USA TODAY: Own a tablet? Grab these 5 accessories

Own a tablet? Grab these 5 accessories

You probably love your tablet for multiple reasons: It’s thin and light; using your fingertips is intuitive; it’s fun to read e-books on it; and there’s no shortage of downloadable apps that are free or close to it. Even with all the benefits — especially compared to your aging laptop — you can still squeeze more functionality out of your slender mobile companion with a few smart accessories. Whether it’s for typing reports, extending battery life, enjoying your music or protecting your investment, here are a handful of hardware add-ons that can help you get more out of your tablet. KEYBOARD, PLEASE Mobile workers or on-the-go students who really want to travel light might consider picking up an iPad mini (from $299)and the Logitech Ultrathin Keyboard Folio ($89.99; logitech.com).

http://usat.ly/1gAjJC6

USA TODAY: How to fix pokey WiFi at home

How to fix pokey WiFi at home

Q. The WiFi in our home is so slow, it’s faster to look up things over my phone’s 3G connection. How can we speed it up? A. This question came from a relative who lives in Brooklyn, so I did some firsthand research during a visit to New York. She lives in a dense neighborhood that abounds in both gadgets and babies, which is a good combination for the future of the electronics industry and the human race but not so good for WiFi. Too many laptops, tablets and other mobile devices leads to congested WiFi airwaves. A baby boom makes that situation worse: Many baby monitors transmit over the same 2.4 Ghz frequencies used by WiFi. Microwave ovens and cordless phones can also contribute to the din in those airwaves.

http://usat.ly/1nboXm3

Happy Mothers Day!

Happy Mothers Day to all mothers! You do a wonderful job!

NCOL Supporting Relay for Life

20140509-183919.jpg

FREE SHIPPING with orders over $25

http://dev.peanut.com/2014email/mothersday.htm

How to log off/sign out of Server 2012

Go to the Start “screen”, click on your user account picture/name in the upper-right hand corner of the screen, and select “Sign out”.2012logoff 

 

How To Give Windows Server 2012 Users a Traditional User Experience

 

Windows Server 2012 is here, and like many of you who have downloaded it and tested it, I have been messing around with the new operating system for a while now. I’ve been exploring new features and capabilities, some of which I like, and others I don’t care for all that much. All in all, however, I think both Windows 8 and Windows Server 2012 will be successful over time and I say that because the user experience will take some getting used to.

Once you install the new OS, many will be taken aback and will find navigating and finding old tools and utilities a bit of a challenge. I expect many administrators will be looking for a way to change the new Metro style and trade it in for the traditional Windows Start Menu. The good news is that we can tweak the user interface in Windows Server 2012 to get really close to what a Windows Server 2008 would look like, with the caveat that you will not get everything back. I think Microsoft is trying to push everyone to adopt the new interface and it will be successful over time in accomplishing this, especially if the upcoming Surface tablets takes off.

Let’s take a look at what we need to do in order to make the changes:

  1. Install the Desktop Experience
  2. Restart the Server
  3. Pin icons and useful tools and utilities to the desktop
  4. Disable Server Manager from automatically starting
Roles and features wizard
Figure 1. Roles and features wizard. (Click image to view larger version.)

Let’s tackle the Desktop Experience. First, in order to gain access to icons like My Computer, Control Panel and many of the traditional features we have been using for years (and keep in mind that when I say gain access, I mean gain access the traditional way — all the tools still exist; you simply have to learn to access them the new way), follow these steps:

  1. Launch Server Manager from the taskbar (if it is not started already) and click on Add roles and features.
  2. Go through the wizard until you get to a screen similar to Fig. 1; make sure to select Features on the left node and scroll down to User Interfaces and Infrastructure.
  3. Click the arrow to expand this feature and select Desktop Experience.
  4. Click Next and follow the wizard to completion, which will require a restart of the server.

Even a simple power operation like restart takes some getting used to, so in order to restart your server follow these steps:

  1. Hover your mouse to the top right-hand corner of the screen and select the Settings icon.
  2. Now click on the Power icon and restart the server.

Once the server comes back up, you can right-click on your desktop and click on Personalize in order to configure our icons. Select Change desktop icons and add the icons you want to your desktop.

If Server Manager is annoying you every time Windows starts and you want to prevent it from automatically starting, do the following:

  1. Launch Server Manager.
  2. On the top right menu, select Manage.
  3. Select Server Manager Properties.
  4. Check the box next to “Do not start Server Manager automatically at logon”.

At this point your desktop will look pretty close to what what you’re used to in Windows Server 2008. I recommend creating shortcuts for some of your favorite tools and utilities and adding them to the desktop. For those of you who like the simplicity of the traditional Start Menu and user interface, in future blogs I will walk through further customizations that will make Windows Server 2012 a bit more friendly.

How to max out your phone battery

How to max out your phone battery
http://www.money.cnn.com//2014/05/07/technology/mobile/cell-phone-battery-life/

Facebook and Google security flaw

http://www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/

How to store your digital photos safely

http://www.foxnews.com/tech/2014/05/04/how-to-store-your-digital-photos-safely/

USA TODAY: 3 ways to lower your Internet bills

3 ways to lower your Internet bills

A few years ago, a cable technician was working on the lines outside my house. When I mentioned I was paying for the company’s top-tier Internet service, he snorted and said, “You can’t get that tier of service with these lines.” It was a lesson to me: We have to always be on guard in dealing with these large cable and Internet companies. (In this case, after I raised heck, the company ended up running a dedicated line to my house.) There are big legal battles in the news these days between these companies; and when there are big legal battles, it means big bucks are at stake. Let’s remember that we the customers are the ones generating those big bucks, and we have to be smart about what we’re paying and why.

http://usat.ly/1na0Yol

Dude, where’s my car? Google Now knows – CNET

http://www.cnet.com/news/dude-wheres-my-car-google-now-knows/

A consumer’s guide to streaming TV devices

A consumer’s guide to streaming TV devices
http://www.cnn.com//2014/04/25/tech/gaming-gadgets/web-streaming-devices/index.html

USA TODAY: Protect your debit card from ‘skimmers’

Protect your debit card from ‘skimmers’

Q. I’m worried about all the ATM machines running on Windows XP, and I’ve also heard about “skimmers” that can leave my debit card vulnerable. What steps can I take to protect my debit card? A. Criminals have gotten good at installing “skimmers” over the card reader on an ATM to snag your account data when you swipe your card. Then, a small camera over the ATM keypad records your pin number when you punch it in. Your best defense is to stay away from remote ATMs; get your cash from a teller or an ATM in a restricted-access foyer. You should also hold your hand over the keypad when you enter your PIN. This blocks a camera from seeing what you’re doing.

http://usat.ly/1fDP5H4

Facebook unveils anonymous login

Facebook unveils anonymous login
http://www.money.cnn.com//2014/04/30/technology/social/facebook-anonymous-login/

Facebook unveils anonymous login

Facebook unveils anonymous login
http://www.money.cnn.com//2014/04/30/technology/social/facebook-anonymous-login/

Google Releases Security Updates for Chrome

Google has released security updates to address multiple vulnerabilities in Chrome. Some of these vulnerabilities may lead to memory corruption or arbitrary code execution.

Updates available include:

  • Chrome 34.0.1847.131 for Windows and Mac.
  • Chrome 34.0.1847.132 for Linux.
  • Chrome 34.0.1847.134 for Chrome OS devices, except HP Chromebook Pavillion.

Users and administrators are encouraged to review the Google Chrome release blog entries and apply the necessary updates.

Facebook launches friend-tracking feature

Facebook launches friend-tracking feature
http://www.cnn.com//2014/04/17/tech/mobile/facebook-nearby-friends/index.html

Enable Remote Desktop Connection on Windows 7 Home Premium

Here’s the steps to get it working:

  1. Download W7-SP1-STM-RDP-v4.zip and extract it to a location on your PC.
  2. Navigate to the folder you just extracted and right click Install.cmd, then choose Run as administrator.
  3. You’ll get a window similar to the one below and you should now be good to go:

You can also enable multiple sessions per user, and the logging in of users with a blank password (although I wouldn’t recommend this). There are some switches that are available when running the program:

  • -? – Show this help
  • help – Same as -?
  • multi – Enable multiple sessions per user
  • blank – Enable remote log on for user accounts that are not password protected

So for example, if you wanted to enable multiple sessions per user:

  1. Go to start and find Command Prompt. Right click it and select Run as administrator.
  2. At the prompt type cd “c:\DIRECTORY\TO\EXTRACTED\FILES”
  3. The prompt should switch to c:\DIRECTORY\TO\EXTRACTED\FILES >
  4. Type: Install multi

Thanks to the guys over at Missing Remote for this hack.

CNN – Smartphone innovation is dying, but that’s OK

http://www.cnn.com/2014/04/18/tech/mobile/smartphone-innovation-kovach/index.html

iPhone 6 Preview

http://www.cnet.com/products/apple-iphone-6/

2014 Easter egg hunt

2014 Easter egg hunt: Google hoaxes and jokes
Here is a roundup of Google Easter egg tricks and hoaxes for 2014.

Microsoft fixes bug with Security Essentials and Windows XP.

Microsoft corrects Windows XP/Security Essentials bug

Microsoft fixes bug with Security Essentials and Windows XP.

Enable SSH and TELNET login on Cisco ASA 7.x inside Interface

Configuration with ASDM 6.x

Complete these steps:

  1. Choose Configuration > Device Management > Users/AAA > User Accounts in order to add a user with ASDM.ssh-inside-out-pix7x-8.gif
  2. Choose Configuration > Device Management > Users/AAA > AAA Access > Authentication in order to set up AAA authentication for SSH with ASDM.ssh-inside-out-pix7x-9.gif
  3. Choose Configuration > Device Setup > Device Name/Password in order to change the Telnet password with ASDM.ssh-inside-out-pix7x-10.gif
  4. Choose Configuration > Device Management > Certificate Management > Identity Certificates, click Add and use the default options presented in order to generate the same RSA keys with ASDM.ssh-inside-out-pix7x-11.gif
  5. Under Add a new Identity certificate click New in order to add a default key pair if one does not exists. Then, click Generate Now.ssh-inside-out-pix7x-12.gif
  6. Choose Configuration > Device Management > Management Access > Command Line (CLI) > Secure Shell (SSH) in order to use ASDM to specify hosts allowed to connect with SSH and to specify the version and timeout options.ssh-inside-out-pix7x-13.gif
  7. Click Save on top of the window in order to save the configuration.ssh-inside-out-pix7x-14.gif
  8. When prompted to save the configuration on flash, choose Apply in order to save the configuration.

Google IS scanning your Gmail and admits it!

http://www.digitalspy.com/tech/news/a564741/google-clarifies-email-scanning-policy.html

Google has updated its terms of service to offer more transparency regarding its email-scanning practices. The web giant confirmed that Gmail messages are automatically scanned when content passes between its servers. Google has staunchly defended this policy, insisting that email scanning is necessary to provide tailored content and protect users against malware.

How to clear a domain profile from a Windows 7 machine

To clear user local profile via registry:

  1. Press on Start > Run >Regedit
  2. Navigate to the following registry key :“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
  3. Under ProfileList navigate to binary key’s like this: S-1-5-21-3656904587-1668747452-4095529-500
  4. On the right side under ProfileImagePath you’ll see the profile path.
  5. Chose the one with the desired user and delete the long registry key like: “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList”

USA TODAY: #AskJeffTech: How to print from an iPad

#AskJeffTech: How to print from an iPad

LOS ANGELES — Cynthia from San Francisco has issues printing from her iPad. She’s not alone. Many of us have switched from laptops to tablets. They are great for entertainment, surfing the Internet and checking e-mail, but fall down when it comes to that most basic function — printing out coupons, movie tickets, Word docs, PDFs and more.

http://usat.ly/Pzx7K8

USA TODAY: Twitter redesigns user profiles

Twitter redesigns user profiles

Twitter users might spot a new look on their profiles if they’re viewing from a Web browser. The microblogging service says it’s rolling out redesigned profiles that look really close to profiles found on fellow social network Facebook.

http://usat.ly/1gHDOQ3

CNET: Polamatic 4.0 brings the Polaroid camera experience to iOS

CNET: Polamatic 4.0 brings the Polaroid camera experience to iOS. http://google.com/newsstand/s/CBIwqq-0qRo

What you need to know about Windows XP expiring

What is end of support?

After 12 years, support for Windows XP will end on April 8, 2014. There will be no more security updates or technical support for the Windows XP operating system. Customers moving to a modern operating system will benefit from dramatically enhanced security, broad device choice for a mobile workforce, higher user productivity, and a lower total cost of ownership through improved management capabilities.

Get more here….

http://wp.me/P2YEZ7-cd

Can the new Windows 8.1 bring back users? | ZDNet

http://www.zdnet.com/can-the-new-windows-8-1-bring-back-users-7000028084/

Microsoft wakes up and gives us the Start button back!

USA TODAY: Reboot with tech to clear clutter, simplify

Reboot with tech to clear clutter, simplify

In theory, today’s top consumer tech tools should make your life easier, not more complicated. Yet all too often, many of us are using the latest gadgets and apps for multitasking mayhem rather than sanity saving solutions. Here are some new ways to cut through the connected clutter and reboot your day: 1. Clutter control for your brain: No matter how many times I check my smartphone calendar, get notifications, or alerts, there are often small details of daily life that somehow slip through the connected cracks, and catch me off guard. Remembering to remember is one of the toughest parts of my busy day. For years now, I’ve used Post-it notes to keep me in check. I have a rainbow of them stuck everywhere — on my desk, purse, fridge — even my car dashboard. But rather trail a tornado of paper wherever I go, I’ve recently discovered the Post-It Note Camera Feature in Evernote.

http://usat.ly/1ilxS1C

Spring cleaning for your smartphone

http://www.cnet.com/videos/spring-cleaning-for-your-smartphone/ Spring cleaning for your smartphone

Steer Clear of the Latest Twitter Spamrun | Malwarebytes Unpacked

http://blog.malwarebytes.org/social-engineering/2014/03/steer-clear-of-the-latest-twitter-spamrun/

Huge Twitter scam to infect you.

USA TODAY: A first look at Microsoft Office for iPad

A first look at Microsoft Office for iPad

Long before CEO Satya Nadella’s announcement Thursday that the company he now runs was finally releasing Microsoft Office for the iPad, there have been other Office-like productivity suites and workarounds that for some mobile professionals have more than made up for Microsoft’s absence. Apple’s own work-oriented apps for the iPad, which are now free, include the fine Pages word processor, the Numbers spreadsheet, and the Keynote presentation app — its answer to Microsoft Word, Excel and PowerPoint. Other companies have stepped in too. With that as the backdrop, it’s premature to say whether Office for iPad from the Microsoft mother ship will somehow provide a superior experience to what’s already out there, certainly not after what can only be a cursory first look at the new Office for iPad. But a billion people use some version of Office today, and of those who also own an iPad, it’s reasonable to assume that no matter how good the alternatives are, they’ll feel more comfortable sticking with Microsoft.

http://usat.ly/1jTNiv5

Twitter rolling out changes moving towards photos

http://www.foxnews.com/tech/2014/03/27/twitter-now-lets-add-up-to-four-images-to-tweets-introduces-tagging/

Hidden Easter Eggs in Microsoft code

http://www.foxnews.com/tech/2014/03/27/hidden-jokes-exposed-in-microsoft-code/

Permissions that need to be set to allow automate users home directory creations

share1When you configure home directory for user (from “Active directory users and computers” – in Windows 2000/2003/2008/2012 domain or “User manager for domains” – in NT4 domain), you should add root share that will contain the user home directory – \\servername\users$\%username%. To allow automatic creation of this home folder, there need to configure correct NTFS and Share permissions on home folder root share.

Right click the folder > Properties > Sharing > Advanced Sharing. Name the share and add a “$” to the end to make it a hidden share.

Click Permissions on the share.

share2

To allow automate home directory creations, please make sure to apply this security settings on the root folder that should contain the user home directory.

Administrators: Full Control
System: Full Control
Authenticated Users: Full Control

Now click OK > OK to get back to the Folder Properties.

Now we need to configure the NTFS permissions, so we need to be on the “Security” tab of the folder we created earlier.

1. Turn off inheritance on the folder and copy the permissions. You do this by:

a. Click the Advanced button found on the Security tab.
b. Clear Allow inheritable permissions to propagate to this object check box in the Advanced Security Settings dialog box.
c. Click Copy when prompted by the Security dialog box.

2. Click OK to return to the Security tab. Ensure we have the following permissions set:

Administrators: Full Control
System: Full Control
Creator Owner: Full Control
Authenticated Users: Read & Execute, List Folder Contents, Read

3. Change permissions for Authenticated Users so they cannot access other users’ folders. You do this by:

a. Click Advanced on the Security tab.
b. Click Authenticated Users, and then click Edit.
c. On the Permissions Entry for HOME dialog box, drop down the Apply onto and select This folder only.
d. Click OK twice.

Windows XP ‘expires’ in one month

Windows XP ‘expires’ in one month, http://fxn.ws/1imjcnv

Hyper-V Replica Capacity Planner

The Capacity Planner for Hyper-V Replica which was released on 5/22, allows you to plan your Hyper-V Replica deployment based on the workload, storage, network and server characteristics. The guidance is based on results gathered through our internal testing across different workloads.

You can download the tool and it’s documentation from here – http://www.microsoft.com/en-us/download/details.aspx?id=39057

Instructions:

1) Download the tool (exe) and documentation

2) Read the documentation first and then try out the tool. You should familiarize yourself with some nuances listed in the documentation before using the tool.

So go ahead, use the tool in your virtual infrastructure and share your feedback and questions through this blog post or in the community forum. We would love to hear your comments!

How to activate Windows Server 2012

This is the easiest way:

Bring up the Start Menu

Right click and choose All Apps

1. Right click Command Line -> run as administrator

2. Type slui 3

3. You get the product key activation wizard pop up. Enter the key here and select activate. This will Activate the server license.

Add routes to OpenVPN on IPCOP

To add additional networks behind your IPCop firewall for OpenVPN clients you must PUSH routes to the client. To do this, in /var/ipcop/ovpn/server.conf add the following line:

push “route 10.1.0.0 255.255.0.0”

 

Enable lock screen widgets in Android 4.4 KitKat | How To – CNET

http://howto.cnet.com/8301-11310_39-57610954-285/enable-lock-screen-widgets-in-android-4.4-kitkat/

Make your smartphone an extension of your office phone!

Allworx Reach

Allworx Reach

Allworx Reach™ combines effortless communications with complete mobility. Whether your smartphone or tablet is Apple or Android, Reach brings the rich functionality of your Allworx phone to your smartphone. Both Wi-Fi and cellular data networks are utilized for Allworx Reach access, so anywhere there is a signal — from across the room or across the globe — you are connected.

Reach is a free download and is supported with Release 7.5 software and higher, but requires a device license on your server to be registered.

To enable it on your Allworx server, you will need a valid Reach device license purchased from NCOL.NET, an Authorized Allworx partner, and have it provisioned on your Allworx server by NCOL.NET.

How to save IPTABLES rules

The following lines allow SMTP and HTTP traffic through an IPTABLES firewall. But this information is not automatically saved and reloaded if the service restarts.

iptables -I INPUT -p tcp –dport 25 -m state –state NEW,ESTABLISHED -j ACCEPT
iptables -I INPUT -p tcp –dport 80 -m state –state NEW,ESTABLISHED -j ACCEPT
iptables-save

Whenever you make a change to your firewall, on a Fedora/CentOS type system, you will want to save the changes.

The output can be redirected to a file.

# iptables-save > /root/firewall-rules
The following command line restores all rules from /root/firewall-rules assuming that the file /root/firewall-rules exists.

# iptables-restore < /root/firewall-rules

By default, iptables-restore deletes all existing rules before restoring the saved rules. If the saved rules are to be appended to existing rules, use the -n or –noflush option.

Save Your Firewall and Load on Restart

You will need to edit the /etc/sysconfig/iptables-config as root to help iptables save and reload your firewall correctly. Be sure the following settings are changed to “yes”.

# Unload modules on restart and stop
# Value: yes|no, default: yes
# This option has to be ‘yes’ to get to a sane state for a firewall
# restart or stop. Only set to ‘no’ if there are problems unloading netfilter
# modules.
IPTABLES_MODULES_UNLOAD=”yes”

# Save current firewall rules on stop.
# Value: yes|no, default: no
# Saves all firewall rules to /etc/sysconfig/iptables if firewall gets stopped
# (e.g. on system shutdown).
IPTABLES_SAVE_ON_STOP=”yes”

# Save current firewall rules on restart.
# Value: yes|no, default: no
# Saves all firewall rules to /etc/sysconfig/iptables if firewall gets
# restarted.
IPTABLES_SAVE_ON_RESTART=”yes”

gGoogle’s Gmail goes down as Reliability guys get grilled

Google’s Gmail goes down as Reliability guys get grilled, http://fxn.ws/1e21zoJ

Setup A WordPress Multisite

http://www.paulund.co.uk/setup-wordpress-multisite

Best of Best WordPress Tutorials of 2013 on WPBeginner

http://www.wpbeginner.com/showcase/best-of-best-wordpress-tutorials-of-2013-on-wpbeginner/

Google Maps Generator for WordPress

Google Maps Generator http://coveloping.com/tools/google-maps-generator via @coveloping

Burglars use social media to target homes

Tip: Burglars use social media to target homes

BURGLARS USE SOCIAL MEDIA Q. I read that burglars use social media to target victims. How do they do it? A. Criminals only need a rough idea of where you live — and access to Google Street View — to start casing your home. Using check-in apps and posting vacation photos broadcasts to the world that you’re not at home right then. Be sure to check your privacy settings — and wait until you’re safely home to share vacation stories. NEW WAYS THIEVES STEAL YOUR IDENTITY Q. I keep hearing about new identity-theft scams. What are they? A. Identity thieves are using public hotspots to set up fake Wi-Fi networks. So, you might think you’re logging onto public Wi-Fi, but end up signing onto a hacker’s network instead. If you’re in a café or restaurant, ask and make sure you’re joining a legitimate network. Medical identity theft is another fast-growing threat. It happens when a thief uses your name and information to receive medical services.

http://usat.ly/KmHMWf