Archives March 2016

Windows tip of the week: Tap into these Software licensing secrets


Software Licensing secrets:

Every version of Windows dating back to Windows Vista has included the Windows Software Licensing Management Tool, a script file found in the Windows System 32 folder as Slmgr.vbs. The script is designed for a local administrator to run in an elevated Command Prompt window.

Most people never need to use this tool, but it can come in handy when you’re trying to resolve activation problems or upgrade a Windows PC. The secret is knowing which switches to add to the end of the command to achieve the desired result.

If you just type the command, with no switches, you get a series of five dialog boxes that list all those switches. Network administrators who manage a Key Management server for Volume Licensing will find a goldmine here. For the rest of us, the three most commonly used switches are the following:

Slmgr.vbs /dli Displays basic license information, including the last five characters of the product key

Slmgr.vbs /dlv Displays much more detailed license information

Slmgr.vbs /cpky Removes the product key from the registry so that it can’t be copied and reused

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Google and AT&T: Fighting Fiber with Fiber

Google fiber is coming to your town. But not without a fight. After Louisville, Kentucky approved legislation that would allow Google Fiber to piggyback on pre-existing telecommunication infrastructure, AT&T sued the city.

“The ordinance in question, known as “One Touch Make Ready,” essentially allows Google (or any other ISP) to install its equipment on existing utility poles, including those owned and maintained by AT&T. Despite strong opposition from AT&T and Time Warner Cable, the ordinance passed with a 23-0 vote.”

AT&T claimed a need to defend past infrastructure investment, and that the ordinance violates current telecommunication rules. The city of Louisville countered claiming, “gigabit fiber is too important to our city’s future.” Google pledged to support the city.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Windows tip of the week: Organize your cloud files the easy way

How to set up a Cloud Files library:

Cloud Solutions

You probably have two, three, or maybe even more folders that sync files from cloud to your PC right now: Dropbox, Google Drive, OneDrive, and so on. How do you keep track of all that cloud content? Set up a Cloud Files library in File Explorer. Here’s how:

In Windows 8.1 or Windows 10, right-click any empty space in the navigation pane on the left and make sure Show Libraries is selected. (Libraries are visible by default in Windows 7’s Explorer.)

Right-click the Libraries heading and then click New | Library. Change the default name to something descriptive, like Cloud Files.

Right-click the first locally synced cloud folder and select Include In Library, choosing the name of your newly created library.

Repeat that step for each additional local folder.

That’s it. You can now get a unified view of all your cloud files by selecting that library in File Explorer. Use the search box to quickly find any file, regardless of where it’s stored.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Office 365 gets Six new Excel Functions

Microsoft made several new updates to Office 365 in February, including the addition of six useful functions for Excel.

EcxelOffice365

When it comes to general updates to Microsoft Office 365, February 2016 was a fairly significant month. Microsoft rolled out numerous improvements to Office 365, like better pen annotation integration, the ability to pin documents to the Start menu, a new feature that allows images to be inserted into documents directly from the camera, and the best—adding more functions to Excel.

Six new functions

Using, combining, and creating formulas in Microsoft Excel is where true Excel gurus separate themselves from the pretenders and wannabes. For an Excel aficionado, the satisfaction of creating the perfect nested formula is second to none when it comes to Excel coding. So when Microsoft adds six new functions to Excel in one month it is a very big deal.

Of course, while there is great satisfaction when you figure out the perfect formula, a certain amount of despair also goes with it—because now you have to apply that complicated nested formula over and over again. This is where the six new functions are supposed to help.

The first updated functions are TEXTJOIN and CONCAT, and they are replacements for the old concatenate function, which gave the user the power to join strings of separate text into one cell. This comes up with addresses all the time—a common task for spreadsheets since they were invented.

In the past, the formula would look something like this:

=CONCATENATE(A3, “, “, B3, “, “, C3,”, “, D3, “, “, E3)

With the new TEXTJOIN formula, the same process would look something like this:

=TEXTJOIN(“, “, TRUE, A3:E3)

This is just one example of how these new functions are designed to simplify users’ lives when it comes to advanced Excel tasks.

The next two new functions are IFS and SWITCH, which provide an alternative to using the infamous series of nested IF functions. The old IF function was the mainstay for Excel coders looking to apply logic to sets of data. You know what I mean: If this is larger than this, than this; but if it is larger than this but less than that, then this, etc. The more nested IF functions the more complicated the formula and the more likely you are to make a mistake.

The last two new functions are MAXIFS and MINIFS. They are designed to supplement the MAX and MIN functions by allowing users to apply conditions to the maximum and minimum calculations and thereby filter results. In the past you may have had to use the IF function to create your filtered conditions. These new functions eliminate the need and make your life just that much simpler.

Office365

Bottom line

When Microsoft began trying to convince us that subscribing to Office 365 was a better idea than repurchasing new versions every few years, the ability to update the productivity suite regularly at no extra cost was one of the main selling points. As the new six functions illustrate, that was not a false promise.

These functions are just the tip of the iceberg when it comes to Office 365 improvements. However, the problem with continuous updates to the software is that users have to try to keep up.

Even though there are some users out there who will keep using nested IF functions no matter what improvements come along, for example. But for the rest of us, it would seem to be worthwhile to pay attention to whatever improvements Microsoft rolls out each month. Because for better or worse, changes to Office 365 are going to keep coming.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 15% on new purchases and get everything you need. Hurry before the offer expires.

Coupon3-23-2016

Use promo code in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Offer expires Tuesday, April 12, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.

Windows tip of the week: How to save time with environment variables

Save time and keystrokes with environment variables:

When asked to open your user profile in File Explorer, you’ll probably type its full path: C, colon, backslash, Users, backslash, followed by your user name. But there’s a much faster way:

Type %userprofile% and press Enter.

Congratulations, you just saved a half-dozen keystrokes or so by using one of many useful environment variables in Windows. These are reserved names, enclosed between percent signs, that represent the current location of a specific system folder.

Here are a few other useful ones to know:

%localappdata% The hidden folder in your user profile where Windows apps store your data

%windir% The folder containing Windows system files; usually C:Windows

%public% A special user profile that contains folders for Documents, Downloads, Music, Pictures, and Videos, intended for sharing on a home network

%temp% or %tmp% The normally hidden folder where Windows and apps can store files necessary for one-time tasks

Some people write these variables using mixed case (%ProgramFiles%, for example) to make them easier to read. But they’re not case sensitive, so skip the Shift key if you want.

Have questions?

For More Tips & Info from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Beware downloading some apps or risk “being spied on”

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from a Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

10 of the latest security products that can help you fight the bad guys

1. IBM z13s mainframeIBM z13s mainframe

Image: IBM

Security standards are constantly changing. Here are some of the latest software and hardware products to help keep your organization secure.

In February 2016, IBM announced the IBM z13s, a mainframe with cryptographic features built directly into the hardware. According to IBM it can decrypt at twice the speed of the generations before it.

2. Cisco Firepower NGFW

Cisco Firepower NGFW

Image: Cisco

Cisco recently announced its Firepower series appliances with its next-generation firewall (NGFW) technology. There are 16 models in the series that include integrated NGIPS and advanced malware protection.

3. Illumio

Illumio

Image: Illumio

Illumio is a startup that provides adaptive security for the data center and cloud environments. The company recently achieved unicorn status as its value topped $1 billion, and it is consistently named a top enterprise security provider.

4. GOTPass

GOTPass

Image: University of Plymouth, H. Alsaiari, M. Papadaki, P. Dowland, and S. Furnell

GOTPass is a graphical authentication system developed by researchers at the University of Plymouth. It uses images to authenticate instead of traditional passwords.

5. Skyport Systems SkySecure

Skyport Systems SkySecure

Image: Skyport Systems

SkySecure is an out-of-the-box enterprise security solution to protect application workloads. The systems includes hardware, software, and management tools.

6. Spikes Security Isla

Spikes Security Isla

Image: Spikes Security

The Isla is an enterprise appliance that “isolates and eliminates all browser-borne malware.” It was launched in mid-2015, but it was independently certified as invulnerable to web malware exploits in early 2016.

7. Blackphone 2

Blackphone 2

Image: Zack Whittaker/CNET

The Blackphone by Silent Circle is an Android-powered smartphone with a built-in security center to lock down your data. The most recent iteration, the Blackphone 2, released late last year.

8. Imation IronKey Enterprise H350

Imation IronKey Enterprise H350

Image: Imation

The IronKey Enterprise H350 is a rugged, military-grade encrypted hard drive. It is available in multiple capacities and is FIPS 140-2 Level 3 certified.

9. Bitdefender Total Security 2016

Bitdefender Total Security 2016

Image: Bitdefender

For home users and small businesses, the Total Security 2016 by Bitdefender is a great option. It stacks up well against key competitors and includes device anti-theft features.

10. Qubes OS 3.1 rc2

Qubes OS 3.1 rc2

Image: Qubes

Qubes OS is a Linux-based, security-oriented OS that is focused on compartmentalization using VMs. It’s been around for a few years, but the latest version released in January 2016.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows tip of the week: How to customize the Send To menu

Customize the Send To menu:

The Send To menu is a particularly useful feature in File Explorer. You can right-click any file or folder, choose Send To, and copy or move those objects to a folder of your choosing. You can also open compatible files by sending them to an application shortcut.

Unfortunately, the default list of Send To destinations is sketchy to say the least. But if you create a shortcut, you can customize that list to your heart’s content. The secret is to open the Run box (Windows key + R), type the command shell:sendto, and then press Enter.

The folder with all the items you see on the Send To list will pop up. To delete an item, just right click it and select delete. To add destinations, like the Videos or Music folders, by dragging them from the menu on the left.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Yammer is on the way to Office 365: Are you ready?

Microsoft is activating Yammer for every Office 365 subscription. But is this one collaboration tool too many?

On February 2, 2016, Kirk Koenigsbauer announced in the official Microsoft Office 365 blog that Yammer is now being activated for every eligible Office 365 subscription. In a nutshell, that means Yammer is going to be another app on the Office 365 app list unless an admin specifically turns off access. Your enterprise should plan accordingly.

Yammer

For those of you unfamiliar with the product, Yammer bills itself as an enterprise internal social network. It mixes the typical chat messenger application with collaboration tools available in Office 365.

Similar to the Delve tool we looked at last week, Yammer can serve as the central hub for team collaboration. From within a Yammer discussion, teams can set up meeting appointments using Outlook, switch to a full-fledged Skype for Business video meeting, and access OneDrive for Business to create collaborative documents.

The initial rollout of Yammer took place on February 2, 2016; the rest of the rollout will take place in stages. The next release is March 1, 2016, and the last is April 1, 2016. According to the blog post, the first wave is for “Office 365 customers with a business subscription who purchased fewer than 150 licenses that includes Yammer and who have zero or one custom domains for Yammer.”

The second wave is for “Office 365 customers with a business subscription who purchased fewer than 5,000 licenses that includes Yammer.” Customers with an education subscription are not included.

The final wave is for “remaining customers with a business subscription and all customers with an education subscription.” For subscribers who have never had a Yammer account, the rollout will take place last, in April. Alas, that is the wave I’ll have to wait for.

Collaboration

Yammer is the latest, and perhaps the last, major teamwork collaboration app to be added to Office 365. In Microsoft’s vision of a mobile-first, cloud-first enterprise, teams collaborate across distances using shared documents, video conferencing, and applications that tie it all together in one virtual location.

YammerForOffice365

With the addition of Yammer, Microsoft is offering several tools teams can use to manage and organize their collaboration activities. Teams can use Yammer, Delve, Groups, Sites, SharePoint, and OneNote to manage their shared conversations and documents across the enterprise. One of those tools should be able to satisfy even the most persnickety of teams.

Bottom line

But then again, that may be where we run into problems. One could argue that there are too many collaboration tools available in Microsoft Office 365. While all these wonderful choices may seem good at first glance, it is possible that subscribers may become overwhelmed.

Microsoft’s idea that teams can choose the best tool for them or for the project they are working on sounds all well and good, but it does still require someone to make an important initial decision. For some people, making a decision that will affect a project from start to finish can be a daunting task.

In the long run, it may be beneficial for organizations to establish guidelines for when each of the collaboration tools works best. They may even decide to block some of the tools from use altogether in favor of a recommended best practice.

Having myriad collaboration tools is generally a good thing, but it might help move things along if the enterprise establishes some well thought out guidelines.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.