typingshortcuts

Keyboard shortcuts are an overlooked feature of the modern OS. Here are 28 shortcuts to keep your hands on the keyboard and to keep your productivity high.

Most of these actions can be easily done with keyboard shortcuts. The shortcuts have you press a combination of two keys at the same time to perform the action. Investing some time into learning these shortcuts and getting used to using them on a daily basis will significantly increase your work efficiency no matter what field you are in. Once you learn this way of navigating the UI there will be no going back! The following shortcuts are for computers running a Windows OS.

Action controller

  • CTRL+Y, Redo the last section
  • CTRL+Z, Undo the last action

For creating, opening, saving, and printing

  • CTRL+N, Creates new file or web browser window
  • CTRL+O, Open a file or document
  • CTRL+S, Saves a file or webpage
  • CTRL+P, Print all the selected areas

Format shortcuts

  • CTRL+B, Bold
  • CTRL+I, Italic
  • CTRL+U, Underline

Browsers

  • CTRL+T, Open a new tab in opened browser
  • CTRL+Shift+T, Reopen previously closed tabs
  • CTRL+H, Open browser history
  • CTRL+W, Close window
  • CTRL+F, Word search page

washington

Screen Capture

  • ALT+Print Screen, Capture screenshot of currently open window
  • CTRL+Print screen, Capture the entire screen

Function keys

  • F1: Open the Help Page
  • F2: Rename file
  • F3: Find or Search
  • F4: Shows the address bar in browser
  • F5: Refreshes the current browser page

Windows Shortcuts

  • CTRL+Alt+Delete,Open the Windows Task Manager
  • Alt+Tab, to move to the last working window
  • WIN+D, Show desktop
  • WIN+L, Lock desktop

97806723306984.20.9

  • CTRL+Shift+N, Create new folder
  • Shift+Delete, Permanently Delete file
  • Alt+Enter or Alt+Double click, Go to properties screen for file or folder

For more ways to increase your office productivity, contact your local IT professionals.

Read More


Windows CVE-2014-4114 Exploit

A Zero-day Microsoft Windows Exploit CVE-2014-4114 has been found which impacts all versions of Windows. Here’s what you need to know to protect yourself.

The Russian espionage group, known as the “Sandworm team”, are the prime suspects believed to have launched a campaign to exploit a range of Microsoft Windows vulnerabilities.  The exploits are classified as Zero-Day, meaning they are so new that no anti-virus companies have figured out how to detect them yet. The ultimate goal is to inject and execute malicious code into systems and networks to leach data from computers.

Sandworm Team Logo

Their targets have involved NATO, US academic organizations, Western European Union and Ukrainian government agencies, European energy and telecommunication companies.

Systems are infected from files being attached to legitimate looking emails and extended through to social engineering methods. Most versions of Windows are affected – including server 2008 and 20012, but excluding Windows XP.

Sandworm CVE-2014-4114 Vulnerability Timeline

iSight has provided a timeline of the Sandworm infection campaign.

The cyber intelligence firm, ISight, has been monitoring Sandworm’s activities. After alerting Microsoft, a patch was released called MS14-060 which is found in Window’s Automatic Updates. The fix is still an on-going work in progress.

The vulnerability explained

Here is a high level overview of what the CVE-2014-4114 Zero Day exploit entails:

  • The vulnerability allows a computer to have code executed remotely through a file that is initially opened by an unsuspecting user via an email attachment.
  • Within most software installation files, you’ll find a component called OLE (Object linking and Embedding) Package Manager.
  • An OLE package allows applications to share files and functionality.
  • The OLE package manager contains a file which permits it to download and run INF files.
  • This is where a computer is vulnerable since a hacker can run any program, virus or malware on a system.
  • Any acquired arbitrary code can then run from the downloaded INF files, which is presumed by the system to be associated with the application’s package.
  • This package will run from the logged-in user’s credentials, such as an administrator or anyone with admin rights.
  • The danger then rests from specific commands given to the file during the execution of the application.
  • It has been observed that unsuccessful attempts from this exploit can also lead to a denial of service, which can lead to service disruption.
  • As mentioned previously, the usual mode of target is through fake emails with attachments and social engineering, where the user would need to be convinced and tricked into opening the file.

Proactive measures to prevent an infection

Follow these guidelines to protect yourself or to quickly recover from a compromised system.

If you find your system compromised

For more details about the Zero-day Microsoft Windows Vulnerability CVE-2014-4114 issue and other security issues putting your business and private data at risk, contact your local IT professionals.

Read More


Windows 10 Logo

Microsoft has recently announced the preview version of Windows 10 for the general public. Here are our favorite Windows 10 features for businesses.

At a glance, it looks very much like a hybrid of Windows 7 and Windows 8, with some colorful Apple elements thrown in. We’ve decided to discuss here some of our favourite features of Windows 10 which may be of interest to businesses and professionals:

The return of the Start Menu

Windows 10 Start Menu Feature

That’s right, the start menu, which was absent on Windows 8, has been reintroduced into the OS. It’s similar to the former start menu in Windows 7, yet it includes live titles like in Windows 8 and attractive “Apple-esque” looking tiles. You can also resize it!

Extended search functionality

Windows 10 Extended Search

Within the start menu, you will be able to search anything from your current PC or device, such as files or Apps, as well as any search results from the internet.

Windows 10 Universal Apps

Windows 10 Universal Apps

Microsoft is following the Apple App Store trend by unveiling their own Windows Universal Apps, which we guess will be compatible across various devices, including phones. Older Windows Apps should still work on Windows 10.

New multiple Task View and Split Screen features

Windows 10 Multi-Task View

Microsoft have done away with Windows 8 Task switcher and have introduced a brand new Task View, which will allow users to switch between virtual desktops. This makes it a whole lot more user friendly and allows you, for instance, to separate your work desktop from your home desktop. It also splits the screen up into four quadrants to make it easier to segment your work.

Snap Assist feature

Windows_10_Snap_Assist

This is another new feature which allows you to arrange (“snap”) your Apps and windows into tiles or new screens.

Package Manager “OneGet”

Following in the footsteps of the very popular Linux based package managers, Windows 10 will allow you to install programs directly from the command line.  It may not sound exciting but imagine avoiding the 10+ windows of Next-Next-Next to get common software up and running.  Deploying programs on many systems also becomes much more manageable.

Business functionality features

Windows 10 Best Business and Professional Features

On Window’s 10 Technical Preview for Enterprise, there is said to be features that are currently under development which have not all yet been included. Some features will include specific business functionalities such as DirectAccess, AppLocker, BranchCache and Windows To Go. We can only imagine that data security and asset management will be at the top of their list.

Final Thoughts…

Now you have a run-down on some of the popular features for the Windows 10 preview. It’s available for download, but be sure to do this on a test computer or VM.

Since the negative backlash on Windows 8, Microsoft is looking for feedback to improve on their new OS before selling it to the market. In our opinion, this is a great thing as they are listening more to the consumers’ needs and practical solutions. Since most businesses and professionals depend on some Windows operating system, this is an opportunity to provide constructive criticism for an improved OS to be born.

For more information about whether Windows 10 is right for your business or practice, contact your local IT professionals.

Read More


How to check for high memory usage 

Is your computer hanging or freezing while working?  If disk space and infections aren’t the issue you may be low on memory. Here are several ways to check.

High memory usage can indicate a number of problems with the computer.  The system could be low on physical memory.  A program could be malfunctioning causing it to abuse the available memory.  High memory usage could also indicate a virus or malware infection.

1.) Open the Task Manager by holding down the Ctrl and Shift keys and pressing Esc.

Task-Manager

Under the Performance tab, below the CPU Usage graphic there is one for Memory. This gives you a pictorial representation of the amount of memory used. The Physical Memory in megabytes  is the amount of Total RAM installed on the computer or Available RAM for handling processes. The amount of physical memory used to map open files is denoted by the Cached entry. Available memory includes Free memory, which is memory currently used for absolutely nothing.

Kernel Memory is used for the operating system and device drivers. Paged memory can be copied to a paging file, freeing more physical memory for use by the operating system. Nonpaged continues to occupy physical memory.

Under SystemCommit is the amount of virtual memory that could be backed by physical memory or paging files. The Commit entry depicts a ratio of memory that could be allocated to data to the total virtual memory on the computer.

At the bottom right of the window is the percentage of Physical Memory currently in use.

2.) By clicking the Resource Monitor within the Task Manager, you can view detailed information for memory in use and memory allocated for each process.

User Account Control will bother you for authorization, which you must give to launch the monitor. The Memory tab provides extensive descriptions of the headings of each column if you hover your mouse over each heading.

hover-column

The advantage of the Resource Monitor is that it breaks down memory use on a process by process basis, allowing you to ferret out the resource hogs among your programs.

If you do find unnecessary programs that are taking up an unusual  amount of memory, you can uninstall them using the Control Panel or remove them as startup programs. For more on how to remove unnecessary startup programs, please consult the following IT article. And for more on how to uninstall programs and other ways to improve Windows performance, please consult the following IT article.

3.) The Performance Monitor is extremely customizable, giving you exactly the performance stats you wish to view.

You can launch it by clicking the Start menu and by typing perfmon. 

perfmon

When it opens, it gives you the basics on how to use it and the memory in use.

perfmon-welcome

By clicking Performance Monitor on the top left, you get a graph of processor usage that you can complement with memory usage stats by first clicking the + icon to add data to the graph.

add

Within the Memory heading, you can view the memory of various subheadings that you can add to the graph.

memory-subheading

Most end users might be overwhelmed by the number of viewable options available in the Performance Monitor.  To get a reasonable assessment of the memory in use, the Task Manager and Resource Monitor generally suffice. The Performance Monitor is recommended for Windows experts who are familiar with the ins and outs of memory usage.

For more about memory and other issues affecting your office systems, consult your local IT professionals.

Read More


3 Reasons To Watch Your CPU Usage

Your computer processor is the brain of your system.  If your processor runs at 100% capacity there could be a serious problem. Here’s why you should check your CPU.

Modern operating systems like Windows 7, Windows 8 and Mac have come a long way in terms of making the most of your computer’s processor.  Multi-core processors have given computers a big boost too.  These and many other factors mean your processor should rarely be used at 100% capacity.  So what could it mean if your computer processor is being used at 99% or 100%?

1. A bitcoin mining virus has infected the system

Bitcoin Virus

Bitcoins are a fairly new form of online currency that can be transferred and used anywhere in the world.  Bitcoins are generated using a computers processor.  However imagine having access to tens if not hundreds of thousands of unsuspecting processors to generate bitcoins for you.  This has motivated criminals to write bitcoin mining viruses that will use your computers processor to make them money.

2. Trojan infections on the computer

3 Reasons to watch your CPU Trojan Virus

A trojan virus allows someone to connect to your computer over the internet.  They can use trojans to view your screen, record anything you type on your keyboard, steal your files or casually browse the data on your computer.  Trojan viruses are one of the leading causes of identity theft and can sometimes be very difficult to remove.

3. Software is malfunctioning or failing

3 Reasons to Watch Your CPU Buggy Software

As hard as they try, software publishers aren’t always able to keep their software up to date and working smoothly with the latest systems.  Often times the publishers will rely on users to let them know when their software misbehaves so they can release an update or fix.  High CPU usage can be a sign of a malfunctioning program so be sure to save your work often.

All managed services clients are automatically covered against high CPU usage.  Here’s how you can check if your processor working too hard.

For more ways to protect your home or office computers, contact your local IT professionals.

Read More