Archives December 2014

Pro tip: Sort table data in a Word document

sort word

Microsoft Word

 

Sorting data in a Word document isn’t something you routinely do. On the other hand, presenting list and table data is, so the potential exists that one day you’ll want to sort something. The good news is that it’s easy to sort data in a table or a list. In this article, I’ll show you how to do just that. We’ll work through a few simple sorting examples. You can use most any table, or you can download the example .docx or .doc file.

Behind the scenes

Word relies on paragraphs when sorting, which seems a bit odd within the context of a table (or list). The paragraph formatting mark determines where one paragraph ends and the next starts. As you can see in Figure A, there’s no paragraph mark in a table. The end-of-cell markers denote the end of each cell’s content. The similar marker at the end of each row (outside the right border) is an end-of-row marker. These markers also contain cell and row formatting. When sorting a table, Word relies on the end-of-row marker to identify where one row ends and the next begins, the same way the paragraph mark does. (To see a document’s formatting symbols, click Show/Hide in the Paragraph group on the Home tab.)

Figure A

Table end-of-row markers are similar to paragraph markers.

Sort by the first column

We’ll start with the simplest sort possible; we’ll sort a table by the values in the first column. To do so, select, the table by clicking its move handle (the small square in the top-left corner). If you don’t see this handle, check the view. It’s available only in Print Layout and Web Layout. With the entire table selected, do the following:

  1. Click the contextual Layout tab. In the Data group, click Sort — or click Sort in the Paragraph group on the Home tab. In Word 2003, choose Sort from the Table menu.
  2. The resulting dialog does a good job of anticipating the sort. Notice that the Header Row option (at the bottom) is selected. As a result, the Sort By field is set to Species — the label in the first column’s header (Figure B).
    Figure B

  3. This is exactly what we want, so click OK. Figure C shows the sorted table.
    Figure C

Before we move on, let’s discuss the Type and Using options to the right. We didn’t need to change either, but sometimes you will. The Type options are Text, Number, and Date. Word usually defaults to the appropriate data type. You can force a specific type by choosing a different option other than the one Word assumes (but you’ll rarely have reason to do so). The Using options defaults to Paragraph — we talked about that earlier.

Sort by the second column

That first exercise was easy. Let’s complicate things a bit by sorting by the second column. Fortunately, it’s just as easy as the first. Repeat steps 1 and 2 from the first exercise. Then, do the following:

  1. In the resulting dialog, click the Sort By drop-down.
  2. Choose Common Name, the header label for the second column.
  3. Click OK. Figure D shows the results of sorting by the second column.
    Figure D

That wasn’t any more difficult that the first sort. Tell Word which column contains the values you want to sort by and click OK — that’s it!

Sort by multiple columns

With only two sort tasks under your belt, you’re beginning to see how simple the sorting process in Word can be. Let’s complicate things a bit so you can see how flexible this feature truly is. Let’s sort by the Class column and then sort the bird and mammal groups in a secondary sort. Repeat steps 1 and 2 from the first two exercises. Then, do the following:

  1. To sort by the Class, choose Class from the Sort By drop-down.
  2. To further sort each class group, click Common Name from the Then by drop-down (Figure E). You could add a third column to the sort if the results warranted the additional grouping.
    Figure E

  3. Click OK to see the results shown in Figure F.
    Figure F

What about lists?

You might be wondering how to sort the same data in list form. Word handles the list sort the same way — the exact same way. Highlight the list and click Sort in the Paragraph group on the Home tab. In the resulting dialog, check the header option and set appropriately (if necessary). Then, determine the sort order by choosing the fields (columns), appropriately.Figure G shows the result of sorting the same data in list form.

Figure G

Sort a columnar list the same way you sort a table.

 

10 ways mobile devices are changing society

mobile devices

Mobile Devices

Humanity is evolving in many ways thanks to mobile devices. But are all the changes for the better?

I was raking leaves in my yard the other weekend when I observed a black SUV slowly idling down the street. I didn’t recognize the vehicle and it looked out of place as though the driver were confused about where to go… or possibly casing houses to rob (hey, I’m a crime writer by nature).

The car pulled up to me and the passenger window went down. An older gentleman politely inquired if I knew where a certain nearby street was located. I told him how to get there and he thanked me profusely then drove off.

That got me thinking that I hadn’t been asked for directions in years, since most people now rely on their mobile devices for maps and directions. I reflected that I wouldn’t have had the pleasant encounter with that grateful driver if he had been using a device to guide him, and that started a train of thought about how mobile devices are changing society. What has improved us, and what are we missing out on?

1. We always know how to get there

It’s great to throw out the paper maps and not have to call people to find out how to get anywhere, nor to be called when they’re coming to my house. All we need is the address and presto! We’re there.

But… we’re also missing out on the unique dialogue we only get from people who know their own neighborhoods. Google Maps won’t tell us that our turn is right after the red mailbox and that it’s a tricky one so slow down. It can also be vague when it directs us through confusing areas like rotaries or 5-way intersections. And as someone who used to get “Triptiks” from AAA, it was pretty cool not only having the entire route for a trip laid out for us by an expert (in a visual form), but to get some one-on-one advice from them such as the best time to travel through D.C. to avoid traffic (trick question, there is no “best time.”) Sure, you can look this up online… where ten different opinions will be available, requiring you to pick and choose the most plausible.

2. We can buy almost anything immediately

Mobile devices are commonly used for purchasing, and according to Adweek.com”smartphones and tablets will account for $1.6 billion in sales on Thanksgiving, Black Friday and Cyber Monday combined.” It’s great that we can buy stuff we’re interested in as we please.

But… this can pose a problem for compulsive shoppers or people who may be less than responsible for their actions (I’m thinking inebriated college students after 2 am). Obviously this is an issue that can impact anyone with low impulse control and mobile devices are simply the conduit for their problem, not the problem itself. But I’ve also found real-life clerks can be extremely helpful in providing advice – the paint guy at my local hardware store, for instance, knows more about paint than anyone I’ve met. Sure, online advice and reviews are available to help you figure out what to buy but the human touch from knowledgeable experts you can talk to in person can’t be replaced.

3. We’re always available

Whether through a phone call, text, email, social media or some other form of communication, we’re always at the beck and call of those we know so long as we have a mobile device with us. Sure, the devices have “mute” functions and off buttons, but the constant flow of input can make many people reluctant to use these options (or to rely on them for long), especially if our mobile devices are used for work or emergency contact from loved ones. In fact, if we contact someone on their cell and they don’t pick up it can be disappointing or irritating. That’s what they’re there for, right?

But… people who want to concentrate and remain focused on a single task at a time have to exert rigid discipline on themselves (and likely those in their inner circle) lest they wander from one interruption to the next, checking that Facebook message a friend just sent or seeing if their spouses replied to that text. It’s like trying to work in an office with the door open while a big party is going on outside in the hallway. I’ve found it’s best to either close the door and focus or knock off for the day (if possible) and officially attend the party; working halfway in between is a recipe for low productivity.

4. No more waiting for the 11 p.m. news

Nowadays if something significant happens (no, but the Kardashians aren’t remotely significant) we whip out our devices and see what’s afoot, whether it’s a weather emergency, a crisis, or some historic moment. Even if the website we’re visiting is overloaded or sluggish there are plenty of others available. It’s all part of our “need to know now” mindset, right?

But… needing to know now can detract from the present moment if the news isn’t exactly earth-shattering. If it’s just another interruption it’s one more thing that takes away from what we’re doing (or trying to get done). I can’t help but feel like many news stories are played up or overemphasized as part of a “Hey! Look over here!” distraction, whether to promote ads, news sources or some other ulterior motive. This only contributes to the short attention span which is becoming a real problem for many people.

5. We’re never bored

Our mobile devices can hold or connect to an endless amount of entertainment. Thanks to streaming audio, video, copious storage capacities and zippy processors, it’s possible to listen to music, watch movies, read e-books, browse the web, engage with others and play games in just a few taps. With this much variety nobody need ever be bored again, right?

But… I think it’s important for people to learn how to handle boredom. So many of us feel like the phrase “I have nothing to do” is something to be feared rather than embraced. I’ve been guilty of it as well, such as during car trips where I was driving while my family slept and I shut the radio off since I didn’t want to disturb them. Being bored is an opportunity to reflect, consider and plan: to revisit the past or map out the future. It can be healthy, not frightening. At the time I was immersed in the TV show “LOST” and used several hours going over all the clues, details and plot elements that had yet to be unraveled (as it turned out, I never got close to the actual story behind the island).

6. We never have to take chances

My wife and I went out the other week and during the course of our evening decided on the spur of the moment to get tickets for the WWII film “Fury.” I lined up tickets on my smartphone at a theater in the next town over – the only one that still had seats for the show – and we picked them up then entered the movie. Great that we didn’t have to just drive over and hope we could get lucky by scoring a pair of seats, right?

But… there is something to be said for just gambling and taking a shot at something without using what is the real-life equivalent of a “cheat code.” Sure, it’s better than getting to the theater to find all the seats sold out, but that would have opened up some other options: see another film? Go somewhere else nearby? View a later show? Don’t get me wrong – if my smartphone can help up my odds of doing something I really want, I’ll play that card, but it does detract from the unpredictability of life with its themes of give and take or wins and losses.

7. We don’t need to know all this useless trivia

Numerous others have discussed this as well: thanks to mobile devices there’s no need to know silly little things like which planet is the sixth one from the sun, who won the War of 1812, or how many digits are in Pi (hint: a lot). We can just look it up right away, so as to save our brains for something more important like what Kim Kardashian is up to (not to beat a dead horse).

But… this access to information also has the capacity to erode our own personal knowledge stores as well as critical thinking ability. If we offload all that data elsewhere and access it only as (or if) needed, we’ll miss out on a lot of interesting and useful things that will hamstring us if we don’t have our mobile devices. In essence, we’re delegating our brain’s skills to an artificial brain, which can’t reason or meaningfully apply its talents to improve our lives or activities – other than just spitting out the facts we ask for. Information is more valuable when applied to the appropriate contexts by a brain actually engaged with what’s happening.

8. We never have to disconnect from friends or family

Social media can truly be amazing. I use it to connect with family across the country whom I’m not able to see regularly. I have built and strengthened friendships with people in my town because of it. And I’ve kept in touch with people who have literally known me all my life; in the era before social media we would simply have fallen out of touch, eventually forgetting each other’s names and all past interactions.

But… stories are rampant about social media wrecking marriages, working relationships and familial ties. Used correctly by well-adjusted folks, it’s a way to bring people together. Used inappropriately by those with underlying issues, it’s a way for them to alienate others (political battles, anyone?) or lose focus on their face-to-face loved ones in favor of their online community. I’m not blaming mobile devices or social media; as with online shopping I’m pointing out that this concept can wind up causing harm to people who misuse it, or misuse others with it.

9. We don’t have to drop off film for processing

Anyone remember Fotomats? If so, you were probably a child of the 80’s. These were drive-thru film processing kiosks where you could drop off your photo film and pick up the processed photos a day later. I haven’t seen one of these in years, and while it’s certainly true that photo film still exists and can be processed at other stores, this is usually done by professional photographers or photography enthusiasts. I’ve been using digital cameras and my smartphone for years now to take pictures; they’re easy to store on my hard drive, they are backed up automatically on my phone, and I can see how the shots turned out instantly.

But… there was something nice about dropping film off knowing it would be ready the next day (unlike in today’s instant gratification society, where we get impatient if something’s not immediately available). There was a sense of anticipation along with the hope all the shots came out OK. We had more patience. And we didn’t waste pictures goofing around, and the ones we kept were generally worth keeping.

Back in the 80’s I probably took one-tenth the pictures I do now, and, while hard drive space is cheap and plentiful, organizing photos by year or occasion (and in some case which one of my kids is involved in the shot) is tedious. I rarely delete digital photos unless they’re blurry or extremely poor quality, so there’s more of a “quantity over quality” element now, whereas it was the reverse back then, at least for me.

10. We don’t ever see payphones or telephone booths around any more

When I was a kid my elementary school had a fantastic old (even for the time) payphone which had three slots at the top for feeding in coins: a nickel slot, a dime slot and a quarter slot. Putting in money and hearing the electronic tones as the coins registered (actually I think it only cost a dime to make a call) was like seeing a magic trick. Now payphones and telephone booths – a famous landmark for Superman fans – have gone the way of the passenger pigeon; I think the last one I saw was in Europe this summer. We just make calls on our smartphones; no hunting for coins, dealing with missing phone books or finding public phones out of order. My kids will likely grow up never having used one of these artifacts.

But… actually, there is no ‘but’. This one was a tongue-in-cheek one; everyone is better off with payphones and phone booths relegated to the dust heaps of history (even the phone carriers are likely making more money off smartphone sales/data plans than they ever raked in with coin-operated telephones). Some progress is truly inarguable.

 

South Jersey Techies A High Quality VOIP Provider

VOIP

South Jersey Techies

 

South Jersey Techies is a high quality VOIP provider.

Our VOIP Solutions let you combine voice and data into a single, easy to manage service and helps you focus on your business, not your network and phone systems.

You can control how your calls are routed from a simple, web based portal accessible from any browser in the world. Use the Find-me/Follow-me feature to make sure you never miss another important call, no matter where you are. With this premium level feature, you get to decide which business calls get through to you at your desk, your cell phone or even at home if you like. You also get to decide which callers go directly to voice mail without even ringing your line.

South Jersey Techies offers a wide range of VOIP Phone Services.  We also offer cheaper, simpler plans that include both local and nationwide long distance calling.

With our hosted VoIP solution there is no expensive PBX equipment in your office to go down, fail or get damaged during a storm. Only your IP phone handsets reside in your office, and those can be easily taken out and moved at any time.

Go VOIP – Go Green – it has a good ring to it don’t you think

South Jersey Techies VoIP systems are more energy efficient and help reduce the need for work related travel and car usage.  Our VOIP Solutions also help reduce paper usage. A great example of this is the fax to e-mail system enabling your company to save on paper usage as the fax no longer has to be printed out, and this applies to both incoming and outgoing faxes.

South Jersey Techies VOIP Advantages:

  • Lower Costs: Save money by combining your phone and data networks
  • Greater Functionality
  • Less maintenance
  • Excellent Voice Clarity and Call quality
  • Free calling features with optional advanced features
  • Mobility: The ability to use your smartphone as an extension of the office phone system, including the ability to have business calls automatically directed to your cell phone and make outbound calls from your smartphone as your office number.
  • Portability: The ability to use any computer or office phone as your personal extension.
  • Flexibility: The ability to redesign your phone system on the fly by simply logging into your VoIP provider’s dashboard.

For more information please visit out websites below, we look forward to serving you:

http://southjerseytechies.net/voip.php

http://www.sjtechies.com/voip-phone-services/

Set Up Exchange E-Mail on an Android Mobile Phone

Set Up Exchange E-Mail on an Android Mobile PhoneWindows_Start_Button

You can set up e-mail using an Exchange account on an Android mobile phone. If you have a different phone, see Mobile Phone Setup Reference. If you are having trouble connecting your device after following these steps, see “What else to I need to know?” at the end of this Help topic.

How do I set up Exchange ActiveSync on an Android mobile phone?


  1. From the Applications menu, select Email. This application may be named Mail on some versions of Android.
  2. Type your full e-mail address, for example tony@contoso.com, and your password, and then select Next.
  3. Select Exchange account. This option may be named Exchange ActiveSync on some versions of Android.
  4. Enter the following account information and select Next.
    • Domain\Username   Type your full e-mail address in this box. If Domain and Username are separate text boxes in your version of Android, leave the Domain box empty and type your full e-mail address in the Username box.
      Note:
      On some versions of Android, you need to use the domain\username format. For example, if your e-mail address is tony@contoso.com, type contoso.com\tony@contoso.com. Your username is your full e-mail address.
    • Password   Use the password that you use to access your account.
    • Exchange Server   Use the address of your Exchange server. To find this address, see “Finding the Server Name” later in this topic.
  5. As soon as your phone verifies the server settings, the Account Options screen displays. The options available depend on the version of Android on your device. The options may include the following:
    • Email checking frequency   The default value is Automatic (push). When you select this option, e-mail messages will be sent to your phone as they arrive. We recommend only selecting this option if you have an unlimited data plan.
    • Amount to synchronize   This is the amount of mail you want to keep on your mobile phone. You can choose from several length options, including One day, Three days, and One week.
    • Notify me when email arrives   If you select this option, your mobile phone will notify you when you receive a new e-mail message.
    • Sync contacts from this account   If you select this option, your contacts will be synchronized between your phone and your account.
  6. Select Next and then type a name for this account and the name you want displayed when you send e-mail to others. Select Done to complete the e-mail setup and start using your account.
    Tip:
    You may need to wait ten-to-fifteen minutes after you set up your account before you can send or receive e-mail.

Finding the Server Name


If your email program isn’t able to automatically find your Exchange ActiveSync server name, you may need to look it up.

  1. Sign in to your e-mail account using Outlook Web App.
  2. If you’re connecting to an Exchange mailbox, your Exchange ActiveSync server name is contained in the address bar in your browser when you are signed in to Outlook Web App, but without the leadinghttps:// and without the trailing /owa. For example, if the address you use to access Outlook Web App is https://mail.contoso.com/owa, your Exchange ActiveSync server name is mail.contoso.com.
  3. If you’re unable to connect to your mailbox using the information earlier in this section, you can try using the server name value that you can view in Outlook Web App options. Do the following:
    1. In Outlook Web App, click Options > See All Options > Account > My Account > Settings for POP, IMAP, and SMTP access.
      Note:
      Although you’re not setting up a POP3 account, you will use this value to determine your Exchange ActiveSync server name.
    2. Under POP setting, view the value for Server name.
    3. Try setting up your email using the server name listed on your options page. For example if the value for Server name under POP setting is mail.contoso.com, try using mail.contoso.com as your Exchange server name.

What else do I need to know?

  • If your e-mail account is the type that requires registration, you must register it the first time you sign in to Outlook Web App. Connecting to your e-mail account through a mobile phone will fail if you haven’t registered your account through Outlook Web App. After you sign in to your account, sign out. Then try to connect using your mobile phone. For more information about how to sign in to your account using Outlook Web App, see How to Sign In to Outlook Web App. If you have trouble signing in, see FAQs: Sign-in and Password Issues or contact the person who manages your e-mail account.

Set Up Microsoft Exchange E-Mail on iPhone

Set Up Microsoft Exchange E-Mail on an Apple iPhone, iPad, or iPod Touch3

You can set up Exchange e-mail on an Apple iPhone, iPad, or iPod Touch. When you set up an Exchange account on your device, you’ll be able to access and synchronize your e-mail, calendar, and contacts. If you have a different device, or if you want to connect using POP or IMAP.

How do I set up Microsoft Exchange e-mail on an Apple iPhone, iPad, or iPod Touch?


  1. Tap Settings > Mail, Contacts, Calendars > Add Account.
  2. Tap Microsoft Exchange.
  3. You don’t need to enter anything in the Domain box. Enter the information requested in the Email,Username, and Password boxes. You need to enter your full e-mail address in the Email and Usernameboxes (for example, tony@contoso.com).
  4. Tap Next on the upper-right corner of the screen. Your iPhone will try to find the settings it needs to set up your account. Go to step 7 if your iPhone finds your settings.
  5. If your iPhone can’t find your settings, you’ll need to manually look up your Exchange ActiveSync server name. For instructions for how to determine your Exchange ActiveSync server name, see the Finding My Server Name section below.
  6. In the Server box, enter your server name, and then tap Next.
  7. Choose the type of information you want to synchronize between your account and your device, and then touch Save. By default, Mail, Contacts, and Calendar information are synchronized.
    Caution:
    If you’re prompted to create a passcode, tap Continue and enter a numeric passcode. If you don’t set up a passcode, you can’t view your e-mail account on your iPhone. You can set up a passcode later in iPhone Settings.

Finding My Server Name


If your email program isn’t able to automatically find your Exchange ActiveSync server name, you may need to look it up.

  1. Sign in to your e-mail account using Outlook Web App. For help signing in, see How to Sign In to Outlook Web App.
  2. If you’re connecting to an Exchange mailbox, your Exchange ActiveSync server name is contained in the address bar in your browser when you are signed in to Outlook Web App, but without the leadinghttps:// and without the trailing /owa. For example, if the address you use to access Outlook Web App is https://mail.contoso.com/owa, your Exchange ActiveSync server name is mail.contoso.com.
  3. If you’re unable to connect to your mailbox using the information earlier in this section, you can try using the server name value that you can view in Outlook Web App options. Do the following:
    1. In Outlook Web App, click Options > See All Options > Account > My Account > Settings for POP, IMAP, and SMTP access.
      Note:
      Although you’re not setting up a POP3 account, you will use this value to determine your Exchange ActiveSync server name.
    2. Under POP setting, view the value for Server name.
    3. Try setting up your email using the server name listed on your options page. For example if the value for Server name under POP setting is mail.contoso.com, try using mail.contoso.com as your Exchange server name.

What else do I need to know?

  • If you’re prompted to create a passcode and don’t create one, you won’t be able to send and receive e-mail.

Is Your Organization Using SHA-1 SSL Certificates? If so here’s what you need to know and do:

ssl

 

Following a recommendation by the National Institute of Standards and Technology (NIST), Microsoft will block Windows from accepting SSL certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm after 2016. Given the number of mission-critical SSL certificates that are allowed to expire from inattention, administrators have their work cut out for them. By knowing what will happen, why it’s happening, and what you need to do, you won’t be surprised by these important policy changes.

What’s Happening?

On November 12, 2013, Microsoft announced that it’s deprecating the use of the SHA-1 algorithm in SSL and code signing certificates. The Windows PKI blog post “SHA1 Deprecation Policy” states that Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016. This policy officially applies to Windows Vista and later, and Windows Server 2008 and later, but it will also affect Windows XP and Windows Server 2003.

SHA-1 is currently the most widely used digest algorithm. In total, more than 98 percent of all SSL certificates in use on the Web are still using the SHA-1 algorithm and more than 92 percent of the certificates issued in the past year were issued using SHA-1.

Website operators should be aware that Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm. Beginning in November 2014 with Chrome 39, end users will see visual indicators in the HTTP Secure (HTTPS) address bar when the site to which they’re connecting doesn’t meet the SHA-2 requirement. Figure 1 shows those indicators.

 

Figure 1: Visual Indicators in the HTTPS Address Bar

 

Google is doing this to raise end users’ awareness and to help guide other members of the Internet community to replace their SHA-1 certificates with SHA-2 certificates.

Why Is Microsoft Deprecating SHA-1?

SHA-1 has been in use among Certificate Authorities (CAs) since the U.S. National Security Agency (NSA) and NIST first published the specification in 1995. In January 2011, NIST released Special Publication 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.” This publication noted that SHA-1 shouldn’t be trusted past January 2016 because of the increasing practicality that a well-funded attacker or government could find a SHA-1 hash collision, allowing them to impersonate any SSL website.

Realizing that it’s highly unlikely that CAs and the industry at large will adopt more powerful encryption algorithms on their own, Microsoft is leading the charge by making Windows reject certificates using SHA-1 after January 1, 2017. Doing this will lead website operators to upgrade to stronger SHA-2 certificates for the betterment of all Windows users and the broader public key infrastructure (PKI) community. The Windows PKI blog post “SHA1 Deprecation Policy” noted that, “The quicker we can make such a transition, the fewer SHA-1 certificates there will be when collisions attacks occur and the sooner we can disable SHA1 certificates.”

In the end, the issue isn’t if SHA-1 encryption will be cracked but rather when it will be cracked.

What Do I Need to Do?

January 1, 2017, might seem like a long way away, but now is the time to understand the problem and how to mitigate it.

As per Microsoft’s SHA-1 deprecation policy, Windows users don’t need to do anything in response to this new technical requirement. XP Service Pack 3 (SP3) and later versions support SHA-2 SSL certificates. Server 2003 SP2 and later versions add SHA-2 functionality to SSL certificates by applying hotfixes (KB968730 and KB938397).

Web administrators must request new certificates to replace SHA-1 SSL and code-signing certificates that expire after January 1, 2017. As of this writing, that would probably affect only public SHA-1 certificates that were purchased with a long expiration date (three years or more) or long-duration certificates issued by internal SHA-1 CAs. Most third-party CAs will rekey their certificates for free, so you simply need to contact the CA to request a rekeyed certificate that uses the SHA-2 algorithm.

When ordering new SSL certificates, you should confirm with the CA that they’re being issued with the SHA-2 algorithm. New certificates with expiration dates after January 1, 2017, can only use SHA-2. Code-signing certificates with expiration dates after December 31, 2015, must also use SHA-2.

Note that the algorithm used in SHA-2 certificates is actually encoded to use SHA-256, SHA-384, or SHA-512. All of these are SHA-2 algorithms; the SHA number (e.g., 256) specifies the number of bits in the hash. The larger the hash, the more secure the certificate but possibly with less compatibility.

It’s important that the certificate chain be encrypted with SHA-2 certificates. (A certificate chain consists of all the certificates needed to certify the end certificate.) This means that any intermediate certificates must also use SHA-2 after January 1, 2017. Typically, your CA will provide the intermediate and root CA certificates when they provide the SHA-2 certificate. Sometimes they provide a link for you to download the certificate chain. It’s important that you update this chain with SHA-2 certificates. Otherwise, Windows might not trust your new SHA-2 certificate.

Root certificates are a different story. These can actually be SHA-1 certificates because Windows implicitly trusts these certificates since the OS trusts the root certificate public key directly. A root certificate is self-signed and isn’t signed by another entity that has been given authority.

For the same reason, any self-signed certificate can use the SHA-1 algorithm. For example, Microsoft Exchange Server generates self-signed SHA-1 certificates during installation. These certificates are exempt from the new SHA-2 policy since they aren’t chained to a CA. I expect, however, that future releases of Exchange will use SHA-2 in self-signed certificates.

What About My Enterprise CAs?

If your organization has its own internal CA PKI, you’ll want to ensure that it’s generating SHA-2 certificates. How this is done depends on whether the CA is running Windows Server 2008 R2 or later and if your CA has subordinate CAs.

If you have a Server 2008 R2 or later single-root CA without subordinates, you should update the CA to use SHA-2. Doing so will ensure that subsequent certificates generated will use the SHA-2 algorithm. To check which hash algorithm is being used, you can right-click the CA and go to the General tab. If SHA-1 is listed, you can run the following certutil command to configure the CA to use the SHA-256 algorithm:

certutil -setreg ca\csp\CNGHashAlgorithm SHA256

You must restart the CertSvc service to apply the change. Now when you view the CA properties, you’ll see that the hash algorithm is SHA-256. All future certificates issued by this CA will use SHA-256, but keep in mind that existing certificates will still be using SHA-1. You need to renew any SHA-1 certificates issued by this CA to upgrade them to SHA-2 certificates.

If your CA is older than Server 2008 R2, you can’t upgrade the CA to use SHA-2. You’ll need to rebuild it with a newer version.

If your organization’s internal CA is multi-tiered with one or more subordinate CAs, you’ll need to reconfigure them to use SHA-2. This is done using the same certutil command just given on each subordinate or issuing CA. Keep in mind that if you use subordinate CAs, you’re not required to update the root CA to SHA-2 since that certificate is at the top of the certificate chain, but it won’t cause any problems if you do. You still need to renew any SHA-1 certificates issued by the subordinate CAs to upgrade them to SHA-2 certificates.

Take Action Now

Administrators and website operators should identify all the SSL certificates used in their organizations and take action, as follows:

  • SHA-1 SSL certificates expiring before January 1, 2017, will need to be replaced with a SHA-2 equivalent certificate.
  • SHA-1 SSL certificates expiring after January 1, 2017, should be replaced with a SHA-2 certificate at the earliest convenience.
  • Any SHA-2 certificate chained to an SHA-1 intermediate certificate should be replaced with another one chained to an SHA-2 intermediate certificate.

The following tools and websites are useful for testing and for further information about SHA-1 remediation:

  • Microsoft Security Advisory 2880823. This website discusses the deprecation policy for the SHA-1 hashing algorithm for the Microsoft Root Certificate Program.
  • Migrating a Certification Authority Key from a Cryptographic Service Provider (CSP) to a Key Storage Provider (KSP). The section “How to migrate a CA from a CSP to a KSP and optionally, from SHA-1 to SHA-2” in this TechNet web page provides detailed instructions for upgrading a CA to use SHA-2.
  • Gradually sunsetting SHA-1.” This Google Online Security Blog post explains how the transition to SHA-2 affects Chrome and details Google’s rollout schedule.
  • SHA-256 Compatibility. This GlobalSign web page lists OS, browser, server, and signing support for SHA-256 certificates.
  • DigiCert SHA-1 Sunset Tool. This free web application tests public websites for SHA-1 certificates that expire after January 1, 2016.
  • DigiCert Certificate Inspector. This tool discovers and analyzes all certificates in an enterprise. It’s free, even if you don’t have a DigiCert account.
  • Qualys SSL Labs’ SSL Server Test. This free online service analyzes the configuration of any SSL web server on the public Internet.

SharePoint Online

sponline

Share Point Online

SharePoint Online

You can also get SharePoint Online with Office 365.  SharePoint Online delivers the powerful features of SharePoint without the associated overhead of managing the infrastructure on your own. Flexible management options ensure that you still retain the control you need to meet the compliance requirements of your organization. You can purchase SharePoint in the cloud as a standalone offering or as part of an Office 365 suite where you could also get access to Exchange, Lync, the Office clients and web apps.

Cross device availability

Easily access and interact with your SharePoint news feed, wherever you go using the SharePoint mobile apps available across various devices.

Easy to Manage

You can get setup in virtually no time! The powerful admin console allows your organization to easily manage capabilities, policies and security for all the content and features within SharePoint. Automated maintenance of the servers ensure that you are always up to date with the latest features with minimal downtime.

Enterprise grade reliability and standards

Safeguard your data by hosting it in geographically distributed data centers with continuous data backup, premier disaster recovery capabilities and a team of experts monitoring the servers around the clock.

Office 365 FastTrack and adoption offer

FastTrack is the onboarding service benefit included for qualified Office 365 customers. Microsoft onboarding experts will provide personalized assistance ensuring the service is ready to use company-wide.

To see all the features that are included, view the detailed service descriptions.

If you are interested in SharePoint Online please contact us at 856-745-9990.

Lync Online

lync

Microsoft Lync

Lync Online

Overview

Lync Online connects people everywhere, on devices running Windows 8 and other operating systems, as part of their everyday productivity experience. Lync provides a consistent, single client experience for presence, instant messaging, voice, video and a great meeting experience. Lync enables instant messaging (IM) and voice calling with the hundreds of millions of people around the world who use Skype.

How it works

Organizations can purchase Lync Online as a standalone service from Microsoft Office 365 or as part of an Office 365 for enterprises suite that includes Lync Online, Microsoft Exchange Online, Microsoft SharePoint Online, Microsoft Office Professional Plus, and Microsoft Office Online. Organizations that subscribe to Lync Online retain control over the collaboration services they offer to users, but they do not have the operational burden of on-premises server software. With the Lync Online multi-tenant hosted plans, Lync is hosted on multi-tenant servers that support multiple customers simultaneously. These servers are housed in Microsoft data centers and are accessible to users on a wide range of devices from inside a corporate network or over the Internet.

Lync Online features

  • Get real-time presence information—including photos, availability status, and location—and enhanced instant messaging (IM) to connect efficiently and effectively.
  • Make voice calls through your computer to other Lync or Skype users in your organization or in other organizations that use Lync or Skype.
  • Create, moderate, and join pre-planned and on-the-fly audio, video, and web meetings with people inside and outside your organization.
  • Enhance online presentations with screen-sharing and virtual whiteboards.
  • Let customers participate in your Lync conference calls even if they are not Office 365 or Lync Online customers.

Office 365 FastTrack and adoption offer

FastTrack is the onboarding service benefit included for qualified Office 365 customers. South Jersey Techies experts will provide personalized assistance ensuring the service is ready to use company-wide.

If you are interested in Lync Online or would like to sign up for a trial please click here or contact us at 856-745-9990.

Office 365 ProPlus

billionphotos-1669715

ProPlus

ProPlus

Your Office instantly, wherever you go. Get the latest tools for productivity, collaboration, compliance, and BI—powerful, flexible, and delivered fast, with smooth upgrades.
 

Best experience virtually anywhere

With Office in the cloud, you always have the latest versions of your familiar Office applications right where you need them. Working on your iPhone or Android phone? Use Office Mobile to view and edit files.3 Using your tablet? Access Office through a browser to create and edit documents. And when you’re away from your own desk, you can stream Office to any Internet-connected PC.1 You get one familiar experience across all your devices, and your files are always up to date.

The flexibility to deploy and manage on your terms

Deploy the way that’s best for you—on-premises with your own tools, or with assistance from the Office 365 online service. And you can run Office 365 ProPlus side by side with earlier Office versions, so your workers can make a smooth transition. Upgrades are smooth, too, because your customizations are respected and add-ins and data files are loaded automatically. Plus, you can monitor the health and performance of your Office in real time across your organization.

Enhanced security for email and advanced compliance tools

Protecting the privacy and security of your data is essential. With Office 365, you can simplify compliance. Team members can access project-related email and documents right from their email. You can help your users avoid sending email with sensitive information to unauthorized recipients by using policy tips in email. Recording and archiving meetings, including IM conversations, is easy for IT. Plus you can scan Excel spreadsheets for errors, and view an audit trail of changes.

Advanced Business Intelligence tools that are easy to use

No matter how good your data, you need insight to make it work for you. Gain insight fast by giving everyone powerful BI tools that are easy to use. With Office 365 ProPlus you can streamline integration and manipulation of large volumes of data from various sources and perform rapid analysis. For more insight, explore different views of data in a pivot table or pivot chart with a click, and bring data to life by compiling data, charts, and graphs into one interactive visualization.

If you are interested in Office 365 ProPlus or would like to sign up for a trial please click here or contact us at 856-745-9990.

End of Support for Microsoft Windows Server 2003

end windows server 2003

 

A large number of businesses still run Microsoft MSFT -1.71% Windows Server 2003 and it’s unlikely they all will upgrade before Microsoft Corp. ends support on July 14, 2015, say analysts. Companies that don’t upgrade increase their cyber security risks because the company will no longer issue security updates and these systems will be more vulnerable to hackers.

Businesses worldwide run an estimated 23.8 million physical and virtual instances of Windows Server 2003, according to data released by Microsoft in July 2014. Analysts say the technology is more prevalent in industries such as health care, utilities and government. Yet it’s also still used in about 7% of retail point of sale systems, according to a report Thursday by Trend Micro Inc.4704.TO -1.11%

“Microsoft does not plan to extend support for Windows Server 2003 and encourages customers who currently run Windows Server 2003 and have not yet begun migration planning to do so immediately,” said Vivecka Budden, a Microsoft spokesperson, in an email.

South Jersey Techies offers various migration options to include Windows Server 2012 R2, Microsoft Azure, hosting partners and Office 365.

“It is going to be difficult to get this done in time,” said David Mayer, practice director of Microsoft Solutions at Insight Enterprises Inc.NSIT -1.12%, a provider of IT hardware, software and services.

Many of these same industries were impacted by the end of service for the Windows XP operating system on April 8.  Microsoft broadcasts these sorts of moves years in advance, so it shouldn’t come as a surprise to anyone. But, the product was stable and for many companies there simply wasn’t incentive to update.

“In general, everyone has been slow to migrate, especially those with servers that are running applications,” said Rob Helm, vice president of research at Directions on Microsoft consulting firm.

The problem in industries such as health care and utilities is that companies run legacy apps written by vendors who still require Windows Server 2003. For example, there are smaller vendors in health care that have not kept up with development and application modernization, said a health-care CIO who asked not to be identified. A hospital may have an inventory of 100 to 500 different applications and many applications will still require Windows Server 2003, he added.

Electric utilities, for example, widely use Windows Server 2003. There hasn’t been much movement to upgrade those systems, said Patrick C. Miller, founder of the nonprofit Energy Sector Security Consortium and a managing partner at The Anfield Group, a security consulting firm. Instead, utilities are working to better secure and isolate those systems.

“I’m concerned about directory services such as application authentication and user permissions,” said Mr. Miller. “If you compromise an Active Directory server, you get access to everything.”

For now, analysts are recommending that companies work out their risk of exposure and make plans to first migrate those applications that will be most difficult. Companies should make plans to harden servers that can’t be updated. That might entail putting those systems on an isolated network, where they’d be less prone to outside attack, said Mr. Helm.

To protect and upgrade your home or business

 please contact us 856-745-9990 or click here.