Are you a photographer that uses Adobe Photoshop Lightroom? If you work with RAW image files (uncompressed image files that contain all the color data from the camera's CCD sensor) this tool is a must have.
Its also one of the best photo management suites available. It provides great tools for managing your images, and making corrections or other adjustments to your photographs.
Adobe is offering a free download of the Lightroom 5 beta. If you don't know what a beta is, its a pre-released version of an application that's generally incomplete, which means it could have a lot of bugs in it.
Company's release beta versions of their applications to allow people to try out the next generation version of their software. This also helps them find bugs in it before its released to the general public.
This blog is for users of the Microsoft Windows Operating System, it contains tips, tricks and secrets for both beginner and expert users.
Wednesday, April 17, 2013
Monday, April 15, 2013
Windows 8: Microsoft Movie Maker
Do you have some videos from your smartphone or from another device that you would like to edit into one continuous video? Maybe you want to add titles, video effects or a sound track to a movie that you created.
Microsoft Movie Maker (download) is an easy to use application that allows you to import create or edit picture slide shows and videos. You can move things around, speed it up or slow it down, edit the soundtrack and add a theme Movie Maker also adds transitions and effects automatically so your movie looks more professional.
Then once it's finished, the application makes it easy to post it online via Facebook, YouTube or other social networking and video sharing sites.
Microsoft Movie Maker (download) is an easy to use application that allows you to import create or edit picture slide shows and videos. You can move things around, speed it up or slow it down, edit the soundtrack and add a theme Movie Maker also adds transitions and effects automatically so your movie looks more professional.
Then once it's finished, the application makes it easy to post it online via Facebook, YouTube or other social networking and video sharing sites.
Monday, April 08, 2013
Windows 8: Remote Server Administration Tools (RSAT)
If you manage Windows servers in a small lab or a large data center, then you need the Remote Server Administration Tools for Windows 8 (download). This tool enables system administrators to manage roles and features that are installed on remote computers that are running Windows Server 2012, 2008 R2, and 2008 (all versions).
NOTE: In this release of Remote Server Administration Tools all the tools are enabled by default. There is no need to enable them by using the Turn Windows features on or off dialog in Windows 8.To remove tools that you don't want to use, follow the instructions below:
- On the desktop, hover in the upper right corner of the screen, and then click Settings, then click the Control Panel.
- Click Programs, and then in Programs and Features, click the Turn Windows features on or off link.
- In the Windows Features dialog box, expand Remote Server Administration Tools, and then expand either Role Administration Tools or Feature Administration Tools.
- Clear the check boxes for any tools that you want to remove. Press the OK button, and then close the Control Panel window.
Wednesday, April 03, 2013
Article: Choose the right password manager to protect your accounts
One of the first rules to securing your accounts today is having a unique password for all of them. With so many unique credentials it's next to impossible for the average person to remember them. This is why a good password manager is so important, it allows you to safely store and retrieve these electronic credentials.
I have been meaning to write an article about password managers. I recently came across the following article in BetaNews. Here is an excerpt, "Here’s the contradiction: you need secure, unique and hard-to-remember passwords to protect your online (and offline) accounts from being hacked. However, remembering those secure, unique and hard-to-remember passwords is another matter entirely. Thankfully there is a solution, and it’s called a password manager." (read the rest of the article)
One piece of advice, whatever password manager you choose make sure that your data file is backed up.
I have been meaning to write an article about password managers. I recently came across the following article in BetaNews. Here is an excerpt, "Here’s the contradiction: you need secure, unique and hard-to-remember passwords to protect your online (and offline) accounts from being hacked. However, remembering those secure, unique and hard-to-remember passwords is another matter entirely. Thankfully there is a solution, and it’s called a password manager." (read the rest of the article)
One piece of advice, whatever password manager you choose make sure that your data file is backed up.
Monday, March 25, 2013
Browsers: Identify Resource-Hogging Add-ons
Extensions and add-ons, can both enhance and cripple your browser. The right ones can extend the functionality of the browser, but too many bog it down.
To help identify resource-hogging extensions Mozilla Firefox and Google Chrome include built-in utilities for troubleshooting these add-ons.
Depending on the browser you're using, type the following command into the address bar:
To help identify resource-hogging extensions Mozilla Firefox and Google Chrome include built-in utilities for troubleshooting these add-ons.
Depending on the browser you're using, type the following command into the address bar:
- Mozilla Firefox
- about:addons-memory
- Google Chrome
- chrome://memory-redirect/
Thursday, March 21, 2013
Windows 8: File History
Have you ever accidentally deleted or over-written a file that contained important information? Windows 8 has a feature called "File History" that automatically saves older versions of your files so that they can be restore later.
Unfortunately, this feature is not enabled by default. To turn it on you have to open the System and Security control panel. This feature does require a second drive (such as an: internal, external or a network drive) in order to use it. Open Advanced settings, set how often you would like the system to back up your files and how long it should keep them.
After the feature is enabled, Windows will backup the files in the background. If you need to recover a file, open the File History control panel click the Restore personal files link then select the file from the list.
Thursday, March 14, 2013
Internet: How fast is your ISP (Netflix ISP Speed Index)
Have you ever wondered how fast your ISP really is compared to others? Check out Netflix's ISP Speed Index to find out.
There probably are other sites that offer this information (to be honest I didn't really care to check), but Netflix is one of the few sources I think can give impartial and accurate information.
So if you want to see how well your current ISP rates compared to others. Or, if you're looking to find or change ISPs, I would check out this site.
There probably are other sites that offer this information (to be honest I didn't really care to check), but Netflix is one of the few sources I think can give impartial and accurate information.
So if you want to see how well your current ISP rates compared to others. Or, if you're looking to find or change ISPs, I would check out this site.
Monday, March 04, 2013
Windows 8: Downloading the Windows 8 ISO File
Windows 8 was the first version of Windows that I upgraded and I didn't preform a clean install. I utilized Microsoft's online upgrade offer that allowed you to install the upgraded version of the OS over the Internet.
The only problem with this option was I didn't get a copy of the media. I at least wanted a copy of the ISO file (a file that contains a image of the CD or DVD that can be burned to a physical disk with the right optical drive and media) so I can make a DVD if I need to.
If you want to download the Windows ISO, go to the following page (Upgrade to Windows 8 with only a product key). Press the Install Windows 8 button on the web page, and download the Installer.
Make sure to have your Windows 8 product key ready, enter the information into the field and then press the Next button. The application will display the version of Windows that your eligible to download, and press the Next button.
After a few minutes of downloading and processing files, the installer will ask you how you want to install the OS. Select the Install by creating media option, and then press the Next button. Select the ISO file option, and then press the Save button.
The only problem with this option was I didn't get a copy of the media. I at least wanted a copy of the ISO file (a file that contains a image of the CD or DVD that can be burned to a physical disk with the right optical drive and media) so I can make a DVD if I need to.
If you want to download the Windows ISO, go to the following page (Upgrade to Windows 8 with only a product key). Press the Install Windows 8 button on the web page, and download the Installer.
Make sure to have your Windows 8 product key ready, enter the information into the field and then press the Next button. The application will display the version of Windows that your eligible to download, and press the Next button.
After a few minutes of downloading and processing files, the installer will ask you how you want to install the OS. Select the Install by creating media option, and then press the Next button. Select the ISO file option, and then press the Save button.
Wednesday, February 27, 2013
Article: Leap Motion Controller starts shipping May 13th, hits Best Buy on the 19th
Excerpt from article: "If you were still thinking that the Leap Motion Controller was going to turn into vaporware, it looks like you were wrong. Just less than a year after the company first made waves with its tiny gesture recognizing box, a finished product is getting ready to ship." (read the rest of the article)
Monday, February 25, 2013
Removing Viruses (and other types of malware)
To put it simply
getting hit by malware (e.g. viruses, Trojan horses, worms, etc.) sucks. Sometimes it can be caused by doing something simple or not very obvious or other times it can be caused by doing something dumb. As the old cliche goes, "There is no use crying over
spilt milk because it only makes it sour for the cat".
All you can do is try to clean up what you can. Modern malware can be virulent depending on the strain that attacked your machine. Try to figure out how you were hit, did you open an email attachment, click a link on a website, download a file from the Internet and run it, etc.? Try to learn from the mistake if you can.
Warning: Follow the advice in this article at your own risk, the author is not responsible for any type of damage (or other type of consequences) that can be caused by following the advice in this document. Make sure you have a good backup of your data before proceeding with any of the information below.
Cleaning Up From a Malware Attack
The problem with modern malware, is its designed to be difficult to remove. In most cases you have two choices. One, if you're extremely paranoid and have lots of time you can format your hard drive and re-install your operating system (warning: before doing this make sure that you have a good backup of your data, and have product keys, OS media disk, any special drivers you need, and copies of your applications). Two, if you're not extremely paranoid or don't have you lots of time, you can try some of the following things:
All you can do is try to clean up what you can. Modern malware can be virulent depending on the strain that attacked your machine. Try to figure out how you were hit, did you open an email attachment, click a link on a website, download a file from the Internet and run it, etc.? Try to learn from the mistake if you can.
Warning: Follow the advice in this article at your own risk, the author is not responsible for any type of damage (or other type of consequences) that can be caused by following the advice in this document. Make sure you have a good backup of your data before proceeding with any of the information below.
Cleaning Up From a Malware Attack
The problem with modern malware, is its designed to be difficult to remove. In most cases you have two choices. One, if you're extremely paranoid and have lots of time you can format your hard drive and re-install your operating system (warning: before doing this make sure that you have a good backup of your data, and have product keys, OS media disk, any special drivers you need, and copies of your applications). Two, if you're not extremely paranoid or don't have you lots of time, you can try some of the following things:
- Make sure your reputable real-time anti-malware application (beware of rouge and fake versions of these products, if you have never heard of the company before then you might not want to trust it) is working, and up-to-date, then run a scan of your computer and see if its detect anything.
- If you don't have a real-time anti-malware application download and install Microsoft Security Essentials
- You can also download and run a stand-alone anti-malware scanner to get a second opinion such as: Microsoft Safety Scanner, or Malwarebytes (note: its sometime better to use scanner from a different vendor to get an accurate second opinion.).
- When utilizing these tools, its advisable to reboot your computer into Safe Mode (press F8 several times during start-up, and select "Safe Mode") and run them.
- Change web site passwords that have been effected or are critical accounts (e.g. work, financial related, etc.).
- Run Windows Update and make sure your operating system software and applications are up-to-date.
- You can install the Secunia Personal Software Inspector (PSI) to help make sure you keep your non-Microsoft applications up-to-date.
- I would also recommend uninstalling All versions of Java and Adobe Acrobat reader
- Malware often utilizes vulnerabilities in these applications.
- There are some applications you may need that utilize Java. If you must keep it, uninstall all the old versions, and make sure you're using the most up-to-date version
- Make sure your Flash plug-in is up-to-date.
- If your Flash plug-in is not up-to-date, download and install the latest version
- Its also a good idea to make sure that you have a good backup of all your data.
- For more advanced user, you might want to check your HOST file and DNS settings (see below) to make sure that they were not modified.
- Checking your DNS configuration settings
- In the Start menu search field, type Network Connections and select View network connections.
- In the Network Connections window, right-click a connection that needs an alternate IP address configuration (e.g., Local Area Connection) and select Properties.
- In the Properties dialog box, on the Networking tab, scroll down and click Internet Protocol Version 4 (TCP/IP v4) and press the Properties button.
- In the General tab, enter the information for the main network you use (such as a static IP, subnet mask, default gateway and DNS server information).
- I would also recommend setting up an alternate trusted DNS provider, such as OpenDNS and Google Public DNS.
- Sometimes malware can also install applications that auto-start when your system boots, use System Internals Autoruns to view all programs that are executed at start-up. Review all the applications for suspicious entries.
- Sometimes malware will also install applications to get executed under certain conditions by the Task Scheduler. From the Start menu search field type: Task Scheduler, and review all the task for suspicious entries.
- Malware is getting smart enough to leverage web site settings in Twitter (e.g. Twitter Oauth) and Facebook (e.g. Facebook Login) because of their support for authentication and setting up application trust for third party web sites. To prevent this from happening to you, review the settings in your profile and unauthorized any site or application that you don't trust.
- Utilizing this technology malware can log into other sites, and even post entries in other people's news streams. Recently some malware was posting malicious links on a friend's Facebook profile from Twitter. If someone clicked the link and their system was vulnerable their Facebook account would have been taken over too.
- There are going to be times where conventional malware removal techniques will not work, and will require the computer to be booted into safe mode or utilize a special boot media (e.g. flash drive or optical media) that can remove the virus from the operating system while its not active. One example of this type of tool is Windows Defender Offline.
- Delete your browser cache (Internet Explore and Firefox, press Ctrl-Shift-Del)
- You might considering dumping your Restore Points, sometimes infected files can get backed up by this system process.
- Open the System control panel, click the System protection link. Select a drive, press the Configure button, then press the Delete button.
- Run the Disk Cleanup (Start menu > All programs > Accessories > System Tools), this will purge temporary file locations on the system.
Notes:
- Even after cleaning your computer with these methods there are no guarantees that its malware free.
- The links to the products in this document are for reference only, and they're not recommended or endorsed by the author.
Wednesday, February 20, 2013
Getting an "Access is denied." error when connecting to a share
Are you encountering a situation where you're getting an "Access is denied" error when connecting to a share on a machines in a workgroup. For example, if you used following command:
net use * \\computername\d$ /user:computername\username password
Then you get the following error:
System error 5 has occurred.
Access is denied.
Try running the following command (requires the administrator command prompt):
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1
To manually implement the change:
Warning: by modifying the registry you run the risk of damaging your operating system, only proceed if you know what you're doing. The reader takes all responsibility for ANY damage or problems that may occur by following these instructions.
- Start the Registry Editor (REGEDIT.EXE).
- If you get the UAC prompt, acknowledge it.
- Locate and then click the following registry sub-key:
- HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ System
- in the Edit menu, select New and then select DWORD (32-bit) value.
- In name field type LocalAccountTokenFilterPolicy, and then press the Enter key.
- Right-click the LocalAccountTokenFilterPolicy, and then press the Modify button.
- In the Value data box, type 1, and then press the OK button.
- Quit the registry editor.
Monday, February 18, 2013
Troubleshooting Network Share Problems
Are you having a problem connecting to a Windows network share (e.g. \\computer_name\share_name) or the default administrator shares (e.g. \\computer_name\c$)? This happens to computers on networks that are connected to a domain controller or local workgroup.
In my own personal experience has been that local workgroups are more unreliable then domain controller connected shares. Below are tips to help troubleshoot this problem:
In my own personal experience has been that local workgroups are more unreliable then domain controller connected shares. Below are tips to help troubleshoot this problem:
- Has there recently been any new updates or changes in the hardware, operating systems, software or configuration made on the client or remote computer?
- For example, were system or application updates installed
- Is the problem happening from one machine on your network or all the machines on your network?
- If its just one computer is having the a problem connecting to it, see if it having problems connecting to other computers. If its just the one computer, reboot and try again.
- If multiple computers are having problems connecting to the share, then there could be an issue with the share's configuration or the file and print service on the remote computer.
- Are you having a problem with one or all the file shares on the computer?
- If you're having a problem with one share delete and recreate.
- If multiple shares are failing, it could be a problem with the network configuration or file and print service.
- Can you ping the computer? Its possible that the client is having problems communicating with the DNS servers or the network configuration or the local machine is not setup correctly
- Trying pinging the computer:
- Local Machine: ping localhost or ping 127.0.0.1
- If this doesn't work there is something wrong with the local machines network configuration drivers, hardware or connection.
- DNS Name: ping machine_name
- FQDN: ping machine_name.example.com
- IP Address: ping 10.1.1.10
- Note: If you can't ping the machine with the DNS Name, try the FQDN, if that fails try the IP address. If you are able to ping the machine with any of these, then try to use that method to connect to it: net use * \\machine_name.example.com
- Does the account have the right file and share permissions?
- If the account you're trying to use to connect doesn't have proper permission to file and share, then you're not going to be able to access the file. Make sure to check them both.
- Make sure that no existing connections are preventing you from making a new connection.
- Open up the Windows explorer and clear all remote connections by right clicking them and selecting disconnect, also open up the command prompt and type "net use * /delete"
- Do you know that the account doesn't have a password or is the account locked?
- If you're using a workgroup account:
- Try resetting the account password to the account you're using to connect to the share.
- Try creating a different account, and setup the permissions, and try to access the share.
- On the remote computer make sure the share is setup correctly in the Computer Management console (COMPMGMT.MSC).
- Tip: In the Computer Management console kill off all Sessions connected to the share.
- Make sure the firewall ports are not blocked?
- If you can't connect to the network share, make sure the ports are open in the firewall and accessible by the remote computer.
- Windows 7 and higher
- Try disabling or leaving the HomeGroup (in the Control Panel \ Network and Sharing Center \ HomeGroup)
- Check your "Advanced Sharing Settings" (in the Control Panel\Network and Sharing Center) in the Home and Work profile, make sure the "File and Printer sharing" is enabled.
- Make sure you're not using the Public profile (in Control Panel\Network and Sharing Center), this setting blocks all ports.
- Workgroup vs. Domain
- Are both machines (local and remote) in the same workgroup or domain?
- Network configuration
- Was the network configuration changed (see IPCONFIG /ALL)
- Adapter configuration
- Are all the appropriate protocols enabled?
- Where there any changes to the HOST file
- Service configuration
- Did someone change the default ports?
- Network considerations:
- Other thing that can effect communication are: IPSEC, VLANs, IPv6, NAP (Network Access Protection), etc. talk to your network engineer about these issues.
Sunday, February 10, 2013
Article: LibreOffice 4.0 arrives -- get it NOW!
LibraOffice is an offshoot of the OpenOffice open source project that split-off from the original project because of issues that they had with it (more information).
If you're looking for a free open source multi-platform office suite, this is one of the better ones. I never found it as powerful as Microsoft Office, but if you're looking for a free office suite of tools this is the one I like to use.
betanews reported: "The Document Foundation released LibreOffice 4.0 FINAL. The open-source, cross-platform productitivty suite, which is based on OpenOffice, has evolved to the point where the developers are happy to assign a major new version number.
Version 4.0 includes a number of relatively minor new features, but the big changes will come under the hood, marking the first radical development in the program’s API since the app it was built on -- OpenOffice -- was first released. Other changes include support for Firefox Personas, integration with CMS and online storage providers, plus support for importing both Microsoft Publisher and the latest VISIO documents." (read the rest of the article)
If you're looking for a free open source multi-platform office suite, this is one of the better ones. I never found it as powerful as Microsoft Office, but if you're looking for a free office suite of tools this is the one I like to use.
betanews reported: "The Document Foundation released LibreOffice 4.0 FINAL. The open-source, cross-platform productitivty suite, which is based on OpenOffice, has evolved to the point where the developers are happy to assign a major new version number.
Version 4.0 includes a number of relatively minor new features, but the big changes will come under the hood, marking the first radical development in the program’s API since the app it was built on -- OpenOffice -- was first released. Other changes include support for Firefox Personas, integration with CMS and online storage providers, plus support for importing both Microsoft Publisher and the latest VISIO documents." (read the rest of the article)
Thursday, February 07, 2013
Adobe issues emergency Flash update for attacks on Windows, Mac users |
Ars Technica reports: "Adobe Systems has released a patch for two Flash player vulnerabilities that are being actively exploited online to surreptitiously install malware, one in attacks that target users of Apple's Macintosh platform.
While Flash versions for OS X and Windows are the only ones reported to be under attack, Thursday's unscheduled release is available for Linux and Android devices as well. Users of all affected operating systems should install the update as soon as possible." (read the rest of the article)
While Flash versions for OS X and Windows are the only ones reported to be under attack, Thursday's unscheduled release is available for Linux and Android devices as well. Users of all affected operating systems should install the update as soon as possible." (read the rest of the article)
- Download the latest version of Adobe Flash
- Check the version of Adobe Flash installed
Saturday, February 02, 2013
Trick: Turning a browser into a notepad
I am not sure how often you can use this, but its still is a cool trick. By placing the following line (data:text/html, <html contenteditable>) of code into the address bar it will turn your browser window into a notepad.
I have tested this in the latest releases of Google Chrome and Mozilla Firefox and it worked fine. It does not work in Internet Explorer, I have tested both versions 9 and 10.
For more information about this trick.
I have tested this in the latest releases of Google Chrome and Mozilla Firefox and it worked fine. It does not work in Internet Explorer, I have tested both versions 9 and 10.
For more information about this trick.
Wednesday, January 30, 2013
Article: Firefox to block content based on Java, Reader, and Silverlight
Ars Technica reports: "Mozilla engineers plan to disable Java, Adobe Reader, and Microsoft Silverlight capabilities in their flagship Firefox browser in a move aimed at improving security and performance. By default, Firefox will load content based on all three plugins only after users click an icon that explicitly permits it. The feature, known as click to play, was introduced late last year. Until now, it disabled out-of-date plugins to prevent hack attacks and browser crashing. Sometime soon, it will begin blocking all plug-ins except for the most recent version of Adobe Flash." (read the rest of the article)
I have stopped running Java and Adobe Acrobat Reader a long time ago, but I still use Silverlight for Netflix. Personally I would like to see an end to all plug-ins, I think they can be useful, but offend create more problems (e.g. memory leaks, crashes, and performance issues). I am looking forward to the greater adoption of standards based technology like HTML 5.
I have stopped running Java and Adobe Acrobat Reader a long time ago, but I still use Silverlight for Netflix. Personally I would like to see an end to all plug-ins, I think they can be useful, but offend create more problems (e.g. memory leaks, crashes, and performance issues). I am looking forward to the greater adoption of standards based technology like HTML 5.
Wednesday, January 23, 2013
Sunday, January 20, 2013
Article: Windows 8 Pro upgrade pricing will jump from $40 to $200 on Feb. 1
VentureBeat reports: "Microsoft’s Windows 8 operating system is about to become a lot more expensive. An upgrade of Windows 8 Pro will go from costing $40 in a promotional offer to a much more expensive $200 at the beginning of February. Microsoft offered up an upgrade to Windows 8 Pro for $40 to try to get consumers more interested in the OS. It claims 60 million licenses of Windows 8 have been sold to date, but we don’t know how many of those copies have actually been activated." (read the rest of the article)
If you're wanting to upgrade to Windows 8 and haven't yet, don't miss out on this deal.
If you're wanting to upgrade to Windows 8 and haven't yet, don't miss out on this deal.
Wednesday, January 09, 2013
Article: Kingston's HyperX Predator Flash Drive Is the Easiest Way To Misplace a Terabyte Of Data
Gizmodo has an article about a one terabyte flash drive that is available from Kingston, here is excerpt from it: "Last year at CES Victorinox surprised everyone with a one terabyte flash drive that the company estimated would sell for almost $3,000. It sounded too good to be true, and given there's been no sign of it since last January, it apparently was. So can Kingston fill the void left in our hearts with its new HyperX Predator one terabyte USB 3 flash drive? Let's hope so." (read the rest of the article)
Monday, January 07, 2013
Video: Hands On With The Lenovo Helix - CES 2013
First product that I have seen from CES 2013 that looks interesting (so far). I have been a big fan of the Lenovo Yoga since CES 2012. Now it's going to be tough for me to decide which one I want more, its a toss up between the Microsoft Surface Pro or the Lenovo Helix.
Subscribe to:
Posts (Atom)