Category Quick Reference Guides

iOS 9 PPTP VPN Setup Tutorial

Manual Setup

Step 1

Start from the home screen. Go to “Settings“.

 

sjt-blog-iphone-vpn-01

Step 2

Go to “General“.

 

sjt-blog-iphone-vpn-02

Step 3

Then proceed to “VPN“. You may need to scroll down to find it.

 

sjt-blog-iphone-vpn-03

Step 4

Tap on “Add VPN Configuration…“.

 

sjt-blog-iphone-vpn-04

Step 5

Tap on “Type“.

 

sjt-blog-iphone-vpn-05

Step 6

Select “PPTP” by tapping on it.

 

sjt-blog-iphone-vpn-06

Step 7

Description” is the name of the connection, can be any as you like, we recommend StrongVPN.
Fill the “Server“, “Account” and “Password” fields.
Server” is your server address. It is not remote.sjtechies.com, that is just an example.
Account” and “Password”. Account is neither Test\jsmith nor your email.
Encryption Level” option must be set to “Auto“. “Send All Traffic” should be “ON“.
When the fields are filled up correctly, tap “Done“.

 

sjt-blog-iphone-vpn-07

Step 8

It will give you the warning about using the PPTP connection, which has some downsides.
Tap Save button. (Hint: If you want stronger encryption just use L2TP.)

 

sjt-blog-iphone-vpn-08

Step 9

Now connect by tapping the switch button to the right of VPN Status.
(If you have more than one VPN configuration listed, the one with a check next to it will be connected. You can tap on a vpn configuration name to select it, or tap on the ‘i’ to the right of the name if you need to update the settings.)

 

sjt-blog-iphone-vpn-09

Step 10

It will show you “Connecting…” status, wait while it connects.
When the VPN connection is established the status will be “Connected“. Also notice the “VPN” badge on the top bar.

 

sjt-blog-iphone-vpn-10

Step 11

To check if your IP address is changed successfully open the Safari browser and proceed to http://strongvpn.com/.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

Now Microsoft Office 365 tackles ‘fake CEO’ email spoofing attacks

Microsoft is rolling out a host of new email security features for Office 365 later this quarter, as it looks to thwart hackers and criminals.

‘Insider spoofing’ or faking the CEO’s email address to trick the CFO into transferring millions to criminal bank accounts is big business. Now Microsoft is using big data and reputation filters to try and squish the threat.

According to the FBI, between October 2013 and August 2015, 7,066 US businesses have fallen prey to ‘business email compromise’, netting criminals an estimated $747m.

Non-US victims lost a further $51m over the period, with the FBI estimating a 270 percent increase in identified victims since January 2015, when it first released figures about the threat category.

As Microsoft notes, when a corporate email domain is spoofed, it makes it hard for existing filters to identify the bogus email as malicious.

However, Microsoft reckons it has achieved a 500 percent improvement in counterfeit detection using a blend of big data, strong authentication checks, and reputation filters in Exchange Online Protection for Office 365.

It’s also rolling out new phishing and trust notifications to indicate whether an email is from a known sender or if a message is from an untrusted source, and therefore could be a phishing email.

The company is also promising a faster email experience as it vets attachments for malware and new tools to auto-correct messages that are mis-classified as spam. The aim is to boost defences without impairing end-user productivity.

Malicious email attachments remain a popular way for attackers to gain a foothold in an organization and, as RSA’s disastrous SecurID breach in 2011 showed, a little social engineering can go a long way to ensuring someone opens it.

Microsoft’s new attachment scanner, called Dynamic Delivery of Safe Attachments, looks to reduce delays as it checks attachments for potential threats.

Currently it captures suspicious looking attachments in a sandbox with a ‘detonation chamber’ where it analyses it for malware in a process takes five to seven minutes.

Microsoft hasn’t figured out a faster way to analyse the attachment, but instead of holding up the email as it conducts the scan, it will send the body of the email with a placeholder attachment. If the attachment is deemed safe, it will replace the placeholder and if not, the admin can filter out the attachment.

The feature is part of Microsoft’s Office 365 Exchange Online Protection and Advanced Threat Protection services.

The company is also tackling false-positive spam, or legitimate messages that are mis-identified as spam, and vice versa, with a new feature called Zero-hour Auto Purge, which allows admins to “change that verdict”.

“If a message is delivered to your inbox and later found to be spam, Zero-hour Auto Purge moves that message from the inbox to the spam folder; the reverse is true for messages misclassified as spam,” Microsoft notes.

Microsoft is testing this approach with 50 customers and says it will be rolled out for all Exchange Online Protection global clients in the first quarter of 2016.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Patience will be the key to a successful Windows 10 upgrade

let the dust settle before you attempt the free Windows 10 upgrade.

Windows 10

With the official Windows 10 launch and Microsoft’s promise that the upgrade for Windows 7/8.1 systems will be free for the first year after launch, you’ll have until July 29, 2016, to make your move. Just because it’s free doesn’t mean you have to rush to get your copy—unless, of course, it’s a status thing.

For the ordinary Windows user, there really isn’t any immediate need to be one of the first people to download Windows 10. In fact, you’ll probably have a better upgrade experience if you hold off for a bit. Wait for the hype to die down, wait for the load on the Windows Update servers to wane, and more importantly, wait for the first wave of updates to make their way out to the masses of Windows users who had to be the first.

Besides, unless you’re a Windows Insider program participant, chances are that you won’t be able to get Windows 10 right away anyhow.

In his July 2nd blog post, “Windows 10: Preparing to Upgrade One Billion Devices,” Terry Myerson stated:

“We want to make sure all of you have a great upgrade experience, so we’ll roll-out Windows 10 in phases to help manage the demand.”

He then goes on to say:

“Starting on July 29, we will start rolling out Windows 10 to our Windows Insiders. From there, we will start notifying reserved systems in waves, slowly scaling up after July 29th. Each day of the roll-out, we will listen, learn and update the experience for all Windows 10 users.”

That last sentence hints at the fact that the Microsoft is anticipating the possibility that there may be some glitches in the first wave of the roll out.

To be sure, I’m not suggesting that you hold out for months before you upgrade—rather, I’m saying that you may want to give it a couple of weeks just to see how others are faring with Windows 10. With Microsoft’s Windows as a service model, the ongoing testing via the extension of the Windows Insider program, and the rapid update system developed during the Windows Insider preview program, the hope is that any issues that crop up in the first weeks after initial availability will be quickly resolved.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Eight advanced tips for Word headers and footers

Microsoft word

Even a novice Word user can display page numbers in a document’s header of footer. The process is fundamental. Advancing beyond the basics is easier than you might think, and you might be surprised how many things you can do with a header or footer! In this article, you’ll find eight tips that will move you from basic user to advanced, at least with headers and footers.

1. Display page numbers in shapes

Most documents over a few pages display a page number in the header of footer. If the document warrants a bit of visual appeal, you can display that number in an interesting and colorful shape. First, add the shape to the header using an easy-to-use built in gallery. Next, use the header’s current position property to add the number.

To add the shape, do the following:

  1. Open the footer by double-clicking the footer area. In Word 2003, choose Header and Footer from the View menu.
  2. While in the header, click the Insert tab. In the Illustrations group, click Shapes and choose one, such as the diamond shape in the Flowchart section (Figure A). In Word 2003, use the Drawing toolbar to access shapes.
    Figure A

figure A

  1. Click inside the footer and drag to create the shape. It’s okay if the shape extends beyond the footer border a bit.
  2. With the shape inserted, use the contextual Format tab to format the shape. I used the Shape Fill options to change the color to lettuce green; I used the Shape Outline drop-down to change the outline to dark green; I used the Shape Effects Reflection option to add a full reflection (Figure B) that fades off the bottom edge (which might not be possible to print but works fine for electronic viewing). In Word 2003, choose AutoShape from the Format menu (with the shape selected).
    Figure B

figure B

With the shape inserted and formatted, add the page number as follows:

  1. Right-click the shape and choose Add Text from the resulting submenu. In Word 2003, use the Header and Footer contextual toolbar to insert the page number, and then format as you normally would.
  2. Click the contextual Design tab. In the Header & Footer group, click Page Number.
  3. Choose Current Position from the drop-down.
  4. Choose Plain Number (the first option) from the gallery (Figure C).
    Figure C 

figure C

  1. Select the number and format it. I applied black font color (Figure D).
    Figure D

figure D

This simple example shows you how to display the page number in a shape. It’s up to you to determine whether doing so is appropriate for your document.

2. Insert a graphic

A header is a good place to display your organization’s logo or some other branding graphic. To do so, open the header or footer as you normally would and then do the following:

  1. With the document in edit mode, click the Insert tab. In Word 2003, choose Picture | From File from the Insert menu, and then skip to step 3.
  2. In the Illustrations group, click Picture.
  3. Use the Insert Picture dialog to locate the file
  4. Select the file, and then click Insert

You probably didn’t realize how easy that would be! While graphics in the header and footer might sound like a great idea, use them sparingly.

3. Use header graphic as a page tab

You can use the header or footer to display a graphic on every page, but you don’t have to leave it in the header or footer. For instance, you might want to use a graphic as a page tab. To do so, insert the graphic as you normally would (see tip 2). Then, drag it out of the header or footer area as shown in Figure E. If the graphic won’t move, click the Layout Options icon and choose a text wrapping option. The Layout Options icon is new to 2013. In earlier versions, you’ll find these options on the contextual Format tab. You might want to rotate the graphic as well.

Figure E

figure E

4. Use sections

A large document might need to change information in the header or footer as the document evolves. The way to implement this requirement is to use section breaks. Simply click inside the document (not inside the header or footer) where you want the new section to begin. Click the Page Layout tab, click Breaks in the Page Setup group, and then choose the best break type for your document. Return to the header or footer of the new section and make the necessary changes. In Word 2003, breaks are on the Insert menu.

For a header that doesn’t repeat information from the previous section, click the Link to Previous option in the Navigation group on the contextual Design tab. Doing so breaks the connection between the two sections. Figure F shows the toggle option linked and not linked. When sections are linked, the option has a dark background and Word displays the Same as Previous tab to the right. When the link is broken, the option has no background and the tab is gone. In Word 2003, this option is on the Header and Footer toolbar (and available only if there’s more than one section).

Figure F

figure F

You must break the link between headers and footers separately.

5. Display custom info

The header or footer area is a great place to display custom information about the document or author using fields. To do so, open the document’s header or footer. Then, position the cursor and do the following:

  1. Click the Insert tab. In Word 2003, choose Field from the Insert menu and skip to step 4.
  2. In the Text group, click the Quick Parts option.
  3. From the drop-down, choose Field.
  4. Using the resulting dialog (Figure G), choose a field, such as Author. Set properties, if necessary, and click OK. (You could also use AutoText or Document Property.)
    Figure G

figure G

6. Gallery page number options replace existing header or footer

Be careful when using the Page Number option to display page numbers in the header or footer. If you’ve already created a header or footer, and you add the page number last, use the Current Position option. Other options from the gallery will replace the existing header or footer. (Galleries aren’t available in Word 2003.)

7. Modify the style

Word applies the Header and Footer style to header and footer text, respectively. Both styles are based on Normal. The easiest way to change the appearance of the text for either is to modify the appropriate style. Doing so will impact the entire document, so don’t change the style if you want to change the format for a single section.

8. Reference a content control

Sometimes, you want to repeat information from the body of the document in the header or footer. In later versions of Word, using content controls, this is easily done. First, you add a content control and create a custom style for it. To the header, you add a StyleRef field that references the style you applied to the content control. In this way, you can easily display the contents of the content control in the header. Let’s work through a simple example:

  1. Position the cursor where you want to insert the content control.
  2. Click the Developer tab and then click Rich Text Content Control in the Controls group.
  3. Click Properties in the same group and enter a meaningful name, such as ccName . The cc prefix identifies the object as a content control and Name describes its content.
  4. Check the Use a style to format text typed into the empty control option. Don’t worry about what’s in the Style control at this point.
  5. Click New Style.
  6. Name the new style appropriately, such as Content Control (Figure H). You can change the Style based on setting, but don’t for this example. In this way, you can see how easy it is to set this technique up without making a lot of unnecessary changes. It’s the same style used for the body of the document; it just has a different name.
    Figure H

figure H

  1. Click OK, and Word updates the Style control to reflect the new style you just created (Figure I).
    Figure I

figure I

  1. Click OK.
  2. Open the header and position the cursor where you want to display the contents of the content control you just added.
  3. Click the Insert tab.
  4. In the Text group, click Quick Parts, and choose Field from the drop-down list.
  5. In the resulting dialog, choose StyleRef from the Field names list.
  6. Choose Content Control from the Style name list
  7. Click OK.
  8. Double-click the content control to close the header.

Enter text into the content control, and the field in the header will update accordingly. Although this technique has a lot of steps, it isn’t difficult to implement.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 10 most important lessons IT learned in 2015

Every year brings with it new challenges, and new lessons, for IT in the enterprise. Here are 10 of the lessons IT learned this past year.

The end of a year is always a good time for reflection, especially so if you’re evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come.

Here are 10 of the most important lessons that IT learned in 2015.

1. BYOX is here to stay

As smartphone use grew to near ubiquity in the enterprise, it brought with it the trend of BYOD, or, bring your own device. While that originally referred to mobile devices such as smartphones and tablets, it spawned as host of “bring your own” everything else.

“BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment,” said Chuck Pol, president of Vodafone Americas.

2. DevOps is no longer just a buzzword

The term “DevOps” gained huge popularity in 2015 as a reference to an agile method that stresses the collaboration of development and operations. The goal is to connect the writers of the code with those who maintain the systems that run it. However, DevOps continues to evolve and, although it has its own set of challenges, it could be poised to become the method of choice for enterprise IT starting in 2016.

3. Data is currency

Data, especially as it relates to big data has been steadily growing in value but 2015 felt like a tipping point. Tools for both structured and unstructured data exploded in popularity and major data service providers went public, adding credibility to the field and likely creating a better inroad into the enterprise. Also, businesses got better at distinguishing between relevant and irrelevant data.

“It is no longer credible to look at data as big static objects in a deep lake, but rather be considered a set of fast moving assets in a raging river,” said Neil Jarvis, CIO of Fujitsu America. “In 2016 and beyond, companies need to look at the data that creates business-relevant information for today and tomorrow.”

4. Finding talent is problematic

Talent shortages don’t just affect startups on the West Coast. CompTIA CIO Randy Gross said that current estimates suggest there are more than one million IT job opening across the US alone, ranging across skill level from support specialists to network admins. Enterprises are going to have to work harder to attract and retain talent.

“Wise employers with IT jobs to fill have engaged in a self-examination of the tactics and strategies they’re using to attract new talent—and adjusting accordingly,” Gross said. “For some companies, new telecommuting and remote work options have helped them fill their talent gaps.”

5. SMAC is still relevant

The SMAC stack, which stands for social, mobile, analytics, and cloud, is also known by some as the “third platform.” As all of these individual components continue to grow and thrive in the workplace, their interdependencies will grow along with them.

“Senior management must become well versed about these technologies and their possibilities to create new value and new competitive advantages in their own business and markets,” Pol said.

6. Cloud lost its fear factor

Cloud acceptance was a mixed bag for a long time, but 2015 brought a more widespread embrace of cloud technologies and services in the enterprise. In fact, some trends are making it almost a necessity.

“The complete adoption of virtualization, as well as investigation into cloud and other strategies, is far more advanced than expected—particularly amongst SMBs,” said Patrick Hubbard, technical product marketing director at SolarWinds. “Making operating systems and applications truly mobile is redefining how companies think about their IT infrastructure.”

7. The security mindset is changing

Anthem BlueCross BlueShield and Harvard University were among the major organizations that dealt with a public security breach in 2015. With today’s social media, you can almost guarantee any data breach that occurs in the enterprise won’t stay a secret. And, with the risk of a breach high, Intel Security CTO Steve Grobman said that teams must adopt a new way of thinking.

“IT must embrace the mindset that they have already been breached, now how do you protect your environment with this new default outlook?,” Grobman said.

8. Shadow IT is a line item

Shadow IT carries nowhere near the same amount of scorn it once did in the enterprise. Some organizations are even openly embracing it, and making it a foundational part of their IT strategy. And, as shadow IT continues to grow, Pol said, it needs to be properly accounted for in the budget.

“As technology continues to transform business, IT infrastructure will become more complex and more difficult to have a complete view of technology across the business,” Pol said. “The role of IT will need to become more strategic and set clear lines of accountability between IT and line of business budget holders.”

9. Employees are the biggest security risk

When most people think about security risks to their organization, the image of the hooded hacker furiously typing away in a dark room. However, employees themselves pose a real threat to the security of an organization as well. Issues such as poor password practices and using unsecured networks with company devices are a real problem. Kelly Ricker, senior vice president of events and education at CompTIA, said mobile, while helping with agility and productivity, is a cybersecurity nightmare.IT

“Every device that employees use to conduct business—smartphones and smartwatches, tablets and laptops—is a potential security vulnerability,” Ricker said. “Companies that fail to acknowledge and address this fact face the very real risk of becoming a victim of cyber criminals and hackers.”

10. Commoditization is a threat

With the plethora of tools available to build and replicate popular tech, it is increasingly important for organizations to guard against the threat of commoditization.

“As development cycles become shorter and the potential for intellectual property to be recreated and copied increases, it is becoming more difficult to create a sustainable competitive advantage for your products and services,” Pol said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://techies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Microsoft withdraws update causing Outlook to start in Safe Mode (with fix)

outlook-safe-mode

Microsoft has withdrawn the released Windows Update KB3114409 because it causes Outlook to start in Safe Mode. This loads the email client without customizations and plugins. Fortunately it can be easily fixed.

The patch was actually released to stop Outlook from starting in Safe Mode, but it appears something didn’t go the right way. Microsoft has decided to withdraw the update for now.

Users affected by the update can easily stop Outlook from starting in safe mode by uninstalling the KB3114409 update.

This can be done this way: Go to your Control Panel. Go to ‘Programs and Features’ and left click ‘View installed updates’. Find KB3114409. Once you’ve found the appropriate update, click ‘Uninstall’.

(Tip: copy/paste KB3114409 and enter it in the search field at the top right.)

After a reboot of the computer Outlook will no longer start in safe mode.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

5G Wireless is coming…But what is 5G?

Just five years after the first 4G smartphone hit the market, the wireless industry is already preparing for 5G.

5G Wireless

Each of the four nationwide cell phone carriers, as well as smartphone chipmakers and the major network equipment companies are working on developing 5G network technology for their customers.

There are many significant hurdles that all the industry players have to clear before you’ll see a little 5G symbol next to the signal bars on your smartphone screen. For example, it has yet to be determined what 5G even means, let alone what it will look like and when it will get here.

But as consumers use up rapidly growing amounts of 4G bandwidth watching streaming videos on their phones, 5G will soon become a necessity. As telecom engineers work furiously to develop 5G technology, we’re getting a clearer picture of the who, what, where, when and why of 5G.

What is 5G?

5G

The “G” in 3G, 4G and 5G stands for “generation.” So 5G will be the fifth generation of wireless network technology.

The standards for 5G have not yet been set. According to Bill Smith, president of AT&T’s (T, Tech30)network operations, 5G will likely be defined in 2018, and the standards for 5G will codified sometime in 2019 by the standards-setting International Telecommunication Union, a branch of the United Nations. The standards will determine which wireless technologies can be called “5G,” as well as what its characteristics must include, such as how fast it will be.

Still, it’s possible to make a very educated guess about what 5G will look like based on the emerging 5G technologies that the wireless industry is experimenting with.

Here’s the elevator pitch: 5G will be faster, smarter and less power-hungry than 4G, enabling a slew of new wireless gadgets. 5G will let us have faster smartphones, more smart-home devices and longer-lasting wearable gizmos.

How fast will 5G be?

5G

5G has the potential to offer speeds up to 40 times faster than 4G — fast enough to stream “8K” video in 3-D or download a 3-D movie in about 6 seconds (on 4G, it would take 6 minutes).

Unfortunately for consumers, there’s a difference between lab experiments and reality. Peak speeds are fun to dream about, but in the real world, actual speeds are much slower than promised.

Nokia (NOK), one of the biggest 5G players, believes that its 5G technology will allow for real-world speeds of about 100 Megabits per second when the network is most congested — that’s about four times faster than 4G’s top speed.

Another characteristic of 5G is that it will have ultra-low latency, meaning that it could drastically reduce the amount of time it takes for the network to respond to your commands. That could give the appearance of much faster loading websites, apps, videos and messages.

How will it work?

A lot of the wireless companies’ 5G experimentation is taking place in super-high frequencies — as high as 73,000 MHz. Today’s cell phone networks broadcast signal in a range of 700 MHz to 3,500 MHz.

The advantage of high-frequency signals is that they’re capable of providing significantly faster data speeds. The disadvantage is that they travel much shorter distances and they can’t easily penetrate walls. That means thousands — perhaps even millions — of mini cell towers, or “small cells” would need to be placed on top of every lamp post, every building, inside every home and potentially every room.

That presents a host of problems. How can cell phone companies possibly process all that data? There are companies, such as Google’s recently acquired Alpental, that are working on those “backhaul” issues. But they’re not so close to a solution, according to Akshay Sharma, wireless infrastructure analyst at Gartner.

That’s why 5G might complement 4G, rather than outright replace it. In buildings and in crowded areas, 5G might provide a speed boost. But when you’re driving down the highway, 4G could be your only option — at least for a while.

When is 5G coming?

5G

None of these questions are going to be answered any time soon. The industry’s consensus is that it will run 5G experiments in South Korea during the 2018 Winter Olympics, with mass deployments beginning sometime in 2020.

Yet Verizon (VZ, Tech30) has said that it is working on 5G technology with the aim of bringing it to market much sooner — as early as 2017.

With all the questions surrounding 5G and all the wrinkles that need to be ironed out, it’s exceedingly unlikely that anything Verizon does will be widely deployed. For example, the smartphone makers will need to develop chips that are capable of sending and receiving 5G signal without driving costs significantly higher.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

CISCO VPN CLIENT & WINDOWS 8 (32BIT & 64BIT) – REASON 442: FAILED

FAILED TO ENABLE VIRTUAL ADAPTOR –

HOW TO FIX IT

The Cisco VPN client is one of the most popular Cisco tools used by administrators, engineers and end-users to connect to their remote networks and access resources.

With the introduction of Windows 8, Cisco VPN users are faced with a problem – the Cisco VPN software installs correctly but fails to connect to any remote VPN network.

When trying to connect to a VPN network through a Windows 8 operating system (32 or 64 bit), the Cisco VPN client will fail to connect. As soon as the user double-clicks on the selected Connection Entry, the VPN client will begin its negotiation and request the username and password.

As soon as the credentials are provided, the VPN client shows the well-known “Securing communications channel” at the bottom of the windows application:

cisco-vpn-client-windows8-fix-

After a couple of seconds the Cisco VPN client will timeout, fail and eventually the connection is terminated. The user is then greeted by a pop up window explaining that the VPN failed with a Reason 442: Failed to enable Virtual Adaptor error:cisco-vpn-client-windows8-fix

INTRODUCING THE FIX – WORKAROUND

Thankfully the fix to this problem is simple and can be performed even by users with somewhat limited experience.

Here are 4 easy-to-follow steps to the solution:

1. Open your Windows Registry Editor by typing regedit in the Run prompt.

2. Browse to the Registry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA

3. From the window on the right, select and right-click on DisplayName and choose Modify from the menu. Alternatively, double-click onDisplayName:

cisco-vpn-client-windows8-fix

4. For Windows 8 32bit (x86) operating systems, change the value data from @oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter to Cisco Systems VPN Adapter.

For Windows 8 64bit (x64) operating systems, change the value data from @oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows to Cisco Systems VPN Adapter for 64-bit Windows (shown below):cisco-vpn-client-windows8-fix

When done editing the Value data, click on OK and close the Registry Editor.

You can now run the Cisco VPN Client and connect to your VPN network.  Changes performed do not require a system restart.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft prices high-end Office 365 E5 at $420 per user per year

Microsoft begins selling its new highest-end Office 365 business plan, E5, on December 1 for $420 per user per year. Here’s what’s included.

Ofice 365-Plans

Microsoft will charge users $35 per user per month, or $420 per year, for its new highest-end Office 365 business plan.

Microsoft officials went public with the pricing for Office 365 E5, its top-of-the-line commercial Office 365 offering, on November 30 during the company’s Convergence EMEA conference. Office 365 E5 is available to customers for purchase starting, December 1.

Office 365 E4 — the current high-end version of Microsoft’s Office 365 line — sells for $22 per user per month, or $264 per user, per year.

The Office 365 E5 SKU will include Skype for Business (Lync) with support for features including Cloud PBX and Meeting Broadcast; new analytics features, like Power BI Pro and Delve Organizational Analytics; and new advanced security features, such as eDiscovery, Customer Lockbox, and Safe Attachments.

Office 365 E4 includes Skype for Business with Enterprise Voice and unified messaging; the full suite of locally downloadable Office apps; and Power BI for Office 365 (which is being superseded by Power BI pro).

Microsoft is planning to retire E4 and replace it with E5. However, Office 365 E4 will remain on the price list till June 30, 2016, Microsoft officials have said.

The E1 and E3 versions of Office 365 will retain their current prices of $8 per user per month, and $20 per user per month, respectively.

Office 365 E1 users will get new work-management capabilities, as well as Skype for Business’s Meeting Broadcast functionality added to their plans for no additional charge. Office 365 E3 users will get those same two new features, as well as the option to purchase Equivio Analytics for eDiscovery. (Microsoft bought Equivio in January 2015.)

Skype Meeting Broadcast enables users to broadcast of a Skype for Business meeting on the Internet to up to 10,000 people, who can attend in a browser.

Office 365 E5 users get all the features that E1 and E3 users get, plus other analytics and networking functionality, including Cloud PBX and PSTN Conferencing.

The Skype for Business Cloud PBX with PSTN Calling service provides users with the ability to make and receive traditional phone calls in their Skype for Business client, and to manage these calls using hold, resume, forward and transfer.

PSTN Conferencing is initially available to 15 countries on December 1, with a phased roll out to international markets in the future. Cloud PBX is available worldwide starting December 1. PSTN Calling is available in the U.S. starting December 1, with a phased roll out to international markets in the future.

The fine print: PSTN Conferencing users may incur additional per-minute consumption charges, but customer can disable this feature to avoid additional billing. PSTN Calling is paid add-on for E1, E3 and E5. For E5 users, PSTN Calling costs $24 extra (per user, per month) for international and domestic calling, and $12 for domestic calling only. For E1 and E3, the international and domestic calling plan is $32 extra.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

 

Wi-Fi-enabled ‘Hello Barbie’ records conversations with kids and uses AI to talk back

Today, Mattel released Hello Barbie, a WiFi-enabled doll that detects language and ‘talks back.’ But how will this high-tech toy impact real-life relationships?

Hello-barbie

She wears black flats, a motorcycle jacket, and skinny jeans. Her curly, bleach-blonde hair falls just past her shoulders. She has a permanent smile and large blue eyes. And, when you talk to her, she listens.

But this young woman isn’t an ordinary friend. “Hello Barbie” is less than a foot tall, weighs just under two pounds, and is made of plastic. And she is on sale for $74.99.

Mattel’s latest Barbie, marketed for children six and up, has just hit the shelves. She is unlike any doll before her—not only does she listen, but she can talk back.

To get started, kids simply download the Hello Barbie companion app. And to turn her on, you push a button on her silver belt buckle. Hello Barbie’s necklace is both a recorder and a microphone. Using WiFi, the jewelry will pick up a child’s questions and conversations—and transmit them back to a control center for processing. Speech-recognition software, operated through ToyTalk, will detect the input. Then, Hello Barbie will reply, using one of 8,000 pre-programmed lines. Examples include:

  • You know, I really appreciate my friends who have a completely unique sense of style…like you!
  • Here’s what’s up: I’m worried my sister Stacie is having a hard time finishing her homework. Does that ever happen to you?
  • I think Santa is real. There’s something very magical about the holiday season and I think he helps bring that magic to all of us!
  • So if you were planning the biggest, raddest, most unforgettable party of the year, what would it be like?
  • Of course we’re friends! Actually, you’re one of my best friends. I feel like we could talk about anything!

Hello Barbie’s dialogue, while perky and fashion-focused, reflects an attempt by Mattel to create a more well-rounded character than in the past. In 1992, Mattel pulled its string-operated Teen Talk Barbie from shelves after being criticized by The American Association of University Women for the inclusion of an unfortunate line: “math class is tough.” It is no mistake that Hello Barbie’s lines includes: “Oh nice! Fun with numbers! Teaching math sounds like a lot of fun. What kinds of things would you teach—Counting? Addition? Subtraction?”

Still, the implication that Barbie is being sold as a ‘friend’ is unsettling. “Hello Barbie can interact uniquely with each child by holding conversations, playing games, sharing stories, and even telling jokes!” boasts Mattel’s website. Hello Barbie, claims Mattel, is “Just like a real friend. [She] listens and remembers the user’s likes and dislikes, giving everyone their own unique experience.”

But is she really listening?

While Barbie may appear to listen and respond, “pretend empathy is not empathy,” said Sherry Turkle, professor at MIT and author of Reclaiming Conversation. Turkle worries about how children will understand their new ‘friend.’

“They are drawn into thinking that pretend empathy is the real thing,” said Turkle. “But objects that have not known the arc of a human life have no empathy to give. We put our children in a compromised position.”

Beyond the social implications of the doll, the capabilities of the recording technology raise privacy issues.

Using Hello Barbie involves recording voice data (see the privacy policy here) and requires parental consent. However, Mattel states that “parents and guardians are in control of their child’s data and can manage this data through the ToyTalk account.” The company also states that the recordings are protected under the “Children’s Online Privacy Protection Act,” and recordings containing personal information will be deleted once they “become aware of it.”

Still, the potential for misuse of this private data is a legitimate concern. “Obviously it is a security and privacy nightmare,” said Roman Yampolskiy, director of the Cybersecurity Lab at the University of Louisville. “[The] company [is] collecting data from kids—hackers [could be] getting access to private info.”

However, like Turkle, Yampolskiy is “more concerned about social development of the children interacting with it.”

“We are basically running an experiment on our kids and have no idea if it will make them socially awkward, incapable of understanding body language, tone of voice and properly empathize with others,” he said.

It all raises the question of what is meant, exactly by ‘real’ conversation? Turkle said, “Why would we take such risks with something so delicate, so crucial: Our children’s ability to relate to each other as human beings?”

Despite concerns, Hello Barbie is here, being shipped to homes across the globe beginning today. She is being turned on, spoken to, and listened to. And when children are finished with her, she is shut down, stood on a charger (Hello Barbie cannot stand on her own) and charged back up.

When she is turned on again, Barbie might ask: “Did you miss me at all?”

“Not even an itsy bitsy, eensy weensy bit?”

How children will respond remains to be seen.

Mattel did not respond to repeated requests for comment for this story.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.