Tag South Jersey Techies

The Biggest Tablet Rumors So Far

The latter half of 2012 should see some exciting developments in tech including a new iPhone,Windows Phone 8 smartphones, Microsoft’s Windows 8-powered Surface, Android 4.1 devices, and tablets, lots and lots of tablets.

Apple is expected to introduce a smaller iPad before December, Amazon may roll out its follow-up to the original Kindle Fire, and Samsung may be one of the first companies to get on board with Windows RT.

Here’s a look at some of the hottest tablet speculation that we may see turn into actual products before the holidays.

iPad Mini

Apple may be getting ready to stop competitors from invading the iPad’s turf with a low-priced 7-inch iPad to take on Amazon’s Kindle Fire and Google’s Nexus 7. Bloomberg recently reported that Apple was prepping a 7-inch tablet that would launch in October for $200. On Sunday the The New York Times reported a similar story to the news wire, but added the new iPad Mini will have a 7.85-inch screen.

The Kindle Fire and Google’s Nexus 7 are seeing some success against the iPad by not taking on the iPad. The two companies sell $200 tablets designed largely for content consumption instead of trying to offer an iPad-like device that can replace your laptop in a pinch.

The Fire and Nexus 7 each operate by providing deep hooks into each company’s content stores to make it easy for people to buy more movies, TV shows, apps, and games. The strategy of focusing on content consumption appeared to work for Amazon, and critics are already saying good things about Google’s Nexus 7.

Kindle Fire 2

Amazon announced the original Kindle Fire in September 2011 and, as we close in on the tablet’s one year anniversary, thoughts turn to what Amazon may have planned as a follow-up to this tablet.

A May Reuters report in May claimed the next Kindle Fire will offer an 8.9-inch display. Earlier in July, an analyst for NPD DisplaySearch told CNET that Amazon was prepping three versions of the Kindle Fire 2, including a 7-inch tablet with a screen with 1280-pixel-by-800-pixel resolution, a camera, and a 4G option.

The current Kindle Fire features a 7-inch display with a resolution of 1024 pixels by 600 pixels.

Kindle FirePad

The Times’ Sunday report about the mini iPad also claimed that Amazon is prepping a bigger version of the Fire to take on Apple’s tablet. There are no details about screen size or functionality, so it’s not clear what the purported device would be like or if it would actually be designed to take on the iPad.

More likely–at least in my view–is that Amazon would prep a larger version of the Kindle Fire that is better adapted to consuming visual content such as movies and gaming. But to keep the price low, Amazon would offer fewer hardware features than Apple’s tablet such as GPS, Bluetooth, and front- and rear-facing cameras.

Rumblings about a bigger Kindle Fire have been circulating for some time. The latest report before the Times claim was from BGR in June saying the new Amazon device would have a 10-inch display and quad-core processor.

Samsung RT

Samsung will have one of the first tablets out of the gate loaded with Windows RT, the version of Microsoft Windows 8 designed for ARM processors, according to Bloomberg.

The device will purportedly feature a Qualcomm Snapdragon processor, but no other device details are known. Samsung’s Windows RT tablet should debut in October when Windows 8 is set for a public launch.

Beyond the Rumors

We already know that Microsoft will roll out its Surface tablets later in 2012 and into 2013, and Acer in June said it plans to launch a Windows RT tablet in early 2013. As we get closer to the Windows 8 launch in October, more details should be announced about the upcoming crop of Windows 8-powered tablets.

To View Full Article Click Here

Changes to SSL Certificates Industry Wide

SSL Certificate Industry Change

There’s a pretty big change coming for SSL Certificates. And, we think it’s really important to keep you in the loop on these changes.

The biggest change you need to be aware of: if you have an active SSL certificate with an intranet name (e.g.’server1?, ‘mail’, ‘www’, ‘server2.local’, etc.), or a reserved IP address, it’s going to be revoked by October 1, 2016.

Also, on July 1, 2012, customers will no longer be able to purchase, renew, rekey, or manage their SSLs with intranet names or IP addresses that expire past November 1, 2015.

This is an industry-wide decision, not one specific to our company.

For more information on the Certification Authorities Browser Forum guidelines, go here.

For more information on which IPv4 Addresses are reserved, go here. We do not support any certificates using IPv6.

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started now

4th Generation Web Hosting Is Here

See the difference for yourself!

Fast, affordable and easy-to-use, 4th Generation Hosting is advanced without being complicated, making it the perfect choice for everyone.

Description:

  • Hosted across multiple servers with proprietary Dynamic Traffic Management. Easy-to-manage and affordable. It’s the next generation of Web Hosting.
Is my site hosted on a cluster of multiple servers with real-time load-balancing?
  • YES
When faced with large increases in traffic, will my site continue to load quickly at no additional cost?
  • YES, capacity automatically scales at NO additional cost.
If my server crashes, will my site stay up with zero interruption?
  • Yes, our proprietary Dynamic Traffic Management keeps your site up and running.
Can I use this even though I’m not a rocket scientist?
  • Yes, 4GH is designed for everyone.
Do I pay more if I use more bandwidth?
  • No, we won’t punish you for your success.
Am I protected against URL spoofing?
  • Yes, Premium DNS protects your domain. (with Ultimate plan)
Do I get a free SSL certificate with fixed IP?
  • YES (with Ultimate plan)
Will my site be scanned for malware vulnerabilities?
  • YES, every day (with Ultimate plan)
Will my server be protected against DoS (Denial-of-Service) and other malicious attacks?
  • YES
What level of intrusion prevention is offered?
  • Two levels. 4GH provides network AND server-level intrusion prevention.

All Plans Include

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started

10 Commandments of Windows Security

With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed many of the historical security holes. Windows 7, for example, has changed the default User Account Control level so that it’s harder for rogue programs to run without first explicitly gaining the user’s permission.

[Also read 3 steps to protect your personal data]

However, feeling too secure can be dangerous. With that in mind, here are 10 tips–commandments, if you will–for ensuring your desktop or notebook computer can be used productively as well as safely. Many of the recommended tools are free, and all are affordable–and certainly less expensive than the potential problems of an unsecured computer. Similarly, many will take you only a minute or two to perform–again, far less time than you’d spend recovering from a security problem.

Yes, Windows 8 is on the way; it’ll be many years before that version runs on a majority of the installed base. So these tips are focused at the computers you are actually using today–especially Windows 7 computers, though most of the advice also applies to Windows Vista or XP machines.

1st commandment: Start with new hardware

Today’s new hardware–motherboards, BIOS, CPUs, hard drives, and the system as a whole–includes more security “baked in,” even before the operating system is installed. Examples include Trusted Platform Modules (TPM), which embed cryptographic security directly into the hard drive or other component, Unified Extensible Hardware Interface (UEFI) firmware instead of the traditional BIOS, and Intel’s vPro security and management technologies. For example, machines with UEFI and TPM will, as part of each boot-up, check the computer’s firmware and boot-up binaries to confirm they have not been infected with malware.

If you are working with an existing machine, consider doing a fresh install of the operating system, after completing one (or several) full backup. Ideally, the operating system would be the newest version rather than what was previously installed. (Products like LapLink’s PC-Mover can reduce the effort of saving and migrating settings and even application software–although applications should be freshly installed if possible, as well.)

Even if you’re working with an existing machine, consider swapping in new hard drives that include built-in encryption. Drives that support the OPAL Storage Specification standard enable companies to manage encrypted drives from multiple vendors–and have also helped reduce the extra cost for an encrypted drive from $100 to nearly zero. After-market drives often include migration tools to speed and simplify a drive swap.

If a self-encrypted drive isn’t an option, look at using full-disk encryption software, such as Windows’ BitLocker (available only on Enterprise or Ultimate Windows Vista, 7 or 8 ) or a third-party tool.

2nd commandment: Use current OS versions and automatically get OS and application updates

If you aren’t using the most current commercial version of the operating system, it’s time to upgrade. Additionally, make sure you set the software to automatically apply updates (not just the OS, but all applications) and periodically turn off the computer, which is when many updates are auto-applied. An appalling number of security breaches occur because applications lack important security fixes that have been available for a year or more.

The computer vendor may also include helpful update tools. For example, Lenovo includes an update process that is designed to show all BIOS and driver updates available for that particular model. You can also manually start the update-check apps process. This may take several cycles, particularly for the first time around, if some updates require other updates.

“Third-party software is usually the vector that security intrusions come through, not the operating system,” says Ed Bott, a Windows expert and ZDNet blogger. Flash, Adobe Reader and Java are three of the biggest targets, Bott says. While many programs include their own automatic update checker, Bott urges using a tool like Ninite orSecunia Personal Software Inspector, which automate update checking for all the applications on your computer.

3rd commandment: Use Windows’ new security tools (and/or third party software)

Windows 7 includes a number of security controls and tools through its Actions Center (which replaces the Security Center), and other tools are available via the Control Panel, including:

  • Windows Firewall: With its basic settings, this wards off basic attacks, and you can use its advanced settings for more specific control. There are also third-party firewall programs available.
  • Microsoft’s Microsoft Security Essentials and Windows Defender. These tools secure your computer against viruses, spyware
    and other malware.

Obviously another option is to invest in third-party security software, like individual anti-virus, anti-spam and other programs, or a security suite, such as Symantec’s.

4th commandment: Set up (or remove) user accounts

Historically in Windows, the default account had administrator privileges–meaning that programs capable of taking unwanted insecure actions wouldn’t have to first ask the user if they could run. Starting with Vista, Microsoft added User Account Control (UAC), which asked non-administrator users for permission to run certain programs or actions. With Windows 7, UAC still protects systems but less intrusively.

Even so, managing which user accounts are–and aren’t–available contributes to security in the following ways:

  • Establishes non-administrative user account(s) for each user.
  • Disables or removes user accounts that aren’t used or shouldn’t be there.
  • Disables the “guest” account, unless it’s needed. If it is needed, a password should be required for elevating privileges, to prevent unauthorized changes to the system.

Consider renaming the administrator account so that it’s not obvious to an intruder. Since this account can’t be “locked out,” password attacks can be performed indefinitely; changing the name makes the account less of a target.

5th commandment: Set passwords

Set the main Windows password, as well as the Power/Time to lock the system, with a screen saver, and require a password to resume activity.

Also, depending on the sensitivity of information on your system (did someone say “online banking”?), consider password alternatives, such as:

  • Smartcard reader (contact or contactless)
  • Biometric facial recognition
  • RSA software and external token
  • Password “gesture” (e.g., Android tablets)

Another option is two-factor authentication, such as requiring both a fingerprint and a password.

6th commandment: Add/activate anti-theft tools

Invest in, install and activate anti-theft tools that can either lock the system; conduct an IP trace; report, take and send pictures; and even wipe the computer when a lost or stolen computer reconnects to the Internet. An example is Absolute Software’s Lojack for Laptops.

Vendors like Lenovo are embedding Absolute’s CompuTrace Agent into the BIOS, so even if somebody erases or replaces the hard drive, the agent is automatically re-installed.

Computers that include Intel Anti-Theft technology in their hardware let you add additional security services, such as automatically locking the main board until it receives the “unlock” password, lock or wipe if a machine goes too long without connecting to the Internet or if a user fails the login process too many times. Intel Anti-Theft is typically part of third-party security products like CompuTrace, adding perhaps $3/year, and as the anti-theft option on WinMagic’s full disk encryption product.

7th commandment: Turn off sharing and other unneeded services

Windows allows you to share resources that are on your computer, like file-sharing (Shared Folders) and print sharing. Your computer’s Internet connection management utility (Windows includes one, but many systems have their own) lets you define each network as either Public, Home or Work. If you mis-set a connection, your Shared Folders will be visible to other computers on the network.

Suggested Desktop Security Reading

  • Windows 7: Explore New and Improved Security Features (Microsoft)
  • Security checklist for Windows 7 (Microsoft)
  • Enhancing Endpoint Security for Windows Desktops,” Derek Melber, President and CTO of BrainCore.Net
  • Best Practices: Windows Desktop, IT Security for the University of Missouri

If you are behind a firewall, when your computer’s Internet connection manager tool asks you what kind of location/connect it is, you can call it either a Home or Work network, Bott says. But specify Public network if you are connecting directly to the Internet (e.g., at home or in the office), if you don’t have a hardware router but instead are directly connected to the cable modem, or if you are connecting to a public network like a Wi-Fi hotspot or a hotel or conference Ethernet. This will ensure that no local sharing is allowed.

In general, disable any services and remove programs you don’t need. For example, if you’re sure your applications won’t need it, you may want to uninstall Java. If your machine has Internet Information Services (IIS) running but doesn’t need it, disable that, as well.

8th commandment: Secure your Web browser and other applications

Web browsers access Web sites that neither you nor your company control (and these sites, in turn, may have ads or link to other content that they don’t control). Any of these may try to inject malware onto your computer.

[Also read 10 ways to secure browsing in the enterprise]

Today’s browsers include more security, like “private browsing” session modes that prevent any personal information from being stored, or don’t save cookies or history for a session. However, this may interfere with productivity.

Check each browser’s security options and select the ones that look useful, like Firefox’s “Warn me when sites try to install add-ons” and “Block reported attack sites.”

Set Microsoft Internet Explorer to have the highest security setting you can tolerate (since higher security often means you have to click more often), suggests Tom Henderson, Managing Director of ExtremeLabs.com, an Indianapolis, Indiana technology testing lab.

Additionally, look for browser “extensions” and add-ons that increase your browser’s security, in a more per-tab, per-site or per-tab-session way. For example, the popular NoScript Firefox add-on allows JavaScript, Java, Flash and other plug-ins to be executed only by trusted Web sites of your choice.

PDF readers may also be vulnerable to JavaScript attacks within the documents they’re rendering. Make sure your PDF reader is secure; consider disabling JavaScript within it.

9th commandment: Rope in Autorun

AutoRun is a major threat vector for viruses and other malware in Windows XP and Windows Vista. [Editor’s note: Simson Garfinkel called Autorun an “OS design flaw” all the way back in 2006.] With this function, the operating systems automatically begins executing a program when it sees an autorun.inf file in the root directory of a new drive, such as a network drive, a CD or a flash drive. So, if you haven’t yet moved to Windows 7, make sure you’ve got all the security updates for the OS version you are running. (See MS Security Advisory: Update for Windows Autorun.

With Windows 7, all the security settings are “No Autorun.” When you attach external media like CDs, DVDs, SD cards and USB flash drives, they will give you a dialog box offering to run a program, but by default, nothing happens automatically.

10th commandment: Consider application whitelisting and other controls “Whitelisting” refers to a list of everything you allow on your computer, including e-mail addresses your mail program can accept, Web sites your browser is allowed to connect to and applications the operating system is allowed to run. Whitelisting may not be a match for e-mail or Web browsing, but for preventing unwanted applications from running–such as malware or zero-day attacks–it may be a good additional tool.

Windows 7 includes AppLocker, a whitelisting utility, or you can buy third-party white-listing products for either individual computers or groups of networked computers. For home users, Windows 7 has fairly robust parental controls that can restrict access by time-of-day or by site, and log Web access, Bott says.

Conclusion: It’s easy to become more secure

As you can see, there is a lot you can do affordably, even to existing Windows systems, to increase their security. It shouldn’t take a lot of time or money to do; however, it may take a lot of both if you don’t do anything and something avoidable goes wrong.

To View Entire Article Click Here

Chrome Passes IE As Top Used Web Browser

Google Chrome Just Passed Internet Explorer To Become The World’s Most Popular Web Browser

After months of chipping away at its lead, Google Chrome has finally overtaken Internet Explorer to become most popular web browser worldwide. Chrome’s share of the market rose to 32.8% in the week ending May 20, while Internet Explorer’s share of the market dropped to 31.9%, according to new data from StatCounter, via TheNextWeb. This marks the first full week that Chrome has beaten Explorer. Google’s browser had previously topped Explorer for a single day back in March. Mozilla’s Firefox is the third most popular browser with just more than a 25% of the market.

Google Chrome:

Google Chrome is a web browser developed by Google that uses the WebKit layout engine and application framework.

It was first released as a beta version for Microsoft Windows on 2 September 2008, and the public stable release was on 11 December 2008.

The name is derived from the graphical user interface frame, or “chrome”, of web browsers. As of October 2010, Chrome was the third most widely used browser, with 8.47% of worldwide usage share of web browsers, according to Net Applications.

 

In September 2008, Google released a large portion of Chrome’s source code, including its V8 JavaScript engine, as an open source project entitled Chromium. This move enabled third-party developers to study the underlying source code and help port the browser to Mac OS X and Linux.

A Google spokesperson also expressed hope that other browsers would adopt V8 to improve web applications performances. The Google-authored portion of Chromium is released under the permissive BSD license, which allows portions to be incorporated into both open source and closed-source software programs.

Other portions of the source code are subject to a variety of open-source licenses. Chromium implements the same feature set as Chrome, but lacks built in automatic updates and Google branding, and most notably has a blue-colored logo in place of the multicolored Google logo.

History For six years, Google’s Chief Executive Eric Schmidt was against the idea of building an independent web browser. He stated, “At the time, Google was a small company,” and he didn’t want to go through “bruising browser wars”.

However, after co-founders Sergey Brin and Larry Page hired several Firefox developers and built a demonstration of Chrome, Mr. Schmidt admitted that “It was so good that it essentially forced me to change my mind.”

To View Entire Article Click Here

Speeding Up Your Home Internet: Tricks and Tips

Though we live in an age of nearly-ubiquitous broadband, it still seems like certain pages don’t load as quickly as one would like.  After you’ve tried changing your ISP (Internet service provider), or ordering a T1 internet connection, consider that many problems can be solved with a series of tips and tricks, outlined below.

  • The first area to make changes is your browser.  Microsoft’s Internet Explorer once held an overwhelmingly large market share, but that’s no longer the case.  Browsers such as Mozilla Firefox, Google Chrome, and Safari from Apple have all become increasingly popular.  They are free to install and render websites much more efficiently than Internet Explorer.  Plus, they have two additional benefits, both of which can help keep your computer and internet running fast.  First, these browsers are more secure, including precautions to prevent malware such as viruses from being installed, a common cause of computer slowness.  Also, these browsers allow the user to install extensions, or programs designed to modify the browser’s functionality.
  • Extensions can be used to remedy another common cause of perceived Internet slowness.  More and more websites include Flash and JavaScript.  While neither is inherently bad, more content takes more time to load and render.  Of you feel you can do without the bells and whistles, there are extensions designed to block this content from being downloaded and shown on your computer.  AdBlock Plus just blocks advertising, but Flashblock blocks all Flash content.  If you’re not ready to go that far, ClickToFlash is a great extension.  It stops Flash content from being shown initially, but gives the user the option of clicking to display it.
  • If checking out your computer yields no positive results, your router might be to blame.  The router’s function is to take a single Internet connection and split it so that every device in the house can make use.  This is very handy, but if the router is wireless and the person installing it does not know better, it can open your network to attack.  All routers should be password protected and secured using the strongest method supported by your devices.  WPA2 authentication is currently the best.  If the network remains unprotected, your connection may be slowed by neighbors leeching from your connection.

These are only a few of the most common causes of Internet slowness.  Hopefully one of the solutions will work for you!

Small Business Phone Services

I have a small business that is growing rapidly- I hope to double my payroll
this year. My need for comprehensive business services is going to grow even
faster than my staff. We are a technical company that offers services over the
phone, as well as personal service right to our client’s locations. That means
we need to be able to receive calls, transfer them to our reps in the field, and
have them be able to transfer calls right back to the office all on the same
phone system. Up until now, we have been using a plan from a business cell phone
company, but as we grow, we are going to need a service to handle our own PBX.
That’s a private branch exchange- basically our own internal business phone
service. The days of ‘family plan,’ style business phone services are
(thankfully) behind us.

We are going to be moving into a multi- floor office building, so we will
need a service that can provide my people with business phone lines at their
desks, but also with cell phones that are part of the same system. I need to be
able to monitor and record calls, direct clients to the right place with a
short, simple automated system, and even make automated message calls to clients
at their request. Basically, I’m pretty sure we need everything a business phone service
could offer. I need one that does it all- but don’t let that fool you; we’re
still a small business with only about one hundred regular clients.

I have been looking into enterprise business services for business cell phones, and it is a
complicated world. There are a lot of companies that make bold, vague promises
about ‘providing solutions,’ ‘business services,’ etc. There’s lots of smug,
high-brow language that does not say very much. I won’t know if a company can
help me, and for how much, until I actually tell them what I need. We are in a
precarious position- needing a lot of different services but still being
relatively small, so I want to avoid the big companies. I don’t want to get
locked into a service that has an attractive introductory deal and then held in
by a complicated contract. I want a company that just handles business phones. I
want a small, dedicated company like mine to handle our phone system for
life.

Microsoft offers Windows XP, Office XP users 50% percent discount

Microsoft is now offering significant discounts on its product upgrades. Discounts are available for Open License programs.

Microsoft officials are well aware that its biggest Windows 7 and Office 2010 competitors are its own previous product iterations (Windows XP and Office XP/2003). To try and wean users away from older, “good-enough” releases, Microsoft is introducing a new licensing promotion.

The revamped “Up to Date Discount” program is targeted at small/mid-size business (SMB) customers running older versions of Windows and Office. Between January 1 and June 30 of this year, Microsoft is enabling users running Windows XP or Vista (on the operating system side) and Office XP, Office 2003 or Office 2007 (on the productivity suite side) to receive a discount of 50 percent on the cost of their licenses for Windows 7 and Office 2007 (or Office 2010, once it is released by June 2010).

The 50% discount calculations “are based on estimated retail prices and reseller prices may vary,” Microsoft officials acknowledge. But the Softies say U.S. customers who sign up for the program “would be paying $35.00 for a Windows 7 Professional Upgrade and/or $91.00 for Office 2007 Professional Plus in year 1, plus receiving all of the Software Assurance benefits (such as an automatic upgrade to Office 2010 when it launches, Office Home Use Rights, and much more) for that price.”

As you’d expect, there are lots of caveats. First,customers get the 50 percent discount only for the first year of their Open Value Subscription (OVS) payment. (OVS is a Microsoft licensing program, introduced last year for SMBs, which allows users to pay for software licenses over time and includes many of the same provisions as Microsoft’s Software Assurance licensing program.) The new deal applies only to those customers using the Professional versions of Windows and/or the Professional versions of Office.

The new promotion, which Eric Ligman, Global Partner Experience Lead with Microsoft’s Worldwide Partner Group, announced via the Microsoft SMB Community Blog on January 1, goes beyond the current Up-to-Date Discount offer. Before the new so-called “N-2? update to the program was put in place, Windows XP users and Office XP users were ineligible for the discount. But Microsoft is now offering users of the older Windows and Office releases coverage if they’re willing to sign up for the Open Volume Subscription plan.

Meanwhile, speaking of new Microsoft licensing promotions, Microsoft is introducing “version 4.0? of another SMB promotional licensing offer, known as “The Big Easy,” according to Ligman.

Starting January 3, SMB customers can increase dollars available for them to spend with Microsoft partners  “by purchasing multiple qualifying product groups, adding Software Assurance to their orders and/or acquiring advanced, premium or Enterprise editions of the MIcrosoft Solutions.” To qualify, customers need to buy products through their Microsoft partners between January 3 and March 31 via the Microsoft Open License, Open Value and/or Open Value Subscription programs.

Products included under the program include Dynamics CRM, Office Communications Server, SharePoint Server, SQL Server, Systems Center and Windows Server, among others.

Article located here to read more.