Online PC Support

OPS Technical Solutions : +1 315-226-4249


Google™ adds research tool to Google™ Docs

Google has introduced a ‘research pane’ feature in its online word processing program Google Docs. This sidebar tool can help users in searching any specific information on the search engine without leaving the Google Docs.

Accessing the research tool

Users can access the research pane from the ‘Tools’ menu by right clicking on a selected word that users want to learn more about or use ‘Ctrl’ + ‘Alt’ + ‘R’ shortcut on a Windows-based PC.

Sarveshwar Duddu, Google software engineer, explains in a blog post how this new feature can be used by the users of Windows and Mac systems.

Google has recently added 450 new fonts and 60 new templates to let its users save their Gmail messages as Google Docs, and has raised the program’s storage to 5 GB.

How to Find System Up-time for Windows

It is known fact that leaving computer turned on for a long period of time it can be harmful for your computer and thus it is important to know how long your computer has been on so you can turn it off. Especially when you are managing more than one computer it is important to know how you can check if the computer has been shut down or not. Here we will share some tips and trick to check the startup time of your computer. Depending up on different Operating system we have mentioned different steps to check when was your computer shutdown last time. But is necessary to be the administrator of the computer or at least you should have the admin rights. Here we will discuss about Windows XP, Vista and Windows 7. If you are not sure which operating system you are using please restart the computer and check what is the Operating system you are using or just follow the following steps

Step 1: Please click on the start menu and then look on the right hand side of the start menu and look for either My Computer or Computer. Once you locate it please right click on it.

Step 2: Once you right click on My Computer or Computer you should see properties at the bottom of the list. When you click on it (left click) it should bring up System Properties and you should be on General Tab if not please click on General so that we can check the properties of the computer.

Step 3: Once you are on General Tab of System Properties you should be able to see the description of the System you are using. It would either says Windows XP or Vista or Windows 7. Once you know what is operating System Please Follow the steps accordingly

For Windows XP.

Step 4: In order to know the System Up time in Windows XP we will have to either open the task manager or go to the command screen. We will discuss the step for Task manager as it is easy and fast. So please press Ctrl, Shift and Esc together you can find them on the left of the key board.

Step 5: Once you get Task manager please look for the tab called Performance. Here you have different section that tells you about the performance of your computer so please look at the bottom of the box you should see something that says System. Below System do you see Up Time, up time means how long you computer has been on since the last shutdown.

For Vista and Windows 7.

Step 4: Please try to go to the command prompt. We can open the command prompt by clicking the start menu and then in the search box please click and type CMD one you do that you will find CMD.exe.

Step 5: Once you find CMD.exe please right click on it and then choose run as administrator this will bring up the black box and you can write the command to get the System Up time. In the black windows please type systeminfo|find “Time:”

Step 6: Please note “|” is called more and is obtained by combination of shift and the key above enter. Once you have successfully Enter the command please hit enter key. This will give you the correct time when your computer was turned on.

Microsoft® Windows® security patches

In January 2011, Microsoft released two bulletins for patching up three shortcomings related to security measures which can affect the Windows operating system. The major vulnerabilities of serious nature can be exploited through drive-by downloading websites as warned by the software company. Flaws for the drive-by download which were covered through MS11-002 were briefed to Microsoft through the program ‘TippingPoint Zero Day Initiative’ which buys data of vulnerability from private researchers.

The bulletin contains a minimum of two separate types of vulnerabilities in Microsoft Data Access Components and cautioned that security problems are there in the path of Microsoft Data Access Components which permitted third party usage of API and allocation of memory. Microsoft treats this as an important issue various editions of Windows Vista, Windows 7 and Windows XP. On Window Server 2008, Windows Server R2 and Windows Server 2003 the harshness is downgraded to vital. The second bulletin projects vulnerability regarding publicly disclosed matter in Backup Manager for Windows.

MS11-001 extends a patch with respect to DLL preloading matter in the backup tool of Windows. It is rated as important and applies only for Windows Vista. Preloading of DLL is an issue in other operating systems. It attracted attention in August 2010 when many vulnerable applications were found. Given the opportunity of preloading vulnerabilities of the DLLs, it is recommended for implementing the updates, KB2264107 and Security Advisory 2269637 that neutralizes the malicious attacks.

Although, some shortcomings will not be rectified such as Graphics Rendering Engine of Windows and vulnerability patches related to zero-day threats. These vulnerabilities may still be exploited as opined by Dave Marcus, director of communications and security research at McAfee Labs. The recommendation of McAfee is that one should install patches of Microsoft as early as possible. Users of Home editions of Windows should utilize Windows Automatic Updates. Users of Business editions require implementing a strategy for risk management and prioritizing the patches.

Google™ Chrome Update Enhances Speed

An Internet browser plays a very important role in performing daily computing tasks. Google Chrome is one of the most popular web browsers. Google Chrome is fast, reliable and very easy to use. It was launched as a beta version for the Microsoft Windows operating system on 2nd September 2008, and the browser was made available to the users on 11th December 2008. Now, the latest version of Google Chrome is version 10, which is now easily available to the users through the Internet.

The previous versions of Chrome were not capable of providing good speed. But now, this new version of Google Chrome enhances the speed with a 66 percent enhancement in JavaScript performance via its V8 benchmark. This will help in running web applications faster in the browser. It will also help you to do better search as now it is the fastest web browser than any other browser.

It has also extended its sandboxing technology to the inbuilt Flash Player. The sandbox isolates the running code from the rest of the operating system so that it has no right to use the critical processes or data, and prevents it from either deliberately or non deliberately doing any harm to the programs or the system. Google Chrome already uses sandboxing for HTML rendering and JavaScript execution. Adobe and Google has the integrated Flash Player plug-in, so now you do not need to download any other Flash Player plug-in. The first step after opening the browser is the update which adds a new interface to the Google Chrome and creates a tab rather than a pop-up menu. There would be a search box on the interface that will provide results as you type and provide direct links for future reference, which a user can use with ease.

These new features that have been included in this new version of Google Chrome are very useful and would definitely make a user feel more comfortable while browsing and don’t have to search continuously to find a way to import the settings, bookmarks or to change or remove the browser’s home page

Now a user also has the option of syncing their passwords from one computer to another. Users often want a better security feature, so for a better security reason, there is an option to encrypt the passwords with your own secret pass phrase. To enable this feature, navigate to the “Personal Stuff” section in Google Chrome’s settings options (or just type ‘sync’ in the settings search box). Syncing also applies to bookmarks, extensions, preferences, themes, and more. Hence it is one of the most trustworthy browsers which a user can use for surfing the Internet.

Apple® patches 62 bugs in Safari® update

Safari from Apple, is a graphical web browser, which is an inherent part of the Mac OS X operating system. Safari is principally the native browser in the iOS also. Safari was originally introduced in 2003 as a public beta version, slowly becoming the default browser in all Macs. The Microsoft Windows version of Safari was released in the year 2007. In the rankings of most widely used browsers in the US, Safari stands 4th in the line of following including Internet Explorer, Mozilla Firefox and Google Chrome.

After Safari 1.0 in 2003, Safari 2.0 in 2005, Safari 3.0 in 2007, Safari 4.0 in 2008, Safari 5 was released in mid 2010. Apple has brought about a very interesting change in browsing in Safari. Some of the interesting features include Bookmark Integration with the address book, Web Page Clips Saving to the Apple Dashboard, flexible search box in the tool bar for Google, Yahoo! or Bing, private browsing, support for HTML 5, support for Transport Layer Security, Document Object Model Inspector of Web Pages and many others.

Security vise the PWN2OWN contest of 2008, CanSecWest Security conference, in Vancouver, brought about the weaknesses in Safari. The Safari was the first to fall in the hacking competition with the successful exploit of the same, bringing the Mac OS as the first OS to fail. This flaw exposed by the contest was duly patched, taking care of other vulnerabilities also in the Safari 3.1.1 update.

PWN2OWN 2009 also brought about the fall of the Safari and Apple introduced the 3.2.3 patch to take care of the exploits. In the PWN2OWN 2010 contest, again the Safari fell first before the Internet Explorer, the iPhone, the Nokia and then the Mozilla Firefox. The 2011 PWN2OWN again, the Safari was the first to fall in the contest.

In fact, after the November 2010 patch of Safari, by Apple fixing 27 flaws, to the new version of the Safari was introduced only in June 2010, the Safari 5 saw its biggest update and patch recently. Apple introduced a new patch covering 62 bugs, just before the PWN2OWN contest vide Safari 5.0.4. This patch covered mainly vulnerabilities in the Webkit engine of the browser. For information the Webkit engine powers the Google Chrome also. Besides the Webkit vulnerabilities several non-security issues were also addressed.

Even if the Safari proved itself to be, about the fastest of browsers, and the prime choice of many a user, a French hacker managed to break the brand new Safari 5.0.4 in barely five seconds. The 5.0.4 update was released only a few minutes before the competition. The next to fall was the Internet Explorer 8. Although the contest predefined which versions of browsers were eligible to be tested at the contest, hackers have managed to break through even later versions of browser releases.

Citrix® XenDesktop Agent for Windows® 7

XenDesktop is a server virtualization application which brings a great amount of efficiency to IT infrastructure. XenDesktop is useful for security measures since it has the advantage of using thin clients as terminals. Migrating one conventional environment with the XenDesktop, you may require repositioning existing firewall or adding new perimeter firewalls. Suppose you have a perimeter firewall amidst a client and database server within a data center. When XenDesktop is used, that firewall has to be placed such that virtual desktop as well as the user device come to one side, and database servers and the controllers of data center come on the  other side. You need to, therefore, think about creating a partition within data center to hold servers and controllers that are used by XenDesktop. Also think of having a protection for the user device and virtual desktop.

All computers in the environment need to be protected with a personal firewall on each computer. When you install the virtual desktop agent, it will prompt for the consent to change the configuration of Microsoft Windows firewall that you add important program exceptions or any port exceptions such that the virtual desktop agent operates correctly.

All network statements need to be adequately secured using encrypted as ideal to match a security policy. You will be able to secure total communication between Microsoft Windows 7 computers with the use of IPSec. In addition, the contact between the user devices as well as desktops can be secured through SecureICA, which by default is configured to 128 bit encrypting. You may configure SecureICA when creating / updating assignments.

You may give users only the permissions they need. Microsoft Windows 7 privileges are always applied to desktops as is usual – so configure the privileges with user rights assignment and through group membership with a group policy. So this is one advantage of XenDesktop which is that you can give rights of user administration to a desktop and not giving physical control over the system in which the desktop is stored. When planning for rights please keep in mind that when the non-privileged user connects to any desktop, they can see what time zone of the system is, instead of a time zone on their user device.

A user also an administrator over a desktop keeps full control to that desktop. If it is a pooled desktop, a user should be trusted like all others, including any future users. All users need to know the probable risk to the data security which is posed by such situations. Using XenDesktop over Windows 7 as an agent, has the above privileges. It is therefore necessary when using a server based system on Windows 7 to assign the user rights appropriately. Moreover, it is necessary to do so such that the data center is secure from malicious attacks.

Call Now: +1 315-226-4249
Call Now: +1 315-226-4249
Call Now: +1 315-226-4249