Tag : application

Google Makes Photo Scanning a Piece of Cake!

photoscan-1

The holidays seem to give people the little push they need to start digitizing their photos. I hear it every season – “This is the year we are finally going to get all the old photos on the big TV and go through them!” and then it comes time to decide how, and the idea falls flat.

The top notch way would be with a photo scanner, and if you have stacks and stacks of photos, this is the recommended option. Photo scanners aren’t always cheap, and spending a little more money and time researching will pay off in the long run. But, if you aren’t in the financial situation to spend a couple hundred bucks on a devoted photo scanner, Google has you covered.

Google announced their new app, PhotoScan, intended for ease and quality. If you have ever tried to take a photo of a photo with your smartphone camera application, you know the quality of the picture is less than great. It is pretty obvious by the glare that you took a photo of a photo, and the edges are almost never straight. Sending your photos off for a company to digitize is an option as well, but the cost associated and the time frame are not ideal. Not to mention most do not want to send their original photos and have to get copies made anyway! What a mess!

The Google PhotoScan app gives a better solution, designed purely for photo capturing. The difference is that loads of scanning applications exist, but these are designed for documents with small print, flat color, and no glare. PhotoScan is designed for photos. It works by first walking you through the steps to take four overlapping photos of the print photo. It superimposes four dots on your smartphone screen and has you move your phone around to draw a circle around each dot. After which the application detects edges and straightens each of the four photos together, removes the glare, and finalizes the result. You are left with a perfect photo of a photo!

The application is essentially taking each of the four photos and stacking them on top of one another. In the process it removes the bright white pixels caused by glare and even adds image correction to color and clarity. Photos can be saved to the photo storage on your phone, or Google Photos offers unlimited storage with easy search, organization, and share features.

Check it out this holiday season!!

PhotoScan

 


If you would like to educate yourself in more detail about the information presented in this blog post please visit : www.computerworld.com 

 

Windows 10 PC/Tablets get Instagram app..but with limits

instagram

A little late but none the less, Instagram is available for Windows 10 PCs and tablets! Almost all the features are there, the live feed, stories, notifications, and direct messaging. The biggest feature of all is the ability to view stories and post and edit photos and videos. Not even the web version allows for such features! Sadly, the editing feature is only available on touchscreen PCs and tablets with rear cameras…seriously?

In addition, the formatting of the application is made for such PC/tablets, so when utilized on widescreens the resolution is less than perfect and the wasted space is frustrating.

Odd that an application made for sharing photos and videos would be so limiting on different platforms.


If you would like to learn more about the information presented in this blog post please visit: www.mashable.com 

 

Keep Conversations Private with End-to-End Encryption Messaging

facebook-messenger-encryption1

Messaging is one technological advance that most cannot live without. But most of us would like to rest assured that what we type will be for the eyes of the receiver only, and not a mysterious third party. Regardless of paranoia or worry about hacking, encryption is a sure fire way to protect messages as they leave your finger tips. End-to-end encryption ensures that only the sender and the recipient can read the message. The message is first encrypted on your phone, then sent, and decrypted on the receiving side. Telecom providers, government agencies, and the company that hosts the service itself, cannot read your messages. The provider couldn’t even hand over messages if subpoenaed, because the provider would not have the ability. Hackers that infiltrate the service platform still would not be able to read your encrypted messages.

This sounds almost too good to be true, and not all encryption services are created equal. Encrypted, does not imply end-to-end encryption. Services that encrypt messages between endpoints of transmission, means that conversations are stored encrypted on the platform’s servers, which is not entirely bad. However, since the platform encrypted them they can also decrypt them.

The best end-to-end encryption services on the market today are as follows:

Telegram – Has been around for a while now, which might aid with the biggest hang up on the app, inviting all your friends to join. This over-the-top service does not have the ubiquity of SMS messaging. The app does allow for individual messaging, group messaging for an unlimited number of users, or even public group messaging for a social network feel.

Signal – This is one of the easier applications to set up, automatically authenticating your phone number. It can be used as your default SMS application as well, eliminating hurdles found with over-the-top services. The color custimization for conversations helps with communication clarity, aka not sending the wrong text to the wrong conversation. In addition to private conversations and group conversations with unlimited users, this application also makes calls.

Wire – Wire is a cool alternative for the user that wants message encryption and creative license. The application allows for doodling, location sharing, image sending, and video recording. Despite the feature initiatives, the application doesn’t support some of the escalated group messaging features, and is best used for private one-on-one conversations.

WhatsApp – By far the most popular, this application offers end-to-end encryption and the lure of over a billion users. Hopefully meaning less people you have to convince to install and use a different messaging service. The application is owned by Facebook, which just recently announced they would be using phone numbers and some other account information from  WhatsApp. Hmm. Despite worry, the application proves to be a user friendly messaging alternative.


If you would like to learn more about the information presented in this blog post please visit: www.networkworld.com

Apple Music is quietly deleteing songs form user drives

apple-fixes-users-folder-bug-with-itunes-update_1Alright, as a person that values her carefully selected music library, I was pretty surprised to hear that my biggest fear was coming to life. Some users are complaining that Apple Music has been quietly deleting songs from their hard drives. James Pinkstone, average user, noticed after implementing Apple Music, that many of his tracks were mysteriously missing. Anyone that has battled with the transition of CDs to the digital age, knows that burning tracks from CD to music library is a long and painful task. It takes time to manually import the tracks, and if you are like many that have already upgrade their machines to the latest edition, know that CD players alone are becoming obsolete. So come to find out that many if not all of the tracks that you have painstakingly imported are suddenly missing, without your permission, would be infuriating.

The official comment from Apple concerning this issue was that, “the software is working as intended”. As intended! Apparently it intends to “clean up” user song content no matter if it has permission to or not. Not comforting. Pinkstone thought perhaps his songs would be made available through the cloud, but that was quickly determinded to not be the case. Luckily for Pinkstone, he has everything backed up. Take that Apple!

10 year old finds Instagram bug and cashes in big

facebook-instagramJani, the 10 year old that found a bug in Instagram, probably didn’t know you technically have to be 13 years old in order to even have an Instagram account. You may have to be 13 to have an account but there are no rules against age in the bug and hacking community. Jani found the glitch when he was able to delete any users comments off of Instagram. Jani says he was able to delete any text content he wished to, and although he didn’t proceed to delete any user text, he said if he wanted to he could have. The 10 year old, in true 10 year old fashion, related the severity of the bug to that of Justin Bieber, saying he could delete comments from anyone’s page, even Justin Bieber’s. Don’t worry Bieber fanatics, he resisted, and decided to rather exploit the bug to Facebook, wiping one of their comments from their test accounts and cashing in on $10,000.

The bug was detected by Jani in February, patched that same month, with his check in hand a month later. He has decided to buy himself a new soccer ball and bike. He also purchased two new computers for his brothers. Jani wishes to work as a security researcher when he is older, and we think he’s well on his way.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit:10-year-old claims $10,000 bug bounty from Facebook

 

What to do if you suspect Malware? We have the answers

Most often one does not know that they are infected with Malware until it is indefinitely too late. A few signs can lead you too believe you might be infected, such as incredibly slow PC performance, browser pop-ups when no browser is open, and security warnings from security programs that have never been installed on your computer, can make you feel uneasy about your machine. Try these tools to kick Malware in the butt. malware-microsoft

Update Antivirus

The software IDs within antivirus software identify existing malware based on what has come before and the latest updates available. Make sure your antivirus software is current, with all of the latest installs. Having software that is even one day out of date leaves your machine at risk for encryption. Antivirus vendors offer updates based on viruses they encounter both in the lab and in the field.

Find Safe Mode

Most malware, when designed correctly, is ready to evade System Restore points set in Windows. Perhaps this might be enough to fix the problem, but say that its not, as it most likely won’t be, try running a program designed to kill any known malware process in progress, such as RKill. The other option in this case is to boot Windows in a way that will not allow malware to get started, aka Safe Mode. By first restarting your PC (Windows 8 or 10), hold down the shift key during the boot sequence, and choose Safe Mode within the troubleshooting options.

Delete Hiding Places

You should then delete all temp files that could hide malware. To delete temp files, open the Start menu, type Disk Cleanup into the search bar and it will check the C:drive for all temp files that can be safely deleted. The software IDs within antivirus software identify existing malware based on what has come before and the latest updates available. Make sure your antivirus software is current, with all of the latest installs. Having software that is even one day out of date leaves your machine at risk for encryption. Antivirus vendors offer updates based on viruses they encounter both in the lab and in the field. After this process it is advised that you run an antivirus on-demand scanner, such as Malwarebytes Anti-Malware. This program is a great line of second defense against malware because it often comes to the rescue if your initial antivirus fails.

No Connection

A RAT, means that someone is remotely accessing your PC. Your first step in this case is to get off the internet. Turn off the Wi-Fi, remove the Ethernet cable, turn off the router, whatever needs to be done in order to detach from the internet. Now, being disconnected from the internet ensures that you are no longer able to be controlled, but it makes it a great deal harder to receive the latest antivirus without access to the internet. The latest software will need to be retrieved from a third party PC, at a different location preferably, then transferred to the RAT PC via USB flash drive. Another option would be to reboot the computer with a CD. Running a full anti-malware utility, these CDs are sometimes called “rescue CD” and can be used without internet connection. Of course, in order to use this option, a CD player will be necessary.

Portable Help

If all other options have failed, it may be the Operating System that has already been infected, making it impossible to even download the newest antivirus software. In order avoid the OS and let the antivirus do its job, you will need to utilize portable apps through a USB flash drive. These portable apps do not require a direct installation. Apps like this consist of Microsoft Safety Scanner, CLamWin, McAfee Stinger, or Kaspersky Security Scan. You can also try a mix of many portable apps since they will not conflict as you have to run each scan individually. There are also other software options such as Spybot and Symantec’s Norton Power Eraser that specifically target a type of malware called crimeware, that run scams. Although this is measure is aggressive, and often times deletes files that might not be malware, all in the effort of safety of course.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: How to Remove Malware From Your PC

Microsoft – Thousands of Dollars in Free Support for Azure Users

Azure-logo

 

Microsoft is offering a new incentive for Azure users, up to $12,000 in free support for those who make a prepaid commitment to Microsoft Azure cloud for the year. This is Microsoft’s latest ploy to get more of it’s traditional users to use Azure. All offers are available May 1st, 2016 through June 30th, 2017.

For those who are already on an Azure Enterprise Agreement (EA), Microsoft plans to move you to a higher support tier for a year starting May 1st. No extra charge no matter if you are a new or existing customer. Customers within the Azure Enterprise Agreement without support, will get a year of free support, usually priced around $4,000. Those customers that have a prepaid commitment of $100,000 or that use $10,000 per month will get a even bigger present. Free ProDirect Support for the year, which is valued at about $12,000.

In addition to ProDirect Support, these customers will also receive six App Consulting sessions, in which a Azure technical professional is available for questions about cloud, app design and implementation, and workload deployment.

Microsoft is pushing hard for Azure in the enterprise, where many businesses prefer to use their own infrastructure rather than Azure. Allowing customers to try before they buy appears to be Microsoft’s focus when it comes to Azure.


If you would like to educate yourself in more detail about the information presented in this blog post please visit:Microsoft: Pay for Azure upfront and we’ll give you $12,000 in free support

 

Easy and Free- 5 security apps for Windows 10

These 5 free security apps allow for safe browsing while protecting your computer against viruses, and even remembers all your passwords for you. Sounds great to us. apps.31776.9007199266248614.e32fdc94-77ee-4dac-af90-52ca48b6eb41

Password Padlock –  Password Padlock manages all your passwords securely by first having you select a single master password. This master password is used to encrypt all the other passwords in your collection using AES-256 encryption. You can rest well knowing that your master password is never stored. Encrypted passwords are easily backed up to OneDrive, and you can backup on one device and restore to another with ease.

LastPass- LastPass remembers all your passwords for you so you can spend time working on more important things. Creating strong passwords for every account you have, LastPass keeps such passwords locked up in the easy to navigate LastPass password manager. Automatic sync across every browser and device ensures you are never left scratching your head for your password. LastPass will sign into all your online accounts for you. Similar to Password Padlock, Last Pass also gives the option to create one secure password for ultimate protection. 

Super Password Generator – The Super Password Generator uses Cryptographic Random Number Generator to make sure the password generated with the given characters are unique and never gets duplicated. This generator can also generate QR code so you can scan it with any device that supports QR Code decoding such as a Windows Phone.

Avast Antivirus Download Center- The Avast Antivirus Download Center App allows for easy access to downloads of PC security products from Avast product portfolio. It also streams the latest security news from Avast Blog directly into your windows 10 PC.

Touch VPN- Unable to access some websites or apps? Worried about unprotected Wi-Fi hotspots? Want to be anonymous and protected from surveillance and hackers? Touch VPN – the Secure VPN Proxy– is the best solution for you!


If you would like to educate yourself in more detail about the information presented in this blog post please visit: 5 top-rated free security apps

5 New Tech Tested Products for Your Business

Ever wondered what the best in tech products are at this very moment? The experts at Network World weigh in and give us a little glimpse of the newest innovations on the market.

Vidder PrecisionAccess – By rendering applications invisible to unauthorized users PrecisionAccess does a fantastic job at preventing application hacking. Even with stolen credentials hackers can’t access protected applications with unauthorized devices.precision-vpn_clip_image002

VeloCloud SD-WAN – VeloCloud provides a hybrid WAN solution that works with MPLS private links as well as ATT-U-Verse with cable or any broadband DSL links. One tech pro reported an increase from almost zero network visibility to nearly 100% network visibility. A great tool for IT management across multiple locations without staff needing to be onsite at all times. Facilitates communication and network visibility.  velocloudlogo

Cisco Identity Services Engine (ISE) – With so many features that help with managing user-facing ports and devices, whats not to love about Cisco ISE. One huge factor reported by tech pros is the integration of TACACS within Cisco ISE, making it easy to run Cisco ISE as a Radius server or TACACS server for network devices. In addition to this, Cisco ISE significantly improves management of devices especially restricting machines from devices and sites they are not permitted to visit.Cisco_ISE

 

 

 

 

 

 

 

 

Intermedia SecuriSync – For backup and file sharing SecuriSync is the way to go. As a two-in-one tool for consolidated file backup and management of continuous file backups, Intermedia SecuriSync makes relevant files easier to access as they are all stored in a secured shared folder. If you have team members spread across different locations, this tool is very helpful in making sure the data is always backed up and kept secure. One platform with a master source keeps project collaboration as safe as it can be.securisync-logo-247x300

OpenSpan Transformation Platform – OpenSpan collects all employee desktop activities both productive and nonproductive, including time away from the computer. This platform allows businesses to evaluate from employee activities how employees work best and what can be improved upon in order to drive down operational costs and maximize revenue. Providing data about employee activities takes away the need for manual employee logs. Lack of employee logs that need to be analyzed by supervisors for key performance indicators (KPIs), such as call volumes, proves to be a huge time saver. OpenSpan Transformation Platform takes working smarter to a higher level.

yKVWo9CQ_400x400


If you would like to educate yourself in more detail about the information presented in this blog post please visit: Fave Raves: 29 tech pros share their favorite IT products 

VMware takes on the big boys with Boxer app for AirWatch

VMware launched a new version of the Boxer iOS app earlier this month and its pretty awesome. The app is for companies using VMware to manage their employee’s mobile devices VMware Boxer is available for both AirWatch and Workspace One customers. The app includes some attractive features, not surprising as Boxer is intended to replace the preloaded Mail feature on the Apple iPhone and iPad.

screen-shot-2015-10-15-at-9-03-16-amThe new app allows for preference customization such as change of sound when new emails arrives. You can also take different actions by swiping email messages, and easily bulk edit messages. The app combines email and calendar taking away the need to navigate away from Boxer in order to see your calendar events. Similar to other applications put forth by Microsoft and Google in terms of functionality.

Boxer VMware will be made free for AirWatch users on the orange, blue and yellow plans. For those who have already committed their email needs to VMware, no need to worry. If you are one of the many that still want VMware purely for email management, VMware will release a special build on the app that will let consumers more more slowly and provide more time between updates. Most consumer and commercial users will be presented with rapid release updates as they are made available, but the extra feature for businesses that wish to update at a slower pace is an attractive option.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: VMware goes after Outlook with Boxer email app for Airwatch