Virtual Desktop in Windows 10

EznvKoM

Here how to do that, it’s just 3 keys :-

Windows key + Control + D : – To Creates new virtual desktop.
10. Windows key + Control + F4 :- To  Closes current virtual desktop
11. Windows key + Control + Left or Right :- To Switch between virtual desktops.

Treat Virtual Desktop as Temporary Workspaces for the Best Experience.

Unfortunately, the built-in virtual desktop feature in Windows 10 is still pretty limited compared to that found in other operating systems. You can’t set different wallpapers for different desktops. You can’t set different color schemes, or apply any other types of personalization. Different desktops cannot have different taskbars, or even different icons on the desktop.

There’s also no way to quickly jump to a specific desktop, either—you have to cycle through them with the keyboard commands or use Task View to navigate.

Virtual desktops are maintained after restarting your PC, but that doesn’t really do you too much good. Even if you have apps and windows set to automatically load with Windows, they’ll just open on your main desktop: Desktop 1. You’ll then have to move them to their respective desktops again after each restart. And that’s the part that takes time. Creating the virtual desktops in the first place is quick and easy.

With that in mind, we’ve found that virtual desktops—at least, as they exist in Windows 10—are best treated as temporary workspaces to help you organize your activities while you’re working on them.

Enjoy & Keep Sharing.!

Advertisements
Posted in Tips & Trick, Windows 10 | Tagged , , , , , , | Leave a comment

Israel users are now connected to WhatsApp via Facebook servers

imagesAt a time when governments are striving for stringent data security and privacy, users in Israel are now reportedly connected to WhatsApp through the Facebook servers, said a report on Monday.

According to WABetaInfo, a popular fan website that tracks WhatsApp Beta, the switch has been made to ensure better connection quality. “All users from Israel are now connected to WhatsApp through the Facebook servers,” the website tweeted. WhatsApp, however, was yet to confirm the report.

According to WABetaInfo, WhatsApp (or Facebook too) can just read metadata of messages. “For example if the message you are sending is an image, a video, a sticker etc.. its date, the phone number of the recipient (otherwise the server wouldn’t know where the message should be forwarded),” WABetaInfo tweeted.

Replying to WABetaInfo, a Twitter user said: “Encryption is not a problem. Its just that metadata like last seen, online time, etc. which are dynamic and are not needed after a particular time, must be wiped from servers”.

The website, however, said that the fact that WhatsApp is starting to use the Facebook servers must not worry you. “This just ensures a better quality of the connection. All chats and calls are end-to-end encrypted, so WhatsApp/Facebook/anyone cannot read/listen them. Everything is encrypted, also Stickers,” WABetaInfo tweeted.

WABetaInfo has asked people to wait till May “to see which data are really stored in the WhatsApp server and if they might be a problem for us”. The European Union (EU) has asked businesses and service providers globally to comply with its new privacy law — the General Data Protection Regulation (GDPR) — that comes into force from May 25 this year.

The EU GDPR has been designed to harmonise data privacy laws across Europe — to protect and empower all EU citizens’ data privacy and to reshape the way organisations across the region approach data privacy.

WhatsApp last month signed a public commitment with Britain’s Information Commissioner’s Office (ICO) not to share users’ personal data with Facebook until data protection concerns are addressed.

“WhatsApp has assured us that no UK user data has ever been shared with Facebook (other than as a ‘data processor’),” Information Commissioner Elizabeth Denham said in a statement.

Posted in FaceBook, Facebook, WhatsApp | Tagged , , | Leave a comment

The next version of Windows 10 will install much quicker than before

Microsoft is making a concerted effort to reduce downtime when applying major Windows 10 updates.

Windows-10-Creators-Update-cumulative-update

Microsoft is aware that major upgrades to Windows 10 typically take a long time to install. For the Creators Update that was rolled out in April 2017, Microsoft says the average offline time for a user was around 82 minutes. That’s slightly longer than it takes to watch Army of Darkness. With the upcoming Spring Creators Update, however, Microsoft has managed to cut the install time to around 30 minutes, the length of a typical sitcom if you count the commercials.

Otherwise known as Redstone 4, this will be the first major update to Windows 10 in 2018. Before we go any further, we should point out that “Spring Creators Update” is not yet the official name, though it’s the nomenclature that’s been leaked out, so we’re running with it for the time being.

DVH4jcrX0AcJIhI

There have been three major updates to this point—Anniversary Update, Creators Update, and Fall Creators Update. Microsoft’s goal is to upgrade Windows 10 twice year with new features and enhancements, in between which it doles out monthly security patches.

Each major update consists of four phases that are broken up into online and offline modes. Online phases occur while the device is being used and the OS is up and running, while offline phases are, well, offline. These entail system reboots and other tasks that are performed outside of the OS being usable.

Microsoft aims to reduce the time it takes to install these bi-annual updates by moving more of the work performed in the offline phase to the online phase. For example, preparing user content for migration previously took place during the offline phase, but will be performed when the PC is up and running when installing the Spring Creators Update. Same goes for migrating drivers and other files that Windows requires.

“Because of these changes, the online phase for the feature update will take longer to complete. However, this should not be noticeable to most users, as the setup processes run at a low priority, so they won’t have a large impact on a device’s battery life or system performance,” Microsoft says.

Even by reducing the upgrade time to 30 minutes, updating Windows still requires some pre-planning. However, it’s nice to see that the install time has been cut nearly two-thirds compared to the original Creators Update, and is down from 51 minutes (on average) for the Fall Creators Update. This will vary by PC, of course, but the bottom line is that the Spring Creators Update will install much quicker.

Some of the more interesting changes that will arrive with the Spring Creator’s Update are related to Microsoft’s mixed reality push. It will include a new virtual environment for users to wander around, and the ability to take screenshots in mixed reality apps with the controllers. In addition, Microsoft is rolling out haptic feedback for motion controllers in SteamVR.

The Spring Creators Update is expected to release next month.

Enjoy!

Posted in Windows, Windows 10, Windows Updates | Tagged , , , , , , , , , | Leave a comment

Thinking Of Buying A New Laptop? Read These Tips First!

laptop-buying-guide

You want a new laptop and you want it now! The problem is that you have no idea where to look for it, what to look for and how to get a great deal. You don’t have all day, so check out this article to get a quick lesson on smarter laptop shopping.

Consider the weight of each computer while you are shopping. Most laptops are less than 2.7 Kg, which is important if you will be using your computer while on the go. Although some laptops focus on mobility issues, these computers are often more expensive. Consider buying a computer with a smaller screen.

Avoid using your laptop computer on a soft surface, such as a pillow or bed. Setting your laptop on a soft surface blocks air flow that is supposed to flow through the ventilation holes on the bottom. This can cause your laptop to overheat. When using your laptop in bed, rest it on a book or other hard surface to allow for ventilation.

If you don’t plan on carrying your new laptop around much, consider buying a full-sized 15 inch screen. It will offer you the best viewing options, as well as being the most cost-effective you can get. They are a little heavier than their smaller counterparts, but pound for pound, worth their viewing pleasure.

The size of your laptop depends on how much you need to travel with it. If you travel frequently, your best option is a small, lightweight computer. The screen and keyboard are small on these computers, but it makes traveling much easier. If you are mostly planning to use your laptop at home, you can go larger.

Always check battery life expectations for a laptop. If you are often on the go, having the longest battery life possible will be imperative. The specs that you see for battery usage can often refer to a laptop running at minimal settings. Look at the specs and judge this based on your expected needs.

The first step in buying a laptop is always to set up a budget. You need to know exactly how much money you can spend without causing yourself to be unable to pay bills next month. If you set an exact limit, you’ll be sure not to have financial issues down the road.

Now that you’re done this article, you have filled your mind with many helpful tips. Laptop shopping will be a snap now that you know what you’re doing. Get to the store or check out online retailers and find the perfect model, get the best price and then start enjoying portable computing!

Enjoy & Keep Sharing!

Posted in Buying Guide, DIY, Laptop | Tagged , , , , , , , , | Leave a comment

Send To Mail Recipient not working after Windows 10 Update

Few of my clients users complaint about After a Windows 10 Creator update , they cannot sent any attachments using the dropdown menu Send To Mail Recipient (right click on file to be emailed).

image

Few users also complaint that after clicking on Send To Mail Recipient, computer thinks a few seconds, then desktop becomes black and Explorer crashes and resets. All open windows on desktop disappear too, looks like Explorer resets.

The Easiest solution to reslove this issue is fixing the Msmapi32.dll

Here the steps.

Insure Outlook is set as the default Mail client.

Close Outlook

For 32 bit versions of Outlook
Delete Msmapi32.dll located C:\Program Files (x86)\Common Files\system\MSMAPI\1033\

For 64 bit versions of Outlook the path is same

Delete Msmapi32.dll located C:\Program Files\Common Files\system\MSMAPI\1033\

Then

Run fixmapi.exe

Open Outlook (Outlook will replace & register the Msmapi32.dll and then open). It will take few add on seconds.

Try the “Send To > Mail Recipient” again.

Enjoy & Keep Sharing!

Posted in MS Office, Outlook, Outlook | Tagged , , , , , , , , , | Leave a comment

Send To Mail Recipient not working after Windows 10 Update

Few of my clients users complaint about After a Windows 10 Creator update , they cannot sent any attachments using the dropdown menu Send To Mail Recipient (right click on file to be emailed).

image

Few users also complaint that after clicking on Send To Mail Recipient, computer thinks a few seconds, then desktop becomes black and Explorer crashes and resets. All open windows on desktop disappear too, looks like Explorer resets.

The Easiest solution to reslove this issue is fixing the Msmapi32.dll

Here the steps.

Insure Outlook is set as the default Mail client.

Close Outlook

For 32 bit versions of Outlook
Delete Msmapi32.dll located C:\Program Files (x86)\Common Files\system\MSMAPI\1033\

For 64 bit versions of Outlook the path is same

Delete Msmapi32.dll located C:\Program Files\Common Files\system\MSMAPI\1033\

Then

Run fixmapi.exe

Open Outlook (Outlook will replace & register the Msmapi32.dll and then open). It will take few add on seconds.

Try the “Send To > Mail Recipient” again.

Enjoy & Keep Sharing!

Posted in MS Office, Outlook, Outlook | Tagged , , , , , , , , , | Leave a comment

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

shutterstock_311192399-850x476

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

The DDoS attack on Dyn took many major web sites offline for most of a day, including Twitter, PayPal, Reddit, Amazon, and Netflix. Millions of compromised IoT devices, belonging to the Mirai botnet, flooded Dyn’s DNS service with up to 1.2 TBps of bogus traffic, making it impossible to respond to genuine DNS requests for their customers’ web sites.

The Dyn attack did not affect the PayPal or Twitter servers in any way, but these sites were unreachable for the vast majority of humans who prefer not to memorize IP addresses when sending money to scammers or shitposting on social media.

The attackers were not nation-state actors but rather garden-variety criminals with an axe to grind. “The perpetrators were most likely hackers mad at Dyn for helping Brian Krebs identify–and the FBI arrest–two Israeli hackers who were running a DDoS-for-hire ring,” Bruce Schneier wrote at the time.

The growing legion of insecure IoT devices–insecure out of the box, and often unpatchable–means that the next DDoS attack on the domain name system could be much more severe. The centralization of DNS providers is largely to blame.

When single points of failure fail

469850173DNS was designed to be distributed, but the growing centralization of DNS creates single points of failure, the authors note. “The attack’s devastating success highlights many of the ways in which a concentrated DNS space with relatively little provider diversification on the part of domain administrators can leave even large firms vulnerable to service disruptions.”

How did we get here, you may ask? Turns out our decade-long love affair with other people’s computers–I mean, the cloud–has resulted in a concentration of internet infrastructure that the designers of DNS never anticipated.

In ye olden days, companies managed their own DNS in house. That required humans managing computers in an office who could otherwise be building the next great thing. You know, like Uber.

While older, more established companies are still more likely to host their own DNS, the emergence of cloud as infrastructure means that newer companies are outsourcing everything to the cloud, including DNS.

“The concentration of DNS services into a small number of hands…exposes single points of failure that weren’t present under the more distributed DNS paradigm of yesteryear (one in which enterprises most often hosted their own DNS servers onsite),” John Bowers, one of the report’s co-authors, tells CSO. “The Dyn attack offers a perfect illustration of this concentration of risk–a single DDoS attack brought down a significant fraction of the internet by targeting a provider used by dozens of high profile websites and CDNs [content delivery networks].”

The shocking part of this report is that despite the clear danger this concentration poses, too few enterprises have bothered to implement any secondary DNS.

Those who fail to learn from history are doomed to repeat it

The Dyn attack got a lot of media coverage, including right here at CSO. Cassandras preached about the need to diversify DNS, but few in the audience bothered to listen, the numbers show. “It seems that the lessons of the Dyn attack were learned primarily by those who suffered from them directly,” the report notes.

Before the 2016 attack, more than 90 percent of the domains studied used name servers from just one provider. Following the attack, that percentage dropped from 92.2 percent to 87.3 percent six months later, in May 2017. Most of those were Dyn customers who experienced the outage.

Even Dyn themselves, now owned by Oracle, offers a secondary DNS service and encourages their customers to use it. In a brief prepared statement, Dyn’s director of architecture Andrew Sullivan told CSO that “website operators need diversity all through their stack, and to select components like DNS services, web firewalls, and DDoS protection that support diversity.”

One difficulty of diversifying external DNS providers, the report notes, is that external DNS is often bundled with other services, like a CDN and DDoS protection. CloudFlare has more than 15 percent market share as DNS provider for the domains studied, yet the company’s DDoS protection service, the report notes, “make it impossible for domains to register DNS name servers managed by other providers.”

The report notes a trend among new domains to use cloud-based platforms that include DNS as one of a suite of service offerings. Amazon AWS can withstand any DDoS attack, you might think, but remember that time a typo by an Amazon employee brought down S3? Both accidents and adversaries threaten single points of failure.

You wouldn’t build a bridge without redundancy, why would you build your DNS infrastructure without redundancy?

How to make your DNS redundant

DDoS-Mitigation-diagram

The first thing you should do is figure out what your current setup is, if you don’t already know. Check your name servers:

dig +ns ourdomain.com

“If the names that come back are in your own domain, that means you’re doing it yourself,” Andy Ellis, CSO of CDN provider Akamai, tells CSO. “You should consider whether that’s the right call, for most companies it isn’t. If you already have a CDN provider, there is a good chance DNS service is available either with your existing contract or as an add on; that’s a fast way to add, or switch, a provider.”

While low traffic sites typically list only two name servers, DNS permits up to eight. Use them all, Ellis advises, in a 6:2 configuration. Organizations wanting additional redundancy can self-host in a 5:2:1 configuration.

What’s striking about this problem is that it is hardly new. RFC 2182 laid down the law on secondary DNS best practices in 1997, the report notes. “A major reason for having multiple servers for each zone,” RFC 2182 tells us, “is to allow information from the zone to be available widely and reliably to clients throughout the internet, that is, throughout the world, even when one server is unavailable or unreachable.”

While some of the RFC suggestions are now out of date–swapping secondary zones with another organization now seems a bit antiquated–the fundamental principles of avoiding central points of failure and ensuring redundancy haven’t changed. “Provider redundancy both gives you scale, and ensures that issues with one provider don’t take your business offline,” Ellis says.

Diversify, diversify, diversify

Central points of failure on the internet are a big no-no, especially when any idiot renting a botnet can take major websites offline for the better part of a day. Mitigating that risk by diversifying your DNS smells a lot like due diligence these days.

“It is not that difficult to do, and it does not cost much, and it is good practice,” Shane Greenstein, professor at Harvard Business School, says. “To be sure, it is a hassle for a very big company, but that is no excuse. All cyber security is a hassle, and this one is pretty minor in comparison to other preventative actions.”

by J.M. Porup.

Posted in DOoS, Internet, Security | Tagged , , , , , , , , | Leave a comment