Monday, October 20, 2014


Hello everyone! 

There has been a great deal of buzz over what the new Windows 10 will look like. The Technical Preview has already released and although there will undoubtedly be more changes to come, this article lists the most prominent features - one being the highly anticipated return of the Start Button!

Enjoy!
~The TPUServices Team

The new windows operating system is due to come out mid-2015 and below is a list of the top 10 most prominent new features.

Windows 10: A guided tour
By Howard Wen, NetworkWorld | Oct 20, 2014 3:00 AM PT




















A guided tour

Microsoft released a technical preview of the next version of Windows for the public to download and try for free. Although a final release with additional features isn't expected until the middle of 2015, there are already a number of changes compared to Windows 8.1. Here are some of the most prominent.














Return of the Start Menu

Clicking the Windows logo Start button, or pressing the Windows logo key on the keyboard, summons the Start Menu, which was last seen in Windows 7, but absent from Windows 8 and 8.1. The left half of this Start Menu lists pinned applications, apps and folders, and recently opened programs and other items. The right half displays the tiles of Windows Apps -- it’s like a mini version of the Start Screen from Windows 8/8.1 attached to the Start Menu. Just as on the Start Screen, you can rearrange the placement of these tiles by clicking-holding-and-dragging on each one.


















All Apps

Clicking “All Apps” will show a listing of apps, applications and folders on your system. You can drag the name of a Windows App (in this example, the Weather app), or even a desktop application, from the left half of the Start Menu over to the right half, so that it can be placed as a tile with the other tiled Windows Apps or applications.




















Expand to fit

As you add more Windows Apps or applications to the right half of the Start Menu, the panel will automatically expand to fit them.



















Start Menu can expand or shrink

Click-and-hold onto the top border of the Start Menu, and you can drag up to increase the height of the Start Menu panel…



















Colorful changes

The background color of the Start Menu can be changed by right-clicking on a blank area of it and selecting “Personalize.”



















Return of the Windows 8/8/.1 Start Screen

If you prefer the Windows 8/8.1 Start Screen, you can turn it back on by right-clicking on the Taskbar and unchecking “Use the Start menu instead of the Start screen.”
















Resizable windows

In Windows 8.1, Windows Apps can run on the desktop environment but only in full screen. Windows 10 Technical Preview now allows them to be run in smaller, resizable windows. You can click-hold-and-drag on all sides and corners of the windows of Windows Apps to resize them.



















Don’t ignore the three dots

Clicking the three dots that are set toward the left of a Windows App’s title bar will open this panel which provides features that are specific to that app.



















Oh, snap

Windows 10 Technical Preview expands upon the user interface in Windows 8.1 that allows you to auto-resize an application’s window by “snapping” it to the edges of the screen. In this example, as the File Explorer window is dragged to the right edge of the screen, a light grayed-out region appears.



















More snapping

Releasing the mouse or touchpad button will then automatically resize the File Explorer to occupy exactly the right-half of the screen. The other two actively running programs, which in this case are both Windows Apps, then appear as thumbnails. You can also snap a windowed application or app into smaller sizes.



















It’s a snap

In this example, the Windows Store app has been snapped to occupy the right half of the screen. The File Explorer has been dragged to the upper-left corner of the screen.



















Make it snappy

This causes the File Explorer to auto-resize to take up the upper-left portion of the screen. The Chrome browser application appears now as a thumbnail, which when clicked, snaps into place, resizing itself to fill the screen’s lower-left portion.



















Switch it up

In Windows 8 and 8.1, you switch among running Windows apps and the desktop environment through this app switcher toolbar, which appears when you move the mouse pointer to the upper-left corner of the screen. But in Windows 10 Technical Preview, this interface won’t be available if you are using the new Start Menu.



















Task View

In Windows 10 Technical Preview, there’s a new Task View function. It’s activated by clicking the overlapping-rectangles icon toward the left on the Taskbar. It displays all active applications and apps as thumbnail shortcuts. Just click on one to go to that program, or you can close a program by clicking the “X” that appears when you move the pointer over its thumbnail. Clicking “Add a desktop” along the bottom will open another instance of the Windows desktop environment...




















No Charms

In Windows 8 and 8.1, when you move the pointer to the upper- or lower-right corner of the screen, the Charms toolbar appears. Like the app switcher, Windows 10 Technical Preview does away with the Charms, if you are using the OS with the new Start Menu activated. Instead, the Charms’ search function has been relocated as its own icon on the Taskbar set to the right of the Windows logo Start button.



















Shutdown

And you access sleep, shut down and restart from the Start Menu; whereas on Windows 8/8.1, you had to go to the Charms bar or Start Screen to get to these.



















Command

The command prompt program has a few improvements, and one is keyboard friendly cut-and-paste functionality. Here, a folder directory location is highlighted in the File Explorer and copied by pressing CTRL+C...



















Internet Explorer 11

Windows 10 Technical Preview comes with a version of Internet Explorer 11 that includes just a few new features, such as support for the HTTP/2 protocol, and improvements to its JavaScript engine (called Chakra). Otherwise, the Microsoft browser in Windows 10 Technical Preview is the original desktop application, not the Windows App version.



















The GUI

Regarding the overall look of Windows 10 Technical Preview: There are hardly any changes from Windows 8.1 at this very early stage of its release, and no new color themes or wallpaper backgrounds. The File Explorer’s icon is a new design, and appears for now to be the only default Windows application to have an updated one.

The only notable change is that the bottom and side borders of windows and many panels have been removed, lending an even more “flat” design that is perhaps meant to unify with the look of Microsoft Office 2013.

Monday, June 30, 2014

All of us worry about security, hackers, spyware, malware, and the like. Here are several practical tips to help keep you and your computer safe. Not everyone needs to follow all of guidelines set below, but choose those that are important or will have immediate benefits for you. 

 

 ~The TPUServices™, LLC Team


 

Security

10 critical security habits you should be doing (but aren't)

@ianpaul  Jun 30, 2014 3:00 AM 

via PCWorld @ pcworld.com

 

 

Batten down the hatches

It's a tough, insecure world out there, fellow PC faithful. Times have never been scarier, with website data breaches turning into regular affairs, programming flaws like Heartbleed popping up left and right, and botnets like Gameover Zeus infecting a legion of PCs, only to gobble the up personal information and financial data stored within.

Good news: There's a lot that regular PC users can do to protect themselves against the worst of the worst. But bad news: Most of us don’t bother.

Giving your digital life a thorough security overhaul is easier than you'd think. Here are 10 critical security measures you should be doing right now—go ahead, do it!

 

Use a password manager

Saying that passwords are dead is a popular meme. Until someone figures out a viable and universal replacement, however, we’re stuck with them.

Alas, passwords are a pain, since you should be using a long string of random letters, numbers, and special characters for all your critical accounts. Passwords that complex are as difficult to remember as they are to crack—which is why using a password manager that can generate and save those passwords for you is so crucial.

Password Mangers are easy to use, and most are cross-platform, giving you access to the data on PCs and mobile devices alike. Our favorites include LastPassDashlane1Password, and KeePass.
 
 

Two-factor authentication

Two-factor authentication is a second step that bolsters the strength of all those long, random passwords you’re now using. This security measure is based on the notion that you need two items to prove your identity: Something you know and something you have. The "something you know" is your regular password, and the "something you have" is usually a short, one-time code generated via text massage or smartphone app that you need to enter before logging in.

Two-factor authentication is not foolproof, but it’s far stronger than using passwords alone. Google’s Authenticator app for Android, iOS, and Blackberry 4.5-7.0 is a popular choice for generating one-time codes, but there’s also the cloud-sync service Authy for Android, iOS, Linux, Mac, and Windows.
 
 

Back up your data... twice

Backing up your data may not seem like a security matter, but guarding your data against faulty hardware or a devastating virus that wipes out your hard drive is extremely important. For best results, don’t just back up to an external hard drive at home. You should also back up to an offsite location to protect against fire, burglary, or children carrying water.

Online backup is the easiest way to get offsite protection. The numerous services available include Backblaze, Carbonite, CrashPlan, iDrive, and Mozy. A disaster-proof backup scheme doesn't have to cost you a dime, though, if you're willing to do a wee bit more legwork.
 
 

Create your own private Internet tunnel

Most public, shared Wi-Fi networks are wide-open. A hacker equipped with a few trivial programs can snag your online traffic as it flies by.

This is mitigated somewhat by logging into websites using HTTPS, but it’s not a perfect solution. Ideally, you should be using a virtual private network to create an encrypted tunnel between your device and the Internet. There are free options from companies such as Hide My Ass, Hotspot Shield, and Tunnel Bear, but a paid VPN is the better option if at all possible. A year of Hide My Ass is just $60 and covers you across PCs and mobile devices.
 
 

Lock down your router

Your home Wi-Fi router is probably the most sensitive Internet connection in your life, since home is where you're most likely to view your bank accounts and other sensitive information online. But alas, most people stick to basic or—shudder—default passwords for their home network.

For the best home Wi-Fi security, use WPA2 encryption and a randomly generated login password that is at least 30 characters long. The longer and more random it is, the harder it is to crack (the occasional flaw in router firmware aside). Can’t remember a 30-character password? Save it in your password manager. Finally, don't forget to change the user name and password for your router’s admin panel.
 
 

Cut the daisy chain

Another weak spot in online security: Email accounts that receive password-recovery messages, in the event you get locked out of your account. Recovery accounts are also prime targets for hackers looking to penetrate your online life.

The best defense is to use a single, hard-to-guess recovery address—something like “myrec0v3ry_ZMf43yQKGA@outlook.com"—and use it only for emergency recovery.

The worst solution is to daisy-chain all your critical accounts—your Outlook.com address is the recovery address for your Gmail address, and Gmail is the recovery address for Amazon. All it takes is one break in the daisy chain to ruin your entire online life.
 
 

Ditch Java (if you can)

Oracle’s Java is no longer critical software for many PC users. That’s a good thing, because it’s been the source of a veritable flood of security vulnerabilities. Some security experts are calling for Oracle to rewrite Java. In January, 2013, the Department of Homeland Security’s US-CERT (Computer Emergency Response Team) recommended that all PC users disable Java unless they absolutely need it.

The best way to find out if you can live without Java is to delete it completely. Seriously! Go do it right now. If a website or software prompt demands Java in the future, simply reinstall it—but you probably won't have to.
 
 

Encrypt everything

When Google learned the NSA was intercepting traffic from its internal networks, the company's answer was simple: encrypt everything. And you should, too. Forcing websites to use encryption whenever possible—with browser plug-ins such as the Electronic Frontier Foundation’s HTTPS Everywhere, if need be—keeps no-goodniks from swiping your logins and personal information.

Don't stop at websites, though. If you carry personal data on a USB stick, encrypt it with Microsoft’s BitLocker to Go, or create encrypted file containers via the Disk Utility in Mac OS X. Open-source encryption options for Windows include FreeOTFE or DiskCryptor. Encrypt your external hard drives, too—especially your backups.
 
 

Supplement your antivirus with an on-demand anti-malware scanner

To stay as safe as possible on Windows, it’s best to equip your PC with two security programs: one antivirus and one anti-malware. The antivirus programs, such as AVG Free or Avast, are always-on solutions that scan incoming files and websites for malicious intent.

These programs won’t necessarily catch or remove everything. That's why it’s a good idea to periodically run an anti-malware program, which stands a better chance of catching active and cutting-edge problems. Snag MalwareBytes Anti-Malware Free (or an alternative) and run it weekly.
 
 

Tape that webcam

Malware was bad enough when it randomly distributed your Word documents to all your email contacts. It can get much worse, now that computers have the capability to see and hear us via webcams and microphones.

Luckily, there’s an easy defense against peeping webcams: plain, old adhesive tape. Just take a small piece of that and cover the lens. When you need to use your webcam, just peel it off and replace it later. If you’re worried about putting tape on the lens, use paper and tape instead.

It’s a bit of a kludge, but hey: Tape has the added benefit of being impenetrable to software attacks.
 

Monday, April 28, 2014


Updated April 27, 2014 8:18 p.m. ET

 
The logo of Microsoft Corp.'s Internet Explorer 9 is displayed on a computer monitor in Washington, on March 15, 2011. Bloomberg


A newly discovered security hole in Microsoft Corp.'s MSFT +2.41% Internet Explorer—the default Web browser for many users—could be particularly troubling for those still running Windows XP.


WSJ cybersecurity reporter Danny Yadron has details on a new security flaw discovered in Microsoft's Internet Explorer that potentially impacts 300 million users of Windows XP. Click here to open a new window and watch the video.


Microsoft on Sunday warned about a flaw affecting versions 6 through 11 of its flagship browser. The coding flaw would allow hackers to have the same level of access on a network computer as the official user, Microsoft said, which is a best-case scenario for intruders.


The company said it is aware of "limited, targeted attacks" that attempt to exploit the flaw. Microsoft didn't elaborate.
FireEye Inc., FEYE -5.54% a security company that claimed credit for finding the hole, described it as part of a hacking campaign against U.S. financial and defense companies. It didn't provide further details.



FireEye said attacks have mainly been targeted at Internet Explorer 9 through Internet Explorer 11.


The bug affects the browser when used on multiple Microsoft operating systems. But the situation poses a special concern for people still using Windows XP.


The software was introduced in 2001, and Microsoft on April 8 stopped supporting XP with software updates—including security patches for the operating system and its browser. XP can run up to Internet Explorer 8.


"XP users are not safe anymore and this is the first vulnerability that will be not patched for their system," Symantec Corp. SYMC -1.04% researcher Christian Tripputi wrote in a blog post for the data-security company.


Windows XP, though outdated and plagued with security flaws, still runs on some 300 million machines. Microsoft offers extended support for corporate clients still running XP, but at a hefty price.
Despite its past statements, Microsoft could decide to make an exception and issue a patch that would aid XP users. The company, based in Redmond, Wash., didn't immediately respond to a request for comment.


"On completion of this investigation, Microsoft will take the appropriate action to protect our customers," Microsoft said in a security bulletin.


Sunday's disclosure, to a certain extent, was predictable. Microsoft had publicized widely its plans to stop supporting XP, and the dire consequences for some users were well-known.


But it isn't clear whether anyone expected a major XP flaw to be found three weeks after Microsoft ended support.


Morgan Marquis-Boire, a well-known security researcher, posted a link to Symantec's warning on his Twitter account Sunday, including the phrase "*gets popcorn*" to indicate that he expects a furor to result.

Write to Danny Yadron at danny.yadron@wsj.com