Broken-WiFi

Is your Wifi not working? No problem, simply follow our quick checklist to get your Wifi back online so you can get on with business as usual.

It can be annoying to lose your Wifi connection at home or in the office. Besides, where would one be without Wifi these days?

Not having a Wifi connection can effect a multitude of business operations such as losing access to both the internet and your internal network, email, shared peripherals (such as printers and scanners), and any other wireless  resources connected to your router.

For many, it’s no longer feasible to have ethernet cables swimming all over the place.
To help end this panic, we’ve compiled a three -step troubleshooting list to get your wireless working again.

so-asus-wireless-n300-3-in-1-router-ap-range-extender-4-x-10-100mbps-lan-ports-1-x-10-100mbps-wan-port-w-dual-detachable-5dbi-antennas-model-rt-n12-d1-3

  • Restart your device or computer. The idea is to restart whichever device has lost its Wifi connection. It is best to do this first, as it may be an isolated issue with only the your computer, laptop, printer or smartphone. It’s also good idea to confirm this by checking to see if other devices and computers are connected and working over the wifi.
  • Restart your wireless router. If all devices connected to your Wifi router appear to be offline, then the problem is likely to be the router. You may want to observe whether your router is flashing amber or red lights, which is a sign that it has lost connectivity. Green lights are usually an indicator of a Wifi router being online, operating as usual. A simple reboot of your Wifi router by unplugging it from the power for 1 minute and plugging it back in can help it come back online. If the router continues to play up after a few minutes following a reboot, contact your ISP to check if there are problems with the internet connection. If not, the Wifi router may need to be replaced.
  • Make sure you’ve selected the correct wireless access point. Check to see which access point you’ve connected to by checking your device’s wireless settings. If you’re unsure about the wireless access point name, you can double-check it by reading the label displayed on the Wifi router or, alternatively, you can or ask your network administrator what it is. Understandingly, it’s so easy to pick the wrong wireless access point as most households and businesses have Wfi routers emitting wifi everywhere.

For more ways to troubleshoot networking problems, contact your local IT professionals.

Read More


Comp 1 (0;00;00;00)

Lenovo has been caught red-handed shipping laptops with invasive adware. Read more here to find out the implications of why you should be concerned.

If your office has purchased any number of Lenovo laptops during the latter part of 2014, then these systems are likely affected by pre-installed adware.

There’s now little wonder  as to why your office’s antivirus or antimalware software might have been bugging you about a malicious adware named “Superfish”. If your systems administrator hasn’t been able to pinpoint the particular source, the culprit could really be the OS itself or Lenovo.

In 2014, several Lenovo notebook users reported injected advertisements while doing regular internet searches. The adware was identified as “Superfish” with capabilities of injecting third-party advertisements to not only on search engines like Google but by any website visited as well. Experts and technical enthusiasts have determined the adware was already pre-installed with the notebook by the time a unit is purchased.

Is It a Big Issue?

Although Lenovo would claim otherwise, experts point out that this invasive software can affect both users’ privacy and security.

For internet users who are annoyed by those numerous and deceiving web advertisements, this would already be a problem. Even the more savvy users can be deceived due to the nature of the advertisements displayed, which are designed in a way to look like they are part of the search results or the webpage itself.

A serious security threat which can spy and steal your data

Other than the ability to bombard you with online advertisements,”Superfish” also gives the perpetrators an opportunity to spy on the user’s activities when online and even monitor personal data:

  • The adware installs itself as a root security certificate in the laptops.
  • A security certificate is a small system file/key that determines which websites, servers, and software are trustworthy and which are not.
  • A root certificate can be likened to having a “master key”, where its authority will be adopted within the internet settings of a computer.
  • This makes a computer vulnerable by tricking it into thinking a website is secure, even if it’s not.

It’s a window of opportunity for cyber criminals to spy on their targets or even deceive them to give out personal data like usernames and passwords. There’s also a risk for laptops to be susceptible to malware and virus attacks since they can slip through their antivirus/antimalware software by using the certificates to make them look like legitimate files.

Lenovo’s Response

superfish-screenshot

Lenovo recently confirmed selling their units pre-installed with adware and shipping them worldwide. According to Lenovo, only units produced between September and December of 2014 were affected. Additionally, Lenovo defended the addition of “Superfish” in its laptops citing that the goal was to improve user experience when shopping online and that it does not monitor user activity.

As of January 2015, Lenovo has stopped shipping the adware on its computer products and has promised not do so in the future. It has also disabled “Superfish” and server interactions for the affected units and users. This “feature” should now cease to exist.

Check if you are affected by Superfish

 

superfish

Filippo Valsorda has setup a quick online test to see if your computer and internet connection are affected.  The test can be run here.

For more ways to stay protected, contact your local IT professionals.

Read More


Java_ai

Most systems today need to run Java occasionally. With the Java 7 end of life approaching, learn why it’s important to migrate to Java 8 to stay protected.

Oracle has supported Java SE 7 for 11 years now, however, with new developments on the latest version to support current and future technological developments, it has reached its end of life.

As of April 2015, Oracle will cease to provide updates for Java 7, which also includes discontinuing downloads for this version from their websites.

The good news is that existing customers are entitled to have continued support for any given security fixes or critical bug issues, including long term maintenance for Java 7 and older versions. All this will be available from Oracle’s Java SE Support team. However, it’s best to migrate to the latest version.

Oracle has also included an auto update feature since their January update to help migrate systems from Java 7 to 8.

Why migrate to Java 8?

Java 7 security updates will no longer be made automatically, making any systems running this version vulnerable. We strongly advise all users to switch to Java 8 for continued feature updates and to further close vulnerability exploits. Since vulnerabilities are likely to lead to exploits, its important to secure  your computer when browsing the internet on Java based websites.

Java exists to help applications and websites run correctly, which is fantastic. Being dependent on this component can lead to problems. With unpatched or outdated versions of Java, hackers can take advantage of using web browsers to serve up malware by exploiting its vulnerabilities.

By not maintaining frequent Java updates, this only serves to invite attackers to exploit your web browser and computer.

How to update Java and stay protected

Ophtek managed services clients are automatically updated.  Follow these steps to update Java manually.

Here are more detailed steps on how to install Java updates. Although the Java version shown in this tutorial is older, the method to install and update are still very much the same.

Remember that it’s worth spending a few minutes updating Java on your systems to lock them down from any possible future attacks.

For more ways to protect your office data, contact your local IT professionals.

Read More


Computers for Classrooms Donation Program

Re-purposing old computers as a learning tool is a project close to our hearts here at Ophtek. Learn how the WCE project helps support the less privileged.

Our ethos of helping to repurpose computers for underprivileged schools and families through our Computers for Classrooms donation program has just gotten better.  We’ve recently donated 35 computers and 16 LCD monitors to the World Computer Exchange, a non-profit organisation with a newly opened chapter in Silicon Valley. There are many benefits to re-purposing old computers as you may have seen through our Computers 4 Classrooms donation program.  Here’s a recap of the benefits of reusing old computers:

Why donate old computers?

  • Greener for the environment– keeps computers out of landfills and reduces toxic waste emitted when they’re incinerated and crushed.
  • Considers worker’s well being– reduces the need for workers to be exposed to chemicals.
  • A valuable tool for the underprivileged– gives those without access to a computer the opportunity to use a computer. For instance families and schools who may lack funds to purchase computer equipment and for children in third world countries.

How does the World Computer Exchange Help Those in Need?

WCE will pre-load free open source educational software onto old computers.  They then ship the ready to be used computers and any new equipment to various underprivileged groups who sign up to partner with them. For instance, this can be schools, libraries, NGOs, orphanages, youth centers, government institutions, learning academies, universities and so forth.

 

Ophtek_Donation

Some of the computer recently donated by Ophtek to the World Computer Exchange.

The aim is to provide computer access in public settings to young adults, up to the age of 24, who are members of underprivileged groups in developing countries. This helps keep running costs low, such as Internet use in public educational establishments.

Donated Computer shipments are sent in containers which hold up 250 to 500 computers to help reduce shipment fees.  If less computers are required by a single organization in need, then containers are arranged to be shared when more than one partner within the same nation requests a shipment. The more partners who request a shared container to their country, the less number of computers available to each individual partner.

The donated computers are intended to be used in public facilities and aren’t to be resold.

Ophtek Principal Arash (middle) with WCE Team Members.

Ophtek Principal Arash Shokouh (middle) with WCE Team Members.

So far, WCE has helped install 3,050 computer labs, shipped computers to 43 developing countries of which 3.8 million underprivileged youths have connected to in order to benefit and learn.

For organizations that do not have access to the internet, WCE sets up offline content so the computers can still be put to good educational use.

Have computers to donate?

computers. By repurposing computers for the greater good, you’ll also touch many people’s lives across the globe whilst going green too.

For more ways to efficiently repurpose your office computers, contact your local IT professionals.

Read More


Printing

It is essential to have a working printer in an office of any size. Here are 3 ways to connect printers as well as their advantages and disadvantages.

Depending on how many staff you have working at your office and the printing requirements needed, you’ll want the most efficient setup available for them. Below are 3 office printing options for you to consider:

1 – Local printer shared over a networkPrinters-HP-OJ-4500-DESKTOP-ALL-IN-ONE-PRINTER-1

Advantages

  • Local printers are relatively cheap to purchase, prices can vary, however the cheapest you can buy new can range from $35-40 or more.
  • They are very straightforward to set up.
  • They fit easily onto a desktop.
  • Suitable for a small team or office to use.

Disadvantages

  • In order for the shared printer to work, the computer hosting the device needs to be online over the network so that other users can print to it.
  • Not suitable for large offices, where hundreds of print jobs need to be processed daily.
  • Most cheap desktop printers that are set up as a shared printer tend to print slower, producing less printed pages per minute than, say, a heavy duty laser jet printer.

2 – Network printer connected over Wi-Fi

Dell wireless printer-p713w-1

Advantages-

  • Moderately priced, prices can range from $100 upwards for a cheaper end laser jet printer.
  • As long as the printer is connected and online, everyone can use the printer.
  • Suitable for medium to large offices who need access to a heavy duty printer such as a laser jet.

Disadvantages-

  • A little more complicated to set up, this usually requires an IT administrator to configure.
  • This setup depends heavily on a wireless connection; therefore the quality of Wi-Fi is essential for this to work efficiently.
  • The distance between the printer to the router is also essential. The bigger the distance, the weaker the connection will be. For instance, the router being too far away from the printer could mean lack of Wi-Fi signal for there to even be a connection. You’ll also need to assess anything that may disrupt Wi-Fi signals, such as the use of microwaves in eating areas nearby.

 

3-Hard wired network printer connected with Ethernet26754_00_1000x1000

 

Advantages-

  • Like the Wi-Fi printers, hard wired network ones that are able to connect via Ethernet are also moderately priced.
  • Suitable for medium to large offices that also require a heavy duty printer or even a multi-functional one with scanning capabilities.
  • A more stable connection compared to Wi-Fi, making it the most reliable solution of them all as far as shared network printing goes.
  • Anyone on the network can connect to the printer without having to rely on it being on a single PC.

Disadvantages-

  • The inevitable use of cables, but can be tidied away with a cable tidy accessory.
  • Even Ethernet printers need to be set up by an IT administrator to allow it to reside on the network and make it available for all to use.
  • As this setup will likely use a heavy duty printer, it’ll also need its own space in the office.

As you can see, the best solution for a small office (or even for a home-based office) is to have a local printer shared over the network. On the other hand, if reliable is important for users at all times within a medium to large sized office, a hard-wired network printer is a much better choice.

For more ways to optimize your printer network setup or network infrastructure, contact your local IT professionals.

Read More