Blog

Information on the Heartbleed Bug

Security_Apr11_CThe security of your systems and communication, especially those that utilize the Internet should be paramount for any business. Over the past few weeks a massive new security flaw has been uncovered. This flaw, codenamed Heartbleed, could potentially expose all your vital data and communications that flows between your computer and websites online. All businesses and Internet users should be aware of this Heartbleed so that they can take steps to stay safe.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.

You can tell sites are using SSL/TLS by looking at the URL bar of your browser. If there is a padlock or HTTPS:// before the Web address, the site is likely using SSL or TLS verifications to help ensure that the site is legitimate and communication will be secure. These technologies work well and are an essential part of the modern Internet. The problem is not actually with this technology but with a software library called OpenSSL. This breach is called Heartbleed, and has apparently been open for a number of years now.

About Heartbleed

OpenSSL is an open-source version of SSL and TSL. This means that anyone can use it to gain SSL/TSL encryption for their site, and indeed a rather large percentage of sites on the Internet use this software library. The problem is, there was a small software glitch that can be exploited. This glitch is heartbleed.

Heartbleed is a bug/glitch that allows anyone on the Internet to access and read the memory of systems that are using certain versions of OpenSSL software. People who choose to exploit the bugs in the specific versions of OpenSSL can actually access or ‘grab’ bits of data that should be secured. This data is often related to the ‘handshake’ or key that is used to encrypt data which can then be observed and copied, allowing others to see what should be secure information.

The problem with Heartbleed

There are two major problems with this bug. The first being that if an attacker can uncover the SSL handshake used by your computer and the server that hosts the site when you login or transmit data they will be able to see this information. This information usually is made up of your login name, password, text messages, content and even your credit card numbers. In other words, anything that gets transmitted to the site using that version of SSL can be viewed.

Scary right? Well, the second problem is much, much bigger. The hacker won’t only be able to see the data you transmit, but how the site receiving it employs the SSL code. If a hacker sees this, they can copy it and use it to create spoof sites that use the same handshake code, tricking your browser into thinking the site is legitimate. These sites could be made to look exactly same as the legitimate site, but may contain malware or even data capture software. It’s kind of like a criminal getting the key to your house instead of breaking the window.

But wait, it gets worse. This bug has been present in certain versions of OpenSSL for almost two years which means the sites that have been using the version of OpenSSL may have led to exposure of your data and communication. And any attacks that were carried out can’t usually be traced.

So what do you need to do?

  • Right now, the best thing you can do is wait to be notified about affected services and patches or you can investigate this list provided by Mashable that has some well known brands listed.
  • If you’d like to investigate whether or not a website you frequent has been affected, you can use this tool.
  • Reset your password for every online service affected by Heartbleed. But beware: you should only change your password after the afflicted business has fixed its servers to remove the Heartbleed vulnerability. Changing your passwords before a company’s servers are updated will not protect your credentials from being leaked.

Please contact us if we have any questions.  Thank you for your time, and safe surfing.

Sincerely,

The Key Methods Support Team

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

Outlook’s New Search Folder

Office_Mar24_CMicrosoft Outlook is an application used for managing personal information including email, tasks, contacts, and calendars. It is one of the programs that is included when you install Microsoft Office on your computer. While Outlook has many useful features, one of the most useful is the ability to create new search folders which let you conveniently access priority emails.

Outlook is one of the most popular email platforms allowing you to read emails from almost any account. The inbox is where the majority of your interaction with Outlook is, but the problem is that many users receive so many emails that it can be overwhelmed quickly. This makes it more difficult to find important emails, or separate the spam/less important emails.

One way to deal with this is by creating a customized search folder for important emails. This makes searching for vital messages easier as they are saved in a separate folder.

Default and predefined search folders in Outlook

There are three default search folders in Outlook and you can see them under “search folders” in the mail navigation pane on the left side of the window. These default search folders are categorized mail, large mail and unread mail. Categorized mail contains messages that are categorized by color.

The large mail folder is a search folder that includes messages that are over 100 KB in size. Unread mail, as the term suggests, contains emails that have not yet been read.

Predefined search folders are also available. These are existing search folders that you can add to the search menu, below the other folders. Some of these require that you enter specific criteria, while others do not. For instance, “mail flagged for follow up” does not require any criteria, while “mail with specific words” asks you to enter certain words that the message must contain to be included in the folder.

Adding predefined search folders can be done by following the steps below:

  1. Click File.
  2. Select New and choose Search Folder. The New Search Folder window will appear.
  3. Click on any of the predefined search folders.
  4. Select the option you want if asked for a specific criterion.
  5. Click OK.

Create a new search folder in Outlook

It’s also possible to create your very own search folder. You get to set not only the criteria, but its name as well. This makes it convenient to easily access important messages as you don’t have to browse through the inbox or various folders in your mailbox.

Here’s how to create a new search folder in Outlook:

  1. Right click on Search Folders in the mail navigation pane and click New Search Folder. You may also press ctrl+shift+p on your keyboard to make the window appear.
  2. Click Create a Custom Search Field followed by Choose.
  3. Enter the name of the new folder in the name field.
  4. Click Criteria and set your preferences to further personalize the folder and click OK.
  5. Click Browse and select folders to add in your customized search folder, then click OK.
  6. Select OK on the new search folder window and the new folder you created will be added under your search folders.

Messages in search folders will still remain in the original folders where they are saved. Even if you view the messages and delete the search folder, the messages will still be accessible in their default folder. However, if you select and delete a message in a search folder, it will be completely removed, even from its original folder.

If you have any concerns or feedback with regards Outlook search folders, feel free to get in touch and we’ll help you in every way that we can.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

What Does Windows 8.1 Update Offer?

Windows_Apr07_CWindows is the most popular operating system used on desktop computers. It is now also used on mobile devices; the latest operating system, Windows 8.1 supports PCs and tablets. This OS was made available last year, following on from the introduction of Windows 8 in 2012 which introduced a whole new look, feel and usability to Windows. In early April Microsoft released Windows 8.1.1, or Windows 8.1 Update 1, the first update to Windows 8.1.

Go directly to the desktop instead of the Start screen

The Start screen was introduced with the release of Windows 8 to make it more convenient for tablet users to navigate apps. However, this is something that many mouse users and those who are used to older versions of Windows have found difficult to use. With the first version of Windows 8, there was no way to change this setting before.

With the 8.1 update released last year, you were able to change your settings so that your computer booted directly to your desktop, instead of the Start screen. Now, with Windows 8.1.1 new computers that don’t have a touch screen should automatically boot into the familiar desktop screen. Users who have the OS installed already can still set Windows to boot directly to the desktop.

Here’s how:

  1. Go to the Control Panel.
  2. Select Appearance and Personalization.
  3. Choose Taskbar and Navigation.
  4. Select the Navigation tab.
  5. Enable the option that says “When I sign in or close all apps on a screen, go to the desktop instead of Start” by clicking the checkbox next to it.
  6. Click the OK button to save the change you’ve made.

You should now go directly to the desktop screen once Windows is started or when you close an application, instead of being taken to the Start screen.

Updated Start screen interface

Aside from the applications that you see on the Start screen, you can easily view all available apps by clicking on the down arrow on the lower left of the screen. You will also see a search button on the upper right side, as well as a power button next to it that you can click to shutdown, restart or put the computer into sleep mode. Moving your mouse to the bottom part of the screen will also show you the taskbar with the Start button and other apps appearing on it.

When you right click an app on the Start screen it will no longer launch the application bar. Instead, you will be given various options, which is what would usually be the case when you right click. These options include turn live tile off, resize, uninstall, pin to taskbar, and unpin from start.

Photos and other media no longer open with apps on the Start screen

With the first version of Windows 8, photos and other media were opened by default using the Metro apps on the Start screen. With Windows 8.1.1, images are now automatically opened using Photo Viewer, while other media is opened using Windows Media. This is the same experience that the older Windows operating systems provided, which most users are familiar with.

Pin Metro apps to the taskbar

The taskbar is a popular Windows desktop feature, allowing you to pin your most used or open desktop apps to. However, with Windows 8 and 8.1 you couldn’t pin Metro apps to the desktop taskbar. With the new update you can post Metro apps to the taskbar and even interact or launch them from the desktop.

A dedicated Settings tile

For those that prefer to use the Start screen there is a new Settings tile that has been added. This can really help customizing your computer far easier.

If you have any queries about the latest Windows update which is free to download, get in touch. We have the answers!

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

How to Create Keyboard Shortcuts

Windows_Mar10_CNo one can refute the benefits to be had in using keyboard shortcuts, especially those for Windows. Not only do they help you save time, but they make it easier to navigate your system. Did you know that Windows allows you to create shortcuts to open apps that are on your desktop? This quick tip could save you time, especially if you have a high number of shortcuts and apps on your desktop.

These steps will help you create keyboard shortcuts which allow you to open apps on your Windows 7 or 8 desktop.

Windows 7

  • Right click on the desktop shortcut of the application.
  • Click Properties and a popup will appear.
  • Click the Shortcut tab.
  • Scroll to the section where it says Shortcut key. Enter a Shortcut key followed by a combination. They key combination should either be ctrl + alt + a number or a letter OR ctrl + shift + a number or a letter.
  • Click the Apply button on the lower right part of the popup box.

Once you have established the shortcut, go to your desktop and give it a try. Be sure that when you establish the shortcut you take note of the key strokes in the section. If you want to use another key aside from Ctrl, press it instead. We recommend Shift or Alt.

Windows 8

  • Go to the start menu
  • Right click and a menu at the bottom will appear. Click the Start Apps button on the lower right part of the page.
  • Right click on the app that you want to assign a keyboard shortcut to and click Open File Location from the menu at the bottom.
  • Right click the shortcut and select Properties.
  • Enter a combo key in the Shortcut Key box. They key combination should either be ctrl + alt + a number or a letter OR ctrl + shift + a number or a letter.
  • Click the Ok button to assign the shortcut.

Keyboard shortcuts used to open programs may not seem to be a big deal to some, but for business owners, knowing these simple tricks can help us focus on the more important things like growing our business.

If you have keyboard shortcuts or tricks for Windows 7 and 8 that you find very useful, please share them in the comments section below.

You can also call or email us for any inquiries, we’d be more than happy to help.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

Do You Audit Your Security?

Security_Mar17_CAny business that employs technology in any aspect will eventually begin to worry about how secure their systems are. In order to ensure security, many companies implement a security strategy. While these strategies are a great way to ensure the security of your business systems and data, there is one element that many business owners forget: The audit.

Auditing and the security security strategy

Auditing your company’s security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.

These elements are: assess, assign, audit. When you develop a plan, or work with an IT partner to develop one, you follow the three steps above, and it may be obvious at the end. In truth however, you should be auditing at each stage of the plan. That means you first need to know what goes on in each stage.

During the assessment phase you or your IT partner will need to look at the existing security you have in place. This includes on every computer and server and also focuses on who has access to what, and what programs are being used. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.

The assignment phase looks at actually carrying out the changes you identified in the assessment phase. This could include adding improved security measures, deleting unused programs or even updating systems for improved security. The main goal in this phase is to ensure that your systems and networks are secure.

Auditing happens after the changes have been made and aims to ensure that your systems are actually secure and have been implemented properly. Throughout the process you will actually need to continually audit and adjust your strategy.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:

  1. The state of your security - Changing or introducing a security plan usually begins with an audit of sorts. In order to do this however, you need to know about how your security has changed in between audits. Tracking this state and how it changed in between audits allows you to more efficiently audit how your system is working now and to also implement changes easier. If you don’t know how the state of your security has changed in between audits, you could risk implementing ineffective security measures or leaving older solutions open to risk.
  2. The changes made - Auditing the state of your security is important, but you should also be auditing the changes made to your systems. For example, if a new program is installed, or a new firewall is implemented, you will need to audit how well it is working before you can deem your security plan to be fully implemented. Basically, you are looking for any changes made to your system that could influence security while you are implementing a new system. If by auditing at this point, you find that security has been compromised, you will need to go back to the first step and assess why before moving forward.
  3. Who has access to what - There is a good chance that every system you have will not need to be accessed by every employee. It would be a good idea that once a security solution is in place, that you audit who has access to what systems and how often they use them. This stage of the process needs to be proactive and constantly carried out. if you find that access changes or system access needs change, it would be a good idea to adapt your the security strategy; starting with the first stage.

If you are looking for help developing a security strategy for your business, contact us today to see how our managed solutions can help.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

Create an Effective DRP with These Tips

BCP_Marc17_CIsn’t it disturbing how a disaster (whether man made or natural) can devastate your business? While disasters are inevitable, you can mitigate risks and lessen the damage to your business in the event of one through a DRP (Disaster Recovery Plan). While it may not seem important to some businesses, especially if yours has never been faced with a disaster, a DRP would be a good idea.

While there are several facets to a DRP that are going to determine whether it will be effective or not, making sure that you’ve considered these 5 tips is definitely a good start.

1.) Commitment from management

Because the managers are the ones who will coordinate the development of the plan and be the central figures who implement the recovery plan, it’s crucial that they are committed to it and are willing to back it up.

They will also be responsible for setting an allocated budget and manpower to creating the actual plan. That said, it’s very important that they know the concept behind it and how huge of an impact a DRP can have on a business.

2.) A representative on each department should be available when creating a DRP

It’s unthinkable to believe that your DRP is well optimized when you haven’t had a representative from each department coordinate with you while creating the recovery program.

Considering how they themselves are the front line of your organization with the best knowledge about how their department works, it’s a huge plus that you should take advantage of when creating a DRP.

With the representatives on your team, you’ll be able to see things from their perspective and gain first-hand knowledge from those who do the actual work.

3.) Remember to prioritize

In an ideal world, you should be able to restore everything at the same time after a disaster strikes. But since most businesses usually have a limited amount of resources, you will usually have to recover systems one at a time.

Because of this, you need to have a hierarchy or a sense of priority when determining which systems should be recovered first. That way, the most important systems are immediately brought back up while the less important ones are then queued in order of their importance.

4.) Determining your recovery strategies

This is one of the main focal points of a DRP since this phase tackles the actual strategies or steps that you’ll implement to recover your systems.

When determining your actual strategies, it’s important that you brainstorm and think about all the options that you have to recovering your systems. Don’t simply stick with the cheapest possible strategy or even the most expensive ones.

You have to remember though that the simplest strategy to implement is probably the best one. That is, as long as the simplest strategy covers the critical aspects of your system recovery.

That said, avoid over complicating your strategies as you might face unnecessary challenges when it comes to the implementation of the recovery strategy.

5.) Do a dry run at least once a year

Your DRP shouldn’t end with the concept alone. No matter how foolproof you think your strategy is, if you haven’t tested it you most likely have missed something important.

It’s during the dry run phase that the need for extra steps (or the removal of one) are made even more evident. You can then start polishing your strategies according to how your dry run plays out. It would also be a good year to practice your plan each year and update it accordingly.

These tips will help you ensure that your DRP will remain effective should a disaster occur. If you’re having a hard time figuring out how to go about the process of creating a DRP, then give us a call now and we’ll help you with the process.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

What is Managed Antivirus?

Security_Jan20_CLet’s face it, technology, while essential, is getting increasingly challenging to manage. Many business owners are struggling to ensure that all of their systems are not only working properly but are also secure. One solution many turn to is the skills and support of an IT partner. These tech partners offer a wide variety of managed services, including managed antivirus solutions that help ensure systems are more secure. However, many business managers are not totally sure what managed antivirus solutions actually are.

What exactly is managed antivirus?

By now, most people are familiar with the term ‘antivirus’. They know that the majority of solutions are a monthly or yearly subscription that they pay for. By subscribing, the company that created the program will update virus databases, allowing scanners to identify viruses during a computer scan. This type of antivirus software is often referred to as unmanaged, largely because the end-user has the ability to deny updates, turn off the scanner, or uninstall it.

A managed antivirus solution is provided by IT partners. These tech experts take care of installing the software on computers and other devices, and will then manage the solution. They will also ensure that scanners are up-to-date and scans are scheduled for a convenient time, thus protecting computers. The best way to think of these solutions is that they are specifically provided by a company to look after your computers and protect them from viruses.

Benefits of managed antivirus solutions

Companies that choose to integrate a managed antivirus solution generally see five main benefits.

  1. All systems will have the same level of security - With a managed service, your IT partner will make sure to install software on all your systems. This means that there should be the same program installed on your systems, and that the antivirus will be updated to ensure that systems are protected from new security threats that come along.
  2. It is easier to manage - Managing your antivirus solution can be a tough task, especially in larger companies where different solutions may need to be employed. By working with an IT partner, your antivirus solutions are managed by tech experts. This is a great solution for business owners who aren’t too familiar with technology, or an overworked IT department.
  3. The solutions can be low-cost - Most managed antivirus solutions are offered as a monthly package, where companies pay per user. For some companies, this solution is more affordable per user than a non-managed solution. This is especially true if you have a high number of users and need to purchase multiple licenses.
  4. Management is continual - With unmanaged solutions, many users turn the antivirus protection off because it can slow their computer down or because they believe their usage habits are not compromising security. Managed antivirus solutions usually can’t be uninstalled or turned off, meaning your systems are continually protected.
  5. Your systems are truly protected - Regardless of how secure your systems are and the steps you take to ensure that malware doesn’t get through, the chances are you will eventually be infected. When you are, it may be tricky to actually completely remove the virus. IT partners are trained in how to do this quickly and efficiently and can usually completely remove the virus, ensuring that your systems are truly secure.

If you are looking for a managed antivirus solution, contact us today as we may have a solution that will work with your business.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates

Leave a Comment (0) →

ALERT: About the CryptorBit Infection

A few months ago, we sent out an email warning about the notorious CryptoLocker infection, which can encrypt the data on your computer so that it becomes unusable and then hold it for ransom.  Unfortunately, a new infection called CryptorBit has surfaced that does exactly the same thing.  Whether it’s made by the same group as CryptoLocker or it’s a copy-cat is uncertain, but the infection and end results are nearly identical in every way.

What it is:

VirusCryptorBit, like CryptoLocker before it, is an infection that can activate when a user clicks on a link in a spam message or malicious email, clicks on a malicious link while browsing the web, or opens an attachment in an email from a malicious source.  Emails may appear to be sent from people you know, but it’s important to read carefully – if it doesn’t look right it’s probably not.

Once inside your computer, CryptorBit takes your files and encrypts them so that you can’t read them.  Then it holds your files hostage for a ransom of $500 or more – if you don’t pay, the files remain unusable and are essentially destroyed.  This not only applies to files on your computer, but also files on any shared drives as well.  These are some examples of effected file types:

- Word files             – Excel files                   – Pictures              – Music

- Movies                  – Quickbooks files        – PDFs                  - All other data

Even when antivirus programs and other security policies and procedures are in place, it will not prevent a CryptorBit infection. Everyone should be especially careful with emails and web browsing.

If you think you have the CryptorBit infection:

  1. DO NOT CLICK ON IT!  Clicking on an infection alert is often the method by which the infection tricks you into activating it.
  2. SHUT DOWN YOUR COMPUTER – in order to prevent further damage to your files, shut down your computer right away.  If you don’t see your start menu because it is hidden by the infection, hold down the power button on your computer until it shuts off.  Unplugging your Ethernet cable is a good thing to do as well.
  3. CALL US RIGHT AWAY – do not attempt to continue working on your computer – the longer you wait, the easier it is for infections to embed.

The best protection against these infections is a good backup.  We strongly advise that people keep their important files on their servers, and not their desktops or local folders.  The reason for this is that files on the server are typically backed up, and files on the local computer are generally not.  If your files are encrypted, we can restore them from a backup with relative ease.

HOWEVER – if your files are not backed up, they will not be able to be recovered without paying the ransom, which is a long, involved, and expensive process.  In either case, PLEASE DO NOT ATTEMPT TO TAKE ANY ACTION ON YOUR OWN!

Please give us a call or send an email if you have any questions, and PLEASE GET IN TOUCH RIGHT AWAY if you think you have infections of any kind.  Please be vigilant!

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →

What is Business Analytics?

BI_Jan27_CThere are many important components of a business, and data is definitely among the most popular. Pause and think for a moment how much of your business relies on it. It would be a challenge for a business to function without it. For business owners that look into data, many will have heard the term ‘business analytics’ before. However, this term can be a bit ambiguous and confusing.

In this article we will take a brief look at business analytics and why it is so important to businesses of all sizes.

Business analytics defined

When experts talk about analytics most audiences will agree that it is the analysis of data and statistics. The vast majority of business owners have some experience with analytics, with some having even taken courses on it at University. This being said, the idea of business analytics is often hard to pin down – ask 10 people and you will likely get 10 different answers defining what exactly it is.

We like to define business analytics as a process rather than a science. This process uses skills, business experience, technology, applications, and common business practices, to enable business owners, managers, and employees to explore past performance. Simply put, it’s the study of the past performance of a business.

With most businesses, the goal of business analytics is to gain insights into the state of the company, and even drive future decisions based on existing data. If you can successfully implement a business analytics process, you and your employees will gain a higher understanding of your business which will lead to better decision making abilities and even higher growth and profits.

What makes up business analytics

As we noted above, this is a process that involves a number of separate components. Four to be exact:

  • Analytics - Using modern data mining and predictive tools to identify patterns that can help make better business decisions and give managers foresight into potential future trends. Usually the questions answered include, “What is the best outcome?”, “Why did this work?”, etc.
  • Data management - This covers the collection and storage of data. Concepts include how and where the data is stored, who has access to it, how it is accessed, and even when it can be accessed. Some examples of this include using cloud-based storage or even a storage server that is hosted in the office. When looking at data management in terms of analytics, most managers will concentrate on what has worked in the past, why it worked, and what will work in the future.
  • Business Intelligence - This is the use of reporting tools and dashboards to gain an understanding of largely event-based questions like, “How many?”, etc. When you implement business intelligence operations you will normally gain better insights into current events and what happened in the past to influence them.
  • Performance Management - This broad term covers actions and tools that are used to track and manage business performance. This includes tasks such a financial reporting and budget forecasting.

The main reason businesses implement the components of business analytics is so that they have a way to not only harness the data their business generates, but to also leverage it in a constructive way so that their business can make better decisions. If used properly, it really helps businesses answer two of the hardest questions to answer: “What do I need to know?” and “What do I need to do?”

If you are looking to learn more about using business analytics or the components that make up this process, contact us today to see how our solutions can help.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates

Leave a Comment (0) →

Take Screenshots on Win 7 and 8

Windows_Jan13_CTo the vast majority of business and individual users Microsoft’s Windows is the backbone of their computing experience. With a wide variety of functions and features, users can do almost anything on their computer. However, many of us still use only a few features on a daily basis, with features like taking screenshots being rarely used. These are still useful to know about though.

Here is an overview of how you can take screenshots on both Windows 7 and 8.

Screenshots on Windows 7

If you are using Windows 7 there are two main ways you can take screenshots. The first is by pressing Print Screen on your keyboard. This will take a screenshot of your whole monitor as you see it and store it on your Clipboard. You will then need to open a graphic editing program, like MS Paint, and paste the image by pressing Ctrl + V. It should be pasted into the open window and you will be able to resize the image and save it.

The second method is to use the Snipping Tool. This can be done by:

  1. Opening the window you would like to take a screenshot of.
  2. Clicking Start and selecting All Programs.
  3. Hovering over Accessories followed by clicking on Snipping Tool.
  4. Clicking New and clicking and dragging a square over the image or window you would like to capture.
  5. Editing the Snip in the window that opens.
  6. Saving the screenshot by pressing the floppy disk.

Screenshots on Windows 8 and 8.1

For those who are on Windows 8 or 8.1 there is a new keyboard shortcut that allows you to quickly capture a screenshot. If you have a window open e.g., a browser window, you can take a screenshot of that window by holding the Windows key + Print Screen keys down at the same time. This will take a shot of the window you have open and save the image in your Pictures Library on your Hard Drive.

If you would like to select a screenshot e.g., a picture from a window, the Snipping tool is also available on Windows 8. You can access it by opening the Start screen and typing Snipping tool. Once this has been searched for, click on the app and select New. This will allow you to select your screenshot and save it by following the same instructions as above.

Looking to learn more about using Windows? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Posted in: News / Updates, Tips & Tricks

Leave a Comment (0) →
Page 1 of 10 12345...»