Office 365 Exchange Online

 

Work smarter, anywhere, with hosted email for business.

Security and reliability

Exchange Online helps protect your information with advanced capabilities. Anti-malware and anti-spam filtering protect mailboxes. Get a Exchange Online Protection Trial or Office 365 Professional Trial to see how good it works. Data loss prevention capabilities prevent users from mistakenly sending sensitive information to unauthorized people. Globally redundant servers, premier disaster recovery capabilities, and a team of security experts monitoring Exchange Online around the clock safeguard your data. And with a guaranteed 99.9% uptime, financially-backed service level agreement, you can count on your email always being up and running.

Stay in control

Maintain control over your environment while gaining the advantage of hosting your email on Microsoft servers. Manage your organization efficiently with the Exchange admin center, an easy-to-use, web-based interface. Run In-Place eDiscovery across Exchange, SharePoint, and Skype for Business data from a single interface through the eDiscovery Center. With mobile device policies, you can create approved mobile device lists, enforce PIN lock, and remove confidential company data from lost phones. And IT-level phone support is available to you 24 hours a day, 7 days a week.

Easy to use and maintain

It’s easier than ever to provide your users with the business email they need to stay productive. Automatic patching eliminates the time and effort of maintaining your system. Give your users an In-Place Archive, so they can keep all their important data in one place. And provide them with anywhere access to email, calendar, and contacts on all major browsers and across devices. Integration with Outlook means they’ll enjoy a rich, familiar email experience with offline access.

Have questions?

Our Hosted Cloud Solution team is here to help.

Call us at: 856-745-9990 or Visit: https://southjerseytechies.net/

To learn more and how Office 365 Exchange Online can benefit your business please contact South Jersey Techies, LLC. South Jersey Techies, LLC is a certified Small and Midmarket Cloud Solutions Microsoft Partner.

To read this article in its entirety click here.

Save Big on Toner!

toner

TECHIEDEPOT.COM

Your #1 Source for the Best Printer Ink Cartridges

Looking to save on toner ?  Save upto 35% when you order Re-manufactured Toner Cartridges with TECHIE DEPOT. Our toner cartridges are intelligently re-engineered and environmentally friendly.   We offer a 3 year 100% warranty whereas most OEMs only offer a 1 year warranty.

We guarantee our products will perform better than any other aftermarket imaging product.  Rest assure you never have to worry about leaking cartridges because of our Patented Ultrasonic and Gasket Seal Technologies.  Our Secondary cleaning System also eliminates streaking.  Our toner cartridges are ISO Certified for OEM page yield and quality.  With our Extended Yield Cartridges you will get up to 100% more yield.

You will find that we are different because everyone is not as committed to quality like we are and our product is better built and more consistent.  Our cartridges have a documented 99.2% success rate and for 7 consecutive years we were awarded the best quality supplier in the aftermarket  by Recharger Magazine.

Pay less for great quality, we are sure you won’t be disappointed with our product.  Contact us and place your order today!

Pro tip: Sort table data in a Word document

sort word

Microsoft Word

 

Sorting data in a Word document isn’t something you routinely do. On the other hand, presenting list and table data is, so the potential exists that one day you’ll want to sort something. The good news is that it’s easy to sort data in a table or a list. In this article, I’ll show you how to do just that. We’ll work through a few simple sorting examples. You can use most any table, or you can download the example .docx or .doc file.

Behind the scenes

Word relies on paragraphs when sorting, which seems a bit odd within the context of a table (or list). The paragraph formatting mark determines where one paragraph ends and the next starts. As you can see in Figure A, there’s no paragraph mark in a table. The end-of-cell markers denote the end of each cell’s content. The similar marker at the end of each row (outside the right border) is an end-of-row marker. These markers also contain cell and row formatting. When sorting a table, Word relies on the end-of-row marker to identify where one row ends and the next begins, the same way the paragraph mark does. (To see a document’s formatting symbols, click Show/Hide in the Paragraph group on the Home tab.)

Figure A

Table end-of-row markers are similar to paragraph markers.

Sort by the first column

We’ll start with the simplest sort possible; we’ll sort a table by the values in the first column. To do so, select, the table by clicking its move handle (the small square in the top-left corner). If you don’t see this handle, check the view. It’s available only in Print Layout and Web Layout. With the entire table selected, do the following:

  1. Click the contextual Layout tab. In the Data group, click Sort — or click Sort in the Paragraph group on the Home tab. In Word 2003, choose Sort from the Table menu.
  2. The resulting dialog does a good job of anticipating the sort. Notice that the Header Row option (at the bottom) is selected. As a result, the Sort By field is set to Species — the label in the first column’s header (Figure B).
    Figure B

  3. This is exactly what we want, so click OK. Figure C shows the sorted table.
    Figure C

Before we move on, let’s discuss the Type and Using options to the right. We didn’t need to change either, but sometimes you will. The Type options are Text, Number, and Date. Word usually defaults to the appropriate data type. You can force a specific type by choosing a different option other than the one Word assumes (but you’ll rarely have reason to do so). The Using options defaults to Paragraph — we talked about that earlier.

Sort by the second column

That first exercise was easy. Let’s complicate things a bit by sorting by the second column. Fortunately, it’s just as easy as the first. Repeat steps 1 and 2 from the first exercise. Then, do the following:

  1. In the resulting dialog, click the Sort By drop-down.
  2. Choose Common Name, the header label for the second column.
  3. Click OK. Figure D shows the results of sorting by the second column.
    Figure D

That wasn’t any more difficult that the first sort. Tell Word which column contains the values you want to sort by and click OK — that’s it!

Sort by multiple columns

With only two sort tasks under your belt, you’re beginning to see how simple the sorting process in Word can be. Let’s complicate things a bit so you can see how flexible this feature truly is. Let’s sort by the Class column and then sort the bird and mammal groups in a secondary sort. Repeat steps 1 and 2 from the first two exercises. Then, do the following:

  1. To sort by the Class, choose Class from the Sort By drop-down.
  2. To further sort each class group, click Common Name from the Then by drop-down (Figure E). You could add a third column to the sort if the results warranted the additional grouping.
    Figure E

  3. Click OK to see the results shown in Figure F.
    Figure F

What about lists?

You might be wondering how to sort the same data in list form. Word handles the list sort the same way — the exact same way. Highlight the list and click Sort in the Paragraph group on the Home tab. In the resulting dialog, check the header option and set appropriately (if necessary). Then, determine the sort order by choosing the fields (columns), appropriately.Figure G shows the result of sorting the same data in list form.

Figure G

Sort a columnar list the same way you sort a table.

 

Tips for a Green PC

Takeaway:  Tips for making environmental choices whether buying a new computer or maintaining your current one.

To reduce energy intake you can use a power strip, monitor usage with utilities and unplug components when not in use.  Deciding to go green for current computers or buying a new computer can help with power management to cut down on wasted energy and costs.

Energy Star is a voluntary energy efficiency program that prevents greenhouse gas emissions with strict guidelines.  EPEAT is an assessment tool to help users compare and purchase computer equipment.  Both provide tools to help make an environmental choice.

epeat-logoenergystar-logo

Buying a New Computer Tips:

  • Research:  Find out if it is Energy Star rated, how much energy the computer will use and power management options.
  • Recommendations:  Check out product reviews from previous purchasers and from non-profit organizations that provide accurate feedback (Such as EPEAT and Energy Star)
  • Purify New PC:  Read the Hazardous Material Use Policy on manufacturer’s site.
  • Don’t be Greenwashed:  Research the company to make sure that their “Green Computer” is not a marketing campaign with few benefits towards the environment.
  • Green Guide:  If you would like user ratings and reviews for products, several websites provide these options as well as advice for purchasing new equipment. 

Upgrading Current Machine Tips:

  • General Health Check:  The three major components that play a role in energy are graphics card, microprocessor and monitor.
  • Replace CRT Monitor:  CRT Monitors may contain Lead, Mercury, Barium and more toxins.  Replace your old monitor with a new LCD or LED Monitor to save energy and money. 
  • Upgrading Memory:  Upgrading your RAM will increase the speed of your machine while lowering the power intake, which is a quick, inexpensive fix.
  • Greener Battery:  Similar to CRT Monitors, older laptop batteries contain hazardous chemicals such as lead.  Companies are starting to manufacturer Green Batteries that have a longer life expectancy using earth-friendly features.
  • Greener Power Supply:  The ability to scale the power required for particular actions with your power supply is an efficient way to save energy; while regular power supplies emit a steady rate of power at all times.

 

 

4 WAYS TO SPEED UP YOUR PC

Speed Up Computer

How to make a computer faster: 4 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools installed on your computer, plus a few safe and free downloads, to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you’re online.

Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren’t logged on as an administrator, you can only change settings that apply to your user account.

1. Remove spyware, and help protect your computer from viruses

Spyware collects personal information without letting you know and without asking for permission. From the websites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance. To combat spyware, you might want to consider using Malwarebytes. This scan is a free service that helps check for and remove viruses. You should also download Microsoft Security Essentials for free to help guard your system in the future from viruses, spyware, adware, and other malicious software (also known as malware). Microsoft Security Essentials acts as a spyware removal tool and includes automatic updates to help keep your system protected from emerging threats.

2. Free up disk space

The Disk Cleanup tool helps you to free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete and then enables you to choose whether you want to delete some or all of the identified files.

Use Disk Cleanup to:

– Remove temporary Internet files.
– Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
– Empty the Recycle Bin.
– Remove Windows temporary files, such as error reports.
– Delete optional Windows components that you don’t use.
– Delete installed programs that you no longer use.
– Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2. When Disk Cleanup has calculated how much space you can free up, in the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner, performing better, and potentially increasing your PC speed.  For more options, such as cleaning up System Restore and Shadow copy files, under Description, click Clean up system files, and then click the More Options tab.

Windows Vista users

1. In the Start menu, click All Programs, click Accessories, click System Tools, and then click Disk Cleanup.

2. In the Disk Cleanup Options dialog box, choose whether you want to clean up your own files only or all of the files on the computer.

3. If the Disk Cleanup: Drive Selection dialog box appears, select the hard disk drive that you want to clean up, and then click OK.

4. Click the Disk Cleanup tab, and then select the check boxes for the files you want to delete.

5. When you finish selecting the files you want to delete, click OK, and then, to confirm the operation, click Delete files. Disk Cleanup then removes all unnecessary files from your computer. This may take a few minutes.

The More Options tab is available when you choose to clean files from all users on the computer.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

2.  In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

3.  Clear the check boxes for files that you don’t want to delete, and then click OK.

4.  When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and potentially performing better.

3. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk as a file is opened (to piece it back together). The response time can be significantly longer.

Disk Defragmenter (sometimes shortened to Defrag by users) is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end to end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:

– You add a large number of files.
– Your free disk space totals 15 percent or less.
– You install new programs or a new version of the Windows operating system.

To use Disk Defragmenter:

Windows 7 users

1. Click Start, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter.


2. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze disk button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might even be set up this way by default.) Under Schedule, it reads Scheduled defragmentation is turned on and then displays the time of day and frequency of defragmentation. If you want to turn off automatic defragmentation or to change the time or frequency, click Configure schedule (or Turn on Schedule, if it is not currently configured to run automatically). Change the settings, and then click OK.

7.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Windows Vista users

1.  Open Disk Defragmenter: Click the Start button, click All Programs, click Accessories, click System Tools, and then click Disk Defragmenter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze diskbutton. After the disk is analyzed, a dialog box appears letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment disk button. In the Current status area, under the Progress column, you can monitor the process as it happens. After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  You can also schedule the Disk Defragmenter to run automatically. (Your computer might be set up this way by default.) Click Modify schedule….

7.  In the Disk Defragmenter: Modify Schedule dialog box, choose how often, which day, and at what time of day you want defragmentation to occur, and then click OK.

8.  Click OK again.

Windows XP users

1.  Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

2.  In the Disk Defragmenter dialog box, click the drives that you want to defragment and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3.  To defragment the selected drive or drives, click the Defragment button. Note:In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.  After the defragmentation is complete, Disk Defragmenter displays the results.

4.  To display detailed information about the defragmented disk or partition, click View Report.

5.  To close the View Report dialog box, click Close.

6.  To close the Disk Defragmenter utility, on the title bar of the window, click the Close button.

Running Disk Cleanup and Disk Defragmenter on a regular basis is a proven way to help keep your computer running quickly and efficiently. If you’d like to learn how to schedule these tools and others to run automatically, please read Speed up your PC: Automate your computer maintenance schedule.

4. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

Run the Error Checking utility:

1.  Close all open files.

2.  Click Start, and then click Computer.

3.  In the Computer window (My Computer in Windows XP), right-click the hard disk you want to search for bad sectors, and then click Properties.

4.  In the Properties dialog box, click the Tools tab.

5.  Click the Check Now button.

6.  In the Check Disk dialog box (called Error-checking in Windows 7), select the Scan for and attempt recovery of bad sectors check box, and then click Start.

7.  If bad sectors are found, choose to fix them.

Tip: Only select the “Automatically fix file system errors” check box if you think that your disk contains bad sectors.

To see the original article in its entirety click here.

How To Remove Windows 7 Antispyware

Remove Windows 7 Antispyware 2012, Vista Antivirus 2012, and XP Security 2012 (See Uninstall Guide Below)

Win 7 Antispyware 2012, Vista Antivirus 2012, and XP Security 2012 are all names for the same rogue anti-spyware program. This family of rogues is promoted in two ways. The first is through the use of fake online antivirus scanners that state that your computer is infected and then prompt you to download a file that will install the infection. The other method are hacked web sites that attempt to exploit vulnerabilities in programs that you are running on your computer to install the infection without your knowledge or permission. Regardless of how it is installed, once it is running on your computer it will install itself as a variety of different program names and graphical user interfaces depending on the version of Windows that is running. Regardless of the name, though, they are all ultimately the same program with just a different skin on it. This rogue goes by different program names, which I have listed below based upon the version of Windows that it is installed on:

Windows XP Rogue Name Windows Vista Rogue Name Windows 7 Rogue Name
XP Antispyware 2012 Vista Antispyware 2012 Win 7 Antispyware 2012
XP Antivirus 2012 Vista Antivirus 2012 Win 7 Antivirus 2012
XP Security 2012 Vista Security 2012 Win 7 Security 2012
XP Home Security 2012 Vista Home Security 2012 Win 7 Home Security 2012
XP Internet Security 2012 Vista Internet Security 2012 Win 7 Internet Security 2012

When installed, this rogue pretends to be a security update for Windows installed via Automatic Updates. It will then install itself as a single executable that has a random consisting of three characters, such as kdn.exe, that uses very aggressive techniques to make it so that you cannot remove it. First, it makes it so that if you launch any executable it instead launches Vista Home Security 2012, XP Internet Security 2012, Win 7 Security 2012, or any of the other names it goes under. If the original program that you wanted to launch is deemed safe by the rogue, it will then launch it as well. This allows the rogue to determine what executables it wants to allow you to run in order to protect itself. It will also modify certain keys so that when you launch FireFox or Internet Explorer from the Window Start Menu it will launch the rogue instead and display a fake firewall warning stating that the program is infected.

Win 7 Antispyware 2012 Screen shot

Once started, the rogue itself, like all other rogues, will scan your computer and state that there are numerous infections on it. If you attempt to use the program to remove any of these infections, though, it will state that you need to purchase the program first. In reality, though, the infections that the rogues states are on your computer are all legitimate files that if deleted could cause Windows to not operate correctly. Therefore, please do not manually delete any files based upon the results from this rogue’s scan.

While running, XP Internet Security 2012, Win 7 Antivirus 2012, and Vista Security 2012 will also display fake security alerts on the infected computer. The text of some of these alerts are:

XP Home Security 2012 Firewall Alert
XP Home Security 2012 has blocked a program from accessing the internet
Internet Explorer is infected with Trojan-BNK.Win32.Keylogger.gen
Private data can be stolen by third parties, including credit card details and passwords.

Malware Intrusion
Sensitive areas of your system were found to be under attack. Spy software attack or virus infection possible. Prevent further damage or your private data will get stolen. Run an anti-spyware scan now. Click here to start.

System danger!
Your system security is in danger. Privacy threats detected. Spyware, keyloggers or Trojans may be working the background right now. Perform an in-depth scan and removal now, click here.

System Hijack!
System security threat was detected. Viruses and/or spyware may be damaging your system now. Prevent infection and data loss or stealing by running a free security scan.

Privacy threat!
Spyware intrusion detected. Your system is infected. System integrity is at risk. Private data can be stolen by third parties, including credit card details and passwords. Click here to perform a security repair.

Stealth intrusion!
Infection detected in the background. Your computer is now attacked by spyware and rogue software. Eliminate the infection safely, perform a security scan and deletion now.

XP Antispyware 2012 Alert
Security Hole Detected!
A program is trying to exploit Windows security holes! Passwords and sensitive data may be stolen. Do you want to block this attack?

Just like the scan results, these security warnings and alerts are all fake and should be ignored.

While running, Win 7 Home Security 2012, XP Antivirus 2012, and Vista Antivirus 2012 will also hijack Internet Explorer so that you cannot visit certain sites. It does this so that you cannot receive help or information at sites like BleepingComputer.com on how to remove this infection. When you attempt to visit these sites you will instead be shown a fake alert stating that the site you are visiting is dangerous and that the rogue is blocking it for your protection. The message that you will see is:

Vista Security 2012 Alert
Internet Explorer alert. Visiting this site may pose a security threat to your system!

Possible reasons include:
– Dangerous code found in this site’s pages which installed unwanted software into your system.
– Suspicious and potentially unsafe network activity detected.
– Spyware infections in your system
– Complaints from other users about this site.
– Port and system scans performed by the site being visited.

Things you can do:
– Get a copy of Vista Security 2012 to safeguard your PC while surfing the web (RECOMMENDED)
– Run a spyware, virus and malware scan
– Continue surfing without any security measures (DANGEROUS)

Just like the fake security alerts, the browser hijack is just another attempt to make you think that your computer has a security problem so that you will then purchase the program.

Without a doubt, this rogue is designed to scam you out of your money by hijacking your computer and trying to trick you into thinking you are infected. Therefore, please do not purchase this program , and if you have, please contact your credit card company and dispute the charges stating that the program is a computer infection. Finally, to remove Win 7 Antispyware 2012, Vista Antivirus 2012, and XP Security 2012 please use the guide below, which only contains programs that are free to use.

Tools Needed for this fix:

  • Malwarebytes’ Anti-Malware

 

Automated Removal Instructions for Win 7 Antispyware 2012 & Vista Antivirus 2012 using Malwarebytes’ Anti-Malware:

  1. Print out these instructions as we will need to close every window that is open later in the fix.
  1. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.
  1. This infection changes settings on your computer so that when you launch an executable, a file ending with .exe, it will instead launch the infection rather than the desired program. To fix this we must first download a Registry file that will fix these changes. From a clean computer, please download the following file and save it to a removable media such as a CD/DVD, external Drive, or USB flash drive. FixNCR.reg.  Once that file is downloaded and saved on a removable devices, insert the removable device into the infected computer and open the folder the drive letter associated with it. You should now see the FixNCR.reg file that you had downloaded onto it. Double-click on the FixNCR.regfile to fix the Registry on your infected computer. You should now be able to run your normal executable programs and can proceed to the next step.If you do not have any removable media or another clean computer that you can download the FixNCR.reg file onto, you can try and download it to your infected computer using another method. On the infected computer, right click on the Internet Explorer’s icon, or any other browser’s icon, and select Run As or Run as Administrator. If you are using Windows XP, you will be prompted to select a user and enter its password. It is suggested that you attempt to login as the Administratoruser. For Windows 7 or Windows Vista, you will be prompted to enter your Administrator account password.Once you enter the password, your browser will start and you can download the above FixNCR.reg file. When saving it, make sure you save it to a folder that can be accessed by your normal account. Remember, that you will be launching the browser as another user, so if you save it to a My Documents folder, it will not be your normal My Documents folder that it is downloaded into. Instead it will be the My Documents folder that belongs to the user you ran the browser as. Once the download has finished, close your browser and find the FixNCR.reg file that you downloaded. Now double-click on it and allow the data to be merged. You should now be able to run your normal executable programs and can proceed to the next step.
  1. Now we must first end the processes that belong to Win 7 Antispyware 2012 & Vista Antivirus 2012 and clean up some Registry settings so they do not interfere with the cleaning procedure. To do this, please download RKill to your desktop from the following link.RKill Download Link.  When at the download page, click on the Download Now button labeled iExplore.exe download link . When you are prompted where to save it, please save it on your desktop.
  1. Once it is downloaded, double-click on the iExplore.exe icon in order to automatically attempt to stop any processes associated with Win 7 Antispyware 2012 & Vista Antivirus 2012 and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that RKill is an infection, do not be concerned. This message is just a fake warning given by Win 7 Antispyware 2012 & Vista Antivirus 2012 when it terminates programs that may potentially remove it. If you run into these infections warnings that close RKill, a trick is to leave the warning on the screen and then run RKill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that rkill can terminate Win 7 Antispyware 2012 & Vista Antivirus 2012 . So, please try running RKill until the malware is no longer running. You will then be able to proceed with the rest of the guide. If you continue having problems running RKill, you can download the other renamed versions of RKill from the rkill download page. All of the files are renamed copies of RKill, which you can try instead. Please note that the download page will open in a new browser window or tab.Do not reboot your computer after running RKill as the malware programs will start again.
  1. There have been reports of this infection being bundled with the TDSS rootkit infection. To be safe you should also run a program that can be used to scan for this infection. Please follow the steps in the following guide:

How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller

If after running TDSSKiller, you are still unable to update Malwarebytes’ Anti-malware or continue to have Google search result redirects, then you should post a virus removal request using the steps in the following topic rather than continuing with this guide:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help Topic

If TDSSKiller requires you to reboot, please allow it to do so. After you reboot, reboot back into Safe Mode with Networking again.

  1. Download Malwarebytes’ Anti-Malware, also referred to as MBAM, from the following location and save it to your desktop:Malwarebytes’ Anti-Malware Download Link (Download page will open in a new window)
  1. Once downloaded, close all programs and Windows on your computer, including this one.
  1. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.
  1. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked. Then click on the Finish button.
  1. MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.

 

 

  1. On the Scanner tab, make sure the the Perform full scan option is selected and then click on the Scan button to start scanning your computer for Win 7 Antispyware 2012 & Vista Antivirus 2012 related files.
  1. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.

 

 

  1. When the scan is finished a message box will appear as shown in the image below.

 

You should click on the OK button to close the message box and continue with the Vista AntiSpyware 2012 & Win 7 Home Security removal process.

  1. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.
  2. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.

 

You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  1. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.
  1. You can now exit the MBAM program.
  1. As many rogues and other malware are installed through vulnerabilities found in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

Your computer should now be free of the Vista AntiSpyware 2012 & Win 7 Home Security program. If your current anti-virus solution let this infection through, you may want to consider purchasing the PRO version of Malwarebytes’ Anti-Malware to protect against these types of threats in the future.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

To see the original article in its entirety click here.


10 Cool Technologies

Takeaway: Impressive new technologies are revolutionizing PC performance, but should you buy now or wait for more improvements? These details will help you decide.

It’s an exciting time for PC enthusiasts. I can’t remember a period when so many existing technologies were being upgraded to the next generation and new technologies were being introduced. Even non-enthusiasts need to know about the changes that are happening to the desktop PC.

But knowing when to upgrade your PC to the latest and greatest can be a difficult decision. Should you buy now or wait for the even more advanced technology that has been promised by the likes of Intel, AMD, and others? For power users, and a lot of IT professionals fall into this category, waiting for a specific technology can have a huge impact on their future productivity and ultimate success. I will list 10 PC-based technologies that are either new or soon to be released and leave it to you whether it is “got to have” or “can do without” technology.

Note: Release schedules, specifications, and prices are subject to change prior to formal release. Use this information as a guideline only.

Extra info: This article is available as a PDF download that includes 11 tables containing additional details on availability, configuration, and technical specifications.

1: USB 3.0

USB devices are ubiquitous, so it’s only natural to want to know more about the successor to USB 2.0. USB 3.0 increases the effective data transfer rate by a factor of more than six — a huge improvement over USB 2.0. It also provides more power than USB 2.0 when devices need it, 4.5 Watts versus 2.5 Watts, respectively, and less when they don’t. USB 3.0 is available now as a chip added to the motherboard or via an add-in card. AMD supports USB 3.0 natively and Intel has announced plans to support USB 3.0 in its 7-series Panther Point chipsets.

Additional resources

  • 10 things you should know about USB 2.0 and 3.0 (TechRepublic)
  • USB 3.0 (Wikipedia)

2: Intel Thunderbolt

Intel, along with Apple, has developed a technology to compete with USB called Thunderbolt — although Intel prefers to think of Thunderbolt as coexisting with USB. Originally codenamed “Light Peak” and making use of optical cables, Thunderbolt is copper-based, allowing for 10 watts of power over the copper. Thunderbolt combines PCI Express and DisplayPort protocols into one shared interface.

There is quite a bit of confusion about the total bandwidth of a Thunderbolt port. According to this Intel Technology Brief, “A Thunderbolt connector is capable of providing two full-duplex channels. Each channel provides bi-directional 10Gbps of bandwidth.” That is 20Gb/s upstream and 20Gb/s downstream. So why is Thunderbolt advertised at 10Gb/s or “only” twice the speed of USB 3.0? An Intel spokesman explained it this way in PC Magazine: “So in summation you have potential for up to 20Gb/s upstream AND 20Gb/s downstream, but any single device maxes out at 10Gb/s (you don’t ‘combine’ the two channels).”

Of course, most consumer storage devices don’t come anywhere near the 10Gb/s data rate, but that is changing with the faster SSDs and flash drives now being produced. Also, up to seven total devices can be daisy-chained to use the remaining 20Gb/s per direction total bandwidth. One or two of these can be high resolution DisplayPort v1.1a displays.

This speed comes at a price, though. A 2.0 meter copper-based Thunderbolt cable costs $49.00 USD, the cost due primarily to the Gennum GN2033 controllers and other electronics built into each end of the cable that performs the data moving and multiplexing magic. You also have to add the cost of the Thunderbolt controllers needed on both the host and peripheral device.

Expect Thunderbolt to be supported on Intel’s Ivy Bridge processors but don’t count on it being available on the 7-series Panther Point chipsets due out in March of 2012. There are limitations I won’t bore you with here, but they are listed in this article, along with other Thunderbolt details.

Thunderbolt using optical cable, also known as 50G Silicon Photonics Link (PDF), continues to be in the works and may appear as early as 2012. According to Dave Salvator of Intel, “Current supported data rate is two channels at 10Gbps bi-directional each.” Thunderbolt ports accept either copper or optical cables.

Additional resources

  • Thunderbolt Technology: The Transformational PC I/O (Intel)
  • Thunderbolt Web site (Intel)
  • Thunderbolt (interface) (Wikipedia)
  • Introducing Thunderbolt (Apple)

3: Serial ATA International Organization: Serial ATA Revision 3.0

That long name is the formal specification name of the follow-on to SATA Revision 2.0. SATA Revision 3.0 or SATA 6Gb/s doubles the effective data transfer rate of SATA Revision 2.0. Looking further out, the SATA Revision 3.2 specification is due by the end of 2011 that creates the SATA Express standard. SATA Express combines SATA software infrastructure and PCI Express to enable 8Gb/s using PCIe 2.0 or 16Gb/s using PCIe 3.0. Both SATA Revision 3.0 and SATA Express are intended to accommodate the increasing data speeds of sold-state and hybrid drives.

Except for Queued TRIM Command, SATA Revision 3.1 includes features primarily for non-PC devices.

Additional resources

  • Fast Just Got Faster:  SATA 6Gb/s (The Serial ATA International Organization [PDF])
  • SATA-IO Releases Revision 3.1 Specification (The Serial ATA International Organization [PDF])
  • SATA revision 3.0 (SATA 6 Gbit/s) (Wikipedia)

4: PCI Express 3.0

PCI Express 3.0 is the next generation standard for the Peripheral Component Interconnect Express, or PCIe. For average PC users, this means that their graphics cards and other extreme I/O add-in cards will be able to transfer data at twice the rate of PCIe 2.0.

PCI Express 3.0 uses a more efficient method of data encoding, 128b/130b, with a 1.5385% overhead versus the 20% overhead of 8b/10b used in the PCIe 2.0 specification. This allows for a doubling of the effective transfer rate even though the total bandwidth increases only 60% from 5GT/s to 8GT/s. Tom’s Hardware is reporting that the first three Sandy Bridge-E processors scheduled for release in November 2011 will have PCIe 3.0 capability but without the PCIe 3.0 certification.

Additional resources

  • PCI Express 3.0 (Wikipedia)
  • PCI Express 3.0 Frequently Asked Questions (PCI-SIG)

5: SSDs & SSD Toolbox

SSDs promise huge increases in performance over the most common bottleneck in a personal computer system, data access to and from hard drives. SSDs are approaching and even exceeding 500MB/s sequential read and write rates. But there are plenty of cons that come with that speedy SSD. SSDs have small capacities and are still expensive compared to hard disk drives. While they are available and have been for quite a while now, the technology is going through birthing pains, as exemplified by the continued compatibility issues with the SandForce SF-2200 series of controllers (see below).

Firmware issues continue to appear, though as in the case of the Intel “Addresses Bad Context 13x Error,” firmware updates to remediate the issue are available. SSDs require a different mindset than with traditional hard disk drives. To maximize life and performance, users need to be educated about defragmentation, Hibernation, AHCI and TRIM and Page File.

The Intel Solid-State Drive Toolbox (PDF) monitors and manages Intel’s SSDs and adds new features. These features include the Intel SSD Optimizer TRIM function, System Configuration Tuner, Secure Erase, access to the SMART data, and running diagnostics to check for read or write errors. OCZ offers a toolbox for their SSDs, and Samsung provides the SSD Magician Tool. SSD Tweaker optimizes Windows for your SSD, and a free version is available.

Additional resources

  • Solid-state drive (Wikipedia)
  • Intel SSD Toolbox Questions and Answers (Intel [PDF])

6: SandForce DuraClass SSD controllers

SandForce has developed a controller for SSDs that adds these DuraClass technology features to the base SSD drive:

  • Five-year expected life using inexpensive MLC flash memory
  • SATA 6Gb/s Interface
  • DuraWrite — Reduces write amplification to 0.5 (typical)
  • SandForce RAISE technology
  • (Redundant Array of Independent Silicon Elements) – Provides RAID-like redundant protection for single SSD computers
  • Automatic AES-128 encryption (SF-1000)
  • Automatic AES-256 encryption (SF-2000)
  • Currently available

Look for the SandForce DRIVEN logo when specing out an SSD or check out this list of SSDs that use the SandForce DuraClass Controllers. Before purchase, be aware that some users have reported problems (including some BSODs) with the SF-2200 controllers. SandForce continues to look into the issue and new firmware updates are in test now.

Additional resources

  • SandForce (Home page)
  • SandForce (Wikipedia)

7: AMD Bulldozer

Power users have been anxiously awaiting the details of AMD’s Bulldozer processors. The desktop processor models are called AMD FX and were officially launched on October 12, 2011. This is not your secretary’s processor — the full AMD FX lineup of CPUs is unlocked. Four models are available at the initial launch, one 4-core model, one 6-core model, and two 8-core models. The processors, codenamed Zambezi, have a 32nm die size. High-end FX models will ship with a sealed liquid cooling system made by Asetek, pictured here, though they will initially be limited to specific markets and not available at launch. Availability of the liquid cooling system in the U.S. is still to be determined.

Before you get too excited, you need to fully understand the exact meaning of a Bulldozer “core.” The Bulldozer microarchitecture employs one module with “two tightly-linked processor cores” that share a fetch, decode, and 256-bit floating-point units and 2MB of L2 memory cache. For example, four Bulldozer modules provide the eight “cores” of the FX-8000 series processors. Testing by AnandTech and Tom’s Hardware of an FX-8150 processor shows that single-threaded performance is similar to that of the Intel Core i5-2500K. Performance is better with higher workloads and multi-threaded applications that can utilize more of its eight “cores.”

Additional resources

  • AMD FX Processors (AMD)
  • AMD Hot Chips Bulldozer & Bobcat Presentation (SlideShare)
  • AMD “Bulldozer” Interactive Series – Introduction (YouTube)
  • Bulldozer (processor) (Wikipedia)

8: Intel Sandy Bridge-E

The next generation of Sandy Bridge processors is dubbed Sandy Bridge-E, with the E meaning Enthusiast. Unlike AMD, which delayed the release of its nex- generation processors, rumors are that the release date of three of the Sandy Bridge-E processors has been pushed up to November 2011. Performance increases of 12% to 65% are expected, compared to similar processors. While the Sandy Bridge-E processors will be built using the 32nm production process, the follow-on processor series, codenamed Ivy Bridge, which is expected in March 2012, will use the 22nm process.

It’s a little confusing, but the Sandy Bridge-E processers will use the new LGA 2011 socket and the X79 Patsburg chipset. The Ivy Bridge processors will use the existing LGA 1155 socket plus the existing 6-series Cougar Point chipset or the yet-to-be-released 7-series Panther Point chipset. As mentioned above, one advantage of the 7-series Panther Point chipset is that it will have native USB 3.0 support.

Like AMD, X-bit labs is reporting that top Sandy Bridge-E models will ship with a new liquid cooling system. The RTS2011C liquid-cooling system looks remarkably like the AMD cooler, which may be more than coincidental, since both are supposedly built by Asetek. This cooling solution will also be sold separately, which is of note since Sandy Bridge-E processors may ship without a cooler.

You will want to wait before purchasing a Sandy Bridge-E processor if you are interested in using hardware accelerated virtualization. Rumors are that the C1 stepping revision has a problem with VT-d, Virtualization Technology for Directed I/O, which will be fixed in the C2 stepping.

Additional resources

  • Intel Core i7-3960X (Sandy Bridge-E) And X79 Platform Preview (Tom’s Hardware)
  • LGA 2011 and Sandy Bridge-E News from IDF 2011 (X-bit labs)

9: DDR4 SDRAM

With publication of the DDR4 SDRAM standard not expected until mid-2012, don’t expect to see DDR4 memory in desktops anytime soon. Availability is confusing since a presentation by the JEDEC director at MemCon 2010 suggested 2015. But BeHardware.com claims that Hynix plans to begin mass production of DDR4 SDRAM in the second half of 2102. Regardless of DDR4 memory module production dates, supporting processors and chipsets may lag well behind — late 2013 is projected for AMD. Unless you are willing to wait until then, your next PC will contain DDR3 SDRAM memory. There is some good news for those wanting faster SDRAM in the near future. The FlyingSuicide Web site is reporting that Sandy Bridge-E processors will officially support DDR3 speeds up to 2133MHz. X-bit labs is reporting that Ivy Bridge processors will support DDR3 memory operating at 2800MHz, even though DDR3 memory at these speeds is not yet available. Either of these would be a great interim solution while waiting for DDR4, assuming of course that the rumors turn out to be accurate.

DDR4 is expected to use a point-to-point approach instead of dual- and triple-channel architecture, though JEDEC has not formally announced that it will be in the final spec. According to JDEC, “The DDR4 standard will be implemented with 3D support from the start.” This means that memory can be stacked using technologies like Through-Silicon Via (TSV). The voltage is expected to eventually decrease from 1.2V to 1.05V.

Additional resources

  • DDR4 SDRAM (Wikipedia)
  • JEDEC Announces Key Attributes of Upcoming DDR4 Standard (JEDEC)
  • DDR4: What we can Expect (bit-tech)

10: Microsoft Windows 8

The major change in Windows 8 begins with the UI, called the Metro UI. A new start screen with Live Tiles replaces shortcut icons. A touch screen monitor will obviously be required if you want to use the new interface with your fingers instead of a mouse. The hints so far are of a UI more befitting a tablet than a personal computer. Yes, you almost certainly will be able to turn off the Metro UI in the final release, but why upgrade to Windows 8 just to turn off its biggest selling feature? It is still too early to tell what other new features will be available that will increase productivity and make for a better user experience on a PC. Windows 8 is expected to support USB 3.0, but as of this time there is no definite news whether Thunderbolt will also be supported. With Thunderbolt coming to the PC in 2012, Microsoft would be remiss to overlook it.

Many questions remain as to whether Windows 8 will be a success on a desktop PC in the workplace:

  • Will users adopt the new interface — with or without a touch screen monitor?
  • Will employers invest in more expensive touch screen monitors?
  • Will Windows 8 be more productive?
  • Will reaching out to touch a monitor eight hours a day cause physiological pain or even harm?

Until more is known, expect businesses to take a cautious, even skeptical approach to Windows 8. Decide for yourself if you like the new interface- – preview Windows 8 by downloading the Windows Developer Preview, a pre-beta version for developers but available to everyone.

Additional resources

  • Windows 8 (Wikipedia)
  • Previewing “Windows 8? (Microsoft)
  • Windows 8 features explained: What’s new and how it works (Digital Trends)
  • Windows 8 features we know about so far (TechRepublic)
  • Building robust USB 3.0 support (Microsoft)

The bottom line

It’s taken 30 years, but I finally have a system that is fast enough for my needs. My Foxconn BlackOps, Intel Core 2 Quad Q9650 with RAID 10 system will more than suffice. Which leads to the obvious question: How much of this technology do you really need? The core wars between AMD and Intel continue, but realistically, how many of those Bulldozer “cores” can you keep busy in a world of single-threaded apps? Other technologies, like USB 3.0, Thunderbolt, SATA Revision 3.0, PCIe 3.0, SSDs, and SandForce promise immediate performance gains. Of course, needs vary, and whatever new technology you include in that next PC should be based on your individual needs.

With all of the buzz about the latest tablet or smart phone, the PC is still the workhorse for most cubicle residents. No matter how careful you are future-proofing your next personal computer, there will always be newer technologies on the horizon. But the next six months look like a great time to upgrade that relic sitting on your desktop you used to call a PC and get the bulk of the new technologies. Happy shopping!

Author’s note: I would like to thank SandForce, Intel, and AMD for their help with this article.

Two great laptops for Windows

For those infatuated with the 11-inch MacBook Air’s svelte form factor but still tethered to Windows, I’ve got two nice alternatives that are worth considering: The Sony Vaio X1 and the Acer Timeline X. I’ve put together a gallery of unboxing and product photos of both machines, along with some comparison shots next to the 11-inch MacBook Air.

While the Sony Vaio X1 and the Acer Timeline X are both worthy competitors to the 11-inch MacBook Air, they are two very different machines that will appeal to different sets of users. Here’s my quick take on the two of them.

Sony Vaio X1

Sony is known for its stylish PC hardware, but it often comes at a premium price tag — similar to Apple. However, in this case, the 11-inch MacBook Air and the Sony Vaio X1 have similar price tags to the Acer Timeline X. All three systems have a base price of roughly $1000. At that price, the three of them have remarkably different hardware profiles.

The Sony Vaio is the lightest of the three machines, and it’s also the most lightly powered. It runs a 2.0GHz Intel Atom processor, the same one that powers many netbooks (compared to the speedier 1.4GHz Core 2 Duo that powers the 11-inch MacBook Air). Here are some of the additional specs of the model we tested (VPCX131KX/B):

•2GB of RAM
•11.1-inch display with LED backlight and 1366×768 resolution
•Integrated Intel graphics
•64GB of flash storage
•2 USB ports, VGA port, Ethernet port, SD card slot
•3 hours of battery life (standard battery) or 12 hours battery life (expanded battery)
•Weighs 1.6 pounds (with standard battery)

The Vaio X1 is even a little smaller than the 11-inch MacBook Air. A business professional could easily slip it into a padfolio. Its portability and weight (or lack thereof) are its greatest assets, and it’s a solid machine for email, Web, and basic business apps. The tradeoffs are that it’s not a very fast or powerful machine and it feels a little overpriced for what you get.

My other concern with this machine is durability. Unlike the MacBook Air, which is made almost entirely of aluminum, the Sony Vaio X1 is totally plastic and not an especially durable blend. That makes it light, but also makes it feel very flimsy. I had the sense that I could have almost broken it in half with my bare hands if I twisted it hard enough.

Still, if you’re not too concerned about performance and you need a super-portable system, then the Vaio X1 is pretty impressive and worth a look.


Acer Timeline X

The Acer Timeline X can’t match Sony or Apple for style or thinness, but it packs a lot more power under the hood. The model we tested (1830T-68U118) was running an Intel Core i7 processor (1.46GHz) and offered very zippy performance for just about any task. The rest of the specs for the Timeline X included:

•4GB of RAM
•11.6-inch display with LED backlight and 1366×768 resolution
•Integrated Intel graphics
•500 GB hard disk storage
•3 USB ports, VGA port, HDMI port, Ethernet port, SD card slot
•8 hours of battery life

The Timeline X can keep up with a lot of desktop machines. It’s that fast. This is the system for someone who needs to pack a lot of performance but wants to do it in as small a package as possible. The Timeline X is certainly a little more heavy and bulky than the MacBook Air of the Vaio X1, but it is far smaller than most of the other laptops in its power class.

My beefs with the Timeline X are mostly qualitative. The touchpad is just too small to be very useful. The 11-inch MacBook Air is literally about three times the size of the Timeline X — and although I’m not a fan of touchpads in general, the one on the Air is one of the few that are useful in a pinch. With the Timeline X, make sure you have a good notebook mouse and plan to use it most of the time. On a related note, the keyboard on the Timeline X is not great either. The keys are huge but they are very close together, which makes it easy to hit the wrong key. The keys are also stiff and shallow, which isn’t very friendly for typing. This is one of the main areas where the Timeline X doesn’t match up very well with the MacBook Air, and to a lesser extent, the Sony Vaio X1.

However, if you want a lot of power in a small package and you want it to run Windows, the Timeline X is one of your best bets.

To view the original article in it’s entirety, Click Here