java_tech

Java is required by many applications and websites to work properly. It can also be exploited by criminals.  Here’s why you should keep your java up to date.

Many business users need it to run custom or legacy applications. Java is not just for gamers. It is used by countless business applications.

Java Security Risks

As recently as January, hackers were able to exploit a security hole in Java to serve up malware to hundreds of thousands of systems per hour.

It is because of these security holes and many others that Java must be updated frequently.

Java often uses your web browser to access websites, and your web browser is the most vulnerable attack surface for hackers. Therefore, not updating Java religiously is playing with fire.

 How to Update Java

First, find out if you have the latest version here.

verify-java-version

Click the red Verify Java version box to allow Oracle’s website to find out if you have the latest version installed. If you are given a prompt stating Allow the Java plugin for your browser, click to allow it.  Next, another prompt will likely appear as shown below:

run-java-test

Click Run to allow the application to run. If you have reached this stage, you have Java, though not necessarily the latest edition. If you have the latest Java, you should get a window telling you Congratulations with an accompanying green check. If you don’t have the latest Java, you should see a screen that looks like this:

outdated-java

Click Click Download Java Now to get the latest version of Java.

agree

Click the red Agree and Start Free Download to get the newest Java for your system. The progress of the download should appear at the bottom of your browser. It will finish when no time appears next to the download.

java_install_c1

Click the .exe file to kick off the installation. You should promptly close your browser to avoid any roadblocks or conflicts.

Vista_Java_Install_2

When the security  warning appears, click Install to permit the latest Java to be installed.

install-java-silently-update-26-01

On the Welcome to Java screen, click Install again to allow the installation to proceed.  At some point during the installation, you will see the following window:

ask

At all costs, do NOT check the Install the Ask Toolbar and make Ask my default search provider option. The Ask Toolbar is completely unnecessary and makes your computer more vulnerable to infections. Click Next to allow the final steps of the installation.

download

After the green progress bar reaches the end, you will be directed to Oracle’s website where you will again see the following:

verify-java-version

As before, click the red Verify Java version button. Once again you should click Allow to enable the website to see what Java version you are running. Also, click Run in the following window to enable the test.

run-java-test

If you have the latest Java, you will see the following window:

congratulations

If the website still tells you your Java is outdated, go through the earlier steps starting with Download Java. If you have already downloaded and installed the latest Java and you get the outdated message, simply closing and reopening your browser will often correct the problem. Go back to Oracle’s website to verify your Java version.

For more about Java or other security issues affecting your home or office computers, consult with your local IT professional.

Read More


services_vpn

Do you want the option to work from home and access all of your office computer’s files and applications?  Let’s cover some options.

LogMeIn was the go to option for remote access software in the past before they started charging for their software.  Fortunately, there are free applications that will allow you to remotely connect to your office computer from home.

1.) TeamViewer

TeamViewer, available for Windows, Apple, Linux, or Mobile installs without much fuss and is easy to use.

team_viewer_console

As you see, the TeamViewer window is divided into the Remote Control and Meeting tabs.  In the Remote Control tab, Your ID and Password have to be shared with the computer that connects to yours. The Personal Password allows you to access your computer from anywhere at any time provided, of course, it is left on.

In the Meeting tab under Control Remote Computer, you can control a remote computer by entering the Partner ID generated on the remote computer’s TeamViewer window under the Remote Control tab.

2.) Chrome Remote Desktop

Easier to use than TeamViewer, Chrome Remote Desktop does not have as many features. However, the good news is you do not need to have the web browser running to use the app.  You will need to have the Chrome browser installed, which we recommend using as your main web browser.

To download Chrome Remote Desktop, go the app page in the Chrome Web Store.

Chrome_Web_Store

Click the blue +Free button to download the app, and click Add when it asks you to confirm. If you are not signed into Google, it will prompt you to do so.

Once installed, click the Apps button under the Chrome search bar, and open the Chrome Remote Desktop App.

chrome_remote_desktop_app

Click the Get Started button if it appears.

To share your computer with another, click the green Share button.

share

You will be given a unique access code that the other party will use to access your computer.

access_code

It is recommended that you read the code aloud to the other party rather than type it. Click Allow access to enable the other party’s remote desktop session on your computer.

allow_access

To access a computer available for sharing, open a new tab in Chrome and click the gray Access button instead of the green Share button. Enter the access code provided by your partner whose computer is to be shared.

access-code-connect

Click Connect. You can also access your own remote computer you have previously made available for sharing with these latter steps. Just be sure to keep the Access code in a safe, handy place.

The downside of Chrome Remote Desktop is that you cannot perform file transfer with it. Instead you have to upload files to and download them from the cloud.

3.) Join.me

Join.me offers an extremely lightweight remote desktop app that is simple to use. If you opt for their basic plan, it’s free.  To share your desktop, go to their homepage and click start meeting.

screen-sharing-join-me-start-meeting

A number will be generated for your sharing session. It should be near the top of the screen in orange.

join.me

Give this number to the party on the other side. They will be able to use this when they connect to your computer by clicking join. Like TeamViewer, join.me is capable of file transfer, and you do not need to register or create an account to use it.

Which should you use?

Because of its inability to do file transfers and the Google account login requirement, Chrome Remote Desktop offers fewer comparative advantages than the other two remote desktop apps.

Between TeamViewer and join.me, the latter is slightly easier to use.  However, TeamViewer offers more features that the free version of join.me. These include co- browsing, whiteboard, and video/ webcam capabilities These extra features more than offset the streamlined, ergonomic interface of join.me and warrant TeamViewer as the recommended free application for remote access.

For more information about remote access or other issues concerning your home or office computers, consult your local IT professional.

Read More


Microsoft Announces End of Windows 7 Mainstream Support

Microsoft has announced that by January 2015 several products would be reaching the end of mainstream support including all versions of Windows 7.

What does mainstream support mean exactly?

This means the company would stop providing free updated features and performance improvements to Windows 7. After the ending of mainstream support the company would start to provide extended support in which security fixes would be free.

Fix Failed Windows 7 Update

How will this affect you?

This decision affects a lot of businesses that are either already using Windows 7 or are migrating all their systems to Windows 7 from Windows XP. The businesses are now going to rely on Microsoft’s extended support for updates and other enhancements for their operating systems. It should be noted that Microsoft has confirmed that all Windows 7 users will continue to receive security fixes and patches up to 2020.

Although the percentage of Windows 7 users around the globe is quite high, it is likely to remain high due to the unpopularity of Windows 8 with it’s different interface.  Windows 7 users need not worry over this announcement. Although you have the option of upgrading to the new Windows 8, at this point there is no need to since there will be extended support . By the end of the extended support a large number of Windows 7 users would likely already have upgraded to a newer operating systems.

Windows-8-Charms-Bar

Extending support

Microsoft might possibly decide to continue the mainstream support for all versions of Windows 7 for a little longer. This was the case when they announced the end of mainstream support for Windows XP.  In total Microsoft supported Windows XP for almost 13 years.

For more advice on managing your office computers and planning for IT changes, contact your local IT professionals.

Read More


3 Reasons To Watch Your CPU Usage

Your computer processor is the brain of your system.  If your processor runs at 100% capacity there could be a serious problem. Here’s why you should check your CPU.

Modern operating systems like Windows 7, Windows 8 and Mac have come a long way in terms of making the most of your computer’s processor.  Multi-core processors have given computers a big boost too.  These and many other factors mean your processor should rarely be used at 100% capacity.  So what could it mean if your computer processor is being used at 99% or 100%?

1. A bitcoin mining virus has infected the system

Bitcoin Virus

Bitcoins are a fairly new form of online currency that can be transferred and used anywhere in the world.  Bitcoins are generated using a computers processor.  However imagine having access to tens if not hundreds of thousands of unsuspecting processors to generate bitcoins for you.  This has motivated criminals to write bitcoin mining viruses that will use your computers processor to make them money.

2. Trojan infections on the computer

3 Reasons to watch your CPU Trojan Virus

A trojan virus allows someone to connect to your computer over the internet.  They can use trojans to view your screen, record anything you type on your keyboard, steal your files or casually browse the data on your computer.  Trojan viruses are one of the leading causes of identity theft and can sometimes be very difficult to remove.

3. Software is malfunctioning or failing

3 Reasons to Watch Your CPU Buggy Software

As hard as they try, software publishers aren’t always able to keep their software up to date and working smoothly with the latest systems.  Often times the publishers will rely on users to let them know when their software misbehaves so they can release an update or fix.  High CPU usage can be a sign of a malfunctioning program so be sure to save your work often.

All managed services clients are automatically covered against high CPU usage.  Here’s how you can check if your processor working too hard.

For more ways to protect your home or office computers, contact your local IT professionals.

Read More


No ads when browsing the internet

Does advertising improve your web browsing experience or make it worse?  Even legitimate advertising can cause major headaches to major infections.

Advertising can be a great source of revenue for websites that offer content and information for free.  Major websites that you use everyday have taken this to an extreme by serving up video ads that talk to you and track your online behavior.  However the more websites rely on advertising for their revenue the more willing they will let any run an ad on their networks.  Here are three reasons why advertising has reached a point where it can be a threat to the average user browsing the internet.

1. Malware spreads through legitimate advertising

Youtube ads serving up malicious code

There have been many cases in the last few years where hackers and criminals have used legitimate advertising and banners in websites and in videos to spread their malware. One example is a bitcoin mining virus being spread through Yahoo advertising.  Even  Youtube fell victim to advertising serving up remote code execution. These major website quickly patched up the problem but it will take more than a break-fix approach to end this cat and mouse game.

2. Are you really getting what you click on?

Ads can trick you into installing junk

Accidentally clicking on the wrong link when you want to download a song, file or program from the internet can open the flood gates of junk on your computer.  The above image shows a legitimate download website.  Can you guess which link is the correct link to download your program?

3. Popups, search engine hijackers and junk programs

Hijacked search engines can be hard to cure

Once junk programs from advertising get their foot in the door, it can be very difficult to detect or even remove the software.  The above search engine may look like Google, but it is a knock off website meant to steer you to their partners websites.

For now until major websites have better safeguards in place to prevent malware, junk programs and sneaky advertising methods from their ad networks it’s better to steer clear from advertising all together.  We recommend running Firefox or Chrome with ad block plugins installed.

For more tips on staying safe online at your home or office, contact your local IT professionals.

Read More