3mm thick cover that features a full (albeit super-slim) keyboard. Since it’s held on by magnets, it will likely be called a copy of the iPad’s SmartCover, too. The backside of the Surface even features a massive, unit-wide kickstand.

There will be two hardware options for Microsoft’s Surface Tablet, with both an ARM option and, for the full Windows experience, an Intel chip.

But like most hardware, it’s nothing without the right software. Ballmer was very clear at the beginning of the announcement event that the Microsoft Surface Tablet’s strength is the Windows ecosystem. This tablet runs Windows 8, and with that, both Metro and the traditional desktop environment. Every application that runs on Windows, save perhaps Skyrim and the like, should run on a x86 Surface.

Still, if Microsoft is attempting to take on Apple, it will need to court a new crop of developers. The iPad’s strength comes from its legions of small 3rd party devs that for the most part completely ignore all things Microsoft. Up until this product, there wasn’t another tablet platform with the same sort of penetration numbers as the iPad. But with the Surface Tablet, Microsoft is essentially giving developers a massive user base as the applications will hit both mobile and desktop units — and Metro’s dedication to the touchscreen makes the deal even sweeter.

The new Windows RT-powered Surface Tablet will sport either 32 or 64GB of storage depending on the purchaser’s preference, while the more traditional Intel variant will come with either 64 or 128GB. Microsoft declined to dive into specifics about their new tablet’s release, though they were quick to note that the Surface tablets would be priced “competitively” when they make it to market.

 

To View Full Article Click Here

10 Word Defaults You Can Customize

Takeaway: Change a few key default settings in Word and you won’t have to make the same tweaks over and over.

Word does a good job of assuming how the average user works, but some of Word’s default settings can be annoying and inefficient. Some users don’t know they can permanently change these settings, so they continue to reset them for each new document or just struggle along. Users should consider resetting the following defaults to work more productively. Of course, there are more defaults to set.

1: Line spacing

The default line spacing setting in Word 2007 and 2010 is 1.15, not 1, as it is in 2003. Microsoft believes 1.15 is more readable online. If you’re not generating Web content, adjust the style(s) you use in Word’s template (Normal.dotx), as follows:

  1. Click the Home tab.
  2. Right-click Normal in the Styles Quick gallery and choose Modify.
  3. Choose Paragraph from the Format list.
  4. In the Spacing section, change the At setting from 1.15 to 1, as shown in Figure A.
  5. Click OK.
  6. Check the New Documents Based On This Template option.
  7. Click OK.

Figure A

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This change will adjust all Word styles based on Normal, so be sure that’s what you want.

2: Smart quotes

If you generate Web content or other published material, you probably have to undo Word’s smart quotes in favor of straight quotes. You can do so quickly enough by pressing [Ctrl]+Z, but that becomes tedious after a while and you might forget. If you use straight quotes more than smart quotes, disable smart quotes as follows:

  1. Click the File menu and choose Options under Help. In Word 2007, click the Office button and click Word Options. In Word 2003, choose Auto Correct Options from the Tools menu and skip to step 4.
  2. Choose Proofing in the left pane.
  3. Click AutoCorrect Options in the AutoCorrect Options section.
  4. Click the AutoFormat As You Type tab.
  5. Deselect the Straight Quotes With Smart Quotes option in the Replace As You Type section, shown in Figure B.
  6. Click OK.

Figure B

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Disable smart quotes for all new documents.

3: Paste special

Word’s paste special feature retains the source formatting. If you’re pasting from foreign sources, you probably reformat it once it’s in your Word document. If you do this a lot, change the Paste Special default as follows:

  1. Click the File tab and choose Options. In Word 2007, click the Office button and then click Word Options.
  2. Select Advanced in the left pane.
  3. In the Cut, Copy, and Paste section, choose Use Destination Styles from the Pasting Between Documents When Style Definitions Conflict drop-down.
  4. Choose Keep Text Only from the Pasting From Other Programs drop-down, as shown in Figure C.
  5. Click OK.

Figure C

 

 

 

 

 

 

 

 

 

 

 

Several paste settings make this a flexible feature; choose the setting that’s most efficient for you.

This feature is significantly different in Word 2003. From the Tools menu, choose Options, and click the Edit tab. In the Cut And Paste section, click the Settings button to display the options shown in Figure D.

Figure D

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Word 2003 is more specific, but it allows some control.

4: File Location

Word saves your documents in My Documents. If you find yourself resetting the save location a lot, reset the default as follows:

  1. Click the File tab and choose Options. In Word 2007, click the Office button and then click the Word Options button. In Word 2003, choose Options from the Tools menu.
  2. Select Save in the left pane. In Word 2003, click the File Locations tab.
  3. Specify the new folder in the Default File Location field shown in Figure E. Or click Browse and locate it that way. In Word 2003, highlight the Documents item and click Modify. Use the Modify Location dialog to specify the new folder and click OK.
  4. Click OK.

Figure E

 

 

 

 

 

Word will save documents to the specified folder instead of My Documents.

5: Spacing between paragraphs

When you press [Enter], Word increases the line spacing to add a bit more white space between paragraphs. This extra space isn’t the same as a blank line, so you can’t delete it by pressing Backspace. To eliminate this extra spacing, do the following:

  1. Click the Home tab. In Word 2003, select Paragraph from the Format menu.
  2. Click the Paragraph group’s dialog launcher (the small arrow in the lower-right corner). In Word 2003, click the Indents And Spacing tab.
  3. Check the Don’t Add Space Between Paragraphs Of The Same Style option.
  4. Click Set As Default, as shown in Figure F. (Not available in Word 2003, but you can change this format for the current document.)
  5. Click OK.

Figure F

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Eliminate the additional white space between paragraphs.

6: Mini toolbar

When you select text, Word displays the mini toolbar, which hosts several formatting options. Even though it’s dimmed, it still annoys some users. You can press [Esc] to hide it or you can permanently disable it, as follows:

  1. Click the File menu and choose Options. In Word 2007, click the Office button and then click Word Options.
  2. Choose General in the left pane (if necessary).
  3. In the User Interface Options section, uncheck the Show Mini Toolbar On Selection option, shown in Figure G.
  4. Click OK.

Figure G

Uncheck this option to disable the mini toolbar.

7: Drawing canvas

Word’s drawing canvas is a distinct layer for drawing. Objects placed in a canvas have an absolute position and remain together as a group. Most users find the canvas layer difficult to work with and frankly, most users don’t need it. If you’re still using Word 2003, disable the canvas layer as follows:

  1. From the Tools menu, choose Options.
  2. Click the General tab.
  3. Uncheck Automatically Create Drawing Canvas When Inserting AutoShapes in the General Options section.
  4. Click OK.
  5. Word 2007 and 2010 disables the canvas layer by default. If you happen to be working with the drawing canvas enabled, disable it as follows:
  6. Click the File menu and then choose Options. In Word 2007, click the Office button and then click Word Options.
  7. In the left pane, choose Advanced.
  8. In the Editing section, uncheck the Automatically Create Drawing Canvas When Inserting AutoShapes option, shown in Figure H.
  9. Click OK.

Figure H

The drawing canvas is annoying enough that Microsoft finally disabled it by default in the Ribbon versions.

8: Normal.dotx

Word bases new documents on Normal.dotx, but the template’s settings might not fit your needs. If you have just a few changes, customize Normal.dotx. A common customization is to change the font and size. To make the change at the template level, do the following:

  1. Open a new document and click the Home tab.
  2. Click the Font group’s dialog launcher (the arrow in the bottom-right corner). In Word 2003, choose Font from the Format menu.
  3. Make the necessary font changes. For instance, you might choose Arial, 12.
  4. Before closing the dialog, click the Set As Default button. In Word 2003, click Default.
  5. In the resulting confirmation dialog, select the option to set the default for all documents based on the Normal template, as shown in Figure I.
  6. Click OK twice.

Figure I

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Make a font change at the template level.

Other template customizations you might want to make include margins and styles. Use a custom template, rather than Normal.dotx, to meet requirements that are more complex.

9: Word selection

When you select part of a word and then part of the next, Word selects the whole word for you — whether you meant to or not. To disable this selection option, do the following:

  1. Click the File tab and choose Options. In Word 2007, click the Office button and then click Word Options. In Word 2003, choose Options from the Tools menu.
  2. Choose Advanced in the left pane. In Word 2003, click the Edit tab.
  3. In the Editing Options section, deselect the When Selecting, Automatically Select Entire Word option, as shown in Figure J.
  4. Click OK.

Figure J

Ridding yourself of this annoying selection behavior is easy.

10: Spelling, grammar, and formatting

Word identifies misspelled words, grammatical errors, and formatting inconsistencies, as you type:

  • A red line indicates a word not found in the dictionary (possibly misspelled).
  • A green line indicates a possible grammatical error.
  • A wavy blue line indicates an inconsistent format.

I recommend that you get used to the display and not disable these features — they’re a helpful indication that something might be wrong. On the other hand, if you find them distracting, you candisable them. To disable the red and green lines, do the following:

  1. Click the File tab and then choose Options. In Word 2007, click the Office button and then click Word Options. In Word 2003, choose Options from the Tools menu.
  2. Select Proofing in the left pane. In Word 2003, click the Spelling & Grammar tab.
  3. In the When Correcting Grammar and Spelling In Word section, uncheck the first three options: Check Spelling As You Type, Use Contextual Spelling, and Mark Grammar Errors As You Type, as shown in Figure K. (There’s no contextual spelling option in Word 2003.)
  4. Click OK.

Figure K

You can disable Word’s spelling and grammar indicators.

To rid documents of the wavy blue line, do the following:

  1. Click the File tab and then choose Options. In Word 2007, click the Office button and then click Word Options. In Word 2003, choose Options from the Tools menu.
  2. Select Advanced in the left Pane. In Word 2003, click the Edit tab.
  3. In the Editing Options section, uncheck the Mark Formatting Inconsistencies option under Keep Track Of Formatting. In Word 2003, deselect the Mark Formatting Inconsistencies check box in the Editing Options section.
  4. Click OK

Even the most competent users make an occasional error and these features identify potential problems. Adjusting to them will probably serve most users better than turning them off.

To View Full Article Click Here

10 Commandments of Windows Security

With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed many of the historical security holes. Windows 7, for example, has changed the default User Account Control level so that it’s harder for rogue programs to run without first explicitly gaining the user’s permission.

[Also read 3 steps to protect your personal data]

However, feeling too secure can be dangerous. With that in mind, here are 10 tips–commandments, if you will–for ensuring your desktop or notebook computer can be used productively as well as safely. Many of the recommended tools are free, and all are affordable–and certainly less expensive than the potential problems of an unsecured computer. Similarly, many will take you only a minute or two to perform–again, far less time than you’d spend recovering from a security problem.

Yes, Windows 8 is on the way; it’ll be many years before that version runs on a majority of the installed base. So these tips are focused at the computers you are actually using today–especially Windows 7 computers, though most of the advice also applies to Windows Vista or XP machines.

1st commandment: Start with new hardware

Today’s new hardware–motherboards, BIOS, CPUs, hard drives, and the system as a whole–includes more security “baked in,” even before the operating system is installed. Examples include Trusted Platform Modules (TPM), which embed cryptographic security directly into the hard drive or other component, Unified Extensible Hardware Interface (UEFI) firmware instead of the traditional BIOS, and Intel’s vPro security and management technologies. For example, machines with UEFI and TPM will, as part of each boot-up, check the computer’s firmware and boot-up binaries to confirm they have not been infected with malware.

If you are working with an existing machine, consider doing a fresh install of the operating system, after completing one (or several) full backup. Ideally, the operating system would be the newest version rather than what was previously installed. (Products like LapLink’s PC-Mover can reduce the effort of saving and migrating settings and even application software–although applications should be freshly installed if possible, as well.)

Even if you’re working with an existing machine, consider swapping in new hard drives that include built-in encryption. Drives that support the OPAL Storage Specification standard enable companies to manage encrypted drives from multiple vendors–and have also helped reduce the extra cost for an encrypted drive from $100 to nearly zero. After-market drives often include migration tools to speed and simplify a drive swap.

If a self-encrypted drive isn’t an option, look at using full-disk encryption software, such as Windows’ BitLocker (available only on Enterprise or Ultimate Windows Vista, 7 or 8 ) or a third-party tool.

2nd commandment: Use current OS versions and automatically get OS and application updates

If you aren’t using the most current commercial version of the operating system, it’s time to upgrade. Additionally, make sure you set the software to automatically apply updates (not just the OS, but all applications) and periodically turn off the computer, which is when many updates are auto-applied. An appalling number of security breaches occur because applications lack important security fixes that have been available for a year or more.

The computer vendor may also include helpful update tools. For example, Lenovo includes an update process that is designed to show all BIOS and driver updates available for that particular model. You can also manually start the update-check apps process. This may take several cycles, particularly for the first time around, if some updates require other updates.

“Third-party software is usually the vector that security intrusions come through, not the operating system,” says Ed Bott, a Windows expert and ZDNet blogger. Flash, Adobe Reader and Java are three of the biggest targets, Bott says. While many programs include their own automatic update checker, Bott urges using a tool like Ninite orSecunia Personal Software Inspector, which automate update checking for all the applications on your computer.

3rd commandment: Use Windows’ new security tools (and/or third party software)

Windows 7 includes a number of security controls and tools through its Actions Center (which replaces the Security Center), and other tools are available via the Control Panel, including:

  • Windows Firewall: With its basic settings, this wards off basic attacks, and you can use its advanced settings for more specific control. There are also third-party firewall programs available.
  • Microsoft’s Microsoft Security Essentials and Windows Defender. These tools secure your computer against viruses, spyware
    and other malware.

Obviously another option is to invest in third-party security software, like individual anti-virus, anti-spam and other programs, or a security suite, such as Symantec’s.

4th commandment: Set up (or remove) user accounts

Historically in Windows, the default account had administrator privileges–meaning that programs capable of taking unwanted insecure actions wouldn’t have to first ask the user if they could run. Starting with Vista, Microsoft added User Account Control (UAC), which asked non-administrator users for permission to run certain programs or actions. With Windows 7, UAC still protects systems but less intrusively.

Even so, managing which user accounts are–and aren’t–available contributes to security in the following ways:

  • Establishes non-administrative user account(s) for each user.
  • Disables or removes user accounts that aren’t used or shouldn’t be there.
  • Disables the “guest” account, unless it’s needed. If it is needed, a password should be required for elevating privileges, to prevent unauthorized changes to the system.

Consider renaming the administrator account so that it’s not obvious to an intruder. Since this account can’t be “locked out,” password attacks can be performed indefinitely; changing the name makes the account less of a target.

5th commandment: Set passwords

Set the main Windows password, as well as the Power/Time to lock the system, with a screen saver, and require a password to resume activity.

Also, depending on the sensitivity of information on your system (did someone say “online banking”?), consider password alternatives, such as:

  • Smartcard reader (contact or contactless)
  • Biometric facial recognition
  • RSA software and external token
  • Password “gesture” (e.g., Android tablets)

Another option is two-factor authentication, such as requiring both a fingerprint and a password.

6th commandment: Add/activate anti-theft tools

Invest in, install and activate anti-theft tools that can either lock the system; conduct an IP trace; report, take and send pictures; and even wipe the computer when a lost or stolen computer reconnects to the Internet. An example is Absolute Software’s Lojack for Laptops.

Vendors like Lenovo are embedding Absolute’s CompuTrace Agent into the BIOS, so even if somebody erases or replaces the hard drive, the agent is automatically re-installed.

Computers that include Intel Anti-Theft technology in their hardware let you add additional security services, such as automatically locking the main board until it receives the “unlock” password, lock or wipe if a machine goes too long without connecting to the Internet or if a user fails the login process too many times. Intel Anti-Theft is typically part of third-party security products like CompuTrace, adding perhaps $3/year, and as the anti-theft option on WinMagic’s full disk encryption product.

7th commandment: Turn off sharing and other unneeded services

Windows allows you to share resources that are on your computer, like file-sharing (Shared Folders) and print sharing. Your computer’s Internet connection management utility (Windows includes one, but many systems have their own) lets you define each network as either Public, Home or Work. If you mis-set a connection, your Shared Folders will be visible to other computers on the network.

Suggested Desktop Security Reading

  • Windows 7: Explore New and Improved Security Features (Microsoft)
  • Security checklist for Windows 7 (Microsoft)
  • Enhancing Endpoint Security for Windows Desktops,” Derek Melber, President and CTO of BrainCore.Net
  • Best Practices: Windows Desktop, IT Security for the University of Missouri

If you are behind a firewall, when your computer’s Internet connection manager tool asks you what kind of location/connect it is, you can call it either a Home or Work network, Bott says. But specify Public network if you are connecting directly to the Internet (e.g., at home or in the office), if you don’t have a hardware router but instead are directly connected to the cable modem, or if you are connecting to a public network like a Wi-Fi hotspot or a hotel or conference Ethernet. This will ensure that no local sharing is allowed.

In general, disable any services and remove programs you don’t need. For example, if you’re sure your applications won’t need it, you may want to uninstall Java. If your machine has Internet Information Services (IIS) running but doesn’t need it, disable that, as well.

8th commandment: Secure your Web browser and other applications

Web browsers access Web sites that neither you nor your company control (and these sites, in turn, may have ads or link to other content that they don’t control). Any of these may try to inject malware onto your computer.

[Also read 10 ways to secure browsing in the enterprise]

Today’s browsers include more security, like “private browsing” session modes that prevent any personal information from being stored, or don’t save cookies or history for a session. However, this may interfere with productivity.

Check each browser’s security options and select the ones that look useful, like Firefox’s “Warn me when sites try to install add-ons” and “Block reported attack sites.”

Set Microsoft Internet Explorer to have the highest security setting you can tolerate (since higher security often means you have to click more often), suggests Tom Henderson, Managing Director of ExtremeLabs.com, an Indianapolis, Indiana technology testing lab.

Additionally, look for browser “extensions” and add-ons that increase your browser’s security, in a more per-tab, per-site or per-tab-session way. For example, the popular NoScript Firefox add-on allows JavaScript, Java, Flash and other plug-ins to be executed only by trusted Web sites of your choice.

PDF readers may also be vulnerable to JavaScript attacks within the documents they’re rendering. Make sure your PDF reader is secure; consider disabling JavaScript within it.

9th commandment: Rope in Autorun

AutoRun is a major threat vector for viruses and other malware in Windows XP and Windows Vista. [Editor’s note: Simson Garfinkel called Autorun an “OS design flaw” all the way back in 2006.] With this function, the operating systems automatically begins executing a program when it sees an autorun.inf file in the root directory of a new drive, such as a network drive, a CD or a flash drive. So, if you haven’t yet moved to Windows 7, make sure you’ve got all the security updates for the OS version you are running. (See MS Security Advisory: Update for Windows Autorun.

With Windows 7, all the security settings are “No Autorun.” When you attach external media like CDs, DVDs, SD cards and USB flash drives, they will give you a dialog box offering to run a program, but by default, nothing happens automatically.

10th commandment: Consider application whitelisting and other controls “Whitelisting” refers to a list of everything you allow on your computer, including e-mail addresses your mail program can accept, Web sites your browser is allowed to connect to and applications the operating system is allowed to run. Whitelisting may not be a match for e-mail or Web browsing, but for preventing unwanted applications from running–such as malware or zero-day attacks–it may be a good additional tool.

Windows 7 includes AppLocker, a whitelisting utility, or you can buy third-party white-listing products for either individual computers or groups of networked computers. For home users, Windows 7 has fairly robust parental controls that can restrict access by time-of-day or by site, and log Web access, Bott says.

Conclusion: It’s easy to become more secure

As you can see, there is a lot you can do affordably, even to existing Windows systems, to increase their security. It shouldn’t take a lot of time or money to do; however, it may take a lot of both if you don’t do anything and something avoidable goes wrong.

To View Entire Article Click Here

Increase Sales & More with Site Analytics

Get the insight you need to succeed on the Web.

The key to any successful website is knowing your visitors. Site Analytics gives you the valuable, real-time data you need – information you can use to spotlight popular products, target new customers, track offer responses and much more. With over 30 detailed reports, you can find out where your visitors are coming from, what paths they take through your site, even where in the world they live.

Stats at-a-glance

  • Get the information you want – without having to click through countless screens – with our customizable dashboard view.

Real-time results

  • With Site Analytics’ real-time statistics, you don’t have to wait until tomorrow to find out if changes to your site are working. Plus, heat mapping and pinpoint functionality tell you which sections or links are getting the most attention.

In-depth reporting

  • Dig into the details and get a better understating of your customers with more than 30 reports. Find out who’s visiting, when they’re on your site, how they’re getting there and much more.

Choose your view

  • Site Analytics lets you decide how you want to view your data with three graphing options (Bar, Area and Line) as well as the ability to export to Microsoft Excel® or Adobe® PDF.

Powerful, easy-to-use features let you dig as deep as you want.

Everyone wants something different from their site statistics. Some people want a quick, birds-eye view; others want to get lost in the details. That’s the beauty of Site Analytics; it works for everyone. Our user-friendly interface and intuitive features put you in control so you can get exactly what you want.

See what’s happening

  • Get a quick overview of your site’s traffic and visitors with a selection of dashboard widgets.
  • Real-time statistics let you see, almost instantly, how changes to your site impact your traffic.
  • Improve your site’s structure and usability by seeing where people click and which links get the most attention with heat mapping.

Organize your data

  • Find the information you need with more than 30 reports in several categories: Visitor, Page, Referrer and Server.
  • Visualize the data the way you want with three different graphing options: Bar, Area and Line. Plus, set custom date ranges to target your results!
  • Share your data with co-workers and clients by exporting to Microsoft Excel® or Adobe® PDF. You can even create a schedule to email customized reports.
  • Get separate reports for each alias and subdomain — simply add them as separate Site Analytics accounts.

And much more

  • Easily collect stats on your WordPress® site with our free Site Analytics plugin.
  • Enable secure (SSL) mode to encrypt your data so it can’t be viewed by others during transmission.
  • Analyze long-term trends and improvements with up to 6 months of Log File data.
  • Use Site Analytics with any website, whether you host with us or a third party.

 

 

 

 

 

 

 

 

 

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started now or click here