Change and customize Windows 7’s Logon screen wallpaper

In this edition of the Windows Vista and Windows 7 Report, we show you how to change Windows 7’s Logon screen wallpaper.

While experimenting with several Microsoft Windows 7 systems recently, we spent a lot of time staring at the Logon screen. During that time, we began to think about changing the Logon screen wallpaper. Now, we have changed the Logon screen wallpaper in just about every version of Windows we’ve used, so we know that there had to be a way to do so.

When we began to investigate the procedure in Windows 7, we discovered that changing the Logon screen wallpaper in the newest version of the Windows operating system is easy, once you know the steps — and you don’t even need any third-party software to do it.

In order to make it easy for OEMs to customize Windows 7, Microsoft built the ability to change the Logon screen wallpaper right in to the operating system. In this edition of the Windows Vista and Windows 7 Report, we’ll show you how to change Windows 7’s Logon screen wallpaper.

A Registry tweak

The process begins with a very minor Registry tweak. Even for those who would not normally feel comfortable editing the Registry, this one’s a piece of cake. To begin, click the Start button and type Regedit in the Search box. Then, select the appropriate result and press [Enter]. When you do, you’ll see the User Account Control, shown in Figure A, and will need to click the Yes button.Note: Editing the Windows Registry file is not without its risks, so be sure you have a verified backup before making any changes.

Figure A

You will encounter a UAC when you launch the Registry Editor.

Once the Registry Editor launches, locate and right-click on HKEY_LOCAL_MACHINE key and select the Find command. When you see the Find dialog box, type OEMBackground in the text box and make sure that only the Values check box is selected, as shown in Figure B.

Figure B

Type OEMBackground in the Find dialog box.

When the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background key opens, locate and double-click the OEMBackground value. When you see the Edit DWORD dialog box, change the value data from 0 to 1, as shown in Figure C. (If the OEMBackground value doesn’t exist in the Background key, you’ll need to pull down the Edit menu from that key and select New | DWORD (32-bit) Value).

Figure C

Change the value data from 0 to 1.

To complete this part of the operation, click OK to close the Edit DWORD dialog box and then close the Registry Editor.

Creating folders

In the second part of the operation, you’ll need to create a couple of folders. To begin, launch Windows Explorer. Then navigate to the C:\Windows\System32\Oobe folder. Once you access the Oobe folder, click the New Folder button in the Windows Explorer toolbar. You’ll see a confirmation dialog box, like the one shown in Figure D. When you click Continue, the new folder will be created and you can name it info.

Figure D

When you click the New Folder button, you’ll encounter a confirmation dialog box.

Then, open the info folder, click the New Folder button again, work through the confirmation dialog box, and then name the second new folder backgrounds.

Configuring the wallpaper

You can use any image that you want for your new Logon screen wallpaper. However, the image has to be in JPG format and you need to name it backgroundDefault.jpg. When you copy your file to the Windows\System32\Oobe\info\backgrounds folder, you’ll encounter and will need to work through a confirmation dialog box similar to the one shown in Figure D.

Two other things to keep in mind: First, the actual file size of backgroundDefault.jpg cannot exceed 256 KB. Second, you’ll want to use an image whose dimensions match the screen resolution that you are using. If you use a file whose dimensions are smaller, the image will be stretched and may appear distorted.

Altering shadows

As you know, the button and the text used to identify your user account on the Logon screen have shadows behind them to give them a 3D-like look, and these shadows work well with the default Logon screen wallpaper. Depending on what image you use for your new Logon screen wallpaper, these shadows might not work so well.

In addition to making it easy to change the Logon screen wallpaper, Microsoft also made it easy to adjust or disable the text and button shadows to accommodate your particular image.

To alter the shadows, launch the Registry Editor again as described above and access the

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI folder

Once you open the LogonUI folder, you’ll create a new DWORD value called ButtonSet, as shown in Figure E. You can then configure the shadow by setting the value data to one of the following numbers:

  • 0 — Light shadow
  • 1 — Dark shadow
  • 2 — No shadow

Figure E

The ButtonSet value allows you to adjust or disable the text and button shadows.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Modifying the Windows 7 boot loader with the Boot Configuration Data Editor tool

In Windows Vista and later versions of Windows, the bootloader was moved from boot.ini to a utility called BCDEdit. Here’s how to modify the boot config data with the new tool.

Sometimes dual-booting a system is a handy way to test new software, a new operating system, or an application that needs to be run in a specific version of Windows. Other reasons to dual-boot might include replication of a client environment.

Windows handles dual-booting by using boot.ini to display a menu of bootable choices or partitions found on the current system. In Windows Vista and later versions of Windows, the bootloader was moved from boot.ini to a utility called BCDEdit.

Recently, we decided we could make better use of some disk space that we had set aside to create a bootable VHD for Windows Server 2008 R2. There was no data other than the OS installation contained within the file because we had used it only to prepare a blog post about booting from Virtual Hard Disks. To free up the space, we deleted the VHD.

Note: Always make sure to back up any data that you want to keep before deleting or modifying partitions on VHDs. Your changes could make the partition unbootable.

Once we had the VHD removed, we thought Windows would be smart enough to clean up the boot loader, but we were not so lucky. We had Windows 7 set as the primary OS, so we were not without a system.

We started looking around for boot.ini and was directed toward the Boot Configuration Data Editor (BCDEdit) as the utility to use when editing boot loader information in Windows 7 (and in Vista too).

To begin, open the Start menu, select All Programs, and then choose Accessories. Right-click on Command Prompt and select Run As Administrator. Once in the command window, type bcdedit. This will return the current running configuration of your boot loader, showing any and all items that can boot on this system.

In this example, we decided to remove the entry for my Windows 2008 R2 installation, as we wouldn’t need it for the time being. To remove an entry, you will need to know the Boot Loader Identifier (found in curly braces in Figure A).

Figure A

we copied the whole list into Notepad and then selected and copied just the ID, braces included.

Removing an entry from the Boot Loader

One simple command got the Windows Server 2008 R2 entry out of the boot loader. At the command prompt, enter the following:

Bcdedit /delete {boot loader identifier}

Press Enter, and the Boot Configuration Data Editor (BCDEdit) will remove the entry for the ID you specified and display a message when finished. When Windows starts, the only choice available in the boot menu should be the current Windows installation.

Warning: Be careful when editing the boot configuration data. If you mistakenly remove the current instance of Windows, you may render your computer unbootable.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Old Windows PCs can stop WannaCry ransomware with new Microsoft patch

In a rare step, Microsoft published a patch for Windows XP, Windows Server 2003 and Windows 8

Users of old Windows systems can now download a patch to protect them from this week’s massive ransomware attack.

In a rare step, Microsoft published a patch for Windows XP, Windows Server 2003 and Windows 8 — all of them operating systems for which it no longer provides mainstream support.

Users can download and find more information about the patches in Microsoft’s blog post about Friday’s attack from the WannaCry ransomware.

The ransomware, which has spread globally, has been infecting computers by exploiting a Windows vulnerability involving the Server Message Block protocol, a file-sharing feature.

Computers infected with WannaCry will have their data encrypted, and display a ransom note demanding $300 or $600 in bitcoin to free the files.

Fortunately, Windows 10 customers were not targeted in Friday’s attack. In March, Microsoft patched the vulnerability that the ransomware exploits — but only for newer Windows systems. That’s left older Windows machines, or those users who failed to patch newer machines, vulnerable to Friday’s attack.

Researchers originally believed the ransomware was spread through attachments in email phishing campaigns. That no longer appears to be the case.

Infection attempts from the WannaCry ransomware.

Once a vulnerable PC becomes infected, the computer will attempt to spread to other machines over the local network as well as over the internet. The ransomware will specifically scan for unpatched machines that have the Server Message Block vulnerability exposed.

Businesses can prevent this by disabling the Server Message Block protocol in vulnerable PCs. They can also use a firewall to block unrecognized internet traffic from accessing the networking ports the Server Message Block uses.

Fortunately, Friday’s ransomware attack may have been contained. A security researcher who goes by the name MalwareTech has activated a sort of kill-switch in WannaCry that stops it from spreading.

As a result, over 100,000 new infections were prevented, according to U.K.’s National Cyber Security Centre. But experts also warn that WannaCry’s developers may be working on other versions that won’t be easy to disable.

“It’s very important everyone understands that all they (the hackers) need to do is change some code and start again. Patch your systems now!” MalwareTech tweeted.

Unfortunately, the kill-switch’s activation will provide no relief to existing victims. The ransomware will persist on systems already infected.

Friday’s ransomware attack appears to have spread mainly in Europe and Asia, with Russia among those nations hardest hit, according to security researchers.

Security experts are advising victims to wait before paying the ransom. It’s possible that researchers will develop a free solution that can remove the infection.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

What you need to know about the WannaCry Ransomware

What has happened?

On May 12, 2017 a new variant of the Ransom.CryptXXX ransomware family (detected as Ransom.Wannacry) began spreading widely, impacting a large number of organizations, particularly in Europe.

What is the WannaCry ransomware?

WannaCry encrypts data files and asks users to pay a US$300 ransom in bitcoins. The ransom note indicates that the payment amount will be doubled after three days. If payment is not made after seven days, the encrypted files will be deleted.

Figure 1. Ransom demand screen displayed by the WannaCry Trojan

It also drops a file named !Please Read Me!.txt which contains the ransom note.

Figure 2. Ransom demand note from WannaCry Trojan

It propagates to other computers by exploiting a known SMB remote code execution vulnerability (MS17-010) in Microsoft Windows computers.

Are you protected against this threat?

South Jersey Techies, LLC recommends and offers Symantec Endpoint Protection to its clients. Symantec Endpoint Protection customers are protected against WannaCry using a combination of technologies: Antivirus, SONAR protection, Network-based protection.

All South Jersey Techies Managed IT Services client computers have the latest Windows security updates installed, in particular MS17-010, to prevent spreading. If your business / organization is not on our Managed IT Services plan please check or contact us to ensure that you have the latest updates installed.

Who is impacted?

A number of organizations globally have been affected, the majority of which are in Europe.

Is this a targeted attack?

No, this is not believed to be a targeted attack at this time. Ransomware campaigns are typically indiscriminate.

Can I recover the encrypted files?

Decryption is not available at this time but companies are investigating. South Jersey Techies, LLC does not recommend paying the ransom. Encrypted files should be restored from back-ups where possible. South Jersey Techies offers a number of backup solutions including Carbonite Online Backup and cloud storage solutions. If you are unsure about your computer / server backups, please check or contact us to discuss the best solution for your business.

What are best practices for protecting against ransomware?

  • New ransomware variants appear on a regular basis. Always keep your security software up to date to protect yourself against them.
  • Keep your operating system and other software updated. Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.
  • Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments.
  • Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.
  • Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However organizations should ensure that back-ups are appropriately protected or stored off-line so that attackers can’t delete them.
  • Using cloud services could help mitigate ransomware infection, since many retain previous versions of files, allowing you to “roll back” to the unencrypted form.

Have additional questions?

Feel free to call us at contact us or (856) 745-9990 with any questions you may have.

Quick Tips: Flush the ARP cache in Windows 7

Here’s how to clear the Address Resolution Protocol cache and how to manage that cache with a few command switches.

The Address Resolution Protocol (ARP) cache is a crucial component of IP networking on any operating system. What ARP does is link Ethernet addressing (IP addressing) to hardware addressing (MAC addressing). Without this system, a machine could not communicate to the outside world as one addressing scheme could not communicate with the other.

The ARP Cache is a collection of ARP entries (mostly dynamic) that are created when a hostname is resolved to an IP address and then an IP address is resolved to a MAC address (so the computer can effectively communicate with the IP address).

When this happens, the PC will store that newly mapped address in the ARP cache, and it will stay there until the ARP cache entry timeout expires. This isn’t usually a problem, but sometimes a bad ARP entry can cause issues with Internet connections and Web page loading. When this occurs, one step that can be taken toward resolution is to clear the ARP cache. Yes, this means the ARP cache has to be rebuilt, which means a little more work for the PC, but that cache will rebuild fairly quickly.

Clearing the ARP cache is done completely through the command line, so stretch out those fingers and get ready to type. After we show you how to clear the ARP cache, we will show you how to manage that cache with a few command switches.

Flush the cache

Step 1: Open the command prompt

Click Start and then type “cmd” (no quotes) in the search dialog box, but don’t hit Enter yet. Right-click the cmd.exe icon and select Run as Administrator (Figure A). After answering the UAC, the terminal window will open offering up the command prompt.

Figure A

If the icon is already pinned in the Start menu, entering cmd is not necessary.

Step 2: Run the commands

The first command to run is

arp -a

This command will display all your ARP entries (Figure B). Naturally the -a option is not the only option available. The arp command also allows for the following switches:

-d Delete an IP address (arp -d 192.168.100.10)
-d -a Delete all entries in the ARP table
-s Add an entry to the ARP table (arp -s ADDRESS MAC_ADDRESS – Where ADDRESS is the address to be added and MAC_ADDRESS is the MAC address of the machine)

Figure B

Here you see the arp cache for two different interfaces on a single machine.

To flush the entire cache, issue the following command:

netsh interface ip delete arpcache

The above command will flush the entire ARP cache on your system. Now as soon as network connections are made, the ARP cache will begin to repopulate.

Verify the flush

Once you have flushed the ARP cache, make sure to issue the command arp -a to see if the cache has, in fact, been flushed. If it does not flush, it could be the system is a victim of a Windows bug caused when Routing and Remote Services is enabled. This is a simple bug to fix:

1.           Click Start | Control Panel.

2.           Click Administrative Tools.

3.           Click Computer Management.

4.           Double-click Services and Applications.

5.           Double-click Services.

6.           Scroll down to Routing and Remote Services.

7.           Double-click Routing and Remote Services.

8.           Set the Startup Type to Disable.

9.           Make sure the service is stopped.

Now try flushing the ARP cache again. It should work this time.

Troubleshooting

It is also possible to troubleshoot network connections using the ARP cache. For example, it is important to look out for invalid ARP entries that go to a MAC address of 00-00-00-00-00-00. If one such entry shows up, make sure to delete it from the cache using the -d switch. Say you have an ARP entry that looks like:

224.0.0.24           00-00-00-00-00-00 static

In order to delete this entry, use the arp command like so:

arp -d 224.0.0.24

And that invalid entry will be gone.

Final thoughts

There are so many ways to troubleshoot networking connections. Flushing the ARP cache is just one of those methods that is rarely thought of, but when all else fails this might be the last-gasp effort that makes you the hero of the day.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft teases Windows 10’s sleek new look for the future

“Project Neon” will give your Windows 10 PC a fresh coat of paint later in 2017.

Microsoft’s planning a sleek visual refresh for Windows 10, and the company quietly teased its first official glimpse of what’s coming in the future during the Windows Developer Day keynote on Wednesday.

There aren’t many details being shared about “Project Neon” right now—as the refresh was called in earlier leaks—but the new visual look will focus on animations and transitions. The basic concept is “to add fluidity, animation, and blur to apps and the operating system,” as first reported by Windows Central. The new design language also hopes to make it easier for developers to create attractive apps.

The design refresh should extend to all Windows 10 devices including PCs and tablets, HoloLens, Xbox, and the few surviving Windows Phones, according to Windows Central.

Twitter user Tom Hounsell shared a clean version of Microsoft’s first look at Windows 10’s forthcoming design tweaks. The image shown on the livestream had large text overlaid on top of the screenshot.

As you can see, this isn’t a huge change, but the visual refresh gives Windows 10 a sleeker, more modern feel. The taskbar icons look a little more dynamic and bolder. Cortana is using the icon instead of the search box, though it’s not clear if this will be the default look. The clock on the taskbar is also bolder, and the usual notification area icons including the Action Center are notably absent. The open Groove Music window itself looks more polished and Aero-esque as well, with no title bar to be seen—just unobtrusive options in the app’s upper-right corner.

The impact on you at home: Windows Central says that some of the code for Project Neon is already available in recent Insider Preview builds of Windows 10; however, it’s unlikely the visual refresh will be ready in time for the massive Creators Update this spring. Microsoft is expected to share more information about Neon during the Build conference in May. The Creators Update is expected to roll out in late March or early April, followed by a second major update later in 2017.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft’s latest Windows 10 ad annoys Chrome users with taskbar pop-ups

Ads on the Windows 10 taskbar aren’t just for Microsoft Edge anymore.

Microsoft’s aggressive advertising push inside Windows 10 is going beyond pop-ups for Microsoft Edge.

Myce recently spotted yet another pop-up ad on the taskbar in Windows 10. This time around Microsoft was advertising its extension for Chrome dubbed the Personal Shopping Assistant (Beta). The extension is a Microsoft Garage project that lets you compare prices across shopping sites.

Prior to the Chrome extension pop-up, Microsoft was advertising its rewards program for Microsoft Edge, which we spotted in early November. The earlier ad appeared to be targeted at people who didn’t use Edge that frequently.

A pop-up ad that promotes Windows 10’s Edge browser and Bing Rewards. The pop-up for the Chrome extension looks similar, as you can see on Myce.

The Chrome one, by comparison, is probably targeted at people who use Chrome as their default browser. Microsoft’s likely thinking that if people won’t stop using Chrome on Windows, at least they can use some Microsoft software while they’re doing it.

Microsoft told Thurrott.com that ads like the one for the Chrome extension are part of the company’s tests to provide, “new features and information that can help people enhance their Windows 10 experience.”

Tests or not, it’s unlikely that Microsoft will ever stop these taskbar ads even though users pay $100 or more for Windows. Thus far, Microsoft has advertised its own software and services.

The impact on you at home: If you want to make sure you don’t get pop-up ads on your taskbar you can turn them off. Open the Settings app and go to System > Notifications & Actions. On this screen under “Notifications” turn off Get tips, stricks, and suggestions as you use Windows. That’s not the only way Microsoft can advertise to you.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Tip of the week: How to turn hibernation on and off

How to turn hibernation on and off:

When your PC goes to sleep, it enters a low-power state, ready to spring back into action when Windows detects a tap on the keyboard or determines that it’s time to run a scheduled task. If you’re planning to be away from the PC for a while, you might prefer to save the current state so that you can restore it quickly, without the chance that the computer will wake up on its own.

There’s an option that lets you save the contents of memory to a hibernation file and then shuts down the PC, so it uses no power at all. When you restart, Windows restores the system state from the hibernation file.

To enable or disable hibernation, open a Command Prompt window and enter the powercfg command with the -h switch. Type powercfg -h on to enable hibernation; substitute the word off to disable it.

Normally, the Hibernate option is hidden from the Shutdown menu. To make it visible, open Power Options in Control Panel and then click Choose What The Power Buttons Do. Under the Shutdown Settings heading, select the Hibernate checkbox to display it in the Power menu.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

How Microsoft rebounded to outshine Apple

As more consumers grow disenchanted with Apple, Microsoft has taken the opportunity to cash in on the growing popularity of Surface devices.

Microsoft claims that more people are switching to Surface devices from Macs than ever before. That’s a concept that would have been hard to picture when Microsoft first released the Microsoft Surface RT and Surface Pro in 2012 and 2013, respectively. The Surface RT suffered from a watered-down version of the new — and generally disliked — Windows 8 operating system and, while the Surface Pro featured the full desktop version, it came with hardware limitations and a high price tag.

In a sea of clam shell notebooks, all vying to be thinner and lighter than the last, the Surface clumsily debuted as a confusing mashup of a tablet and a laptop. And people didn’t like it. RT users complained of the limited functionality and never-ending bugs, while Surface Pro users were forced to pay a high price just to avoid Windows RT. In fact, the Surface RT did so poorly that Microsoft had to take a $900 million dollar write-down after drastically cutting the price of the device.

The backlash even made some question whether or not we were witnessing the end of Microsoft. It might seem dramatic now in 2016, but in 2013, people really missed the Start menu. Instead, Microsoft listened to consumers’ complaints to find a balance between the company’s vision and what consumers wanted. And it worked — Microsoft has regained credibility and popularity by creating new products that didn’t simply mimic or improve upon what was already out there.

Apple’s identity crisis

For a company once targeting modern, creative professionals, it’s hard to tell who Apple makes products for anymore. Apple’s devices now feel tailored to a low-tech crowd, or people who like new tech, but just aren’t that interested in specs. They want a reliable, easy-to-use device that just works. But where does that leave the original fan base of creative workers who need high-performance and cutting edge features? Apple hasn’t left this industry with many options — and at this point, you can get more for your money in graphics and performance on a Surface Book than a Macbook Pro. Plus, with the newly announced Microsoft Studio, there is finally a strong alternative to the iMac — with a touch display, no less.

Apple’s compromise is the MacBook Pro with Touch Bar, which features a dynamic touch bar replacing the row of function keys on the keyboard. The display changes depending on settings and the app you’re using; it’s a cool feature, and certainly useful, but it’s a confusing message. If the iPad Pro is competing with hybrid notebooks like the Surface Pro 4, but Apple doesn’t think people want touch-displays on a notebook, then does that make the iPad Pro a giant iPad?

Microsoft is focused on touch-based input — in fact, you’d be hard-pressed to find even a mid-ranged PC that doesn’t at least offer the option of an upgrade to a touch display. The two companies have taken different stances, but in siding with touch, Microsoft has more to offer in each of its devices. If you want a notebook that can sometimes be a tablet, or a tablet that can sometimes be a notebook, you can purchase just one device instead of two.

Microsoft has focused on developing a family of Surface devices that can suit a wide range of users. It starts with the lower-end Surface 3, which is a great device for anyone who just wants a computer to surf the web and use basic apps. The Surface Pro 4 acts as a step up in size and hardware, with configurations for anyone from light users to those who need more performance. And now, with the Surface Book and Surface Studio, even those who need the highest end configurations for heavy-duty video or image editing have an option.

The Surface in pop culture

Remember when Windows users were the boring, out of touch, suit-wearing nerds in commercials, and a Mac user was the hipster CEO of a startup — that guy in 2006 who wore hoodies and scootered to all his meetings? That landscape has changed a lot since then, and now Microsoft is the one calling out Apple on selling outdated hardware and falling behind the curve.

Microsoft has clearly made a push to get the Surface in front of consumers anyway possible — CNN commentators used the devices in this year’s debates, but it was later discovered they were using them to hide their iPads. Hulu’s The Mindy Project also features Mindy Kaling’s character using a Surface Book, with one very obvious instance of product marketing, where she very purposefully ejects the display from the keyboard. And what New Englander can forget when the Surface Pro 4 made headlines after Patriot’s coach, Bill Belichick, became so frustrated with the technology that he spiked it onto the field.

These might not be the most positive representations of the brand, but the visibility of the device seems to be working. In places where it used to be a sea of aluminum notebooks, featuring the familiar, backlit Apple logo, we’re starting to see some diversity.

Just as it wasn’t the end of Microsoft in 2013, it’s now Apple’s chance to step out of the spotlight and make some changes. But there’s nothing like a little healthy competition to help spark new, creative designs and that’s exactly what motivated Microsoft to step back, refocus and come back strong.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Tip of the week: How to wipe a disk clean

 

 

Wipe a disk clean:

If you’re planning to dispose of a PC by giving it away, selling it, or discarding it, your top priority should be making sure that no personal information is left on the device. The same is true if you’re recycling a hard disk drive or USB flash drive.

The first step with a PC is to reinstall Windows, using the option to delete the existing partitions on the device and then do a clean install. For a secondary disk, you can use the Format command to erase any existing content. But that still leaves the possibility that some data will still be available in the erased space, where a determined spy could recover it using a disk utility.

The solution? Encrypt the disk before formatting it. Without a recovery key, any recovered data will be unreadable. The easiest way to accomplish this on the system drive is to open an elevated command prompt and run the following command:

cipher /w:c:

If you’re working with a secondary disk, substitute the drive letter for that drive.

The /w switch stands for wipe, and the result is the effective obliteration of every bit of data in unused disk space, leaving existing files untouched.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.