FAQ Overview

Guidelines & Tips from IT

Go to category

Data Security

With cyber-attacks becoming more oriented toward data theft, it is vital for both businesses and individuals to take extra precautionary methods when it comes to data protection. Here are a few data security tips:
data-protection
 
Make password management a top priority: Setting and then updating passwords regularly is something that should be practiced at the personal, as well as the enterprise levels. If you have used a password once, don’t ever use it again; not on the same account, but also try to never use it again on any other account.

Don’t abandon your devices unlocked/unattended: Be it a Desktop or a Laptop, the electronic devices that we own contain important/sensitive data on them that can destroy us if it got in the wrong hands. Make it a practice to never leave your device unlocked and/or unattended at any place.

Be extra careful while clicking links and attachments in emails: The threats posed by phishing are real. Always be super-wary before clicking on attachments and links because, even though the sender might look legitimate, there is a possibility that they might not be.

Always keep your applications up-to-date: This is something that we are all guilty of at times. Don’t hold off on important updates, as they are often rolled out to remove dangerous bugs from the application.

Know what you are downloading: Always download stuff that you can easily deem to be credible; you can do so by verifying the authenticity of the website. Know that a malware application is often dressed gracefully to trick the victim and you won’t know what hit you until it’s too late.

Control what you post on social media: A saying goes, “Whatever happens on the Internet, stays on the Internet” (it’s practically true), so be very careful about what you post on social media websites. It doesn’t matter if you delete the post or deactivate your account, whatever you might have posted can be retrieved and can be used against you.

Avoid clicking on flashy advertisements: The Internet is laden with flashy advertisements that will make you feel like clicking on them. If the ad leads you to a malicious webpage, be vigilant in closing it instantly.
 

2025-08-26 14:54
IT Admin

Laptop Charger

You may think that it is okay to simply ignore to take care of your charger but as owners of one, it is your responsibility. Unfortunately, your laptop charger can become damaged in many ways, by getting tightly wrapped up, wire breaks due to twisting and rolling, constant plugging and unplugging, etc. However, with proper care and use you can prolong the lifespan of the laptop charger. Here are a few simple ways to care for your adapter.

laptop-charger

  • Make sure you use a charger that is specifically for your laptop. If not, the possibilities of damage are high.
  • Place your laptop charger somewhere that water cannot reach it to avoid electrocution.
  • Always unplug your charger when it gets hot so as to avoid overheating of the device.
  • When using the charger for a long time, place it on a surface where circulation is possible.
  • The charger wire should not be kept in contact with a sharp edge table for this may cause a tear in the wires covering and later exposing the wires inside.
  • Don't pull on the cord when removing the charger, and keep it away from where it can be stepped on. 

2020-06-08 10:11
IT Admin

Laptop Essential Maintenance

With proper maintenance, gentle use, and regular care, your equipment will last for years. Ignoring important factors like cleaning and manufacturer updates can result in a bogged-down machine that is frustrating to work with. Below are a few pointers to keep your device healthy.

laptop-essential-maintenance

Tidy up your hard drive by deleting old files: Your laptop probably has a number of files floating around you aren’t using anymore. Cleaning up these files will free up memory so your computer can run faster. Before going on a mass purge of your system, take care to make sure you avoid any “critical” folders that contain files your computer needs to run.

Clear your browser’s cache and cookies: This is an essential part of keeping your laptop speedy and safe. Even browsing the internet normally will result in a large number of cookies occupying your browser files, so taking the time to remove them can work wonders.

Clean your screen and keyboard: For your screen, the best option would be pre-moistened screen wipes. These items contain a safe amount of moisture that won’t damage your screen and can help increase the clarity of your display. As for your keyboard, you’ll want to tread cautiously. Needlessly jamming something like a paperclip in the space between keys can break the sensitive mechanisms that make the thing work.

Clean your camera and microphone: Gently wipe the camera and microphone with a soft, dry cloth. Do not blow to clean the microphone, as it can loosen or dislodge the components inside that allow it to pick up sound.

2020-06-08 10:11
IT Admin

Laptop Hinge

Hinge, the most important part of a laptop is what makes the lid open or close to making the laptop feel like a book. Breaking or damaging it is rather easy since it can easily undergo any accidents. Without further ado, follow these recommendations mentioned below.

laptop-hinge

  1. Close the lid properly: Close the lid gently and hold from the middle of the screen. Closing the lid using only one edge causes extra pressure on the hinges which over time will crack and break them.
  2. Prevent damage to the monitor: Make sure there are no obstructions (paper clips, pens or pencils, etc.) on your keyboard when you are shutting the lid. Items like these can dent, scratch, or even crack the screen.
  3. Hold your laptop by the base: Lifting and holding the laptop by the display creates unneeded pressure on the hinges. This action may direct pressure on the LCD and deform or crack the screen itself.
  4. Be aware of what you put on top of the laptop: Placing heavy items on the laptop (open or close) can cause serious damage to the LCD, hinges, and chassis.
  5. Place laptop on a hard surface: While using a laptop be sure to place it on a hard and stable surface so that there is space between the laptop base and the surface on which it has been placed.

2020-06-08 10:10
IT Admin

Work From Home & Reboot Modem/Router

It is important that you take good care of your laptop and modem/router to keep it working well. Following these easy steps will ensure that your device lasts longer and requires less maintenance. As a bonus, these tips will also help with undisturbed production.

 Laptop Battery Backup
Even the most efficient laptop is going to run out of juice at some point. Hence, ensure that your laptop battery is always maintained between 70% and 90%. Letting it below 20 percent often will affect the lifespan of the battery considerably. To enjoy uninterrupted workflow and video calls, during the lockdown it is recommended that you keep your device plugged-in while in use. 

Reboot WIFI Modem/Router             
Reboot is just a fancy way of saying "turn your modem off and back on". Restarting your modem can fix a few internet connection problems, improve slow connections, and resolve wireless issues. Please follow the below steps.

work-from-home

Even if you haven't encountered any errors it's a good practice to periodically restart your router and cable modem (once in a week is a good pace). This will help keep your connection working and should reduce the possibility of losing the internet at an inopportune time. To reboot your device use the power button on your device (if available).

2020-06-08 10:16
IT Admin

Screen Recording

Please find the steps to harness the screen-recording function backed into the operating system that can be used for recording a Google Hangout Meet session or any full-screen application without relying on third-party tools like Snagit or ShareX.

Microsoft Windows 10

screen-recording-windows


Xbox Game Bar is built into Windows 10 so you can capture videos and screenshots of your applications and games. While you're in an application, Press the Windows logo key + G on your keyboard to open Xbox Game Bar.

  • Select Record from now (the circle) to start a clip, then Stop recording (the square) to end it.
  • For full-screen applications, use Windows logo key + Alt + R to start and stop recording.
  • To view a clip, go to This PC > Videos > Captures.

Note: If you are facing any difficulty while recording audio then, go to Start > Settings > Privacy > Microphone > Turn ‘Xbox Game Bar’ On to provide Xbox Game Bar the permission to access your microphone.

Apple macOS Mojave 10.14/Catalina 10.15

screen-recording-macos

  1. On your Mac, press Shift + Command + 5 to open Screenshot and display the tools.
  2. Click a tool to use to select what you want to capture or record as well as enable the MacBook Pro/Air Microphone.
    Note: It is mandatory to change the microphone option to record with audio.

    For a portion of the screen, drag the frame to reposition it or drag its edges to adjust the size of the area you want to capture or record.

    Tool                                              Description

    Record the entire screen              macos-record-entire-screen

    Record a portion of the screen     macos-record-a-portion-of-the-screen

  3. Click Options if you want.
  4. Start the screen recording:
    • For recordings: Click Record. To stop recording, click the Stop Recording button in the menu bar. When the Show Floating Thumbnail option is set, you can do any of the following while the thumbnail is briefly displayed in the bottom-right corner of the screen:·         
    • Swipe right to immediately save the file and make it disappear.
    • Drag the thumbnail into a document, an email, a note, or a Finder window.
    • Click the thumbnail to open a window where you can trim the recording, or share it.

Depending on where you chose to save the recording, an app may open.

2020-06-08 10:44
IT Admin

Long Lasting Battery

Change display settings:

Adjust some of your PC's display settings to help extend battery life. For example:

Set a shorter duration for an active display:

Select the Start button, and then select Settings > System > Power & sleep. Under On battery power, turn off after, pick a shorter duration.

Reduce your display’s brightness:

Select the Start button, and then select Settings > System > Display. Turn off Change brightness automatically when lighting changes (if it appears), and then use the Change brightness slider to set the brightness level you want.

Use a dark background:

Select the Start button, select Settings > Personalization > Background, and then choose a dark picture or dark solid color.

Use a dark theme:

Select the Start button, select Settings > Personalization > Themes > Theme settings, and then choose a dark theme.

Change power settings:

Adjust some of your PC's power settings to help extend battery life. For example:

Set a shorter duration for when your PC sleeps:

Select the Start button, and then select Settings > System > Power & sleep. Under On battery power, PC goes to sleep after, choose a shorter duration.

Disconnect from a Wi-Fi network when your PC sleeps:

Select the Start button, and then select Settings > System > Power & sleep > When my PC is asleep and on battery power, disconnect from the network. Change the setting to Always or Managed by Windows instead of Never.

Note:
This option isn’t available on all PCs and depends on your PC hardware and manufacturer.

Put a lid on it:

Most laptops can go to sleep automatically by closing the lid. To set this, select the Start button, and then select Settings > System > Power & sleep > Additional power settings > Choose what closing the lid does.

Choose a lower power mode:

Select the Battery icon on the right side of the taskbar. To reduce power use, move the slider toward the Best battery life.

Note:
This option isn’t available on all PCs and depends on your PC hardware and manufacturer.

Just press a power button:

Most PCs let you turn off your display, shut down, sleep, or hibernate with a press of the Power button.
To choose what the power buttons do, select the Start button, and then select Settings > System > Power & sleep > Additional power settings, and then Choose what the power buttons do.

Other things you can do:

Keep your PC plugged in until it’s fully charged.

To check your PC’s battery level, move the mouse pointer over the battery icon on the taskbar, or go to Settings > System > Battery.

Turn on airplane mode if you don’t need the Internet, Bluetooth, or other wireless communications:

Select the Start button, then select Settings > Network & Internet > Airplane mode, and turn on airplane mode.

Use Microsoft Edge for browsing:

Tests show that when browsing with Microsoft Edge, your battery lasts 36-53% longer per charge than when browsing with Chrome, Firefox, or Opera on Windows 10.

General Guidelines:

Unplug unused peripherals:

Unplug any peripherals — say an external hard drive or webcam — while using battery power. In addition to transferring data between your device and your laptop, that cable is also drawing power to the peripheral itself even when you’re not using it. That’s an obvious drain on your laptop battery.

Plug it in before it dies:

PC World notes that a lot of us like to wait until our laptops are all but dead before we plug it in, which is bad for your battery. If at all possible, never drain your laptop battery below a 20% charge. This extends the life of your battery as used with a low charge puts a strain on the battery itself, and eventually reduces its charging capacity.

Keep your laptop out of hot and cold:

Use your laptop in situations where the ambient temperature is neither hot nor cold. Extreme temperatures cause your computer to work harder, which in turn drains the laptop battery faster. Too much exposure to these extremes can also damage the battery itself, shortening its useful life.

Do not keep your laptop plugged in:

What they found is that laptops plugged in constantly actually have a lesser number of cycles (think of the battery drained, then plugged into recharge — that is a cycle) than those who kept their batteries between 20% and 80%.

Do not feel the need to always charge your battery fully; it is not necessary. (Some computers may have a smart charging mode that will prioritize battery health, in which case you can keep it plugged in.)

Turn off Wi-Fi and Bluetooth:

Do not need connectivity? Turn those features off. Even if you are connected to Wi-Fi or Bluetooth, your device may still be searching for other connections. Although it is slight, maintaining that connection does suck up some laptop battery power. So if you don't need connectivity, just turn it off until you need it.

2020-06-08 11:00
IT Admin

Multitask Windows

Here are a few guidelines to multitask using a smart window. Smart Window, also called Snap, is a feature of Microsoft Windows that lets you automatically position windows side-by-side, without having to manually resize them. Smart Window is also useful if you don't want to use Alt-Tab to switch between 2 windows.

image.png

Enable Snap Windows in Windows settings

If you are running Windows 10, first make sure the Snap Windows feature is enabled in the Settings.·        
            -> Access the Settings by opening the Start menu and click the gear icon ⚙ on the left. Alternatively, hold down the Windows Key and press “i”.       
            -> In the Settings menu, click System.
            -> On the left, click Multitasking.
            -> On the right, make sure Snap Windows is set to On.

Snap windows using the mouse

Follow these steps to snap windows using your mouse.
            -> Click-and-drag on the top title bar of the first window, so your mouse pointer hits either the left or right side of your screen. Let go of the window when you see the outline of the window resize to half of the screen.
            -> Choose the other window you want to view on the side of the first window. Click-and-drag the second window to the opposite side of the screen until the mouse pointer hits the side of the screen and resizes.

Snap windows using the keyboard

Follow these instructions to snap windows using your keyboard.
            -> While pressing the Windows key, press either the Right or Left arrow to move the open window to either the left or the right portion of the screen.
            -> Choose the other window you want to view to the side of the window in step one. When using the Windows key for this step, as described in step one above, use the opposite (right or left) arrow button that you used in step one.

How to un-snap windows after snapping them

After you snap one or more windows, you can follow these steps to return them to a normal window view.       
            -> Click-and-drag the window, so the mouse pointer hits the top of the screen, and let's go to put the window back to regular size.       
            -> If you want to view a single window, click a blank spot at the top, and while holding the mouse button down, shake the window you want to view. The shaking action will minimize all other windows to the Taskbar. To re-open windows that were minimized, click and shake the window you're using.       
            -> Press the Windows key on your keyboard, and at the same time, press either the up arrow or the down arrow. The up arrow will maximize the window, and the down arrow will minimize the window.

2020-06-22 11:33
Sebastin SironMani A

Malicious extensions from Chrome Web Store

Some of us are aware of this recent expose by Reuters regarding massive spying on users of Google's Chrome through malicious extensions.

As a result, Google has removed 70+ extensions from its Chrome Web Store, and we have listed all of them in this sheet for your perusal. Kindly go through it, and if you come across any extension which by any chance is installed on your Chrome then please remove it immediately and spread the awareness. 

Here are a few steps on how to manage your extensions.

  • On your computer, open Chrome.
  • At the top right, click More More and then More tools and then Extensions.
  • Make your changes here as per the list.

2020-06-25 11:22
Sebastin SironMani A

Free-up Google Drive space

This FAQ is meant as a quick fix for those who already filled up their Google Drive space and worried about how long it's going to last. The following illustration will guide you to free up and gain some of the space, which might be occupied by unwanted junk in the Trash.
1. From Chrome browser goto > drive.google.com > Click Trash from the left pane. 
 
image.png
 
2. After going to Trash, you can verify and delete individual files if you want or else click Empty Trash from the drop-down menu to delete everything from Trash.

2020-06-29 10:58
Sebastin SironMani A

Improve Battery Power Saving

Nowadays we are facing numerous issues with Laptop battery consumptionand all the way it leads to indebtedness in production.

Like its predecessors, Windows 10 also comes with a bunch of features to increase battery timing, including a completely new Battery Saver option.

However, if you are looking for even more up time or your battery is not holding enough charge, then there are some ways to deal with that.

Disable UI animations and shadows

  • Press Windows + R keys and type sysdm.cpl in the Run dialog to open System properties.
  • Move to the Advanced tab, click the Settings button under the Performance section.

  • Now select the Adjust for best performance option and click OK to disable all the animations and shadows.

Now the Windows UI will be snappier and lighter on the battery.

Disable background apps

  • Open Start Menu, click on Settings, and then go to Privacy.
  • Move to the Background Apps section and you’ll see all the background apps in the right panel. Just switch off the ones you don’t need.

Move to the Background Apps section and you’ll see all the background apps in the right panel. Just switch off the ones you don’t need.

Only the background process will be disabled, the app itself will work fine.

Disable startup apps

  • Press Ctrl + Shift + Esc keys to open the Task Manager and move to the Startup tab
  • Here, select all the unnecessary startup apps and click on Disable to stop them

Disable startup services

  • Press Windows + R keys and type msconfig in the Run dialog to open System configurations window.
  • Move to the Services tab here and uncheck the option Hide all Microsoft services at the bottom-left corner.
  • You will see all startup services now. Uncheck the ones you don’t need and click OK to apply changes. A PC restart will be required for changes to take effect.

Prevent your PC from heating

  • Heat can cause many problems in PC, and faster battery drain and permanent decrease in battery life are one of them. To overcome this, please hold the Laptop on a flat surface(avoid bed) and avoid using cloths under the device.

2020-07-10 11:54
Sebastin SironMani A

Scheduling Meetings on Microsoft Teams

Step 1: Login into Microsoft Teams Application from your Laptop/MacBook.

Step 2: From the sidebar, select Calendar.

Step 3: Create a New meeting and add participants. And, Save it.



Step 4: The meeting will appear in the calendar timeline. Right-click and select Join online.

Step 5: Click Join now, to join the meeting right away. If the participant is not joined yet, you can notify him/her. He/she will get an intimation if they're online on Teams.

2020-07-17 09:04
Prasanth Padmakumar

Public WiFi

This tip is about Public WiFi. It's better not to use Free Public Wi-Fi. Using a public Wi-Fi network not only puts your personal devices at risk but also exposes your traffic to everyone else using the same network.

Cyber-criminals can potentially access any information you provide, such as credit card numbers, confidential information, or passwords.

If a public wi-fi network is your only option, consider following the tips listed below to help keep you secure

  • Use two-factor authentication.
  • Use anti-virus software and keep it up-to-date. 
  • Turn off sharing. 
  • Be sure you're using HTTPS on websites.

2020-07-20 17:07
Sebastin SironMani A

Restart

Facing an issue on your computer? First advice from tech support wouldbe — “Did you try rebooting it?”  This solution is engraved in our mindsso deep down that it has become an instant reflex. Even though most of them donot actually know what exactly happens but somehow it fixes the problem. Let ustry to find out why?

One big reason a restart will fix so many PC problems is that it will clear your Random Access Memory (RAM).

Common Problems when Restart Fixes the Problem

Flushes RAM

Your computer's random access memory (RAM) is also known as volatile memory. Your RAM handles lots of different short-term tasks and data, like running processes and holding program values. Rebooting your computer flushes out all this information, allowing your device to start anew and helping it run faster and more efficiently.

Stops Memory Leaks

Memory leaks occur when a program doesn't close properly. Every program that runs on your computer uses memory(usually RAM) while it's open. When you close the program, that memory should return to your computer. Outdated, overused, or glitchy programs, however, can have memory leaks, which occur when memory isn't returned to the computer. Rebooting your computer each night can help prevent memory leaks from occurring.

Fixes Small Errors

Many computer users are unaware that when they reboot their computer, it runs diagnostics on itself, automatically fixing minor errors. These errors can range from buggy or glitchy applications to problems with the RAM.

System Freeze

You'll often feel that your computer freezes or has a problem you don't know how to fix, simply restarting resolved the issue.

Installs Updates

Every piece of software on your computer has the potential to receive updates, which can add new features to an application or fix issues that occurred with older versions. In fact, Microsoft releases new updates for its components on the second Tuesday of every month, known as "Patch Tuesday." Often times, you must restart your computer to download and install the necessary updates and patches that help it run quickly and smoothly.

Windows is running Slow

The computer needs nothing but the clearing of unnecessary junk on system resources especially RAM. Hence, restart is a quick and working solution in this case.

Restart is not limited to Windows Computers

The magic of restart is applicable to most of the electronic devices like MAC, android phone, WiFi router, or even the software running on Windows OS.  Most of the instruction manual will suggest rebooting or resetting the device to bring it to normal. 

Note: For those users that are using the ‘Fast Startup’ feature in Windows, just remember that a shutdown does not re-initialize your system — you must use restart.

2020-07-31 10:19
Sebastin SironMani A

Windows Update

Windows Update is a free Microsoft service that is used to provide updates like service packs and patches for the Windows operating system and other Microsoft software.

Windows Update can also, be used to update drivers for popular hardware devices.

Patches and other security updates are routinely released through Windows Update on the second Tuesday of every month—it is called Patch Tuesday. However, Microsoft releases updates on other days as well, like for urgent fixes.

Used For?

Windows Update is used to keep Microsoft Windows and several other Microsoft programs updated.

Updates often include feature enhancements and security updates to protect Windows from malware and malicious attacks.

You can also use Windows Update to access the update history that shows all the updates that have been installed to the computer through the Windows Update service.

How to Access Windows Update?

It can be accessible by the following steps.

  • Windows update is built-in and a part ofWindows Settings, available from the Start menu (Search from Start as “windows update”) Or   
  • To manually check for the latest recommended updates, select StartSettingsUpdate & Security > Windows Update Or
  • Windows Update can also be accessed by executing this command from the Run dialog box (WIN+R).
                  control /name Microsoft.WindowsUpdate

Click “Check for updates” to get the latest updates and install them. 

Note: Please restart your Laptop/Desktop once the installation got a place (Mandatory).    

2020-08-03 10:25
Sebastin SironMani A

Voice Phishing

Tech support scams are an industry-wide issue where scammers use scare tactics to trick you into unnecessary technical support services that supposedly fix the contrived device, platform, or software problems.

At best the scammers are trying to get you to pay them to "fix" a non-existent problem with your device or software. At worst they're trying to steal your personal or financial information, and if you allow them to remote into your computer to perform this "fix", they will often install malware, ransomware, or other unwanted programs that can steal your information or damage your data or device.

How IT support scams work

Scammers may call you directly on your phone and pretend to be representatives of CapeStart's IT Support Team. They might even spoof the caller ID so that it displays a legitimate support phone number or profile name on Skype. They can then ask you to install applications that give them remote access to your device. Using remote access, these experienced scammers can misrepresent normal system output as signs of problems.

Scammers might also initiate contact by displaying fake error messages on websites you visit, displaying support numbers, and enticing you to call. They can also put your browser on full screen and display pop-up messages that won't go away, essentially locking your browser. These fake error messages aim to trick you into calling an indicated technical support hotline.

When you engage with the scammers, they can offer fake solutions for your “problems” and ask for payment in the form of a one-time fee or subscription to a purported support service.

So kindly avoid falling for such scams by thoroughly checking the caller's identity and please report us if you find anything fishy or anyone tried impersonating as CapeStart'sIT Support team.

2020-08-24 08:27
Sebastin SironMani A

Laptop Hinge

This topic highlights a few tips & tricks to avoid laptop hinge damage. Hinge, the most important part of a laptop is what makes the lid open or close to making the laptop feel like a book. Breaking or damaging it is rather easy since it can easily undergo any accidents. Without further ado, follow these recommendations mentioned below.

Close the lid properly: Close the lid gently and hold it from the middle of the screen. Closing the lid using only one edge causes extra pressure on the hinges which over time will crack and break them.

Prevent damage to the monitor: Make sure there are no obstructions (paper clips, pens or pencils, etc.) on your keyboard when you are shutting the lid. Items like these can dent, scratch, or even crack the screen

Hold your laptop by the base: Lifting and holding the laptop by the display creates unneeded pressure on the hinges. This action may direct pressure to the LCD and deform or crack the screen itself.

Be aware of what you put on top of the laptop: Placing heavy items on the laptop (open or close) can cause serious damage to the LCD, hinges, and chassis.

Place laptop on a hard surface: While using a laptop be sure to place it on a hard and stable surface so that there is space between the laptop base and the surface on which it has been placed.

2021-10-15 14:49
Sebastin SironMani A

Laptop Overheating

Today's topic is around how to protect your laptop from overheating. Unsurprisingly, when you try to pack that many electronic components in such a small space, heat will become a real problem.

But other than getting burns on your skin from an overheated laptop, how do you know your laptop is actually too hot? One easy thing to keep an eye on is your CPU temperatures. It’s quite normal to see your CPU heat up under heavy use.

But if your laptop feels painfully hot or if it’s behaving strangely, download a reputable hardware monitoring utility (Windows), or Intel Power Gadget (macOS), and check your processor’s core temperatures by running it in the background.

Intel has specified temperatures around 100° Celsius as a maximum, but a good rule of thumb is that if you’re getting over 90° Celsius under load, you should probably try to cool your laptop down.

The processor temperatures aren’t the only thing to watch out for. Batteries don’t particularly like excessive heat either. And their tolerances are lower than they are for CPUs. The lithium-ion batteries common in modern electronics should be kept below 45° Celsius. Although they can operate at higher temperatures, up to around 60° Celsius or so, some laptops will stop charging once the battery temperature hits 45° Celsius. If your battery is often running at high temperature under load, its life might be shortened, and it might even swell upon you, like physically get larger, which can damage other laptop components.

And on the subject of high temperatures causing deformation, heat can actually cause the soldering inside the machine to crack or warp. Infamously, this phenomenon was at the center of a controversy that happened a little over a decade ago, called #BUMPGATE, that involved Nvidia and Apple. Nvidia sold a bunch of GPUs to Apple that turned out to be defective, but the issue wasn’t the GPU dies themselves. Instead, the soldering that held the die on to its package, arranged into small balls called bumps, was apparently made of a different material that didn’t behave in a way Nvidia expected once they heated up. As a result, many of these bumps expanded excessively, leading them to break entirely. Some reports indicated that failure rates were high as 40%. To this day, relations between Apple and Nvidia are rumored to be quite bumpy. And Apple started switching many of its Macs to AMD GPUs in the wake of #BUMPGATE, though it’s never been confirmed exactly how big of a role that particular incident played.

Back to the heat inside your laptop. We know that it’s bad. But if your monitoring tool indicates your temperatures are too high, how do you cool things off?  Well, you start off with the simple things, you can check the ambient temperature of the room you’re in, try operating your laptop on a hard, level surface to ensure that the air vents will have clearance to breathe, and blow out those vents with some compressed air to make sure they aren’t clogged with dust.

And if you’re still scratching your head, you can submit the laptop to our IT team for an in-depth analysis where we’ll pop off the panel, remove any dust or debris, and ensure all the fans are running properly and aren’t unplugged or straight-up dead. 

Note: A good laptop stand or cooling pad to sit your laptop on might be a good idea. You don’t necessarily need anything super expensive. Just find something well-reviewed.

2020-09-01 13:34
Sebastin SironMani A

Why do we use CTRL+ALT+DEL?

"History is a gallery of pictures in which there are few originals and many copies" - Alexis de Tocqueville.

It’s been a long time since the days of command-line interfaces, where we accomplished the vast majority of tasks with a keyboard, and the use of a mouse was rare or unknown.

But even though we’re all used to pointing and clicking these days, plenty of keyboard shortcuts are still incredibly useful. But did you ever take a moment to think about where some of these seemingly random combos actually came from?

In today’s IT Guidelines & Tips, we’re going to take a look at a bit of the history behind them, starting with our old friend CTRL+ALT+DEL.

The engineers behind the original IBM PC in the early 1980s wanted a quick way to restart the machine from the keyboard. But they didn’t want to make it too easy, lest the user accidentally reboots the computer and lose whatever they were working on. At first, CTRL+ALT+ESC was proposed, but all three of those keys are on the same side of the keyboard. So, it was thought that combination would still be too easy to trigger by mistake. So instead, DEL was assigned to be the third key.

Funnily enough, even though CTRL+ALT+DEL persists as a standard key shortcut to this day, it was originally intended just for development use but was leaked to the public after it was included in some IBM reference documents.

By the time Windows 3.0 rolled around in 1990, the combination was no longer linked to the BIOS as a way to reboot the computer immediately. Instead, the OS presented you with a screen, allowing you to go back, terminate the program that was running, or reboots the whole system by pressing the combination again, and Windows 95/98 gave us a similar screen that allowed us to close any running program. In Windows XP, the combo would bring up the Task Manager instead, and nowadays Windows 10 gives us a screen with several useful options when pressing CTRL+ALT+DEL, but pressing the keys again actually doesn’t do anything

Let’s move on to another one we use quite a bit, ATL+F4, for closing a program or a window. When you think about it, it seems pretty random. Why not something like ALT+C for close or ALT+G for just go away?

Well, ALT+F4 has its origins in a 1987 IBM project called Common User Access. The idea was to standardize how a user would interact with software, no matter what kind of system or program they were using as back then, different programs had wildly different key combinations to accomplish the same task, even among the same class of application, such as word processors. Some of the standards are still in use today, such as F5 to refresh a page. The reason ALT+F4 was mapped to the close function was that the designers used other ALT+FN key combinations to manipulate Windows in different ways, such as ALT+F8 to resize and ALT+F10 to maximize.

And although many of these shortcuts have fallen by the wayside because people weren’t using them, ALT+F4 remained popular. So, it still serves as a quick way to close your browser if your boss walks in and you don’t want him/her to know you were doing something other than working.

Speaking of hiding whatever it is you were doing, let’s finish up by talking about ALT+LEFT-ARROW. If you’re a fan of using keyboard shortcuts specifically in your web browser, you might be familiar with this one. It’s the way to go back one page without clicking the mouse, but going back is something we do super frequently. So why not just have one button for it instead of a combination? Well, we actually used to.

It wasn’t too long ago that you could actually hit BACKSPACE to go back a page in many web browsers. But a big problem was that people kept hitting the key by mistake. Users would be filling out the form on a webpage, and need to delete something, but accidentally click outside of the textbox, meaning the BACKSPACE button would take them off the page rather than just delete one character. And oftentimes when the user would click forward to get back on the intended page, they discovered all the data they’d entered was wiped out. This led Google to change the shortcut in Chrome in 2016, which is now standard across major web browsers. 

2020-09-08 12:28
Sebastin SironMani A

Laptop Essential Maintenance

With proper maintenance, gentle use, and regular care, your equipment will last for years. Ignoring important factors like cleaning and manufacturer updates can result in a bogged-down machine that is frustrating to work with. Below are a few pointers to keep your device healthy.

Tidy up your hard drive by deleting old files: Your laptop probably has a number of files floating around you aren’t using anymore. Cleaning up these files will free up memory so your computer can run faster. Before going on a mass purge of your system, take care to make sure you avoid any “critical” folders that contain files your computer needs to run.

Clear your browser’s cache and cookies: This is an essential part of keeping your laptop speedy and safe. Even browsing the internet normally will result in a large number of cookies occupying your browser files, so taking the time to remove them can work wonders.

Clean your screen and keyboard: For your screen, the best option would be pre-moistened screen wipes. These items contain a safe amount of moisture that won’t damage your screen and can help increase the clarity of your display. As for your keyboard, you’ll want to tread cautiously. Needlessly jamming something like a paperclip in the space between keys can break the sensitive mechanisms that make the thing work.

Clean your camera and microphone: Gently wipe the camera and microphone with a soft, dry cloth. Do not blow to clean the microphone, as it can loosen or dislodge the components inside that allow it to pick up sound.

2022-11-02 10:34
Sebastin SironMani A

Zoom - Video conferencing with real-time messaging and content sharing

Zoom is a cloud-based video conferencing service you can use to virtually meet with others - either by video or audio-only or both, screen sharing, all while conducting live chats - and it lets you record those sessions to view later.

Here are the steps to connect with Zoom conference calls.

Step 1:

Copy and paste the URL in the browser and hit enter. Zoom installer file automatically will start to download

Step 2:

Double click the installation file which is downloaded already.

Step 3:

The installation will begin, and it looks similar to this window. Please hold until it completes the installation.

Step 4:

Enter your name here.

And press “Join Meeting”.

Step 5:

Enable “Automatically join computer audio by computer when joining a meeting” and press the “Join with Computer Audio” button.

Step 6:

Sometimes in windows machine will show this below message for a security reason. Please give allow access here.

Step 7:

If you have joined successfully, this window will appear. Here you can share your screen whenever you wanted, you can invite people and you can have a video conference session as well.

2020-09-29 11:28
Sebastin SironMani A

Network Discovery

When you connect your laptop to a new Wi-Fi network, it’s never enough for Windows to just connect you and be done with it. It always asks you this rather cryptic question about “Do you want to allow your PC to be discoverable by other PCs and devices on this network?”, with a warning that you shouldn’t do it if you’re sitting at a coffee shop or on a public network.

But many folks have never quite understood what picking one option over the other one means, and even more frustrating is that, if you click the wrong thing, or click away from it, it’s very difficult to find that prompt again.

Start > Settings > Network & Internet > Change connection properties 

So basically, what it comes down to is whether you want to use file and device sharing, for devices it would commonly be something like a printer, on your local network. And lots of people never bother with this, but it can be useful. So, let’s have a look at what answering that question Yes or No actually does, and how to take advantage of the associated features.

If you tell Windows that you don’t want your computer to be discoverable, it won’t let any other devices on the network see any files or devices that you’re sharing either, and this is simply meant as another layer of protection if you’re on a strange network, like one at an airport, restaurant or railway station. But, if you answer Yes, it will allow you to share those things i.e. Shared files, on whatever network you’re connected to, which is unsafe to do on a public network since anyone can access it from that network. 

2020-10-02 13:44
Sebastin SironMani A

Is Sitting Too Close to the Screen Dangerous?

We’re all probably guilty of sitting a little too close to our screens whether you’re a designer and your monitor is too big for your desk or if you were just yelled at by your mom by having your face practically smushed against the TV while you’re watching IPL. But what exactly qualifies us too close as the public has commonly believed?

So, a big part of the reason people worry about whether sitting too close can hurt their eyes is that many of us feel eyestrain when we’re staring at something for far too long. Eyestrain is a natural consequence of attempting to focus on just one thing for long periods of time and if you’re sitting close to a screen, chances are you’re hyper-focused on wherever it is you’re looking at, say a tense moment in a sporting event, but why does focusing on something for a long time makes your eyes hurt? It turns out that the mechanism for this incompletely understood but it’s thought that because your eyes are trying to intensely maintain their focus for so long it ends up overworking your Ciliary Muscles, these are the muscles that control the shape and curvature of the crystalline lens and near the front of your eye so that they can properly focus. Looking at something close by causes them to contract so it’s natural that they might tire out, just think about how sore your other muscles get after a hard day at the gym. However, the good news is that this has never been demonstrated to cause permanent eye damage in adults, and if you’re worried about brightness that probably not a big deal either as everyday electronic screens simply don’t appear to get bright enough to cause retinal damage, although it might be unpleasant to use a smartphone at full brightness in a dark room, it’s nowhere close to saying staring at the eclipse like Donald J Trump or doing something stupid with a laser pointer.

But if you’ve teenage siblings or children, keep in mind some studies have suggested that excessively focusing on objects too close to them can cause near-sightedness or Myopia later in life because their eye is still growing at that age and this isn’t limited to sitting too close to electronic screens, even if they’re spending too much time with a book that can cause problems too so make sure they’re resting their eyes enough.

Of course, eyestrain is still annoying even if it isn’t actually harmful to adults in the long-term so if you’re suffering from tired eyes after yet another hour of playing PUBG, give your eyes a break and maybe go outside* where you’ll probably be paying attention to objects that are more distant from you. Another good idea is to use a reputable brand of eye drops since when you’re focusing on things close to you for long periods, your eyes tend to dry out because you’re not blinking as much.

There are far greater health concerns from staring at a screen all day like maintaining poor posture.

2020-10-21 23:46
Sebastin SironMani A

Password Significance

Passwords provide the first line of defense against unauthorized access to your computer and personal information. The stronger your password, the more protected your computer will be from hackers and malicious software. You should maintain strong passwords for all accounts on your computer.

Importance of a Strong Password

One of the concerns that people often have when it comes to creating complex passwords is a fear of forgetting them, particularly when there are several to remember. Naturally, a person should try to think of something that will be easy for them to memorize. One way to do that is to turn a sentence or phrase into something that is not easily recognized by others. To do this, use the first letter of every word in the sentence, replacing certain words with numbers or symbols. For example, the word "for" may be replaced with the number 4 or the word "number" with the # symbol. With this method, a password such as "Save the number for later in the year" may read St#4LITY.

Here are some useful tips for creating strong passwords and keeping your information secure.

  • Use a unique password for each of your important accounts (i.e. email and online banking). Do not use the same password across multiple accounts.
  • Your password should be at least 8 characters long. The password should consist of lowercase and uppercase letters, numbers, and symbols. A long password will offer more protection than a short password if it is properly constructed.
  • Do not use personal information such as your name, age, date of birth, child’s name, pet’s name, or favorite color/song when constructing your password.
  • Avoid consecutive keyboard combinations (i.e. qwerty or asdfg).
  • Look around and make sure no one is watching while you enter your password. If somebody is, politely ask them to look away.
  • Always log off/sign out if you leave your device for the day – it just takes a few seconds to do and it’ll help ensure that no one uses your system for malicious purposes.
  • Avoid entering passwords on computers you don't control – they may have malicious software installed to purposely steal your password.
  • Avoid entering passwords when connected to unsecured Wi-Fi connections (like at an airport or coffee shop) – hackers can intercept your passwords and data over unsecured connections.
  • Never tell your password to anyone.
  • Change your passwords regularly and avoid using the same password over and over again.
  • Never write down your passwords on a sticky paper and hide underneath your workstation or telephone. Somebody will find it.
  • Always select “never” when your Internet browser asks for your permission to remember your passwords.
  • Enable Two Factor Authentication(T2A) wherever possible.

We all have a responsibility to keep our information secure. These guidelines will help you avoid most of the pitfalls you may encounter along the way.

2020-11-30 03:21
Sebastin SironMani A

Quantum Computing 101

Quantum physics one of the most successful theories of modern science describes the way our world works at the most fundamental level. Quantum computing has become one of the leading applications of quantum physics.

Quantum computers have the potential to solve some of the world’s most complex problems that are beyond the reach of even today’s most powerful supercomputers.

Real-world quantum systems cannot be modeled on a classical computer without making poor approximations. Modeling a simple compound i.e. Calcium monofluoride (CaF) makes our best supercomputers completely useless.

Quantum computers are not going to replace classical computers but their radically different way of operating enables them to perform calculations that classical computing cannot. Let’s see how they differ.

Classical computers encode information in bits and each bit can represent a 0 or a 1. These 0s and 1s act as on-off switches that ultimately translate into computing functions.

To perform a simple calculation like solving a maze, a classical computer would test each possible route one at a time to find the correct one. Just as classical computers have bits, quantum computers have qubits. Qubits however make use of two key principles of quantum physics,

  1. Superposition
  2. Entanglement

Superposition means that each qubit can represent a 0, a 1, or both at the same time. And entanglement happens when two qubits in a superposition are correlated with one another, meaning the state of 1 whether it’s a 0 or a 1 or both depends on the state of another.

Using these two principles qubits can act as a more sophisticated version of switches helping quantum computers solving difficult problems that are virtually impossible using classical computers.

To illustrate how this makes quantum computers more powerful, let’s look at some numbers. Take a classical 2n bit computer with n representing the number of bits. It can represent and examine only one system state at a time, a 2n qubit computer however would have the power to represent 2 to the power of n system states and perform parallel operations on all those states at once. This means that every time you add just one more qubit to a quantum computer the number of states that can represent and examine doubles.

So, a 50-qubit quantum machine could examine 250 = 1,12,58,99,90,68,42,624 states at once, this exponential increase in power together with the entanglement of qubits is what allows quantum computers to solve certain problems so much more efficiently.

300 qubits could hold more numbers simultaneously that there are atoms in the universe.

While a classical computer solves a problem like a maze by testing each possible route one at a time. A quantum computer uses its entangled quantum states to find the correct route quicker with far fewer calculations.

Think of it this way, technologies that currently run on classical computers can expertly find patterns and insights buried in vast amounts of existing data but quantum computers will deliver solutions where patterns cannot be seen because sufficient data doesn’t exist or the possibilities for discovering an optimal answer are too enormous to ever be processed by a classical computer.

To be in their quantum state qubits must be free from all radiations and kept at a temperature just above that of absolute zero (0 Kelvin or −273.15° Celsius), this voids the entire advantage of the machine. Right now, we can only achieve a quantum superposition for a tiny fraction of a second.

Quantum computers could lead to the discovery of new medicines and materials by helping us untangle the complexities of molecular and chemical interactions. They could help the financial services industry make better investments by finding new ways to model financial data and isolate key global risk factors. They could even transform the supply chain and logistics by finding the optimal routes across global systems like optimizing fleet operations for deliveries during the holiday season.

The manipulation of quantum nature through code is known as a quantum algorithm. Mathematicians and scientists around the world are on a race to build these algorithms for when capable quantum computers arrive.

Quantum computing won’t replace our everyday computers and smartphones but its ability to solve complex problems will open up a new universe of information, transforming our view of the world and the way we navigate it. 

2020-10-31 13:33
Sebastin SironMani A

Night Light Feature

It's becoming common knowledge that exposure to blue light can suppress the production of melatonin, preventing your body from winding down properly before bed and making it more difficult to sleep, especially for those who remain on their devices throughout the evening. If you often work at night or simply like to read on a screen before going to sleep, this can be a game-changer.

Windows 10:

Windows can enable the "Night light" feature found in Settings > System > Display, which will automatically apply a similar filter to your display as the sun sets and then remove it at the sun rises.

Along with the ability to set custom hours, you can tweak the temperature of the filter with a manual slider in "Night light settings" and the feature can be enabled/disabled without returning to the settings by using the button in the Action Center (beside the Windows clock).  

MAC OS:

MAC OS users from Sierra 10.12.4 onward have an option called "Night Shift" which can be found by navigating to System Preferences > Displays > Night Shift (tab) and provides about the same level of functionality as already described for Windows 10.

Night Shift is also available on select iOS devices (iPhone 5s onward, iPod Touch 6G, iPad Air and newer, iPad Mini 2 and newer, and iPad Pro), head to Settings > Display & Brightness > Night Shift.

2020-11-03 23:24
Sebastin SironMani A

How to prevent my laptop from damages

Keep liquids away from your laptop - As tempting as it might be to drink coffee, juice, water, or any other liquid near your laptop, accidents can happen all too easily. Spilled liquids may damage the internal microelectronic components or cause electrical damage. Short circuits can corrupt data or even permanently destroy some parts of the laptop. The solution is very simple: Keep your drinks away from your computer. Even if you are careful, someone else might spill your drink.

Keep food away from your laptop - Please don't eat over your laptop, the crumbs can fall between the keys and provide an invitation to small bugs or damage the circuitry. Worse yet, the laptop will look dirty if there are crumbs on it.

Do not use your computer in a room where pet animals are - Their fur and hair can get into the internal workings and damage them. Also, larger pet animals like dogs can accidentally damage them by knocking them off their support by brushing past, wagging tail, tripping over leads, etc.

Always have clean hands when using your laptop - Clean hands make it easier to use your laptop touchpad and there will be less risk of leaving dirt and other stains on the computer. In addition, if you clean your hands before you use the laptop, you will reduce wear and tear on the coating caused by contact with sweat and small particles that can act upon the laptop's exterior.

Avoid placing heavy materials, such as books, on top of your laptop - This can push the LCD screen into the keyboard, and will eventually damage it. Also, the CD-ROM insert will be squished and, eventually, will break.

Try to keep the laptop on a flat, clean surface - This prevents damage to the laptop. This can be hard to do, particularly if you are outside with your laptop, but if there is a flat surface available then put your laptop on it.

Don't use your laptop on the bed/pillow - Repeated use of a laptop on the bed/pillow will cause the fans to suck up the dust and debris in the bed, ultimately blocking the fan.

Protect the LCD display monitor - When you shut your laptop, make sure there are no small items, such as a pencil or small ear-phones, on the keyboard. These can damage the display screen if the laptop is shut on them; the screen will scratch if the item is rough. Close the lid gently and holding it in the middle. Closing the lid using only one side causes pressure on that hinge, and over time can cause it to bend and snap.

 

- Thank you for doing the right thing, we respect your diligence  -

2020-11-15 15:23
Praveen R

Can I use my TV as a Computer Monitor?

Can your TV, be used as a monitor? Let's figure it out.

TV broadcasts and video cameras use a clever compression technique called Chroma subsampling that takes advantage of the fact that our eyes are most sensitive to differences in light than color differences. Chroma Subsampling throws out some of the video feed’s color data to allow for more luminance information. So that the picture has enough contrast to appear clear to us while using much less video bandwidth.

How does this work?

Well, when you’re looking at chroma subsampling specifications, you might see numbers like 4:2:2 or 4:2:0. This basically means that if you take a 4x4 block of pixels, only one half or one quarter respectively, of the original color data, will be retained. The luminance data for each pixel is retained fully but applied to only one half or one quarter as many colors.

Chroma subsampling is a widespread standard for movies and TV, which typically use the 4:2:0 method. It’s a big part of the reason you can watch 4K Netflix or YouTube without it constantly buffering. And even non-streaming options, like home Blu-Ray disc players, make frequent use of it. And although this might sound like you’ll end up not seeing accurate colors, our eyes simply can’t tell the difference in many cases. Given that a 4:2:0 subsampled video file only takes up about half as much space as an uncompressed or 4:4:4 file, it is not surprising that it is very commonly used.
But are there times when 4:4:4 is actually important to have? The answer is yes, especially if your screen is connected to a computer. You see subsampling is fine for content with smooth gradations, like movies and sporting events, and even many video games. But if the display you have hooked up to your PC is subsampling, text and other UI elements with sharp edges, can look smudged and blurry.

This typically is not an issue for actual computer monitors, as these are usually designed to display a 4:4:4 signal, but televisions are notorious for undesirable subsampling, which you may have seen for yourself if you’ve ever tried to type a word document or present a PowerPoint presentation or read an article in your browser on your conference room TV via casting or HDMI, an artifact sometimes called fringing(Pretty hard to read, depending on the background color)

Nowadays though, many modern TVs can be specifically told that they’re connected to a PC, and therefore should not subsample. Typically, if you can locate a setting called something like UHD ColourDeep ColourRGB, or something similar, switching to it should force the TV to display your images in 4:4:4. And other times, simply selecting a PC or Computer Mode on your TV will also do the trick. 

2020-11-23 18:12
Sebastin SironMani A

New Google Storage Policy - Update

Google announced a new storage policy. This says, going forward, if you don't check in on your Google Drive files every now and then, it may delete them. Google frames this change as a way to tidy up abandoned digital detritus, perhaps leftover from long-forgotten accounts. Which, maybe, sure. Or, alternatively, it may be that a Google user simply stored some valuable files away for a while, as one might with physical documents in a fire-proof safe, and simply hasn't peeked at them in a few years.

Google at present has no plans to just start deleting your stuff willy-nilly. However, it's letting you know that come June 1, 2021, the clock is ticking.

"The simplest way to keep your data active is to periodically visit Gmail, Google Photos, and Google Drive (and/or collaborative content creation apps like Google Docs, Sheets, Slides, Drawings, Forms, Jamboard, and Sites) on the web or through an official Google app," explains the support page. "Make sure you're signed in and connected to the internet."

But don't stress too hard. Google claims it will attempt to warn users "using email and notifications" before throwing their documents in the trash. It will do so, the Google support page explains, "at least three months" before the two-year mark.

Interestingly, the ability to delete the contents of users' accounts after a predetermined amount of time is actually a Google feature. It's called ‘Inactive Account Manager’, and it lets users instruct Google to delete their data after a set period of time.

Now, with the recent update, Google has made it clear that it's no longer interested in being your forever storage locker. So make sure to check in on your files every now and then going forward.

- Thank you for doing the right thing, we respect your diligence  -

2020-11-25 13:20
Praveen R

Few ways to speed up your laptop performance

Delete unused programs:- The internet is full of helpful tools and utilities that can be downloaded to accomplish various tasks, from data backup to desktop customization, but these applications have a tendency to accumulate over time. It is easy to build up a large collection of programs on your hard drive that you don't really use anymore, and these can often contribute to laptops feeling slower in day-to-day use. A good rule of thumb is to regularly audit your installed applications (which you can do from Windows 10’s settings menu) and inform IT to remove any program that you no longer use regularly.

 

Limit startup programs:-

Many programs (including some of the apps mentioned above) are designed to start automatically as soon as Windows boots. Software manufacturers often set their programs to open in the background, out of sight, so they'll open right away when you click their icons. That's helpful for programs you use a lot, but for programs you rarely or never use, this wastes precious memory and acts as a drag on overall system speed as well as making your machine slower to boot to the desktop.

Thankfully, it is now easier than ever in Windows 10 to adjust what applications are allowed to run on startup. Simply head to the settings menu, click on ‘Apps’ followed by the ‘Startup’ tab; this will show you a list of every program or service that has the option of running at startup, a label showing the impact on system resources and performance, and a toggle switch to block or allow it from running on boot. Simply flip the switch on any services that you don’t want to run all the time, and you should start to see an improvement in performance and boot times.

 

Avoid opening multiple tabs in a window while browsing:-

Too many browser tabs! It’s a problem everyone has at some point. Besides cluttering your monitor, having multiple tabs open makes it hard to find the right tab when you need it, and jumping from tab to tab is hardly a productive activity. Also, your browser will use up more memory, slowing down your computer and your work.

The simple solution, of course, is to close tabs as soon as you don't need them (Use the CTRL + W or CMD + W keyboard shortcut to close tabs instantly).

 

Clear cache & cookies:- When you use a browser, like Chrome, it saves some information from websites in its cache and cookies. Clearing them fixes certain problems, like loading or formatting issues on sites.

Follow the below steps to clear cache & cookies on google chrome browser,

1. On your computer, open Chrome.
2. At the top right, click More.
3. Click More tools Clear browsing data.
4. At the top, choose a time range. To delete everything, select All time.
5. Next to "Cookies and other site data" and "Cached images and files," check the boxes.
6. Click Clear data.

 

Defrag your hard disk:-

Defragmentation - or defragging - restructures the disk so that all of the bits that make up various files are grouped in the same physical area, which hopefully increases the speed of hard drive access at the same time. Note, however, that because solid-state drives (SSDs) do not use spinning-platter disks, they are immune to fragmentation.

It is easy to check whether a physical disk is in need of defragging; simply head to the storage tab in Windows 10’s system settings menu, and click the option labeled ‘Optimize drives’ (or run a command ‘dfrgui’ in cmd prompt). This will open the optimization wizard, which allows you to analyze your machine’s drives individually and presents you with a percentage showing how fragmented each one is. From there, you can defrag the drive, which should result in more stability and faster performance.

 

Windows Update:

Windows Update is a free Microsoft service that is used to provide updates like service packs and patches for the Windows operating system and other Microsoft software. Windows Update can also be used to update drivers for popular hardware devices.

In Windows 10, you decide when and how to get the latest updates to keep your device running smoothly and securely. It can be accessible by the following steps.

  • Windows update is built-in and a part of Windows Settings, available from the Start menu (Search from Start as “Check for Updates”) Or   
  • To manually check for the latest recommended updates, select StartSettingsUpdate & Security > Windows Update Or
  • Windows Update can also be accessed by executing this command from the Run dialog box (WIN+R).
             control /name Microsoft.WindowsUpdate

Click “Check for updates” to get the latest updates and install them. 

Note: Please restart your Laptop/Desktop once the installation got place (Mandatory).

- Thank you for doing the right thing, we respect your diligence  -

2021-05-08 06:21
Praveen R

How to stop annoying browser prompts(Location/Send Notifications)

If you've grown tired of answering those annoying browser prompts every time a website wants to show you notifications or know your location, you can turn the messages off forever with a few clicks in every major browser. Scroll down below for your browser and where to locate the appropriate settings in Chrome (desktop and Android), Firefox, Opera, Edge, and Safari (desktop).

Chrome:

From the dropdown menu > select Settings > Search as “site settings” > Permissions.

From here you can click into 'Location' and 'Notifications' separately to disable each. This will block the pop-ups forever while also preventing websites from knowing your location and sending you notifications.

Firefox:

In the address bar type "about:config" and hit Enter. Accept the risk when prompted.

If you made it under the hood safely, use the search bar to find the following entries: dom.webnotifications.enabled and geo.enabled.

Double-clicking on each entry will set their values to false, which is what you want to do if you're trying to disable the pop-ups.

Opera:

From the dropdown menu, select Settings and then go to the Websites tab.

Location and notification prompts are both listed halfway through the website section of Opera's menu settings -- set both of them to "do not allow...".

Microsoft Edge:

Open Windows 10's Settings (search 'settings' via Start), then go to Privacy > Location.

Scroll down in this section to 'Choose apps that can use your location' and you can customize the settings for Microsoft Edge along with other applications. Note that disabling 'Location service' on the top of the same page will block all apps from using your location.

Open Edge's settings menu, go to View advanced settings > Notifications (manage).

Websites that can show notifications will be listed here so you can customize which ones are able to send them. Likewise, from the privacy settings in the Windows 10 menu mentioned above, the notifications section will let you block them from all applications.

Safari(macOS):

From Safari's dropdown menu, select Preferences then go to the Websites tab. On the left side menu, you'll find Location and Notifications.

On Location, you will find per website settings based on the currently opened tabs. But to deny location to all websites, on the bottom right corner select where it says "When visiting other websites:" select Deny.

On the Notifications settings, uncheck the option where it says, "Allow websites to ask for permission to send push notifications."

2020-11-30 03:19
Sebastin SironMani A

Apple Silicon

For a long time now, Apple has stood alone among major computer and smartphone manufacturers in using their own operating systems developed in-house rather than licensing Windows or Android. So, it’s probably not super surprising that they’ve recently announced they’re going to start using their own processors in iMacs and MacBooks.

But after using Intel chips for the past 15 years, why are they making this change? And what exactly can we expect from Apple’s attempt to strike out on their own? To answer, let’s first look at a bit of Apple’s history because this isn’t the first time, they’ve gone against the grain in terms of what kind of silicon lies at the heart of their computers. 

Prior to 2005, Apple used a series of processors branded as PowerPC, which was a non-x86 architecture that arose from a joint venture between Apple, IBM, and Motorola as a way to counter the dominance of Intel-based PCs running Windows. However, Apple made the switch to Intel because it was becoming difficult for IBM and Motorola to manufacture chips that could compete with Intel in terms of performance. And of course, a lot of this came down to cost.

You see unlike Intel, who was primarily in the business of chip-making and could crank out tons of CPUs very cost-effectively, Motorola and IBM had lots of other operations and simply couldn’t operate their chip-making at the same scale as Intel. Then you had the fact that Apple didn’t control as much of the home computer market, and either IBM or Motorola didn’t want to keep pouring money into making processors for a computer manufacturer that was still dwarfed by companies making “Wintel machines”.

This is especially true given that Apple was dividing up the money they were spending on CPUs between the two companies, hurting both IBM and Motorola’s bottom lines even more. Ironically, the cost is once again a big factor in Apple’s decision to transition away from Intel and put its own processor inside its PCs.  One analyst estimates that Apple could save between $100 and $150 for every system they build with one of its own CPUs.

There are many other considerations that would’ve gone into this decision. One is that Apple was reportedly unhappy with Intel’s quality control for some time. But even aside from that, Apple also seems to believe that they can save significantly on power consumption. Now Intel obviously does have CPUs built for very low power applications, such as their Y-Series that go into laptops designed for long battery life.

But the ARM architecture in Apple’s chips could lead to even greater power savings. Unlike Intel’s x86 architecture, ARM is an example of a reduced instruction set or RISC architecture, meaning that CPU instructions are intended to be executed in just one cycle as opposed to over multiple cycles. Oftentimes, the result of using RISC is greater power efficiency. Meaning that ARM chips have been used extensively in tablets, smartphones, and even smartwatches, which need to extend their battery life as much as possible.

But don’t think that low power consumption automatically means lower performance. That old PowerPC architecture that we mentioned earlier that Apple used in its older desktops and laptops, those were actually RISC chips as well. And there are even supercomputers that use RISC. Not to mention that even Intel’s modern x86 processors have elements of RISC computing backed into them. But it was hard not to notice that Apple’s announcement at WWDC was rather short on specific details about the performance. While it is true that the A14 ARM chips found in the iPhone 12 series are significantly ahead of competing products from Qualcomm, it isn’t quite clear yet how Apple’s new silicon will fare against Intel in a desktop or laptop environment.

Regardless, the new chips will at the very least allow both iOS/iPadOS apps and macOS programs to natively run side by side on the same machine, making things easier not only for your average home user but also for developers who will no longer have to code for two different platforms. Apple is also providing tools for developers to port their x86 applications over to the new Macs. Though it remains to be seen how much performance will or won’t suffer, especially for programs that will need emulation for the time being, which introduces inherent performance overhead as it translates from x86 to ARM.

So, it looks like we’ll have to be patient in order to find out exactly how Apple’s homemade chips stack up to the competition, as they still apparently have plans to release new Intel-based Macs for two more years before switching over to their own silicon completely.

2020-11-30 03:21
Sebastin SironMani A

Unity Annotation Tool (UAT) Download instructions:

Step 1:

Access the following link to the Workstation Installation and Upgrade Page -->

https://uats.us.imaging.watson-health.ibm.com/drpacs/downloads/default.aspx

Allow the page to load. It may take up to 15 seconds.

Step 2:

After the page loads, a login screen will appear. Be sure to login using your provided UAT login credentials.

Step 3:

Once the page loads, select Dominator Station --> Install Dominator.

Step 4:

Click Save or Save As for the prompt at the bottom of the page.

Notes...
  • The download takes about 20-25 minutes and running Dominator the first time after the download takes about 10-15 minutes.
  • Click OK for a privacy warning. Continue installing the applications.
  • To avoid downloading Unity again if an antivirus application prevents the installation from completing, download and save Dominator locally before running it.
  • Accept any firewall warning when running the application. ü Answer any antivirus questions and click Run or Run anyway for Microsoft warning messages.

2020-12-03 10:06
Praveen R

Guidelines for working at home while disasters:

Set up your Workspace
  • If you don’t already have a spot designated, find one
  • Make sure there’s a power supply nearby, or that you safely can run an extension cord and power strip to your location
  • Have your essentials nearby, including a laptop, charger, headphones, and note-taking materials
Make an Internet plan B  
  • Subscribe to a cellular internet plan with ample bandwidth
  • Learn how to use your phone as an Internet hotspot
  • Have all devices fully charged at all times, and keep an auxiliary battery bank handy in case you have a prolonged outage and run out of juice you may need your phone in an emergency  
Save your work often
  • Back up your work frequently to ensure you don’t lose it all when the lights go out
  • As an extra precaution, save your work in 'Google Drive' in case you can’t access your computer files later
 
Please get in touch with the IT/Facilities team in case of any emergency support.

2020-12-04 06:39
Praveen R

Email Spam and Reputation

Email spam, also known as junk email, is unsolicited bulk messages sent through email. Recipients of spam often have had their email addresses obtained by spambots, which are automated programs that crawl the internet looking for email addresses. Spammers use spambots to create email distribution lists. A spammer typically sends an email to millions of email addresses, with the expectation that only a small number will respond or interact with the message.

The term spam is derived from a famous Monty Python sketch in which there are many repetitive iterations of the Hormel canned meat product.

Why do people send spam?

Often, spam email is sent for commercial purposes. While some people view it as unethical, many businesses still use spam. Spam email can also be a malicious attempt to gain access to your computer.

Common types of spam:

  • Commercial advertisements
  • Antivirus warnings
  • Email spoofing
  • Sweepstakes winners
  • Money scams

How to react:

  • Recognize the email sender(sometimes mimicked).
  • Check the content.
  • Do not click any links(downloads, subscribe, etc) which is associated.
  • Do not respond and mark it as Spam.
  • Always confirm with IT if you suspect anything wrong.

Will it affect Company Reputation Level:

Yes. If you are marking the email as Spam without knowing exactly, definitely affects the reputation of the domain level and company.

Sender reputation is a score assigned to a sender based on the quality of email campaigns, their frequency, volume, and user interaction. Avoid sending too many emails or too often because it gives a negative signal to ESP filters, and your future emails will be considered spam. 

6 Factors to influence a sender reputation:

  • Email sending volume and frequency
  • SPAM complaints
  • SPAM traps
  • Bounces
  • User interaction
  • Unsubscribing

Please be more careful, when we are finding the spam email and mark it as spam.

2020-12-14 22:21
Sebastin SironMani A

A Deeper Analysis on Google's Recent Outage

The world always assumes that Google services will be there from Gmail and YouTube to Cloud Storage, Search and IoT management we take it for granted. Each hour YouTube has 30,000 hours of video uploaded, Google receives almost 230 million search queries, and an enormous number of emails are sent. In terms of connections, Google controls about a third of the surface internet but on Monday the 14th of December 2020, all of Google services suddenly disappeared across the world, users were unable to access emails, kicked out of ongoing Google Meet sessions.

One Twitter user even said that he was left sitting in the dark with his toddler as his Google Home system had failed. The crash had become one of the biggest social media trends. It sent waves of panic across businesses in many parts of the world. How could one of the largest companies suddenly go dark on all of its services at once? What happened? Was this a hack?

In total, the outage only lasted one hour but had already caused a lot of chaos. When it was all over most people forgot about it and went about their day. But when we analyze the situation some interesting things emerge. Not only are consumers dependent on Google but many businesses like us are also dependent on Google and how does Google avoid downtime in the first place?

Google outage caused pandemonium across the world. Some of the biggest companies in the world use Google and this includes Uber, Airbnb, Pinterest, Netflix, Spotify, Twitter, Instacart, and the list goes on and their employees could not able to reach not just these services in terms of Gmail but in some cases not able to get into the system at all. Lots of companies use Gmail to authenticate such as Salesforce, Dropbox so many others, in certain cases inaccessible and it also hits IoT devices such as Smart Thermostats, Smart Lights, those also appeared to be down.

Gmail, Google Search, YouTube, Google Docs, Google Drive, Nest Home Systems, Google Play even Google Stadia cloud gaming service all gone. The WSJ newsroom was dependent on Google Services, so during the outage, some reporters had to resort to using telephones to collaborate in writing stories. Some schools in the US had to close for the day. Wayne-Westland Community Schools in Michigan gave its combined 10,000 students the day off after Google crashed, the school relied on Google Meet for classes. Many other educational institutions would have been affected due to the prevalence of online classes because of the ongoing pandemic. There were also cases of the management of medical companies not being able to check on the schedules of physicians and other medical staff not being able to contact customers.

Remote work and learning have left individuals and businesses more dependent on online services than ever and in this domain, Google is the most widely used. All in all, the outage affected billions of people worldwide. So, what happened?

Google’s spokeswoman told the WSJ that there was a problem with the company’s system that authenticates log-in credentials. She stated that the problem was due to internal servers and that the issues weren’t the result of a cyber-attack. This explanation doesn’t give us much but that’s just about all that Google wants to say about the issue. It really is rare for Google to have such a global outage like this because even single physical geography is served by multiple servers across the world and even on these servers there are multiple backups that rapidly come online if there’s a problem. So, as we’ve seen so many businesses and people’s livelihoods rely on Google. It raises some serious questions what if next time Google was down not just for an hour but for days, billions of dollars in revenue could be lost by companies around the world.

So how does Google prevent this? How does Google basically never go down? Google calls its plan to keep its services up and running, Site Reliability Engineering (SRE), coined all the way back in 2006, SRE is a digital design philosophy basically for Google the idea is to get the software developers to run software management.

People call this kind of philosophy DevOps. Basically, the development of software coding that provides the outcomes of a system administrator. The thinking goes as follows, software developers will get bored by performing tasks by hand and naturally build tools to help automate the process without the involvement of actual people. In fact, Google has written a book about this.

Google states that SRE is its most fundamental feature. Todd Underwood of Google SRE team in 2016 told WIRED magazine, “We long for the day when nobody runs anything”. It’s interesting because traditionally development and operations were opposing forces, the developers always wanted to build new software and get the changes out to the public as fast as possible, but the operations team wanted to ensure that nothing went wrong and the best way to do this is to keep the changes to a minimum.

The trick that Google found is that if we combine development and operations, we can get a powerful synergy for a reliable system. It makes sense, Google is the world’s largest online empire, so the more humans we are running the more probability there is for mistakes. So, just have code run everything.

What about hacking? To combat the threat of hacking Google often runs hacking championships, these feature hackers who report security problems so they can be fixed before bad actors exploit them. Google calls this the Vulnerability Reward Program and it was first launched in 2010.

Though this next part is the interesting thing, the Google outage occurred just a mere few hours after it was discovered that the US Government had been targeted by a foreign cyber-attack. The hack was so serious that it led to an emergency National Security Council meeting at the White House. Experts are calling out it one of the most sophisticated hacks ever seen. It was done through something called a Supply-Chain Hack.

A software tool called SolarWinds that was used by government departments was infected with malware during an update, after this, the hackers were able to monitor internal emails and do some general snooping. The infected software update in question was released all the way back in March of 2020 and lay undetected until last week. Thousands of companies and American government departments use some form of SolarWinds software, some affected by the hack include the Department of Homeland Security, Department of Justice, Department of Defence, Treasury Department, NASA, NSA, and more. All of the top 10 US telecom companies and 425 of the US Fortune 500 companies are all said to be at risk. It is estimated that 18,000 clients had installed the infected update. Ironically, SolarWinds software monitors the computer networks of businesses and governments for outages.

But what if this massive Google outage was a response to the SolarWinds attack? Google’s staff may have been hurriedly shoring up their security and the scrambling resulted in some downtime across all of their services. For a massive worldwide outage to occur just a few hours after a massive cyber-attack on some of America’s biggest companies is pretty interesting timing, to put it mildly.

Google’s outage can be seen as a stark reminder of our hyper-connectedness. The company has become a bottleneck for so much of the world’s processes, it’s become part of a massive system and if it breaks that also has massive consequences. For just one company to become an unexpected chokepoint for global productivity is pretty unnerving.

So, what can be done? Well, the solution is obvious, there are alternatives to Google for every service they provide. It really comes down to the individual person or business, what it all comes down to is trading in some of that convenience that we’ve all gotten used to.


2020-12-30 08:10
Praveen R

Cookies

Cookies are small files stored in your browser cache that can do many useful things have also been scrutinized for potentially compromising user privacy. So how exactly do these things work and why are they even called cookies? The name comes from ‘Magic Cookie’ which was an early term for a small piece of data passed between computers usually for identification purposes. Modern browser cookies also identify your computer but they serve the additional purpose of tracking your activity which isn’t always as nefarious as it sounds.

The way it works is that when you visit a cookie-enabled site for the first time, let’s say Amazon, the site will put a cookie on your browser that contains a unique ID. Amazon uses this ID to keep track of your session so the site knows, which shopping cart is yours and what you’ve looked at so it can suggest products based on your past activity.

Session management with cookies has many more applications though than just virtual shopping carts. The identifier in a cookie can allow a server to,

  • Keep track of your login, so you don’t have to keep entering your password every time you visit a site.
  • It can remember how you’ve customized the layout or appearance of a page previously.
  • Cookies also allow sites to figure out how many unique visitors they get since each unique visitor has their ID contained within a cookie which is important for webmasters who need analytics data for business development.

Cookies make things more convenient but you might also hear they can also spy on you. One of the most common ways that your browser can compromise your privacy is by allowing third-party cookies that are sent from sites other than the one that you’re visiting, for instance, banner ads are often hosted on a different domain than the one that you’re actually browsing and can plant cookies on your browser that track you across multiple sites which many people find intrusive and downright creepy.

But even worse is the potential for cookie theft which is usually supersensitive things like website passwords aren’t stored in cookies but the identifier in the cookie can be used to essentially steal a logged-in session, meaning that an attacker could access your shopping cart, bank account or even medical records without even knowing your password and get this browser usually just store your cookies in plain text without any encryption making them a vulnerable target, though using websites that transmit cookie data over a secure connection can help somewhat.

So, what can you do then to mitigate these privacy risks?

  • Most browsers will allow you to disable third-party cookies with a simple option, so you’ll only get cookies directly from the site that you’re visiting and if you want to take it a step further you can disable cookies entirely if you don’t mind the features that they offer.
  • If you’ve got cookies on or even just in general be careful about what you click on and what sites you’re browsing. If you’re only navigating to trusted sites that are going to not spy on you then no one will be spying on you. Although it’s not always easy to tell who to trust these days.
  • Periodically clearing your browser cookies and cache not only improves the security but also fixes certain problems, like loading or formatting issues on sites.
  • Finally keeping the hard drive on your laptop encrypted is a pretty key one because if someone walks off with your entire computer and all the cookies on it, it’s an easy way to have the bad guys stealing all your cookies.

Here is the article shows how to clear your browser cookies.

2021-01-10 10:46
Sebastin SironMani A

Free-up Google Drive Space

Google Drive is a file storage and synchronization service developed by Google. It allows users to store files on their servers, synchronize files across devices, and share files. Itis a RESTful online file storage web service for storing and accessing data onGoogle Cloud Platform infrastructure. 

The service combines the performance and scalability of Google's cloud with advanced security and sharing capabilities.

Google Drive offers users 30 GB of storage associated with Email and Drive through GSuite in default. To check the storage of your current Drive, here is the spot.

If it exceeds the limit, we could face some issues.

  • Mail won't work if the drive usage goes above 95%.
  • Won’t store any data inside the drive.
  • Won’t allow creating any Google documents.

To avoid such circumstances, please follow the below steps.

  • Free up space by deleting old emails especially from the trash.
  • Delete files by size in Google Drive listed from largest to smallest.
  • Delete permanently from the trash in Drive as well if you don’t need them.

These methods wouldn't apply (The support Team will require all emails), please immediately contact IT support, we'll upgrade your storage.

Please note that Google doesn't have a proactive system to notify the administrators regarding theuser's storage quota, so it's the user's responsibility to notify the warning and take appropriate action from above.

2021-01-23 15:42
Sebastin SironMani A

Google Chrome Shortcut Keys

Here listing out all the major shortcut keys used with Google Chrome and Internet Explorer. If you are using Mac, use instead of where applicable.

Shortcut Description
Alt+Home Open your homepage.
Alt+Left Arrow Back a page.
Alt+Right Arrow Forward a page.
F11 Display the current website in full-screen mode. Pressing F11 again will exit this mode.
Esc Stop loading the page or a download from loading.
Ctrl+(- or +) Zoom in or out of a page, "-" will zoom out and "+" will zoom in on the page.
Ctrl+1-8 Pressing Ctrl and any number 1 through 8 moves to the corresponding tab in your tab bar.
Ctrl+9 Switch to the last tab.
Ctrl+0 Reset browser zoom to default.
Ctrl+Enter This combination is used to quickly complete an address. For example, type "computerhope" in the address bar and press Ctrl+Enter to get https://www.computerhope.com.
Ctrl+Shift+Delete Open the Clear browsing data window to quickly clear private data.
Ctrl+Shift+B Toggle the bookmarks bar between hidden and shown.
Ctrl+A Select everything on a page.
Ctrl+D Add a bookmark for the page currently opened.
Ctrl+F Open the "find" bar to search text on the current page.
Ctrl+O Open a file in the browser.
Ctrl+Shift+O Open the Bookmark manager.
Ctrl+H Open browser history in a new tab.
Ctrl+J Display the downloads window.
Ctrl+K or Ctrl+E Moves your text cursor to the omnibox so that you can begin typing your search query and perform a Google search.
Ctrl+L, Alt+D Move the cursor to the browser address bar and highlight everything in it.
Ctrl+N Open New browser window.
Ctrl+Shift+N Open a new window in incognito (private) mode.
Ctrl+P Print current page or frame.
Ctrl+R or F5 Refresh the current page or frame.
Ctrl+S Opens the Save As window to save the current page.
Ctrl+T Opens a new tab.
Ctrl+U View a web page's source code.
Ctrl+W Closes the current tab.
Ctrl+Shift+W Closes the currently selected window.
Ctrl+Shift+T This combination reopens the last tab you've closed. If you've closed multiple tabs, you can press this shortcut key multiple times to restore each of the closed tabs.
Ctrl+Tab Moves through each of the open tabs going to the right.
Ctrl+Shift+Tab Moves through each of the open tabs going to the left.
Ctrl+Left-click Open a link in a new tab in the background.
Ctrl+Shift+Left-click Open a link in a new tab and switch to the new tab.
Spacebar Moves down a page at a time.
Shift+Spacebar Moves up a page at a time.

 

2021-01-30 14:58
Sebastin SironMani A

Windows 10 Features

Windows 10 features an improved MetroUI and brought back the Start menu that everyone missed in Windows 8. It mixes the best of Windows 7 and 8 in a new way that’s useful, improves productivity, and looks stunning. Here listing out some features that tend to use more often.

Touchpad Gestures:

The new gestures include using two-finger swipes to scroll through a document or web page, three-finger swipes to switch between apps and launching the multitasking view, four-finger swipes to move between virtual desktops, and a number of other gestures and taps. To find what all you can do with the touchpad on your Windows 10 machine and disable or enable these gestures, just go to Settings -> Devices -> Touchpad and interact with the options present there. 

Storage Sense to Manage Storage:

This new feature in Windows is its ability to automatically delete unnecessary files such as temporary files and files in your trash to release storage on your device. To enable this feature, go to Settings -> System -> Storage and turn on the toggle under the “Storage Sense” option.

Quickly Access Emoji Keyboard:

Emojis have become more popular than anyone could have ever imagined and it’s easier to access them on your Windows machine through " +. " button.

Turn on the New Screenshot Tool:

To enable this option just go to Settings -> Ease of Access -> Keyboard and turn on the “Print Screen Shortcut”. Once you have done this, whenever you hit the Print Screen button you will be presented with three options. You can either capture the entire desktop, capture a part of the desktop, or capture a part of the desktop in free form. Once you capture the screenshot it will open in a window where you can also easily annotate it, and share it with anyone you want to.

Privacy Settings:

Windows records your usage(such as location data, getting to know your features, and more) to give you a better service, however, if you are not comfortable sharing your information with Microsoft, you should certainly switch these things off.

Settings -> Privacy -> General and turn off all the toggles.

Then go to “Inking and typing personalization” and turn it off(to restrict Windows from tracking your typing and inking history). Similarly, you can click on other options such as “Diagnostics and Feedback”, “Activity History”, and more to disable sharing of your information that you don’t want to.

Enable Dark Mode:

To enable dark mode go to Settings -> Personalization -> Colors and scroll down and enable the dark mode.

Open Windows Clipboard:

Windows 10 has got a new Clipboard History feature. It allows you to see all your copied items in one place. This will be immensely helpful for users who use copy-paste functionality regularly. Just press Windows key + V together and you will instantly get the Clipboard History window. From there, you can navigate through all the copied items and hit enter to paste a text or an image.

2021-02-07 16:53
Sebastin SironMani A

Slack Configuration Steps:

What is Slack?

Slack is a powerful business collaboration and communication tool designed to make internal communication between staff and teams simpler and more streamlined for everyone.

Slack Installation:

Platform Link
Apple iOS https://apps.apple.com/app/slack-app/id618783545?ls=1
Apple macOS https://itunes.apple.com/app/slack/id803453959
Google Play Store https://play.google.com/store/apps/details?id=com.Slack
Microsoft Windows https://app.slack.com/client/T03TY07AY/C03TY07BWhttps://slack.com/downloads/windows

 

Sign in to CapeStart Slack Workspace:

   

  • Or go to the Slack application and click “Sign In To Slack”.

  • Fill the OTP to advance to the next page.

  • Fill the fields and create your Slack account.

  • Click “Open” from the browser pop-up to redirect to the Slack application.

Some of the common Slack terms,

  • ChannelChannels are spaces for all the people, tools, and files that you need to get work done in Slack. You can create channels for different teams, topics, and projects to bring order and clarity to work.

  • Direct message (DM): Direct messages are one-to-one conversations between you and another member.

  • Mention (@mention): When you send a message and include an @mention, the person you mention will be notified. Type the @ sign followed by a member's full name or display name.

  • Screen sharing: During a call, present your screen or allow others to draw on it.

  • Thread: A conversation consisting of an initial Slack message and its replies.

  • Voice calls: Talk with your teammates in Slack.

Thanks!

2021-02-28 10:49
Praveen R

Chrome Flags

Chrome flags are a set of experimental features and settings that are buried in Chrome for developers and tinkerers. It will let you improve your browsing performance and also lets you use new in-development features.

Before we come to know how you can enable Chrome flags, it’s essential to know that some of the features might be a little buggy and the changes might crash your Chrome settings and data. It is advisable to use it when you want at a minimal level.

How to enable it?

  • Please find Chrome flags by just typing “chrome://flags” or “about://flags” in the Omnibox (address/search bar).
  • Once ‘Chrome flags’ is open, you’ll see a long list of features that you can enable or disable. You can easily search for specific features by typing in the search box.
  • All the advanced features have a short description below along with the platforms they are available in. You can enable any feature you like by just hitting the “Enable” button or changing it from “Default” to “Enabled” or “Disabled”.
  • After you select the “Enable” or “Disable” option, you will be presented with a “Relaunch Now” button that will save your changes and restart Chrome with the changes in place.
  • If you feel that your Chrome experience has become unstable but can’t find the flag that might have caused it, you can use the “reset all to default” button to restore all the Chrome flags settings.

Some of the Features:

  1. Quieter Notification
    We know how notifications have become almost a nuisance on Google Chrome. Almost every website abuses the notification permission and incessantly prompts a dialog box to allow notifications. However, with the Quieter Notification flag turned on, the notification prompts gets blocked completely.

  2. Faster Download Speeds
    Parallel Downloading has been in the Chrome Flags repository for a very long time. It seems Google is not working on this feature to make it part of the stable channel. Nevertheless, this flag accelerates download speed by breaking the files into smaller chunks, similar to how IDM and other download managers work.

  3. Enable Smooth ScrollingAs the name suggests, this Chrome flag helps improve the scrolling experience on your mobile and desktop. It reduces the janks and jitters that you may witness while scrolling and it works with Windows, Linux, and Chrome OS as well.

  4. Secure DNS Lookups
    Another awesome Chrome Flag that you must enable is Secure DNS Lookups. Many users, including me, have been using the HTTPS Everywhere extension to always force HTTPS connection while using the internet. And now, Google has brought a flag that does the same thing. So just enable the flag and Chrome will try to use a secure HTTPS connection for any website that you are visiting. By the way, Mozilla has already made DNS over HTTPS a default feature on Firefox.

  5. Share Webpages Using QR Codes
    This is one of the latest Google Chrome Flags and its job is to make sharing links easier. Suppose you are browsing the web on your desktop and you want to quickly open that link on your mobile device. Well, there’s no easy way to share links to your mobile device unless you are logged in to the desktop Chrome and your mobile device with the same Google ID. Well, if you enable this flag you will be able to share links in seconds. To make this work, open the Google Flags page and search for “QR”. Now enable the “#sharing-qr-code-generator” flag. Once you do that, you will see a ‘QR code’ icon in the address bar, next to the bookmark (star) icon. Click on it and Chrome will show you a QR code corresponding to the webpage that’s on your current tab. Just scan it with your phone to open the link on your smartphone.

  6. Hover Cards
    Hover Cards is a new way to identify and navigate through tabs. It’s especially helpful when you are dealing with lots of Chrome tabs. Basically, if you enable this flag then a preview image of the tab will show in the form of a hovercard.

  7. Pull to Refresh Gesture
    This is one of my favorite Chrome flags on this list. You can enable this gesture on your laptop and swipe down on the trackpad to refresh the webpage.

  8. Enable Reader Mode
    While Safari has an excellent Reader Mode, we do not have such a feature on Google Chrome. However, there is a hidden Chrome flag that lets you enable Reader mode on Chrome. You get a barebone reader mode which simplifies the web page and removes unnecessary ads. Sure, it’s not as good as Safari’s Reader Mode, but it does work.

2021-02-20 10:54
Sebastin SironMani A

Gmail Shortcuts

Gmail shortcuts are an alternative route that is shorter than the one usually taken. It is very useful when we are dealing with emails often.

How to enable:

  • On a computer, go to Gmail.
  • In the top right, click Settings Settings and then See all settings. 
  • Scroll down to the "Keyboard shortcuts" section.
  • Select Keyboard shortcuts on.
  • At the bottom of the page, click Save Changes.

Shortcuts you can use: 

You can use keyboard shortcuts to navigate your inbox and messages, format text, and complete actions like archiving and deleting when you have Gmail open.
Note: Keyboard shortcuts work differently on PC and Mac computers. On PCs, you'll use Ctrl instead of ⌘.
Some of the Shortcuts:
  • c - Compose
  • d - Compose in a new tab.
  • / - Search email.
  • g - Search chat contacts.
  • g + n - Go to the Next page.
  • g + p - Go to the Previous page.
  • g + i - Go to Inbox.
  • g + d - Go to Drafts.
  • r - Reply.
  • a - Reply all.
  • f - Forward.
  • ⌘/Ctrl + Shift + 5 - Previous font.
  • ⌘/Ctrl + Shift + 6 - Next font.
  • ⌘/Ctrl + Enter - Send.
  • ⌘/Ctrl + Shift + c - Add cc recipients.
  • ⌘/Ctrl + Shift + b - Add bcc recipients.
  • ⌘/Ctrl + k - Insert a link.

If you want to bring up the complete Gmail keyboard cheat sheet, simply type "Shift + /".

2021-02-21 06:22
Sebastin SironMani A

Work Profile

 Here are the steps of configuring Android for Work or creating a Work Profile on your Mobile device. This will let you access the confidential work emails and documents securely from your android smartphone.

Step 1: Sign in to your account

  • Tap Settings > Accounts
  • Then tap Add account > Google.
  • Sign in with your username and password and tap Next.  
  • Tap Accept to accept the Terms of Service and Privacy Policy. 
  • You might see a prompt to install the Google Apps Device Policy app.

Step 2: Install the Device Policy app

  •  If prompted to install the Google Apps Device Policy app, tap Next
  •  Tap Install to install the Google Apps Device Policy app.
  •  If prompted to set up your device then choose: I own this device and then tap Next
  •  If prompted to allow the Device Policy app to make and manage phone calls, tap Allow. 
  •  It will require you to create a Work Profile
               -> When prompted, tap Next
               -> Complete the steps in Create a Work Profile.
               

Step 3: Create a Work Profile

A work profile keeps your personal and organization apps and data separate from one another. Creating a work profile is recommended. This way, your apps or data won’t get affected.

  •  If prompted to create a work profile, tap Set Up > OK. 
  •  Tap Next
  •  If prompted, tap Encrypt and take the following actions:
               -> Tap the Encrypt Phone. (If prompted, confirm your PIN.) 
               -> To begin encrypting your device, tap Encrypt Phone again. (It might take a few                          minutes to complete.) 
  • Tap Next each time you see a prompt to do so.
  • At the Policies window, tap Next to return to the sign-in screen. 
  • Sign in to your CapeStart Mail account and start using your Work apps. 
  • You can launch Work apps, which are marked with an image of a suitcase. Tap the app you want to use to launch it. 
  • You can also go to the Google Play Store. From there, install the managed apps you want to use. I.e. Google Docs, Google Drive, Google Sheets, Google Slides, etc. 

Note: Please turn-off the Scheduled Restart function from the Settings > Device Care menu in case you're using the latest Samsung Galaxy S / Note smartphone to avoid missing your alarms and notifications. Because the encryption will enforce a secure-boot feature to enhance the device security, that'll require a PIN to start the device whenever it restarts.

2021-02-28 10:30
Sebastin SironMani A

Slack Configuration on Mobile

Please find the steps below to Configure Slack on the Mobile device.

Step 1: Create a work profile on your Mobile. 
Step 2: Open the Play Store which would be installed already on the work profile.
Step 3: Install Chrome and Slack from the work profile Play Store.
Step 4: Open the Slack.
Step 5: Go to https://capestart.slack.com/signup#/ and “Continue with Google” using CapeStart email.           
            Or            
            Go to the Slack application and click “Sign In To Slack”.
Step 6: Fill the OTP to advance to the next page.
Step 7: Click “Open” from the browser pop-up to redirect to the Slack application.

2021-02-28 11:05
Sebastin SironMani A

Focus assist

Focus assist (also called quiet hours in earlier versions of Windows 10) allows you to avoid distracting notifications when you need to stay focused. It's set by default to activate automatically when you're duplicating your display, playing a game, or using an app in full-screen mode. You can control any or all of these, as well as determining to what level notifications are suppressed.

  • Select Start  > Settings  > System Focus assist, or, in the search box on the taskbar, type Focus assist and then select Focus assist settings from the list of results.

    alternate text

  • To set the current state of focus assist, select Off (receive all notifications), Priority only (see only notifications from a list you can customize to your liking), or Alarms Only (hide everything except alarms).

  • Under Automatic rules, you can determine the conditions that cause focus assist to activate automatically. Select the item to turn that condition on or off and to determine the time and/or level of focus assist that condition activates, or just select the switch as a shortcut to turning a condition on or off. (To completely deactivate focus assist, turn all of these off.)

  • Select Show me a summary of what I missed while focus assist was on to be sent a notification when you exit from focus assist about what was redirected to Action Center. Deselect this to deactivate this notification.

  • When the focus assist turns on automatically, by default a notification appears in the action center explaining that the focus assist is on and suppressing notifications. If you would prefer not to see this message, click the Change focus assist button in the notification, and uncheck Show notification in the action center when focus assist is turned on automatically in the Settings page that launches.

2021-03-06 05:41
Sebastin SironMani A

Slack Configuration Steps for MAC

What is Slack?

Slack is a powerful business collaboration and communication tool designed to make internal communication between staff and teams simpler and more streamlined for everyone.

Slack Installation

1. Enter this URL in the browser and click the "GET" button.

2. Now click the "INSTALL" button.

3. Now enter your Apple ID and Password.

4. Now click "OPEN".

5. Open the Slack application click the button "Sign In to Slack".

6. It will be redirected to the browser to the Slack login page. And now click "Sign in with Google" option(must be logged in with your Capestart email id in the browser).

7. The popup would appear in the browser. Enable the check box as "Always allow" and click "Open"

8. If the above step is not working, please repeat the steps from 5 to 7 until it's prompting out.

9. Open "Security & Privacy" from the "System Preference" window. 

11. Now add the Slack application in the "Accessibility", "Camera", and "Microphone".

12. Close the Slack application and open it. If you have asked for a restart, please do.

2021-03-14 10:16
Sebastin SironMani A

Google Meet Features - Record Meeting

We have upgraded the 'Google Meet' based on our business requirements with the following features,

  • Record Meeting
  • Polls
  • Breakout Rooms
  • Q&A
  • Unlimited G-Drive storage, etc.

Here we are sharing the steps to 'Record the Google Meeting'. 

Start and stop a recording:
  • Start or join a meeting.
  • Click More -> Record meeting.
  • Wait for the recording to start.
        Other participants are notified when the recording starts or stops.
  • Click More -> Stop recording when you finish.
    • The recording also stops when everyone leaves the meeting.
  • Click Stop recording again to verify.
    • Wait for the recording file to be generated and saved to the meeting organizer’s My Drive > Meet Recordings folder.  

An email with the recording link will be sent to the meeting organizer and the person who started the recording.

In the email, click the link and wait for the recording to open.
Select an option,

  • To play the recording, click Play
  • To share the recording, click More More Moreand thenShare Share Enter user names or email addresses and click Done.
    • Note: We can also copy and share a link.
  • To download the file, click Download Download
  • To add the recording to the current folder, click Add to My Drive Add to My Drive

Note: The upgrade has been done for the specific set of users only, based on the business need.

2021-03-16 09:02
Sebastin SironMani A

Availability Based Calendar Schedule

Find a time that someone is free and schedule an event:

You can check if someone(to whomever you want to schedule a meet) free or busy when adding them to an event.
  • On your browser, open Google Calendar.
  • On the left, click Search for people.
  • Start typing someone’s name and choose the person(can also be multiple) you want to meet with.
  • At the top left, click Create Add +.
  • Click Suggested times and you'll see when they can attend.
  • Enter the Title of the event/meet and add the guest if you want.
  • Save it now and find the created event in the Calendar.

2021-03-21 04:54
Sebastin SironMani A

Cyber Security Guidelines : Do's & Don'ts

Cyber Security also called Information Security. It refers to the practice of ensuring the integrity, confidentiality, and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access.
 
 
Here listing out some do's/don'ts. And make a fit wherever it is applicable.
 

Do’s

  • Always use private/official email domains and NOT public domains like Gmail, Rediff, etc. for official purposes. Also, use an individual email Id instead of a generic email id.
  • Ensure Digital Certificate is stored in “C” drive and in non-exportable format.
  • Password should be strong and difficult for anyone to guess. It should be a combination of uppercase /lowercase alphabets, special characters (e.g. &, $, #), numbers,
  • Hard / Soft token if any, should stay in the personal custody of the authorized users.
  • Users should keep different passwords for Login & Transaction authorization and should not share them with anyone.
  • All passwords should be changed regularly.
  • Keep system / PC / laptop locked when away from your workstation.
  • Be cautious while clicking on any email received from external and unknown sources.
  • Verify the sender's address. Check the complete email id including the domain along with the signature.
  • Report suspicious emails received to your IT immediately.
  • Delete unwanted emails immediately.
  • Enable SMS and email alerts for transactions
  • Always communicate change in existing ENet users immediately to HDFC
  • Bank for incorporating them in ENet application.
  • Ensure that the user ids of the resigned user are reported to the Bank
  • immediately for deletion before their last working day.
  • Ensure that anti-virus signatures are updated on all laptops/desktops.
  • Type the URL in the fresh browser window or visit the bank's website.
  • Download banking apps from the play store (Android phones) or iStore (Apple phones) only.
  • Check that the websites have 'https://' and a locked padlock at the start of the URL.
  • Register your email ID and mobile number for banking alerts and check them regularly.
  • After completing a transaction online, check that the correct amount has been debited.
  • Report lost/stolen devices to law authorities and service providers immediately.
  • Always inform your bank in case of a change in a mobile number or unauthorized SIM deactivation.

 Don'ts

  • Never share Digital Certificate / Hard Token / Soft Token with anyone, even within the organization.
  • Do not disclose Digital Certificate file / Hard Token / Soft Token/ Password / Pin / OTP to anyone apart from the person authorized to use it
  • Passwords should never be written on any device, notepad files, sheets of paper, etc.
  • Never leave your Hard / Soft token application in an unprotected manner
  • Never keep similar passwords for ENet login & transaction authorization
  • Do not share your ENet registered email id and its password with anyone including colleagues
  • Do not open any unknown email that contains random attractive links
  • Do not click on the links/attachments of strange/attractive emails from unknown senders.
  • Never disclose or provide sensitive information such as user name, passwords, or banking details via an email or a phone call
  • No official or customer data should be shared with unwanted people outside your office network without following your internal security's laid down process. For financial transactions, do not use public PCs or open Wi-Fi networks (at railway stations, airports, cafes, etc).
  • Never use the auto-complete feature on banking sites or select the 'Remember password' facility.

2021-03-28 05:56
Sebastin SironMani A

Guidelines & Tips from IT: Web Outages & Opera VPN

1) Down for everyone or just me?

  • This is a very useful website that helps you to detect whether a website you're looking for is actually down or just geo-restricted in your location. 
  • It runs multiple proxy servers across the world to check the status of a website. Once confirmed it's up then you can use our next tip to simply bypass or unblock it.
  • You will get more information regarding, Why do websites just stop working? by watching the link here.

2) Opera VPN 

  • Opera VPN is a free VPN tool that comes built-in with Opera Browser. (FYI: Opera is now based on Chromium Project)
  • The main advantage of this application is, it doesn't require any administrative privilege to install it on your computer.
  • Users can download and install this application directly from their website.
  • Once Installed, you can go into the browser's Settings (Alt+P), scroll down to Advanced and Enable VPN.
  • Once VPN is enabled, you can now bypass the geo-restrictions and able to access the blocked websites with high business criticality.

2021-04-12 19:25
Praveen R

Guidelines & Tips from IT: How to use Slack Threads

Slack Threads:

Slack Threads let you discuss topics in detail without adding clutter to a conversation’s main view, and make it easier to keep track of discussions.

Start or reply to a thread
  1. Hover over the message that you'd like to reply to.
  2. Click the Reply in thread icon.
  3. Type your reply.
  4. Send your message.

View all threads

Select Threads at the top of your left sidebar to see all the conversations that you’re following, where threads with unread replies will appear at the top of the list. From your Threads view, you can do the following:

Benefits of Threads:

  • Threads improve the ability to work asynchronously – Manage to handle old/new messages and catching up on several hours later.
  • Keep announcement channels clear.
  • Transparent and Sticky.
  • Join the conversation at your convenience.
  • Organize the message for future referrals.

2021-04-19 07:17
Praveen R

Guidelines & Tips from IT: Make Your iDevice Even More Secure

In the summer of 2020, a Brazilian man whose iPhone was stolen right out of his hand. Despite his best efforts to lock it up, he still lost over $30K because, once the thieves easily bypassed his 6-digit passcode, they had automatic access to all of his banking, user accounts, and app store purchasing because of the way iCloud Keychain - the default password manager used by every single iPhone and Mac since 2013, is designed. So, let’s explore how iCloud Keychain works and how you can keep your digital life safe.
 
According to a recent study, the average internet user has over 100 user accounts and passwords to manage. That’s insane. So, what most of us do is use the same, or nearly the same password, for everything. This is not good because it leaves you vulnerable to getting stuffed.
 
Credential stuffing is when a hacker buys a database of logins from a compromised site, like, say when Yahoo got hacked in 2016 with a 3 billion user breach. And then they try those logins on hundreds of other sites, like your bank or iTunes.
 
The best solution to avoid this is to have a different, unique password for each one of your accounts. But how on earth are we to remember over 100 strings of passwords each with its own numbers and special characters? Enter iCloud Keychain. It’s Apple’s solution to this very pernicious problem. If you use any of Apple’s devices, you’re probably already using it. You have probably seen the pop-up on your phone or iPad or Safari browser asking if you want to save your password. If you tap, yes, it’s saved to your Keychain. Better still, if you’re creating a new account, the feature can help you create really secure passwords and you can save credit card and address info for online shopping.

And all of these credentials are synced between your devices, through the iCloud, which you may have switched on during your iPhone set up. Simply put, iCloud Keychain is Apple’s implementation of what’s known more broadly as a password manager. There are many options in the world of password managers e.g., 1Password, LastPass, Zoho Vault, etc. The services are quite a bit more fully featured than iCloud Keychain, but they also cost money, ranging from $1.50 to $4 a month for individual plans.

They work on all the platforms and with all the browsers, and individual credentials can even be shared with others. All that info is encrypted behind a master passphrase, which is the password you make incredibly long, strong, and ideally nonsensical, like FlightComedyJawCar or ClockCoalBasketballVision. What’s convenient is that you can always have the right password when you need it, no matter where you are and it’s all behind that master password.

But critically, that’s not how iCloud Keychain works. Your Keychain master password is the same as your device’s password. So, the weak password you’ve been using for years on your MacBook or the convenient passcode you use to quickly get onto your iPhone could be all that stands between would-be thieves and your treasure trove of passwords. This is why the victim of our earlier story was so brutally compromised. The thieves cracked his iPhone passcode and thus had access to his entire library of passwords, including the one for his Apple ID.

So, if you’re using your iPhone or iPad with a 6-digit numeric password, you should probably consider an alphanumeric password as you use on your computer. Which, for FaceID users in the middle of a messed up COVID pandemic is a massive inconvenience. iCloud Keychain is also not as flexible as the big password managers. On your Mac, it only autocompletes on Safari and, though we are pleased to report it’s now available on Windows PCs, it only works on Chrome and there are hoops. First, you need to install Apple’s iCloud software before you can even get the Chrome extension. And then every time you freshly open Chrome, you have to input a 2-factor code that you get from the same device. And before you get too excited, it doesn’t work on Chrome for Mac.

So, should you keep using iCloud Keychain? A lot of times we hear people say that having all your passwords stored in the cloud is a big risk. And we understand. Your passwords are somewhere you don’t control and you just have to just trust that they’re not going to be compromised like they have been everywhere else. But that’s the reason why you should get a password manager. You can have a hundred different passwords for all of your accounts and password managers like iCloud Keychain, will store and transfer those passwords behind encryption, which is only unlocked with your master passwords.
 
It a tough choice with whether or not to use iCloud Keychain since it came out in 2013. But there are two factors that have us rethinking things. First, Apple opening up to Windows users, as we mentioned earlier, does make it significantly more viable, should your digital life fit within those limitations. Then starting March 16th, the LastPass free tier, which has been arguably the best option for a while now, will be restricted to either all-PC access or all mobile access, but not between the two.
 
As a free option, iCloud Keychain is now the best of the bunch. But if you care about maximum security, flexibility, and features, paying for a password manager might be the better option.
 
Whatever the case, we think it’s important to practice good password hygiene by ensuring you don’t reuse passwords. And if you do choose to use a password manager, make sure that its passphrase is long, strong, and memorable.

2021-04-29 12:57
Praveen R

Guidelines & Tips from IT: How to Properly Shutdown Windows PC

Turning off a PC, it’s pretty simple, right? Just click “Shut down” on the Windows Start menu and that’s supposed to do the trick. But wait, it turns out that “Shut down” in Windows 10 doesn’t actually mean a shutdown.

So, what happens when you click “Shut down”? Well, Microsoft has taken the idea behind “Hybrid sleep” and added yet another feature called “Fast Startup” that actually changes the way your computer shuts down. Here’s how it works. 
  • “Fast startup”, which is enabled by default on Windows 10 takes the state of the Windows kernel which is essentially the core elements of the operating system, and saves it to the disk. 
  • However, this only happens after Windows logs you off so none of the data from programs or files you are working on gets saved. In this sense, it’s closed to a normal shutdown than hibernation but it doesn’t get 100% of the way there.
  • The benefit of “Fast startup” is exactly what it sounds like. Your PC doesn’t have to spend tons of time reinitializing critical Windows components when you power the system back on allowing for shorter boot times. 
  • However, there’s a downside that can cause really puzzling issues if you’re unaware that “Fast startup” even exists.
  • Problems that are present within the kernel itself, such as a misbehaving device driver that would normally disappear with a full shutdown can recur when you start your computer back up if you have “Fast startup” enabled. 
  • So, because Microsoft figures people are more likely to hit, “Restart” than “Shut down” if some bug necessitates the reboot, “Restart” actually cycles your PC through a full shutdown whereas “Shut down” counterintuitively does not.
  • But there are ways around “Fast startup” if you want to ensure your computer is completely clearing out its current state every time your turn it off. You can do this by holding the Shift key when clicking “Shut down” from the Start menu.

There’s a chance you may not even miss the slightly faster startup if you’re running a modern system with a speedy SSD.

TL;DR Do “Restart” or Shift + “Shut down” once in a while for maintaining the optimal health of your Windows operating system.

2021-05-17 17:41
Praveen R

Guidelines & Tips from IT: Google FLoC

Google is trying to change something big about the internet the way websites track our activity. Google says it will be a more robust way to protect user privacy. But how much can we trust a company whose main source of revenue is advertising?
  
Google is putting a new tracking scheme into their Chrome browser called FLoC. It stands for Federated Learning of Cohorts. FLoC is meant to be a replacement from the much-maligned and frankly super annoying third-party cookie system we use today. 
 
Enter FLoC, the idea here is that instead of allowing advertisers to track users individually, users will instead be assigned to cohorts made up of several thousand people. By default, Chrome will track your browsing habits and once it comes up with a list of topics it thinks you’re interested in, the browser will put you in a cohort with people who share the same interest.
FLoC is already rolling out to a small percentage of Chrome users. So, remember to check to opt out if you don’t want to take part.
 
For more information on FLoC please visit the below links:

2021-05-31 13:31
Praveen R

Guidelines & Tips from IT: Windows Updates

Have you ever wondered what if you just didn’t bother updating Windows ever? The day-to-day may not seem too different if you mostly use your computer for basic tasks but under the hood, you’re going to be putting yourself at a real disadvantage if you just stop updating.

For starters, your computer may actually lose functionality as time goes on. Microsoft updates Windows with two major updates per year and smaller updates in between as needed. This means that Windows should change dramatically over the coming years and in some ways it already has.
 
 
The Windows 10 operating system is already 5 years old and the current update is already substantially different from the launch edition with more customization options, a Linux subsystem, and dark mode in file explorer among many other changes. In fact, the upcoming Windows 11 upgrade, coming out in late 2021 is going to feature a sweeping visual redesign and optimizations. Also, the future software and drivers may not support older non-updated versions of Windows. 
 
Let’s pivot and talk about the other big reason to keep your system updated, security. Newer Windows versions have given users more protection and security options. Even more important is that security holes are constantly being patched with updates.

You see, a piece of software is as huge and complex as the Windows operating system is bound to have security vulnerabilities. It’s simply impossible for the developers at Microsoft to know every single possible security hole ahead of time or how hackers will try to attack the OS in the future. Also, Windows adds more features which means that there will be new attack vectors meaning getting subsequent security updates in between major feature releases is extremely important.
 
To top it all off, outdated Windows versions including older builds of Windows 10 stop receiving updates from Microsoft after a certain period of time. Attackers are fully aware of this and often target systems running older operating systems because they know that any new security holes they find will never be patched.
 
So please run Windows updates regularly on your machines, at least once a week to keep it up to date.

2021-07-01 08:16
Praveen R

Guidelines & Tips from IT: Internet Dark Patterns

Online businesses often involve quite a bit of subterfuge known as Dark Patterns. Surprisingly, this isn't the name of Metal Band rather it’s a tactic designed to influence you somehow, usually into buying a product or service you might not really want, sign up for marketing emails, or simply stop you from doing something the business may not want you to do.

 

 

Dark Patterns aren’t one size fits all, just like a Stephen King monster a Dark Pattern can take many forms. One classic example is how hard it often is to find the phone number to talk to a real human being when you need customer service. A related tactic is how hard some services make it to close your account. You have probably seen how companies will bury the unsubscribe link on any email at the bottom in a tiny font. This is not a big deal compared to trying to straight-up canceling a membership. 
 
Typically bringing up a settings menu and clicking “Close my account” isn’t good enough, sites will either entice you to stay with a massive in-your-face offer to prevent you from canceling the subscription with the actual cancel link presented in a much smaller size. Or they will make it insanely hard to find the actual “Delete my account” button. Amazon is notorious for this and many others such as Facebook. This is a good example of what designers call a Roach Motel, easy to sign up for an account and get in but hard to leave.
 
There are other instances to watch out for like how these sites will use UI elements to nudge the users in a certain direction. This can also be done in a less subtle way called Confirmshaming. When you get a popup promising discounts and exclusive offers, if you’re not interested in getting email spam you can’t just click on a close button instead you have to click on a small link with some condescending nonsense like “No thanks, I’d rather pay full price”.
 
Possibly the worst form of Dark Pattern is the one that actively requires you to click an extra button to opt-out of something. This can be anything from how tedious some sites make it to reject unnecessary cookies or have a prefilled checkbox to install some unwanted antivirus program or toolbar when installing some software.  

These aren’t the only kind of Dark Patterns floating around out there so while it’s a pain, be sure to take a few extra seconds to read before you click.

2021-07-01 08:27
Praveen R

Guidelines & Tips from IT: PrintNightmare Vulnerability

Microsoft is warning Windows users about an unpatched critical flaw in the Windows Print Spooler service. The vulnerability, dubbed PrintNightmare, was uncovered earlier this week after security researchers accidentally published a proof-of-concept exploit. While Microsoft hasn’t rated the vulnerability, it allows attackers to remotely execute code with system-level privileges, which is as critical and problematic as you can get in Windows.
 
Microsoft has now started rolling out out-of-band Windows updates to remedy a PrintNightmare security bug affecting all supported versions of Windows 10.

Windows 10 KB5004945 emergency update is rolling out to address this vulnerability for those on version 2004 (April 2020 Update) or newer.
 
For those using Windows 10 version 1909 (November 2019 Update), they’ll be getting KB5004946.
 
For Windows 10 version 1809 (November 2018 Update), there’s a different patch – KB5004947. 
 
To fix PrintNightmare vulnerability, follow these steps:
  1. Open Windows Settings > Updates & Security > Windows Update.
  2. Click on “Check for updates“.
  3. A new July patch will automatically start downloading on your device.
  4. Click on “Restart now” after the patch is downloaded.

2021-07-08 11:49
Praveen R

Guidelines & Tips from IT: How to Keep a Laptop Battery Healthy

The battery of your laptop is one of its most vital components thus one of the most important to keep healthy. Although we mostly tend to think of other hardware first like RAM, screen resolution, and CPU power.
 
When we talk about laptops, we forget that the battery is the powerhouse of the laptop, and without it, the laptop would be anchored to an AC outlet.
 
Not all laptops have in-built removable batteries for cool-down. Also, internal cooling fans break down after a couple of years.
 
Should you leave your laptop plugged in all the time?

In order to get the most life out of your laptop battery, keeping it charged somewhere between 40% to 80% has been observed as optimum. With newer batteries, however, the charging stops at 100%, but for older batteries, you wouldn’t want to leave your laptop charging all the time
 
 
The new generation of lithium batteries performs better in full charge cycles, thus not letting the battery drop below 40% is a safety measure.

Also, because leaving laptops on charge all the time could cause the battery to overheat - in some models, which is a danger you should obviously look to avoid.

In many laptop models, once the battery is fully charged, it will automatically cut off the power supply to the battery. Thus keeping it plugged in is unnecessary after that point, however, it won’t let the battery overheat in most cases.
 
Should the laptop battery be completely drained before re-charging?
 
Most of the newer generation laptop batteries are either lithium-polymer or lithium-ion, and they’re designed to have the ability to withstand repeated charge cycles.
 
 
As mentioned above, keeping your laptop plugged in at all times wouldn’t necessarily damage your battery, but since laptop batteries do have a limited number of charge-discharge cycles, therefore letting your laptop battery completely discharge is extremely likely to reduce its intended lifespan.
 
Below are some important tips that will help to keep a laptop battery healthy:
  • Avoid discharging the laptop completely after charging it. The best practice is to try to keep the battery percentage between 40 to 80 percent. This is especially true for older laptop batteries.
  • Make sure that your laptop doesn’t overheat and the cooling fan is fully operational. The battery of your laptop is unlikely to overcharge and harm itself because of excessive charging. It has been designed to bypass the charging energy.
  • Batteries that are charged to full 100% have only 300-500 discharge cycles. Those that are charged up to 80% get nearly quadruple the number of recharging cycles.
  • Avoid draining the battery completely, and adjust power settings for best power use in your settings.
  • Performing battery backup, disabling unused ports and devices, and selecting battery saving or eco mode will put your laptop into lower power modes and help prevent unnecessary battery drainage too.

2021-07-09 13:51
Praveen R

Guidelines & Tips from IT: Google Chrome Hacks - Chapter 1

 

Pop-ups, modals, overlays, interstitials: there are a lot of different ways to refer to the design elements that websites use to notify you of something (e.g., this site uses cookies) or encourage you to take an action (e.g., sign up for our newsletter). Regardless of what you call them, these notifications can be annoying, intrusive, and distracting.

But you don't have to deal with the process of closing multiple pop-up notifications to read content online. With the right extensions, you can block all website notifications on Chrome and get rid of other annoying website elements like paginated articles and auto-playing videos to start enjoying a less distracting online reading experience.

In this chapter, we can see about how to block
​​

  • Website notifications on Chrome,
  • Cookie notifications on Chrome,
  • Auto-playing videos on Chrome

1. How to block website notifications on Chrome

Real-time desktop or browser notifications for something like incoming emails or Slack messages make sense. New articles on a website you just heard of for the first time because it showed up in the search results? That makes less sense. That doesn't stop websites from asking you to let them send push notifications to your desktop or browser.

 

 

If you're tired of seeing these pop-ups and having to decline the requests, you can change your Chrome settings to either block all push notification requests or block them on specified sites.

  1. Open Chrome.
  2. Click the More icon (three vertical dots at the top-right corner of the browser).
  3. Select Settings.
  4. Scroll down to the Privacy and Security section, then click Site settings.
  5. Select Notifications.
  6. Toggle the Sites can ask to send notifications switch to the off position.

 

 

2. How to block cookie notifications on Chrome

 

 

  • Since the European Union started enforcing GDPR in mid-2018, nearly every website you visit now covers a part of the content you're trying to read with a notification about the use of cookies on the site.
  • If you're tired of clicking accept buttons and close icons to get cookie notifications out of the way of the content you're trying to consume, use the I don't care about cookies Chrome extension to banish them for good.
  • I don't care about cookies is a free (with donations accepted) Chrome extension that claims to remove cookie notifications from almost all websites. 
  • And if you do find a cookie notification that slips past the blocker, you can report it by clicking Report a cookie warning in the extension's options menu.
 
Important: Though cookie notifications can be annoying and distracting, they do contain important information that helps you understand and in some cases opt-out of how the websites you visit collect and use your personal data. For that reason, we recommend that you seriously consider the implications of blocking cookie notifications before installing this extension. 
 
3. How to block auto-playing videos on Chrome
 
 
  • Last night, you blasted your favorite song through your laptop's speakers. Today, you're sipping coffee and getting prepared for the day with a little online research. You were having a nice morning until you landed on a site with an auto-playing video that started playing at the volume of your evening jam session and scared the soul out of you.
  • Auto-playing videos especially those that play audio and videos are the modern equivalent of websites with background music: unnecessary, unexpected, and generally unpleasant. And they slow down your page load speeds.
  • To stop auto-playing videos altogether, you can use the free AutoplayStopper Chrome extension.
  • And if for some reason you do want to allow videos to autoplay on a specific site, you can approve sites quickly by opening the extension's options menu from the omnibar and selecting Allow autoplay for [site].

2021-07-23 16:59
Praveen R

Guidelines & Tips from IT: Google Chrome Hacks - Chapter 2

 

Pop-ups, modals, overlays, interstitials: there are a lot of different ways to refer to the design elements that websites use to notify you of something (e.g., this site uses cookies) or encourage you to take an action (e.g., sign up for our newsletter). Regardless of what you call them, these notifications can be annoying, intrusive, and distracting.

But you don't have to deal with the process of closing multiple pop-up notifications to read content online. With the right extensions, you can block all website notifications on Chrome and get rid of other annoying website elements like paginated articles and auto-playing videos to start enjoying a less distracting online reading experience.

In this chapter, we can see about the following things,
​​

  • How to stop Chrome from hijacking your media keys,
  • Remove all clutter from any site in one click,
  • How to block ads on Chrome

1. How to stop Chrome from hijacking your media keys

You open a video link while listening to music. You reflexively hit the play/pause key on your keyboard to pause the music.

The video pauses. The music keeps playing.

You might try digging in Chrome's settings, but there's no solution to be found there. That doesn't mean there's no way to stop this from happening you just need to know where to look.

Chrome's hidden options aren't easy to find. For this case, in the Chrome address bar, type chrome://flags, and search for "key", or just copy this link into Chrome: chrome://flags/#hardware-media-key-handling. You'll see the hidden Hardware Media Key Handling option.

 

 

Set this to Disabled. Make sure you also restart your browser—you'll see a Relaunch button at the bottom of the window.
 
 
From now on, your media keys will have no effect whatsoever on anything happening in Chrome, meaning you can pause your music when a video starts playing. This will save you a lot of money on new computers and will also make your life a little better.
 
2. Remove all clutter from any site in one click
 
 
Too many websites are a cluttered mess—the article you want to read is hidden beneath layers of ads, marketing pop-ups, and worse. How many times do you have to click "Close"?

Instead of doing all of that clicking and waiting, try using Mercury Reader. This free extension shows you the article you want to read and nothing else—just click the icon or use the keyboard shortcut (Cmd + Esc for Mac users, Alt + \ for Windows users).
 
 
3. How to block ads on Chrome
 
 
Online ads aren't as much of a nuisance as they used to be. Generally, sites have stopped doing things like cramming ads into every open space on the page and using pop-ups and pop-unders. But even though things are better, you'll still occasionally run across a site like the one above that hasn't caught up to the new user experience best practices for advertising.

If ads are slowing down your browsing experience consistently, you can use an ad blocker to get rid of them all together like the free AdBlocker UltimateIt blocks display ads, YouTube pre-roll ads, and even AdWords ads (the text ads that appear in Google's search results).

Other popular free ad-blockers for Chrome include uBlock Origin (known for its customizability) and Ghostery (blocks ads and trackers).

Something to remember: Ads can be obnoxious, but if there's a website consistently producing content you enjoy, consider adding that site to an allows list in your ad blocker. Many sites can only continue producing content because they earn advertising revenue. If you really don't want to see ads, you could also consider paying for a subscription to the site, donating to a creator's Patreon, or offering some other alternative method of monetary support.

Ads, overlays, notification requests, and auto-playing videos aren't quite everything annoying you might run into online. There are other things you'd probably like to be able to disable (hello, chatbots) that don't currently have solutions. However, these setting changes and extensions are a good starting point for enjoying a more pleasant and less distracting internet browsing experience.

Finally, we hope you enjoyed reading this email and found this informative and helpful in keeping yourselves up-to-date.
 

2021-07-23 17:13
Praveen R

Giudelines & Tips from IT: Keyboard Shortcuts

Keyboard Shortcuts:

  • To open Chrome’s built-in task manager: Press Shift + Esc. Extremely useful when Chrome freezes.

 

Chrome Task Manager

 

  • To drag multiple tabs to a new window: Press Ctrl + Click on tabs you want to move. Do the same to move multiple tabs to an existing window.

 

Ctrl and Click to select tabs to open in new window

 

  • To rename a file: Press F2. Works for multiple files too, which will append “(1), (2), etc.” at the end.
  • To open Task Manager directly with one hand: Press Ctrl + Shift + Esc
  • To freeze Task Manager: Hold Ctrl key. Useful for inspecting specific processes.
  • To take a screenshot of the active window only (without taskbar): Press Alt + Print Screen.
  • To delete one word at a time: Press Ctrl + Backspace.
Delete An Entire Word With Ctrl and Backspace
  • To use the mouse as a laser pointer in PowerPoint: hold Ctrl + Left click. Mouse cursors are too mainstream.
  • To open your PowerPoint file in presentation mode directly: Right-click on the file, then select Show.

 

PowerPoint Right Click Show

 

  • To shrink an Excel file size: save it as .xslb

 

Thanks!

2021-08-23 17:37
Praveen R

Guidelines & Tips from IT: The Importance of a Clean Computer

A clean computer is important for your health and well-being. First of all, dirty computers and keyboards are a germy house, and the best defense against the spread of illnesses is to keep the germs washed away. Using best cleaning practices helps control the spread of infections among building occupants. Also, regularly cleaning your computer makes the entire system run more smoothly and keeps it running longer.
 
health.jpg
 
  • Dust is way more than a simple nuisance around the house; it can also clog up the fans and vents inside your laptop, preventing it from cooling down properly. 
  • Overheating, in turn, can wreak havoc on the hardware inside and ultimately spell demise for your laptop.
  • When your laptop overheats, it is working that much harder to perform at maximum capacity. 
  • As a result, the fans run at full blast to keep the hardware cool, which does a number on your battery and causes it to drain much faster than usual.
  • Keeping dust out of the vents and fans will ensure that your battery stays in tip-top shape
  • If your laptop is overheating AND it’s running at max capacity, it will try to reduce its performance to stay cool.
  • You could be in for many frustrating hours of refreshing the Internet, waiting for your documents to load, and staring at that dreaded rainbow-hued spinning wheel.
  • If you don’t want to waste the time (and who does?), invest in your laptop now by cleaning the screen & keyboard every other week and the fans at least once a month. You’re almost guaranteed to thank yourself later on.

2021-08-27 16:48
Praveen R

Guidelines & Tips from IT: Shortcuts and Tricks

1. Microsoft Excel Keyboard Shortcuts
 
image.png
 
  • F2: Edits cells
  • Shift Space: Selects whole lines
  • Ctrl Space: Selects whole columns
  • Ctrl Plus: Insert cell
  • Ctrl Minus: Delete cell
  • Ctrl 1: Edits the cell format
You can find a full list of  Excel Shortcuts & Word Shortcuts here.
 
2. Take a Screenshot
 
image.png

  • On Macs, CMD Shift 3 takes a photo of the entire screen, CMD Shift 4 lets you use your mouse and select a portion of your screen to take a screenshot. 
  • The Print Screen button on your Windows keyboard for PCs and the screenshot can be pasted into any photo-editing software, like Paint or Photoshop. On the PC, you can use the Snipping Tool - a program in Windows - to select a specific area of your screen to take a screenshot.
3. Easily Search Websites
 
image.png

  • In Google Chrome, when filling in a web address, for example, www.youtube.com, press TAB instead of ENTER and you can perform your search on the site from the address bar.
4. Use 'Pushbullet' to send files, links, and text between devices
 
image.png
 
  • Pushbullet is an app and extension that brings all your devices together. It lets you easily send messages and reminders from your computer to your smartphone, and share links and files to different devices. 
  • So, if you take a screenshot or picture on your smartphone, you can easily 'push' it to your laptop. The service is free, and it works with iOS, Android, Mac, and PC devices.
5. Use the 'OneTab' extension to get your tab addiction under control
 
image.png

  • OneTab is arguably the best Chrome or Firefox extension you can download. The extension places a small button on your toolbar that, when pressed, converts all your open tabs into a list that you can easily open and access later. Or, you can export your tabs as a list of URLs to share with others. 
  • The extension saves up to 95% of your computer's memory, because your browser is no longer running all those tabs. Goodbye spinning wheel of death!
6. Disable autoplay videos in Chrome
 
image.png

  • In the Chrome address bar, paste this: chrome://flags/
  • On your keyboard press CTRL F (or Command F on a Mac)
  • Type autoplay
  • Click the dropdown menu and set it to "document user activation required"
  • On the other hand, you can use the AutoplayStopper chrome extension to disable autoplay videos
7. Clean out your inbox much faster
 
image.png

  • If you're buried under thousands of emails in your Gmail inbox, we think you're going to love this search string.
  • In the search bar, type the following, then press enter. in:inbox is:unread -category:promotion. This will make it easy to delete a bunch of emails from brands and stores that are trying to sell you something.
  • Also, just make a filter for the word "unsubscribe" in your email. This will make it easy to unsubscribe to those pesky emails that never stop coming. If you're new to creating filters, here's how you can do it in Gmail.
We hope you enjoyed reading this article and found this informative and helpful in keeping yourselves up-to-date.

2021-09-20 08:42
Praveen R

Guidelines & Tips from IT: WiFi Modem/Router Maintenance

It is important that you take good care of your laptop and modem/router to keep it working well. Following these easy steps will ensure that your device lasts longer and requires less maintenance. As a bonus, these tips will also help with undisturbed production.

Reboot WIFI Modem/Router: 

  • Reboot is just a fancy way of saying "turn your modem off and back on".
  • Restarting your modem can fix a few internet connection problems, improve slow connections, and resolve wireless issues. Please follow the below steps.


  • Even if you haven't encountered any errors it's a good practice to periodically restart your router and cable modem (once in a week is a good pace).
  • This will help keep your connection working and should reduce the possibility of losing the internet at an inopportune time.
  • To reboot your device use the power button on your device (if available).

When you face any issue with the internet, try the above steps initially to fix it by yourself. If nothing helped, then contact the ISP provider's support team immediately and inform the issue in detail.

Note: If you are a BSNL or AT user, you can report the issue via our IT ticketing portal itself by choosing the 'Home Internet' category.

2021-10-06 10:13
Praveen R

Guidelines & Tips from IT: Interesting Computer Tricks

1. Shake and Minimize Window:
 
Windows-10-shake-to-minimize-inactive-windows.gif
 
If you have stacks and stacks of windows open, and you want to minimize them and move down, then simply do this.
  • Click on the top bar of your desired window, 
  • Hold it down, and shake with the mouse to instantly minimize all other open windows 
  • Do it again to restore those windows
 
2. Create a Shortcut Key for Specific Software:

You can create your own shortcut key for any computer Application.

image.png
  • Just Do Right-Click on the application & open Properties.
  • Click and move to the Shortcut Tab as shown in the image.
  • Click on the shortcut key row and press your favorite shortcut key.
  • And the Last click Ok.
  • “CTRL + ALT” will by default you can not change it, just click on apply and that’s it now you can use that shortcut key to open that software.
  • Now try to open that application with your desired specific shortcut key.
3. Create Password Protected Files and Folder Archives:
 
This is the best way to protect your files and folder without having any additional application, also you can use this method in any version of Windows, MAC & Linux. This can be worked in the 7-Zip, WinRAR, or The Unarchiver (Mac) or some equivalent.
  • Right-click on the files or the folder.
  • Click on Add To Archives.
  • Now set your password, confirm the password and click ok.

 
Now your files and folder will be moved to password-protected archives. You can access it anytime by putting your secure password. No one can open your files without the correct password.

2021-10-22 16:07
Praveen R

Guidelines & Tips from IT: Social Engineering

Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems.

Protect Your Identity by Keeping Your Social Media Presence Clean:
  • On your social media accounts, minimize the amount of personal information that you display. 
  • In particular, minimize how visible your information is to any untrusted individuals. 
  • This way, those who are not approved to be your friend or contact on the platform will be less likely to view your personal information. 
  • Most sites offer this as a privacy option in the settings for your account.
Pay Attention to Data Breaches to Protect Your Identity:
  • Identity thieves often target large retail chains and other organizations to steal customer data. 
  • Pay attention to any data breaches announced in the media. 
  • A lot of the time, it isn’t you that gives away your information, it is someone else who has access to that data. Keep informed about breaches. 
  • If you are part of one, change your password ASAP and monitor activity.
Be On Guard Against Unknown People Asking For Sensitive Data:
  • Social engineers may try to trick you into giving away sensitive information, such as user login names and passwords or credit card numbers. 
  • They may pose as authorized users or members of a security firm, for example. 
  • Remain on guard and verify the identity of any person making an unsolicited request before you give away information by phone, email, or in person.
Most Ransomware Attacks Begin Because of a Human Act:
  • Most of the time, a ransomware attack is successful because of something a human did. 
  • Clicking a link, downloading an attachment, or logging into an unsafe site, are the most common ways ransomware other malware get on devices and networks. 
  • Always be suspicious when examining emails and other communications and never log into a questionable site.
Ways to Avoid Being a Victim of a Phish:
Do Don’t
Keep your software and browsers up to date Don't click on any links in any email sent from unknown or suspicious senders
Hover over links to identify obvious fakes; make sure that an embedded link is taking you to the exact website it purports to be Don't send an email the looks suspicious to friends or family as this could spread a phishing attack to unsuspecting loved ones
Take your time and inspect emails for obvious red flags: misspelled words and bad grammar, incorrect URL domains, unprofessional and suspicious visuals, and unrecognized senders Don't download content that your browser or security software alerts you may be malicious
Instead of clicking on a link provided in an email, visit the website of the company that allegedly sent the email to make sure the deal being advertised is also on their webpage Don't give away personal information like your credit card number, home address, or social security number to a site or email address you think may be suspicious

2021-12-13 06:17
Praveen R

Guidelines & Tips from IT: Split the screen on Windows 10

Knowing how to split the screen on Windows 10 opens up a wide range of options, starting with making a particular tab to take up a specific portion of your screen. Perhaps you’re entering data into a spreadsheet and need two tabs equally visible at once. Thankfully the process itself is pretty straight forward and with this handy guide on how to split your screen on Windows 10, you’ll be carving up your screen in no time.
 
 
1. Select a window you want to split your screen with

  • The split-screen function in Windows 10 will work with most applications and tabs, including third-party programs as well as browsers. 
  • Just select whatever window you want to take up a portion of the screen first. 

For this trick, we’re going to fill half the screen with a Google Chrome tab.

2. Press Windows + Left (or Right)

  • You can drag the particular window to the edge of your screen Left/Right.
  • Also, you can press the Windows key plus the Left or Right Arrow key will make whatever window you have open take up exactly half of your screen. 
  • Obviously pressing the left arrow key will make it take up the left side of the screen, whereas the right arrow key will make it take up the right side.

3. Select a second window

  • If you have more than one window open when you complete step 2, they should appear as thumbnails on the other half of the screen. 
  • Just select whichever one you want to take up the remaining half of the screen and it will automatically fill the space.

4. Drag the divider to your preference

  • If you don’t want the two windows that are each taking up half the screen to have the same share of the screen, you need one to be bigger than the other.  
  • Just click on the thin dividing line between the two windows and drag it either left or right to match your needs.  

5. Split your screen into quarters (optional)

  • If you need to have more than two windows open at once you can go as far as splitting your screen into quarters.  
  • First press Windows + Left/Right Arrow key, this will make the window take up half of your screen.
  • Next press the Windows + Up/Down Arrow key and it will automatically snap to fill just a quarter.

2022-01-04 03:58
Ajai Krishna

Guidelines & Tips from IT: How to Manage 'Undo Send' in Gmail ?

We all have email regrets, everyone does right? Perhaps we knew it was a bad idea or a "reply all" disaster the second when we hit Send. We all know the panic of hitting "send" on an email too soon. With Gmail, you can add a buffer to recall a mistakenly sent message.

The feature, dubbed Undo Send, is on by default and you can't deactivate it. But you can adjust how long you get to unsend an email.

Let's see how to configure this in an easy way!

  • First, click the gear icon (setting icon)  and select  > See all settings.

  • In undo send option: click the drop-down menu to select how long you want to be able to undo a sent message (5, 10, 20, or 30 seconds).
  • Then scroll to the bottom and select Save Changes. 

  • If you click the undo link before the time runs out, your message will not go out. You'll get a chance to re-edit it or delete it entirely. 
  • You can even undo discards, so when you delete a message in progress, you can bring it back and start again.

2022-01-10 16:06
Ajai Krishna

Guidelines & Tips from IT: Have You Heard of Copy Paste Using Cloud Clipboard ?

Here's another feature that very few people take advantage of. It's called Cloud Clipboard, and it lets you seamlessly copy and paste text, links, and pictures across multiple devices.

How to Enable the New Clipboard Features

These new features are off by default. 

  • To enable these new clipboard features, head to Settings > System > Clipboard. 
  • To enable the clipboard history, turn “Save Multiple Items” to “On.”

To sync your clipboard data across all your Windows 10 devices- set “Sync Across Devices” to “On.”

How to use Cloud Clipboard?

To access Clipboard, press Win+V anywhere, and the clipboard will pop up. To copy-paste any of the selected text or images, just click Ctrl+C or Right-click >> copy, and it will automatically appear in the editor.

You can scroll through the list, copy anything you want, and paste it by simply double-clicking on it. So far we haven’t seen any limit on how many it can retain, but as of now, there seems to be no limit. Also, if we want to keep clipboard data even after a restart, please follow these steps:

  • Hover over one of the clipboard data until it becomes a little dark.
  • Look for a PIN icon on the right side. Click on it to PIN.
  • All the data which your pin stays with you even after a PC restart.

2022-01-17 10:52
Ajai Krishna

How to use voice typing on Windows 10?

Need an alternative way to work in Windows 10 beyond your keyboard and mouse? Try your voice. You can dictate text to create emails, documents, and more. Using your voice to control Windows can be a helpful option if you physically can't or don't want to use your mouse and keyboard. 

In order to invoke the dictation panel, make sure to place the mouse cursor on any text field, and then use the Windows key + H shortcut.

When the voice dictation panel appears, and you see the microphone icon in blue, you can immediately start dictating. However, bear in mind that using this experience, you'll also need to speak the punctuation and to dictate a symbol or letter, you'll need to use the "start spelling" command and then speak the symbol or letter.

For example, if you want to say "Microsoft sells software, hardware, and accessories." with the quotation marks, you'll need to say open quote Microsoft sells software comma hardware comma and accessories period close quote.

In the same way, to input a letter using uppercase, you must use the "uppercase" command, followed by the letter. For example, uppercase m will give you an M.

Once you're done, say "stop dictating," or after five seconds of inactivity, dictation will turn off automatically.

Windows 10 dictation commands

Here's a list of the most common dictation commands that you can use. The words using "quotation marks" are just examples. You'll need to replace them with different words to perform your task.

Voice commands

Actions

Select "word"

 

Selects specific word or phrase

Select that

Selects recent dictation result

Select the "next three words"

Select the "previous two paragraphs"

Selects multiple blocks of text

Start spelling

Stop spelling

Enables and disables spelling mode

Clear selection

Unselect that

Clear current selection

Delete that

Strike that

Deletes recent dication result or selected text

Delete "word"

Deletes current word

Go after that

Move after "word"

Go to the end of "paragraph"

Move to the end of that

Moves cursor to the first character after specified word or phrase

Go after "word"

Move after "word"

Go to the end of that

Move to the end of "paragraph"

Moves cursor to the end of the text

Go up to the previous "paragraph"

Move back to the previous "word"

Moves cursor backwards to the beginning of the previous block of text

Go to the start of the "word"

Moves cursor to the first character before a specified word or phrase

Go before that

Move to the start of that

Moves cursor to the start of a text block

Go down to the next "paragraph"

Move forward to the next "word"

Moves cursor forward to the beginning of the next block of text

Go to the end of the "paragraph"

Move to the end of the "word"

Moves cursor to the end of a text block

Press "key"

Tap "key"

Supported keys: Tab, Enter, End, Home, Page up, Page down, Backspace, Delete

 

If it’s not working, make sure you turn on “online speech recognition”. To do this, open the Settings app on the start menu, select “privacy” then click “speech”. Turn on “online speech recognition”.

2022-01-24 17:06
Ajai Krishna

Guidelines & Tips from IT: Handy touchpad gestures

Touchpads are standard equipment on laptops these days, and for everyday computing, a modern touchpad can do everything a mouse can, and more. 
Try them out a few times, and before long they'll become second nature.
 
 
Let's look at touchpad gestures!
 
GESTURE WHAT IT DOES
Tap the touchpad with one finger Open or select an item
Tap the touchpad with two fingers Show more commands (like right-clicking)
Tap the touchpad with three fingers Open Cortana
Tap the touchpad with four fingers Open the Action Center
Place two fingers on the touchpad and slide vertically or horizontally Scroll
Place two fingers on the touchpad and pinch Zoom out
Place two fingers on the touchpad and spread them apart Zoom in
Swipe three fingers up Show thumbnails of your currently running apps in Task View
Swipe three fingers down Show the desktop
Swipe three fingers either left or right Switch between your open apps
Swipe four fingers either left or right Switch between virtual desktops

2022-01-31 14:23
Ajai Krishna

Guidelines & Tips from IT: Is blue light filter good for eyes?

We’ve all read the reports: Blue light can play a role in sleep issues. It’s also been mentioned as a factor in skin damage, too. Fortunately, not only can you enable a blue-light filter on your smartphone, you can do so in Windows 10, too.

In fact, the process is incredibly easy setup takes just a few minutes. Here’s how to do it.

Step 1:

  • Click on the Start menu (or tap the Windows key on your keyboard). Then type in “Night Light” to bring up a direct link to that setting.
  • Alternatively, you can go to Start > Settings > Display, then click on Night light settings under Color (see image below). If you take this route, you can turn Night Light on and off via a toggle on the Display settings page.

Step 2:

  • Click the Turn on now button to immediately activate blue-light filtering. Move the strength slider to increase or decrease how much blue light Windows 10 will eliminate.
  • You can also instead click the gray toggle for the Schedule night light to restrict the blue-light filtering to specific hours. 
  • Customize a time span for when the blue-light filtering is on, and you’re all set to go. 
  • Windows can also base the schedule on your location’s periods of actual sunset. You’ll just need to turn on Location Services for that to work if your system has that setting off, a link to Location settings will automatically appear.

That’s it. You’re done!

2022-02-07 12:09
Ajai Krishna

How to snooze emails in Gmail ?

Emails come in throughout the day — sometimes at really inconvenient moments. If you don’t have the time to deal with an email when it appears or if you want to get back to it later and you’re afraid you’ll forget about it, you can use Gmail’s snooze feature.

Snoozing an email means that it will disappear for a while and then come back to the top of your inbox at a time you pick, as though you’re receiving it all over again.

Here’s how to snooze your emails.

  • In your inbox, hover over the email that you want to snooze. You’ll see a row of icons on the right-hand side. 
  • Click on the one that looks like a clock.

Hover over the message to see the snooze button.

  • Alternatively, you can select the message or messages you want to snooze using the checkboxes and then click the clock icon that appears above the inbox
  • You can also find the clock icon at the top of the screen when you open the email
  • In any case, when you click the clock icon, you’ll see a drop-down list of suggested times. Click on whichever one best suits you.

You can choose one of the suggested times or set your own.

  • If none of the times shown fit when you want to receive the message, you can click on “Pick date & time” at the bottom of the drop-down menu to set your own. 
  • A pop-up window will open. Once you’ve chosen your time and date, click “Save.”

Set the time you’d like to receive the email in this window.

  • The email will disappear from your inbox and will reappear at the top at the time you’ve chosen
  • If you want to be reminded about which emails you’ve snoozed, you can access them by clicking “Snoozed” on the left-hand side under “Inbox”
  • To undo a snoozed email, open it in the Snoozed folder and click “Unsnooze” at the top of the screen

2022-02-14 17:48
Ajai Krishna

Guidelines & Tips from IT: How to Care for Your Laptop’s Battery

Guidelines & Tips from IT: How to Care for Your Laptop’s Battery

Taking proper care of your laptop’s battery is important for ensuring your mobile machine can run as long as possible. We’ve rounded up the top tips for how to care for your laptop’s battery, from how long you should leave it plugged into how low you should let the battery drain.

Save cycles, save your battery

  • All laptop batteries are built to handle a certain number of charge cycles, usually somewhere around 500 full cycles — and sometimes even more. 
  • Essentially, a charge cycle equals one full discharge down to 0% and then a recharge back up to 100%. 
  • A discharge down to 50% and then back to 100% would equal half a cycle. 
  • Over time, each charge cycle decreases a battery’s capacity from its design
  • specifications, meaning that the fewer times you drain it, the longer the battery lasts.

Keep It Between 40 and 80 Percent Charge

  • If you use your laptop away from its charger quite often, try to keep it above 40 percent charge. 
  • When it’s time to recharge it, top it off to about 80 percent if it has decent capacity and you can live with the uncertainty. 
  • Using it this way is the best and most obvious way to extend the longevity and charge capacity of your laptop. 

Leave it plugged in (but not all the time)

  • If you’re not moving around and running an intensive application, it’s a good idea to leave your laptop plugged for the duration of that time. 
  • If you’re handling day-to-day tasks that don’t consume as much power as quickly — like browsing the internet — you can rely on the battery alone.

Update your operating system

  • For optimal functionality, you must consistently update your computer’s software. 
  • When the manufacturer releases a new update, it not only has patches and upgrades but can also help programs run more efficiently, which will conserve battery power. 
  • The same operating system on a later patch could use significantly less battery power, giving your battery a longer lifespan without changing anything else. 
  • And so, review your OS and keep your machine — and its battery — on a healthy diet of updates.

It’s always surprising to find out how much longer you’ll want to keep your perfectly set-up laptop once its battery life is a known thing, not a complete mystery.

2022-02-18 15:01
Ajai Krishna

Google Chrome Tips And Tricks You Can’t Miss For Sure!

Internet is a form of information of life today. In this era, everyone grows up with the internet at their fingertips. Keeping that in mind, Google Chrome browser has been a favorite web browser for many savvy internet users.  While Chrome is easy to use, there are some simple Google Chrome tips and tricks that can make your web experience much more satisfying and reliable. 
Here’s a look at some tips to make Chrome faster, more effective, and extremely flexible!
Open Multiple Pages on Startup
  • Rather than opening your browser with just one homepage, Chrome gives you an option to open several pages as it starts up, providing instant access to several websites and services you prefer to start your day with.
  • Go to settings and select On startup --> Open a specific set of pages

Utilizing URL/Adress Bar (Omnibox)

  • In Chrome, the URL address bar is also called Omnibox, which can be used for simple mathematical queries. 
  • Just type the calculations or conversions directly in the Omnibox and press enter to see the results yourself.

Reopen a Recently Closed tab

  • While surfing the internet, you can open any tab that has been closed by mistake. No worries,
  • In windows, you just have to press Ctrl + Shift + T. 
  • In Mac, you just have to press command + shift + T

To be continued...

2022-03-04 15:20
Ajai Krishna

How To Keep Windows 10 up-to-date?

Updating the Windows 10 operating system on your laptop is an easy and effective way to make sure your system runs smoothly. When you update Windows 10, your Laptop will have the latest features, bug fixes, and (most important) security patches!

  • Fortunately, Windows will periodically check for the latest system updates and install them automatically. 
  • All you need to do is restart your computer to ensure the updates finish installing. 
  • As convenient as automatic updates are, there are times when you'll need to manually check for updates twice a month.

Doing so is pretty straightforward, just follow these simple instructions to manually update Windows 10 on your Laptop!

  1. Select the Start (Windows) button from the bottom-left corner.

2. Go to Settings (gear icon).

3. Select the Update & Security icon

4. Choose the Windows Update tab in the left sidebar (circular arrows)

5. Click the Check for updates button. If there is an available update, it will begin downloading automatically. 

To finish the update, you'll need to restart Windows, but you do this later if there's no urgency. 

Note, your system will not be equipped with the latest updates until it's been restarted.

2022-03-14 18:01
Ajai Krishna

Guidelines & Tips from IT: CapeStart Knowledge Base Portal (KB Portal)

Learning new skills can be highly beneficial to our career, as it can help us to position ourselves to take on new projects and leverage new knowledge to advance. Showing that we are open to learning new things, we can also show our value in our commitment to our career and our company.

In this article, let us explore the KB portal that enables you to easily find the information needed to support yourself. The information is stored as articles, which are downloadable files or pdf.
 
Let us see how to make use of the KB Portal works!
 
1. Visit the KB Portal page and then select All categories
 
2. Then select Guidelines & Tips from IT
 
 
3. Finally we will find a list under 'Questions in Guidelines & Tips from IT', where we can check all the Tips!
 
 
Learning new skills can take time and patience. However, when you commit to learning something new, you can increase your opportunities for career advancement, expand your professional networks and enhance your knowledge base.
 

2022-03-21 14:59
Ajai Krishna

Guidelines & Tips from IT: How to Stare at Laptop Screen All Day?

If our screen is too bright, it can give you eye problems,  especially if we sit in front of a computer and surf or code all day. A too-bright screen can cause eye strain and fatigue, which can lead to headaches and other maladies.

Since we are regular computer users, eye health is critical for optimal performance. So in this article, we will show you how to adjust your screen's brightness on Windows 10 Laptops.

  1. Increase or decrease brightness using Action Center

The easiest way to change the brightness of your PC screen is using the action center. 

Follow these steps:

  • Open the Action Center from the system tray or press Windows key + A.
  • At the bottom, you will find a sun-like symbol, and next to it will be the adjustment bar.
  • Drag it to the left to reduce brightness, or drag it to the right to increase brightness.

  • The change in brightness is in real-time when using the above method. 
  • You will feel the brightness reducing or increasing while you drag the bar.

2. Quickly adjust screen brightness using the laptop keyboard

  • Most modern laptops come with brightness control keys in the Fn keys. 
  • You can look for brightness icons on the function keys from F1 to F12.
  • Normally, you will need to press the Fn key + the brightness key to make it work.
  • This is the quickest way to reduce or increase brightness.

Note: Brightness keys vary from laptop to laptop.

A screen that is too bright or too dim can take its toll on your eyes and make you uncomfortable, knowing how to increase and lower the brightness helps us be more productive and focused. 

 

2022-03-28 19:17
Ajai Krishna

Guidelines & Tips from IT: WFH Laptop Etiquette

With you, your good friend – your laptop – also has moved from office to kitchen table, thanks to Covid19. Working from home, shortly called WFH, has become very common and will continue for many more months or years depending on what direction the pandemic takes. Not everyone is used to or familiar with working from home. For many working professionals, this trend of working from home is unfamiliar.

Therefore, it is important that we take good care of our laptop, while you work from home, for long life and trouble-free operations.

Here are a few simple but important tips and guidelines on how to take care of our laptops while working from home.
 
  • Keep your computer or laptop in a clean and dust-free room.
  • Ensure that the keyboard is clear before closing the display monitor on top of it.
  • Hold it by its base (ideally with both hands) and not by the display.
  • Insert and remove any charger cable/headphones gently, so as not to damage the ports.
  • Never leave it in or around extreme heat and cold
  • Avoid placing heavy materials, such as books, on top of your laptop
  • Use an old toothbrush to clean the area around the exhaust fan and the gap between the keys on the keyboard.
  • Try to keep the laptop on a flat, clean surface. Don’t use your laptop on the bed.
  • Keep liquids and foods away from your laptop.

We hope you enjoyed reading this email and found this informative and helpful in keeping yourselves up-to-date.

2022-04-25 14:33
Ajai Krishna

Guidelines & Tips from IT: How to recognize and avoid a Phishing Email?

What is Phishing?

Phishing persuades you to take action which gives a scammer access to your device, accounts, or personal information. By pretending to be a person or organization you trust, they can more easily infect you with malware or steal sensitive data.

Successful phishing messages are difficult to distinguish from real messages. Usually, they are represented as being from a well-known company, even including corporate logos and other collected identifying data. However, there are several clues that can indicate a message is a phishing attempt. 

Some tell-tale signs of a phishing email include:

  • The message uses subdomains, misspelled URLs (typosquatting), or otherwise suspicious URLs.
  • The recipient uses a Gmail or other public email address rather than a corporate email address.
  • The message is written to invoke fear or a sense of urgency.
  • The message includes a request to verify personal information, such as financial details or a password.
  • The message is poorly written and has spelling and grammatical errors.

Phishing scams can also employ phone calls, text messages, and social media tools to trick victims into providing sensitive information.

If you receive one of these emails, this is what we should do:

  • Verify the sender by checking their email address by hovering above the subject 
  • Check the link, before you click. Make sure the links start with https:// and not http://
  • Be careful when providing personal information. Never provide your credentials to third parties.
  • Do not rush or panic reacts.  Scammers use this in order to pressure you into clicking links or opening attachments.
  • If you gave sensitive information, don’t panic — reset your credentials on sites you've used them. 
  • Immediately report all phishing emails to itsupport@capestart.com 

2022-05-02 14:55
Ajai Krishna

Guidelines & Tips from IT: Home Network Problems?

Of all the types of system issues, internet/network problems are one of the worst. Let's step through the basic process of how to troubleshoot network connectivity problems. 

That way, the next time we open up our web browser to a Cannot Connect message, we'll know what to do!
Let's try these easy steps first, before reaching our Internet Service Provider(ISP),
1. Make Sure It's Actually Your Network Problem
Sometimes, what seems like an issue with your network is actually a problem on a specific website's end. If we can't get on Facebook, for instance, check another few websites to make sure that the problem isn't just with a single site.
We can also visit downfor.io, which is a short URL for the site Down for Everyone or Just Me? to easily check if a website is down for everyone. Simply enter the URL and you'll see where the issue lies. If a site is down for everyone, you'll have to wait until it's fixed.
2. Restart your modem
There's no need to get upset about network issues right away, as the fix to our problem might be as simple as rebooting oursmodem. Restarting fixes a lot of issues. Unplug your modem, wait 30 seconds, and then plug it back in.
This process allows the modem to clear out any glitches.
3. Check Physical Network Connections
If the network problem persists after rebooting, we should next check to make sure that all physical network connection cables are in place. 
If you use an Ethernet cable to connect to your laptop, make sure that it's not unplugged or damaged. If your laptop has a physical wireless switch, make sure that it's not set to the off position.
4. Contact Your ISP
Should all the above steps complete successfully, we've now verified that your modem is working well.  Now we are sure that, the problem is occurring outside of the network and for multiple devices. 
If this is the case, our next best and final option is to reach out to ISP Customer Care to fix the network issue.

2022-05-10 06:45
Ajai Krishna

Guidelines & Tips from IT: How to Silence Windows 10 Notifications during Meetings or working on High Priority tasks?

Focus Assist can be used while we are in an important client or team meeting, while sharing our screen, using an app full screen, or during specific hours. We can tell Windows to hide all notifications while still filtering alarms or anything deemed high priority. 

Focus Assist can be turned on and off relatively quickly and there are three main options from which to choose.

  • Off: This disables Focus Assist completely and enables all notifications.
  • Priority only: Enables notifications from a customizable list of contacts.
  • Alarms only: Disables all notifications except for those associated with alarms.

Here's how to get started.

To activate Focus Assist, go to Settings > System > Focus Assist and make a selection or else just type Focus task's search bar and select Focus Assist.  

  • An option under the Focus Assist settings page called Show me a summary of what I missed while focus assist was on controls whether or not you see missed notifications in the Action Center. 
  • Check the box for this option if you want to see everything you missed in one location.

2022-05-20 14:31
Ajai Krishna

Guidelines & Tips from IT: Make Use Of Chromecast in Office Meetings!

Group discussions are a great way to let everyone share their ideas, but what if their ideas include more than just words? If we want to share the screen during a typical presentation, we have to disconnect the presenter’s laptop, connect a new laptop—possibly with a new cable—and hope everything works.
 
The Chromecast allows us to let anyone present in a few seconds. If we want to put something on the big screen, all we have to do is open chrome and select Cast only.
 
Let's see, how to make better presentations using Smart TVs in all major conference rooms, which support both Intel Wireless Display as well as Chromecast. 
 
To enable secured Chromecast, please follow the simple steps below,

  • Once enabled, it will ask you to relaunch your Chrome browser. Please click Relaunch, it will instantly restart your Chrome browser.
  • After the relaunch, open save and share from the 3-dots menu (kebab icon) in the top right corner.
  • Click on cast to see the available TV's

  • Now you’ll be able to find the available TVs from the Cast tab and cast the screen.

Chromecast is common to all laptops using Chrome browsers!

Happy Casting!

2024-05-13 14:58
Ajai Krishna

Guidelines & Tips from IT: Excel Formatting Tricks That Can Make You An Excel Expert

In order to deal with tons of data, we can’t ignore the important role Excel plays in daily work. However, both for beginners and advanced users, there are still many useful tips and tricks that are inevitably overlooked.
Here are some useful Excel spreadsheet secrets we may not know.

1. Use tables to format data quickly

  • Excel Tables are an incredibly powerful way to handle a bunch of related data. 
  • Just select any cell within the data and press CTRL+T and then Enter. 
  • And bingo, our data looks slick in no time. 

2. Change colors in a snap

  • So we have made a spreadsheet model or dashboard. And we want to change colors to something fresh. 
  • Just go to the Page Layout ribbon and choose a color scheme from the Colors box on the top left. 
  • We can also define our own color schemes. 
  • What's more, we can even define schemes for fonts or combine both and create a new theme.

3. Use cell styles

  • Consistency is an important aspect of formatting. By using cell styles, we can ensure that all similar information in our workbook is formatted in the same way.

For example, we can color all input cells in orange color, all notes in light gray, etc.

To apply cell styles, just select all the cells you want to have the same style and from the Home ribbon, select the style you want (from the styles area).\

4. Use the format painter

  • Format painter is a beautiful tool part of all Office programs. We can use this to copy formatting from one area to another. 
  • See the below demo to understand how this works. 
  • We can locate the format painter in the Home ribbon, top left.

5. Clear formats in a click

Sometimes, we just want to start with a clean slate.

Simple, just select all the cells, and go to Home > Clear > Clear Formats.

 And we will have only values left so that we can format everything the way we want.

 

2022-06-30 15:50
Ajai Krishna

Guidelines & Tips from IT: How Can I Check If My Password Was Breached?

What is a Data Breach?

A data breach is a high-risk security incident, where sensitive data is compromised by an unauthorized individual. The hacker could exploit this data by accessing, copying, transmitting, viewing, or stealing it.

Data breaches commonly involve the exposure of valuable sensitive information, including:

Cybercriminals can also discover and exploit existing data leaks and cloud leaks to cause data breaches. 

Chrome’s Password Checkup checks our username and password against over 4 billion credentials that Google has recognized as unsafe. Google identifies Gmail accounts affected by third-party data breaches and accounts where users are re-using their Gmail passwords, to prevent further compromise.

We’ll need to access Password Checkup to check if our login credentials are unsafe and take further action.

How to Use Password Checkup?

We can access Password Checkup directly here.

Once we’re in Password Checkup:

Click the ‘Check Passwords’ button on the Password Checkup page.

Google recommends us to update our passwords if:

  • The password has been exposed in a data breach
  • The password is considered weak
  • The password is used across multiple accounts

Gaining awareness of common tactics used to compromise is the first line of defense against accidentally exposing your personal information.

2022-07-12 05:08
Ajai Krishna

Guidelines & Tips from IT: Data Analytic Magic Begins with Pivot Table

An Introduction To Pivot Table in Excel

Pivot tables are among the most useful and powerful features in Excel. We use them in summarizing the data stored in a table. They organize and rearrange statistics (or "pivot") to draw attention to the valuable facts. You can take an extremely large data set and see the relevant information you need in a clean, concise, manageable way.

Sample Data

The sample data that we are going to use contains 448 records with 8 fields of information on the sale of products across different regions between 2013-2015. This data is perfect to understand the pivot table.

Insert Pivot Tables

To insert a pivot table in your sheet, follow these steps:

  • Click on any cell in a data set.
  • On the Insert tab, in the Tables group, click PivotTable.

A dialog box will appear. Excel will auto-select your dataset. It will also create a new worksheet for your pivot table.

step 2

  • Click Ok. Then, it will create a pivot table worksheet.

Drag Fields

To get the total sales of each salesperson, drag the following fields to the following areas.

  • Salesperson field to Rows area.
  • Sales field to Values area.

Value Field Settings

By default, Excel gives the summation of the values that are put into the Values section. You can change that from the Value Field Settings. 

  • Click on the Sum of Sales in the Values field.

value field

  • Choose the type of calculation you want to use.

value field setting

  • Click OK.

vfs

Sorting By Value

  • Right-click any Sales value and choose Sort > Sort Largest to Smallest.

sort1

Result:

sort 2

Two-Dimensional Pivot Table

We can create a pivot table in various two-dimensional arrangements. Drag the following fields to the different areas

  • Salesperson to Rows area.
  • Region to Columns area.
  • Sales to Values area.

2d pivot table

Applying Filters to a Pivot table

Let’s see how we can add a filter to our pivot table. We will continue with the previous example and add the Year field to the Filters area.

filter pivot

You can see that it adds a filter on the top of the worksheet.

Grouping Data in a Pivot Table

Excel allows you to group pivot table items. To create the groups, execute the following steps:

  • In the pivot table, select the data you want to group.
  • Right-click and click on Group.

group 1

Now, your data is grouped.

Percentage Contribution in a Pivot Table

There are various ways to display the values in a table. One way is to show the value as a percentage of the total. 

  • Add the sales field again to the values section.
  • Right-click on the second instance and select % of Grand Total.

percent 1

Conclusion

In this article, you’ve learned the basics of pivot table creation in Excel. You can see how simple it is to get started creating one and visualizing your data in many different ways. 

Boost your analytics career with powerful new Microsoft Excel skills by taking the Business Analytics with Excel course, which includes Power BI training

This Business Analytics certification course teaches you the basic concepts of data analysis and statistics to help data-driven decision making. This training introduces you to Power BI and delves into the statistical concepts that will help you devise insights from available data to present your findings using executive-level dashboards.

We hope you enjoyed reading this email and found this informative and helpful in keeping yourselves up-to-date.
 
For future reference click Capestart Knowledge Base Portal. Please explore the tool for more IT Tips and technology updates.
Feel free to contact us through the Global Service Desk if you need any assistance.

- Thank you for doing the right thing, we respect your diligence  -

2022-07-20 09:27
Jones Laura

Guidelines & Tips from IT: Pivot Table in Google Sheets (Part-I)

The Pivot Table Google Sheets Tutorial

To create a pivot table from the above data, follow the steps shown below:

  • Select all the data in your spreadsheet (on which you want to base your pivot table).
  • From the Insert menu, select Pivot table.
From the Insert menu, select Pivot table.
  • In the ‘Create pivot table’ box, if you want to display your pivot table in a new sheet, then select the radio button next to ‘New sheet’. If you want it in the same sheet, select the radio button next to ‘Existing sheet’.
New sheet
  • You should now see a pivot table created. If you had asked for the table to be displayed in a new sheet, you should find the new tab name as ‘Pivot Table 1’.  You can rename it to something else if you want to.
pivot table google sheets

At the beginning, your pivot table would be blank as shown in the image below. It will start filling up once you start adding rowscolumns and values to the table (explained in step 6).

  1. The range of cells on which the pivot table is based
  2. Some suggestions for pivot tables based on your data
  3. Options to customize your pivot table according to your requirement. This includes 4 insert options:
    1. Rows
    2. Columns
    3. Values
    4. Filters
Pivot table editor sidebar.

Suggested Pivot Tables

Google Sheets provides a few ideas for pivot tables based on your selected data. For example, for our sample data, Google Sheets suggests the following:

  • Average of Unit Price for each Region
  • Count of Country for each Region
  • Number of unique Item Type for each Region

Clicking any of these suggestions will automatically create your initial pivot table. For example, let’s click on the second suggestion: “Count of Country for each Region”:

 Count of Country for each Region

Looking at the above table lets us know at a glance how many countries operate from each geographical region.

2022-10-13 12:51
Jones Laura

Guidelines & Tips from IT: Pivot Table in Google Sheets (Part-II)

Creating a Custom Pivot Table

The suggestions provided by Google Sheets might not suit your needs, so you also have the option to build your own pivot table manually.

“How many units of each item type were sold on the different sales channels before the year 2014?”

Let’s break this question down to understand exactly what we want our pivot table to show. We want:

  • The names of different Item types sold in the form of rows
  • The different sales channels in the form of columns
  • The value of total units sold in cells where each Item Type meets a Sales Channel
  • Filters to display only the data relating to the years before 2014. A filter lets you see parts of the data, while keeping irrelevant parts hidden.

Now that we know what we want, let’s start building our pivot table.

To display the list of Item Types in each row, click on the ‘Add’ button next to ‘Rows’ in your Pivot table editor. Select ‘Item Type’ from the dropdown.

click on the ‘Add’ button next to ‘Rows’ in your Pivot table editor. Select ‘Item Type’ from the dropdown.

The pivot table will obtain the names of all the Item Types from your data table and display them as shown below:

Note that the pivot table has displayed the list of items in alphabetical order and has removed any duplicates.

To display the list of Sales channels across each column, click on the ‘Add’ button next to ‘Columns’ in your Pivot table editor. Select ‘Sales Channel’ from the dropdown.

Select ‘Sales Channel’ from the dropdown.

The pivot table will obtain the names of the different Sales channels (‘Online’ and ‘Offline’) from your data table and display them as shown below:

Our spreadsheet pivot table is already starting to take shape.

Now it is time to populate the pivot table’s cells with the number of Units sold for each Item type through each Sales channel. For this, click on the ‘Add’ button next to ‘Values’ in your Pivot table editor. Select ‘Units Sold’ from the dropdown.

Select ‘Units Sold’ from the dropdown.

You should now see the sum of units sold for each item on each sales channel.

sum of units sold for each item on each sales channel.

Note that the Units Sold have been summed up and displayed in each cell. So for Baby Food, the pivot table summed up all the units sold Online and displayed them in cell C3.

‘Summarize By’ (under Units Sold)                   

Adding Filters

We are already getting a lot of insights into our data from our created pivot table in Google Sheets. The last thing to do now is to narrow down our results so we see only the total number of units sold before sthe year 2014. For this we can use filters.

To add a filter to your pivot table, follow the steps outlined below:

  1. Click on the ‘Add’ button next to ‘Filters’.
    Add filters
  2. Select ‘Order Date’ from the dropdown.
  3. Click on the dropdown under ‘Status’.
    Click on the dropdown under ‘Status’.
  4. Click on the ‘Filter by Condition’ category.
    Click on the ‘Filter by Condition’ category.
  5. From the dropdown under ‘Filter by Condition’, select ‘Date is before’.
  6. You should see a new dropdown under this now. Make sure that ‘exact date’ is selected.
  7. In the input box that says ‘Value or Formula’, type the date ‘1/1/2014’. This ensures that the pivot table only considers the dates before 1st Jan 2014.
    filter by condition
  8. Click OK.

That’s all! We now have a pivot table that displays the sum of units sold for each Item type on each Sales Channel before the year 2014.

2022-08-29 15:54
Jones Laura

Guidelines & Tips from IT: Excel Shortcuts That Will Speed Up Your Work

1. Create a pivot table from the selected data

Pivot Tables are one of the most powerful tools in Excel for summarising data, so it is helpful to know this keyboard shortcut to work quickly with them.

For both Windows and Mac, select the data set and press ALT + N + V (this is a sequential shortcut so press ALT then N then V).

A dialog box will appear with options to create a Pivot Table. You can normally select a cell in the data set as long as there are no blank rows or columns, and Excel will highlight the entire data set.

2. Create an Excel Table (Format As Table) from the selected data

There are two quick and easy ways to create an Excel Table using existing data in a spreadsheet.

The first way using the keyboard shortcut is CTRL + T for both Windows and Mac. This will allow you to choose from the styles of Excel Tables. Make sure your selected cell is anywhere in the data set that you want to convert into a table.

The second way is ALT + H + T for both Windows and Mac to open the Format As Table menu. Then you can use the arrow keys to select the style you want and hit ENTER.

3. Working with long and complex functions in the formula bar

Sometimes when working with a very long and complex formulas in the formula bar, you can only see the first line.

Users tend to expand the formula bar by using the mouse cursor at the bottom edge of the formula bar, but instead you can now use CTRL + SHIFT + U for Windows and ^ + SHIFT + U for Mac to quickly toggle the formula bar between a collapsed and expanded state easily.

 

 

4. Using Range Names into a formula with Paste Name Dialog box

Providing that you have created at least one Range Name in your workbook, you can use these instead of using the cell references in your formulas.

Just press F3 on Windows and Command + F3 for Mac to display the Paste Name dialog box to paste one of your Range Names into the formula.

5. Using Insert Function (fx) Dialog box

Instead of typing your formulas manually, you can use Insert Function button in the formula bar to display a dialog box to help you to build the correct formula.

Rather than always having to click on the Insert Function button, press Shift + F3 for both Windows and Mac.

6. Add line breaks to a cell for readability

Instead of typing long text into a cell and having to adjust the column width manually, you can insert a line break.

Move to a point where you wish to create a new line by pressing ALT + ENTER for Windows and Control + Option + Return or Control + Command + Return for Mac.

2022-09-28 08:14
Jones Laura

Guidelines & Tips from IT: SLACK - Troubleshoot connection issues

webcam not working

That's right! At some point we all should have faced this issue. Slack Call Doesn't Connect!

2022-10-05 13:54
Jones Laura

Guidelines & Tips from IT: Highlight Duplicates in Google Sheets

Find Duplicates in Google Sheets by Highlighting Them

Sign in to Google Sheets and open the spreadsheet you want to work with. Select the cells where you want to find duplicates. This can be a column, row, or cell range.

Selected cell range

 

Click Format > Conditional Formatting from the menu. This opens the Conditional Formatting sidebar where you’ll set up a rule to highlight the duplicate data.

Select Format, Conditional Formatting

At the top of the sidebar, select the Single Color tab and confirm the cells beneath Apply to Range.

Confirm the cells in Apply To Range

Below Format Rules, open the drop-down box for Format Cells If and select “Custom Formula Is” at the bottom of the list.

Select Custom Formula Is

 

Enter the following formula into the Value or Formula box that displays beneath the drop-down box. Replace the letters and cell reference in the formula with those for your selected cell range.

=COUNTIF(B:B,B1)>1

Here, COUNTIF is the function, B:B is the range (column,) B1 is the criteria, and >1 is more than one.

Alternatively, you can use the following formula for exact cell references as the range.

=COUNTIF($B$1:$B$10,B1)>1

Here, COUNTIF is the function, $B$1:$B$10 is the range, B1 is the criteria, and >1 is more than one.

 

Under Formatting Style, choose the type of highlight you want to use. You can use the Fill Color icon to choose a color from the palette. Alternatively, you can format the font in the cells with bold, italic, or a color if you prefer.

Fill Color palette

Click “Done” when you finish to apply the conditional formatting rule. You should see the cells containing duplicate data formatted with the style you selected.

Duplicates Highlighted in Google Sheets

As you make corrections to the duplicate data, you’ll see the conditional formatting disappear leaving you with the remaining duplicates.

Edit, Add, or Delete a Conditional Formatting Rule

You can make changes to a rule, add a new one, or delete a rule easily in Google Sheets. Open the sidebar with Format > Conditional Formatting. You’ll see the rules you’ve set up.

  • To edit a rule, select it, make your changes, and click “Done.”
  • To set up an additional rule, select “Add Another Rule.”
  • To remove a rule, hover your cursor over it and click the trash can icon.

Edit, add, or delete a rule

2022-10-13 12:52
Jones Laura

Guidelines & Tips from IT: Document computer issues in Windows with Steps Recorder

The primary reason to use Steps Recorder is to document a process that leads to an error, which can then be shown to a tech expert for assistance. To get started:

  1. Open the Start menu or the Run dialog box (WIN+R or with the Power User Menu in Windows 10/8).

     
  2. Enter the following command to immediately open Steps Recorder:

    psr

    This is an unusually small, rectangular program, and it often appears near the top of the screen. It could be easy to miss depending on what you already have open and running on your computer.

  3. Close any open windows other than Steps Recorder.

    The tool will make screenshots of what's on your computer screen and include those in the recording you save and then send off for support. Unrelated open programs in the screenshots could be distracting.

     
  4. Before you start the recording, think about the process involved in producing whatever issue you're trying to demonstrate.

    For example, if you're seeing an error message when saving a new Microsoft Word document, you would want to make sure you're ready to open Word, type a few words, navigate to the menu, save the document, and then, hopefully, see the error message pop up on the screen.

    In other words, you should be prepared to properly reproduce whatever problem you're seeing so Steps Recorder can catch it in action.

     
  5. Select Start Record.

    Another way to start recording is with the Alt+A hotkey on your keyboard, but this only works if the program is "active" (i.e., it was the last program you clicked on).

    Steps Recorder will now log information and take a screenshot every time you complete an action, like a mouse click, finger tap, program opening or closing, etc.

    You can tell when it's recording when the Start Record button changes to a Pause Record button.

  6. Complete whatever steps necessary to show the problem you're having.

    If you need to pause the recording for some reason, select Pause Record. Use Resume Record to continue without fully stopping.

    During a recording, you can also press the Add Comment button to highlight a section of your screen and manually add a comment. This is really useful if you'd like to point out something specific that's occurring on the screen to the person who's helping you out.

  7. Select Stop Record to quit recording your actions.

     
  8. Once stopped, you'll see the results of the recording in a report that appears below the original Steps Recorder window.

    In early versions of this tool, you may be first prompted to save the recorded steps. If so, in the File name: textbox on the Save As window that appears, give a name to this recording and then press the Save button. Skip to Step 10.

  9. Assuming the recording looks helpful, and you don't see anything sensitive in the screenshots like passwords or payment information, it's time to save the recording.

    Choose Save and then, in the File name: textbox on the Save As window that appears next, name the recording and then select Save.

    A single ZIP file containing all of the information recorded by Steps Recorder will be created and saved to your Desktop unless you chose a different location.

  10. You can now close the program.

     

What to Do With Your New Steps Recorder File

The only thing left to do is get the file you saved to the person or group helping you out with your problem.

 

Depending on who's helping you (and what kind of problem you're having right now), options for sending the Steps Recorder file might include:

 
  • Attaching it to an email and sending it to tech support, your computer expert friend, etc.
  • Copying the file to a network share or flash drive.
  • Attaching it to a forum post and asking for help.
  • Uploading the file to a file sharing service and linking to it when asking for help online.
 

More Help With Steps Recorder

If you're planning a complicated or lengthy recording (specifically, more than 25 clicks/taps or keyboard actions), consider increasing the number of screenshots it will capture.

 

You can do this by choosing the down arrow next to the question mark. Go to Settings and change Number of recent screen captures to store from the default of 25 to some number above what you think you might need.

2022-10-21 09:11
Jones Laura

How to Fix Chrome's lingering Internet issues?

Google Chrome is one of the widely used web browsers worldwide. However, much like other browsers, it too can be subject to loading or formatting issues on sites, among several other problems.

Clearing Chrome’s cache and cookies is the easiest way to resolve these problems. In this guide, we’ll show you the steps to clear Chrome’s cache and cookies on different devices.

What Does Clearing Chrome’s Cache and Cookies Do?

Before clearing Chrome’s cache and cookies, we should know what deleting them does to the browser.

  • When we delete our browser’s cache and cookies, all our saved pages and website data get deleted.
  • As a result, if we’re logged in to a website, we’ll be logged out of it immediately and will be required to enter our credentials again to log back in.
  • Similarly, visiting a website would take a little longer than it used to albeit not in a noticeable way.
  • And, any browsing issues you have with the browser slow page loading or bad content/page formatting would likely get resolved.

How to Clear Chrome’s Cache and Cookies on Mac and Windows?

Clearing Chrome cache and cookies is quite straightforward on Mac and Windows. Follow the steps below to do this.

These steps are common for all versions of macOS and Windows.

  1. With Chrome open, click on the ellipsis button in the toolbar and select More Tools > Clear Browsing Data. Alternatively, you can hit the Command+Shift+Delete (Mac) or Ctrl+Shift+Delete (Windows) keyboard shortcuts to directly view the Clear browsing data window in the Settings menu. Or, we can also navigate to chrome://settings/clearBrowserData to access it.

  2. In the Clear browsing data prompt, check off the checkboxes next to Cookies and other site data and Cached images and files.

  1. Click on the dropdown menu next to Time range and choose a time range during which you would like to clear the cache and cookies.

  2. Hit the Clear data button to clear Chrome’s cache and cookies on Mac and Windows.

 

2022-11-16 08:19
Ajai Krishna

Guidelines & Tips from IT: Let's go phishing! Best tips for spotting a phishing email!

Everyone is susceptible to a phishing attack. Often, phishing emails are well-crafted and take a trained eye to spot the genuine from the fake.

There are, however, ways to make ourself less of a target. Keep in mind our top tips to stay safe online. 

Name of sender can trick you

Email addresses and domain names can be easily spoofed. It is, therefore, crucial that you check the domain name for spelling alterations on  suspicious emails. Even if they appear to have come from a trusted sender, always double check.

Check for typos

Attackers are often less concerned about being grammatically correct. Which means that typos and spelling errors are often evident in messages. Such errors in an email could be a good indication that the message is not genuine.

Don’t share sensitive information hastily.

Any email that asks for sensitive information about you or our company is suspicious. No one from our office, for instance our Manager/TL will ever ask for any credentials or any sensitive information over an email.

Don’t fall for URGENCY!

Phishing attacks use scare tactics such as urgency and authority to trick victims into taking immediate action. Emails that ask to share personal information or to make cash transactions are… ‘phishy’. 

 Attachments can be dangerous.

Hover over attachments to check for an actual link, before you click on it or download it. But, if you are still unsure of the sender, do not click on the link.

Keep your devices up to date.

Devices, and the applications on them, are more susceptible to attacks when systems are not updated. Regularly check for updates on yours windows or mac laptops. 

When in doubt, reach us!

If you suspect that the security of your work device for example Laptop or data has been compromised or recevied an phising email, feel free to reach out to IT Services.

 

2022-12-02 06:19
Ajai Krishna

Guidelines & Tips from IT: Session Hijacking

Dear Stars, 

This week's IT tips are all about - Session Hijacking 

This article is about Session Hijacking and the ways to prevent it. But before we proceed with it, let me first tell you what a Session is. The total time you devote to your internet activity is called a Session. A session starts as soon as you log into a website or a service and ends when you end the connection or shut down your computer system. All your internet activity details are stored in a session temporarily.

What is Session Hijacking?

When a Session is a time when you are on the internet, Session hijacking means an attack over your internet session and the most common example one can give here is that, when you are using internet banking to check your bills or to do some transaction, an attacker can take over your internet session and hijack it. Session hijacking is usually done using web applications or browser sessions. 

A session hijacker can get complete access to your session and can do anything you could do on that website. Let’s learn about a few more examples of Session Hijacking so that you can avoid them.

How does Session Hijacking work?

Session Hijacking can be done in three different types – In Active session hijacking, the attacker attacks your active internet connection, which means, hijacking your internet session while you are logged in and the other is passive session hijacking wherein the attacker monitors your session and steals the information exchanged between you and the server. In a hybrid hijack, the attackers monitor the network session and then attack as soon as they find the way.

Examples of Sessions Hijacking.

1. You get an email saying that you have won a lottery and prompting you to click on a link to claim your prize. The attackers include their own session key to this link and as soon as you click on the link, you will grant him access to your session.

2. When you log in to your bank account or credit card to make a purchase or check the balance, the attackers can attack your ongoing session, kick you out of the session and take over. They can then access your bank account.

How can we Prevent Session Hijacking?

Session Hijacking undoubtedly is one of the most common cyber-crime and is pretty scary too, but we can certainly prevent it with some simple measures. These attacks can really bring some terrible consequences for business organizations including data theft, financial losses, and much more.

Use HTTPS and not HTTP

 (Hypertext transfer protocol secure) is a better and more secure version of HTTP. Especially the websites that require login details. HTTPS makes sure that the website has the SSL and TLS certification throughout the session and ensures the increased security of data transfer. Also, popular web browsers like Google Chrome flag all non-HTTPS websites as unsafe, and you get a warning message too.

Clear Cookies

Once the session is completed, clear the cookies to prevent session hijacking and stealing of cookies. The attacker will not be able to trace cookies if accidentally you have visited any vulnerable or malicious site.

Be Proactive

This is actually the best thing you can do to avoid session hijacking. Avoid using public WiFi and public computers, especially to access your banking websites or any website that requires your login credentials. If you have to use public WiFi, make a VPN (Virtual Private Network) to make sure that no one intrudes.

Also, Keep the System Updated, Don’t click on malicious links, and Log out Carefully

Be aware and never devour!!!.

2023-01-31 13:56
Vino Chandran

IT Ticket Raising & Scheduling

Steps for Creating a Ticket:
 

You can visit the  Ticketing Portal URL link from your laptop or phone for creating a new ticket.

          Username: email address

          Password: ********

  1. Select IT Support under the new request

  2. And choose the appropriate category and raise a ticket.

  3. Once the ticket is created you will be receiving an email with the ticket details along with a Calendar slot scheduling URL link.

 

Calendly URL link: https://calendly.com/cs-itsupport/support 

Click on the URL link to schedule a slot with the IT team by selecting the date and time.

Note: If the slot is not booked or the user didn't reach out to the IT team at the scheduled time, then the ticket will be automatically closed after 8 hrs.

You will be presented with a new screen to fill in the details below.

  1. Name
  2. Email
  3. Add Guest (User, Team Lead, or Manager if needed)
  4. Enter the ticket number received in the email.
  5. Select the work location whether from home or office.
  6. It is a must to fill a description with the ticket reference number and details for better help from the IT Team
  7. Click Schedule Event.

At the scheduled time, your ticket will be assigned to any of the IT resources, you can contact the respective person and follow the instructions provided by him.

Notes:

  • Tickets will be assigned and worked once the slots are scheduled based on the availability of resources
  • If the slot is not booked or the user didn't reach out to the IT team at the scheduled time, then the ticket will be automatically closed after 8 hrs
  • All access-related requests including Application/Tool/License should have the respective manager's approval
  • It is mandatory to visit the IT bay for all System-related issues (Eg: System Hang, Power ON issue, Battery issue, Performance related issues, Damages, etc..)
  • For Work from home users, they need to schedule a slot and your ticket will be assigned at the scheduled time and worked remotely by the available resource.
  • IT team's availability is 10 AM to 9 PM (Mon - Fri). After shift hours, only the critical issues will be addressed based on the IT resource availability.
  • Please avoid asking IT requests in Slack, in-person, or on other platforms without creating a ticket and booking a slot
  • The ticketing portal and Calendly URL are accessible on any device (Mobile, Tab, etc).

2023-10-06 08:23
Benny Jackson G

Goodman | Daikin VPN

1. GoodMan Password For New Users:

If you are working from home, 

Please get help from any of your teammates or the team lead, who’s working from the office.

If you are working from the office,

Please follow the below steps to reach out to GoodMan IT Support.

 

  1. Use any of our office landline phones.
  2. First Dail 0 and wait for 2 secs and then enter the following number 00 1 713 263 5400
    0 00 1 713 263 5400
  3. After connecting to Goodman voice bot. Press 1 for GoodMan IT Helpdesk.
  4. Please wait until you connect to a GoodMan IT person.
    Once connected please use the following or self script.
    Hi, I’m from India. Can you please help me to create a new Cisco VPN password?
    The username is MACX.

    I’ll repeat
    M - For Malaysia
    A - America
    C - Chiago
    X - Xmax

    You can create the password to India123 with first I in caps (Else your preffered password).

2. GoodMan Password For Existing Users:

Try Resetting the password by yourself:

If your old password expired or is not working anymore. You can reset the password using the self served link

Open this Link

https://webmail.goodmanmfg.com/owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fwebmail.goodmanmfg.com%2fowa%2f

Provide your username along with the domain. 

If your username is MACX

Please enter as follows,

GMC\MACX

And your previous password in the password field. And click ‘Sign In’.

In the next screen you will be asked to enter a new password.

Reach to GoodMan/Daikin GoodMan IT Support Team:

If you are working from Home,

Please get help from any of your teammates or Team Lead who’s working from the office.

If you are working from the office,

Please follow the below steps to reach out to GoodMan IT Support.

  1. Use any of our office landline phones.
  2. First Dail 0 and wait for 2 secs and then enter the following number 00 1 713 263 5400
    0 00 1 713 263 5400
  3. After connecting to Goodman voice bot. Press 1 for GoodMan IT Helpdesk.
  4. Please wait until you connect to a GoodMan IT person.
    Once connected please use the following or self script.
    Hi, I’m from India. Can you please help me to reset my Cisco VPN password?
    The username is MACX.

    I’ll repeat
    M - For Malaysia
    A - America
    C - Chiago
    X - Xmax

    You can reset the password to India123 with first I in caps(Else youre preffered password).

     

Note:
If you are not able to connect to the GoodMan IT person, please keep trying after sometime.

2023-03-23 09:17
Jones Laura

Enable Email Notifications

 

Keeping up with incoming emails can be challenging, and we frequently miss crucial ones. To prevent this, we can activate alerts with sound to be notified.

Turn Gmail notifications on or off

You can get email notifications on Google Chrome, Firefox, or Safari when you're signed in to Gmail and have it open in your browser.

Note: You won't see any notifications if you turned off all notifications for your browser.

  1. Open Gmail.

  2. At the top right, click Settings Settings and then See all settings.

  3. Scroll to “Desktop notifications.”

  4. Click New mail notifications on or Important mail notifications on.

  5. Next to "Mail notification sounds," select a sound from the list.

  6. To turn off email notification sounds, select None.

  7. Scroll to the bottom and then click Save changes.

Note: If you use inbox categories and turned on notifications for new mail, you'll only get notifications about messages in your Primary category. If you turned on notifications for important mail, you'll get notifications for everything marked as important.

I can't see my email notifications

If you use Windows 10, you'll see notifications outside of your internet browser. Turn on your Chrome notifications in the Windows Action Center.

2023-03-24 15:04
Benny Jackson G

Keyboard Shortcuts For Mac Users

048dacc2-b667-4fca-9d9c-07e3de92dcc0.png
Command-Space: Show or hide the Spotlight search field.
Command-W: Closes the active window you are currently in.
Command-P: Print the current document.
Command-T: Open a new tab.
Command-S: Save the current document.
Command – Comma (,): You are working in an app, and you want to open the application's Preferences.
Command-G: Find the next occurrence of the item previously found.
Command-M: Minimize the front app window to Dock
Command-L: Center the cursor or selection in the visible area
Command-Option-D: Show or hide the Dock from within most apps.
Command-left/right arrows: Command and the left/right arrows to go back/forward on a page in the browser window 
Fn twice: Launch Dictation on your Mac, start speaking, and press fn once you've finished.
Command + Control + Q: shortcut to immediately lock your machine.
Command+D: Bookmark the current page.
Command+B: View bookmarks.
Command+J: View recently downloaded files.
Command+Delete: Send a selected file to the Trash.
Space: Preview the selected file.

2023-03-31 11:46
Kalaivanan G

Laptop battery/charging issues

Check the power connections

  • Make sure the power cord is securely plugged into the laptop and the socket.
  • Ensure that the power outlet is working by plugging in another device.
  • Look for any damage to the power cord, such as fraying or cuts. If the cord is damaged, you'll need to inform the IT team for further assistance.

Restart your laptop

Check for any system updates

Additional tips

  • Keep your laptop cool and avoid exposing it to extreme temperatures.
  • Please plug the charger before your battery goes below 50%.
  • Don't let your laptop battery completely drain before charging it.

Please try the above basic steps and still If you require any assistance, kindly contact our IT support team by raising a ticket via our Ticketing portal

2024-01-31 14:46
Atcaya Saminathan

Laptop Display Issues

External display

If you're using an external display, make sure it's properly connected to your laptop and turned on. Also, check if the external display is set as the primary display in your laptop's display settings.

Power connection

Ensure your laptop is plugged in and receiving power. A low battery can sometimes cause display issues.

Restart your laptop

Check for any system updates

Check for hardware damage

Please try the above basic steps and still, If you require any assistance, kindly contact our IT support team by raising a ticket via our Ticketing portal

2024-01-31 15:36
Atcaya Saminathan

Keyboard/Mouse not Working

Check Physical Connections

Ensure that the keyboard and mouse are properly connected to the computer. If they are wired, check the USB connection. If they are wireless, check the batteries and ensure that they are properly paired.

Try Different USB Ports

If you are using USB peripherals, try plugging them into different USB ports. Sometimes, a specific port might be faulty.

Restart Your Computer

A simple restart can often resolve temporary issues. Restart your computer and check if the keyboard and mouse work after the reboot.

Use a Different Keyboard/Mouse

If possible, try using a different keyboard and mouse. This can help determine whether the issue lies with the peripherals or the computer.

Check for Physical Damage

Inspect the keyboard and mouse for any physical damage. Broken cables, loose connections, or damaged keys can cause issues.

Please try the above basic steps and still, If you require any assistance, kindly contact our IT support team by raising a ticket via our Ticketing portal

2024-01-31 15:41
Atcaya Saminathan

Earphones not working on Laptop

1. Check the connections:
Make sure your earphones are plugged into the headphone jack correctly.
Ensure the volume is turned up on both your laptop and your earphones. Many earphones have volume controls on the cord or inline remote.
Check if the mute button on your laptop or earphones is accidentally turned on.
2. Clean the headphone jack
Dust buildup in the headphone jack can sometimes cause audio problems. Gently blow out any dust in the jack.
3. Restart your laptop:
4. Check for any system updates
5. Test your earphones with another device
6. Check for physical damage
If none of the above steps work, there may be physical damage to your earphones or the headphone jack on your laptop. Look for any visible damage, such as fraying wires or a loose jack. If you see any damage you'll need to inform the IT team for further assistance.

Please try the above basic steps and still, If you require any assistance, kindly contact our IT support team by raising a ticket via our Ticketing portal

2024-02-01 14:18
Kalaivanan G

Network connectivity issues and troubleshooting

Gather Information

  • Note down the symptoms (e.g., complete internet outage, slowness, specific websites unreachable). Is the issue affecting one device or multiple?
  • Confirm the issue is with a specific website or an application

Check Physical Connections

  • Ensure cables are securely plugged into your device, router, and modem (if separate). Look for loose or damaged cables.
  • Try a different Ethernet cable, as they can degrade over time.
  • If using Wi-Fi, check for signal strength issues.
  • Try to disconnect and reconnect

Restart Devices

Keep system Updated

Please try the above basic steps and still, If you require any assistance, kindly contact our IT support team by raising a ticket via our Ticketing portal

2024-02-01 15:15
Atcaya Saminathan

How to Manage DL's in Gmail Groups

Dear Stars,

This week's IT tips are all about ‘How to manage DLs in Gmail groups’.

Group owners and managers can easily handle email distribution lists within the group giving them the access to manage communications as needed.

Google Apps

Log in to Google Apps, using your email and gain access to the suite of applications and services. 

Groups

Once logged in, navigate to the "Groups" section within Google Apps; here, you'll find a list of the various groups you are part of or have administrative control over.

Select the specific group you wish to manage or modify, as each group may have unique members, roles, and purposes.

Members Details

Within the chosen group, navigate to the "People" section located on the left-hand side of the interface; this is where you can view and manage the members associated with the group.

Add Members

If you want to include a new member, click on "Add Members," input the email address of the person you wish to add, and specify their role within the group, whether it be an owner, manager, or regular member.

You can also include a member in the group by selecting the add user icon located on the right side of each group.

Remove Members

If you need to remove a member from the group, identify the individual by clicking the checkbox next to their profile picture or name, then choose the "Remove" option, ensuring they are no longer part of the group's membership.

Role changes

Select the user's role to modify or update it according to your specific requirements.

We hope you enjoyed reading this email and found this informative and helpful in keeping yourselves up-to-date.

Click Capestart Knowledge Base Portal for future reference. Please use the tool to learn more about IT tips and technology updates.

If you require assistance, please contact us via the Global Service Desk.

- Thank you for doing the right thing, we respect your diligence  -

2024-02-05 12:30
Atcaya Saminathan

Steps for Creating a Ticket

You can visit the  Ticketing Portal from your laptop or phone to create a new ticket.

 Username: email address

 Password: ********

  1. Select IT Support under the new request
  2. Choose the appropriate category and raise a ticket.
  3. Once the ticket is created you will receive an email with the ticket details.

After the ticket is created, the IT team will promptly assign it and make themselves available to address the issue. The IT team will attempt to address and resolve the issue remotely. If the issue requires physical examination, users will be directed to visit the IT bay for assistance.

Here are the locations where you can find the IT team:

Krishnankovil Office:

  • Prime Building: First floor TL bay, close to Silvermount.
  • Orion Building: First floor TL bay, near Sparkle.

Kottar Office (Spectra):

First floor, last bay, adjacent to the server room.

The IT team members and their responsibilities are as follows:

HelpDesk & Technical Support: Kalaivanan G, Atcaya Saminathan RL

IT Infrastructure: Vino Chandran, Sivaperumal Pavanasam

Inventory Management & Hardware Support: Vimal G Praveen

Note: All users are required to create a ticket on the Ticketing Portal for any issues, except in emergency situations. If it's an emergency, users can directly visit the IT bay for assistance.

2024-02-08 15:18
Atcaya Saminathan

Beware of Rising Spear Phishing Attacks

Dear Stars,

We are reaching out to raise awareness about a serious cybersecurity threat: spear phishing attacks.

Spear phishing attacks are targeted emails, WhatsApp messages, or SMSs that appear to come from trusted sources, such as colleagues or organizations. Their goal is to deceive recipients into divulging sensitive information or downloading malicious software. To safeguard ourselves against these threats, it’s crucial to understand the tactics commonly used:

  • Urgency and Familiarity:Attackers often create a sense of urgency and may use personal details to seem legitimate.
  • Malicious Links and Attachments: Messages (Email, WhatsApp, SMS) frequently include harmful links or attachments that, when clicked, can compromise security.
  • Impersonation of Trusted Senders:The sender’s address may be spoofed to appear as someone familiar, sometimes even using our known person’s profile image in WhatsApp.
  • Requests for Sensitive Information:Be cautious of any requests for passwords, account details, or other confidential information.

Recently, we’ve encountered multiple incidents where our employees received spear phishing messages. One notable incident involved a message via WhatsApp impersonating our CEO, complete with his profile image. Please refer to the screenshot below for more details:

Action Steps:

  • Report: If you receive a suspicious message, promptly report it to our IT department. Include as much detail as possible to aid our investigation.
  • Block and Delete:To mitigate risks, block the sender and delete the message immediately.

Your vigilance plays a crucial role in maintaining our cybersecurity defenses. If you have any questions or concerns, please contact our @CapeStart ITSuppport team.

Click Capestart Knowledge Base Portal for future reference. Please use the tool to learn more about IT and Security related tips and technology updates.

2024-07-17 14:13
Aslin Keerthi

Beware of Rising Phishing Attacks

Hi Stars,

We want to raise your security awareness about Email phishing attack which will affect our organization and your personal data.

Please find the sample phishing email for you reference:

Microsoft 365 Multi-Factor Authentication (MFA), This fraudulent email is part of a phishing campaign designed to steal sensitive login credentials and potentially compromise organization's security.

Here is how you can identify the fake emails:

Check the Sender: Verify the sender's email address. Be cautious of emails from unofficial or misspelled domains, as well as those that do not match the typical communication channels used by Microsoft or our IT department.

Examine the Message: Pay attention to the content of the email. Look for signs of phishing, such as generic greetings, urgency, spelling and grammatical errors, suspicious links or QR.

Verify the URL: Before clicking on any links, hover over them to see where they lead. Ensure that the URL begins with the Official URL, such as https://login.microsoft.com or another official Microsoft domain.

Avoid Sharing Credentials: Never share your login credentials, MFA codes, or any personal information with anyone, even if they claim to be from IT support or Microsoft. Our IT team will never request this information via email.

What to do if you receive an email that you suspect is a fake MFA request:

  • Do not click any links, scan QR codes or download any attachments in the email.
  • Do not reply to the email or share any information with the sender.
  • Forward the suspicious email to @CapeStart ITSupport

Thanks & Regards,
SecOps Team

2024-07-18 16:07
Aslin Keerthi

Microsoft 365 sign-in for multi-factor authendication Phishing Awareness Image

2024-07-18 13:02
Aslin Keerthi

Phishing Alert: Stay Vigilant and Protect Your Information

Hi Stars,

As part of our commitment to maintaining a secure digital environment, we want to remind everyone about the importance of recognizing and avoiding phishing emails. Cybercriminals use these fraudulent messages to trick you into revealing sensitive information such as passwords, credit card numbers, or other personal data.

What is Phishing?

Phishing is a cyber-attack where attackers disguise themselves as trustworthy entities to steal sensitive information. These attacks often come in the form of emails, messages, or websites that look legitimate but are actually malicious.

Example of a Phishing Email

Below is an example of a phishing email with key indicators highlighted:

Key Indicators of Phishing Emails:

  • IT Department will never email you to verify your account: Legitimate institutions will not ask you to verify account details via email.
  • Urgent and Threatening Emails: Be wary of emails that create a sense of urgency or threaten negative consequences.
  • Poor Punctuation and Grammar: Phishing emails often contain noticeable grammar and punctuation errors.
  • Suspicious URLs: Always hover over links to see the actual URL. Phishing emails may use URLs that look like legitimate services but direct you to malicious sites.

What You Can Do:

  • Hover Over Links: Before clicking any link, hover your cursor over it to see the true destination.
  • Verify the Source: If you receive an unexpected email, verify its authenticity by contacting the organization directly using contact information from their official website.
  • Report Suspicious Emails: If you suspect an email is phishing, report it to our IT department immediately.

Protecting Our Organization:

It is crucial that we all stay vigilant to protect our organization's data and systems. Here are some additional steps you can take:

  • Keep Software Updated: Ensure your computer and applications are up to date with the latest security patches.
  • Use Strong Passwords: Create strong, unique passwords for your accounts and change them regularly.
  • Enable Two-Factor Authentication: Where possible, enable two-factor authentication for an added layer of security.

By staying informed and cautious, we can protect ourselves and our organization from phishing attacks. If you have any questions or need further assistance, please don’t hesitate to reach out.

Thanks & Regards

SecOps Team

 

2024-07-31 15:42
Sherin

Security Awareness: Recognize and Avoid Phishing Emails

Hi Team,

In our ongoing mission to protect our organization from cyber threats, we need your help to stay vigilant against phishing emails. These fraudulent messages can appear very convincing, but they’re designed to trick you into installing malware or sharing sensitive information.

Example of Phishing Email

Let’s take a look at a common type of phishing email:

  • Malicious Attachment: The email may include an attachment with a suspicious file extension, such as .7z, which is often used to deliver malware.
  • Malicious Link: The message may contain a hyperlink disguised as a legitimate link, leading to a harmful website. Hovering over the link usually reveals its true, suspicious URL.

How to Stay Safe:

  • Be cautious with unexpected emails, especially those with attachments or links.
  • Check the sender’s email address for any inconsistencies.
  • Report suspicious emails to IT immediately.

While we have Sophos protection in place, your awareness is key. Make sure your Sophos protection is up to date to keep your devices secure.

Best regards,
SecOps Team

2024-08-19 08:33
Sherin

Security Awareness: Beware of Malware in Fake Emails

Hi Team,

In our ongoing mission to protect our organization from cyber threats, we need your help to stay vigilant against malware emails. These fraudulent messages can appear very convincing, but they’re designed to trick you into installing malware or sharing sensitive information.

Phishing Email with Malicious URL Example:

Recognize Phishing Emails:

  • Be cautious of emails that create a sense of urgency, such as "Your package will be delivered today."
  • Check the sender’s email address carefully. Scammers often use addresses that look similar to legitimate ones.
  • Hover over links without clicking to see where they actually lead. Malicious links often redirect you to fake or harmful websites.

The Danger of Clicking Unknown Links:

Clicking on links in these emails can lead to malware being downloaded onto your device. This malware can steal your personal information, encrypt your files (ransomware), or give hackers control over your computer.

How to Protect Yourself:

Do Not Click: Avoid clicking on links or downloading attachments from unexpected emails.
Verify: If you’re unsure about the legitimacy of an email, go directly to the company’s official website or contact their customer service.
Use Security Software: Ensure that your antivirus software is active and up-to-date to help detect and block malware.
Report Suspicious Emails: If you receive an email that looks suspicious, report it to your IT department or follow your organization’s protocol for handling phishing attempts.

Call to Action:

Stay Alert: Always double-check before you click.
Secure Your Environment: Regularly update your software and use strong, unique passwords to protect your accounts.

Remember: Cybercriminals are constantly evolving their tactics. Stay informed and vigilant to keep your digital life secure!

Thanks & Regards,
SecOps Team

2024-08-26 15:50
Aslin Keerthi

Beware of Malware: How to Spot Suspicious Emails and Stay Safe

Hi Stars,

In our ongoing mission to protect our organization from cyber threats, we need your help to stay vigilant against malware emails. These fraudulent messages can appear very convincing, but they’re designed to trick you into installing malware or sharing sensitive information.

Phishing Email with Malicious Content Example:

How to Identify Potential Malware Emails:

Just like phishing attempts, malware can often be distributed via deceptive emails. Here’s how you can spot potential malware threats:

  • Urgent or Threatening Language: Be cautious of emails that create a sense of urgency or use threatening language to prompt immediate action. Malware distributors often use this tactic to rush users into making mistakes.
  • Suspicious Email Addresses: Always check the sender's email address. If the address doesn’t match the organization's official domain or seems suspicious, it could be a sign of malware. Malware distributors may use email addresses that appear to be from legitimate sources at first glance.
  • Poor Grammar and Typos: Be wary of emails with obvious grammatical errors, misspellings, or awkward phrasing. Legitimate organizations typically avoid these mistakes, while malware distributors may not be as meticulous.
  • Requests for Sensitive Information: Legitimate organizations will never ask for your personal or financial information via email. If you receive such a request, it is likely an attempt to distribute malware.
  • Suspicious Links or Attachments: Always hover over links before clicking them to check the actual URL. If the link doesn't match the context of the email or leads to an unfamiliar website, it could be a malicious site designed to deliver malware. Similarly, avoid opening unexpected attachments, as they may contain malware.

By staying vigilant and recognizing these common signs, you can help protect yourself and your organization from malware threats. Always report suspicious emails to your IT department immediately.

Thanks & Regards,
SecOps Team

2024-08-26 15:49
Aslin Keerthi

Security Awareness: The Importance of Two-Step Authentication

Hi Stars,

Multi-Factor Authentication (MFA) provides an essential layer of security by safeguarding accounts beyond just using passwords. However, it isn't entirely invulnerable and can be compromised through techniques like social engineering, code interception, brute force attacks, and token manipulation. To reduce these risks, it's important to implement robust authentication protocols, minimize the frequency of MFA prompts, and regularly update security systems.

  • Be cautious with unexpected MFA prompts.
  • Avoid sharing verification codes.
  • Report suspicious activity immediately.

Why MFA is important cloud account

Enable two-step authentication on all your accounts today to safeguard your personal information and sensitive data from potential threats. We recommend implementing MFA across all your applications for enhanced security.

If you need any assistance with enabling MFA for your application, please contact the IT department.

MFA is essential, but awareness is key to staying secure!

Thanks & Regards,
SecOps Team

2024-09-02 11:44
Aslin Keerthi

Security Awareness: Best Practices for Passwords and Authentication

Hi Stars,

One of the most overlooked yet essential components of our company's security is password management. Cybercriminals often rely on guessing commonly used or predictable passwords to gain unauthorized access to company accounts. If we use simple passwords or follow identifiable patterns (like username, birthdays or phone numberes), it becomes easier for attackers to compromise multiple accounts. Once stolen, this information can be sold on the deep web or used for malicious purposes.

Essential Password Protection Strategies

  • Use Complex, Randomized Passwords: Avoid simple passwords or patterns such as personal information, usernames, or common phrases. Instead, create strong, unique passwords for each account using a combination of letters, numbers, and symbols.
  • Utilize Password Managers: Tools like Bitwarden and Zoho Vault securely store and generate complex passwords, making it easier to manage multiple accounts with strong, unique passwords for each one.
  • Regularly Update Passwords: Periodically changing passwords, while avoiding reuse across different accounts, helps to minimize the risk of breaches over time.

By implementing these simple yet effective steps, you significantly enhance the security, making it harder for cybercriminals to exploit weak password practices.

Thanks & Regards,
SecOps Team

2024-09-13 15:46
Aslin Keerthi

Essential Browser Security Best Practices for Safe Browsing

Hi Stars,

Essential Browser Security Best Practices for Safe Browsing:

  • Use Trusted Browser Extensions Install browser extensions from reputable sources only. Malicious extensions can spy on your activities, steal data, or install malware. Regularly review and remove any unnecessary or suspicious extensions.
  • Keep Your Browser Updated Outdated browsers can have vulnerabilities that attackers exploit. Always ensure your browser is up to date by enabling automatic updates or regularly checking for updates manually.
  • Be Wary of Suspicious Links and Pop-Ups Don’t click on links or pop-ups from unknown sources, even if they seem harmless. These can lead to phishing websites or install malware on your device.
  • Use Secure, HTTPS-Enabled Websites When browsing or making online transactions, ensure the site’s URL starts with "https://". This indicates that the connection is encrypted and more secure.
  • Enable Browser Privacy Features Most browsers offer features that improve security and privacy, such as blocking third-party cookies and tracking. Enable these features to reduce your exposure to tracking and malicious ads.
  • Regularly Clear Your Browser’s Cache and Cookies Periodically clear your browser’s cache and cookies to avoid being tracked by websites and to protect your personal information stored in cookies.
  • Regularly Review Permissions: Some websites request permission to access your camera, microphone, or location. Regularly check and manage these permissions in your browser settings to ensure you’re not exposing unnecessary data to websites.
  • Disable Autofill for Sensitive Information: Although convenient, autofill settings can be a security risk, especially if your browser gets compromised. Disable autofill for sensitive information such as passwords, credit card numbers, and personal data.

Thanks & Regards,
SecOps Team

2024-10-03 13:15
Aslin Keerthi

Importance of Reporting Phishing: A Guide for Employees

Importance of Reporting Phishing: A Guide for Employees

Phishing attacks are a prevalent threat in today’s digital landscape, and they can have severe consequences for both individuals and organizations. As employees, understanding the importance of reporting phishing attempts is crucial in safeguarding our workplace. This guide outlines why reporting phishing is essential and how you can contribute to a safer work environment.

Why Reporting Phishing is Important

  • Protecting Sensitive Information: Phishing attacks often aim to steal sensitive data, such as login credentials, financial information, and personal details. By reporting phishing attempts, you help prevent unauthorized access to this information.
  • Preventing Financial Loss: Phishing can lead to significant financial losses for organizations due to fraud or data breaches. Early reporting allows IT teams to take swift action, potentially saving the company from costly repercussions.
  • Safeguarding Colleagues: When you report phishing attempts, you not only protect yourself but also your colleagues. By alerting the IT department, you help ensure that others are aware of potential threats and can take precautions.
  • Improving Security Awareness: Reporting phishing attempts contributes to a culture of security within the organization. It encourages open communication about cyber threats and helps identify patterns that can inform future training and prevention strategies.
  • Enhancing Organizational Response: Each reported phishing attempt provides valuable data that can improve the organization's overall security posture. This information helps IT teams understand emerging threats and develop better defenses against them.

How to Report Phishing

To effectively report phishing attempts in Gmail, follow these steps:

  • Identify Suspicious Emails: Look for red flags such as poor grammar, generic greetings, or requests for sensitive information.
  • Do Not Engage with the Email: Avoid clicking on any links or downloading attachments in suspicious emails. Engaging with the content can compromise your device or data.
  • Use the "Report Spam" Feature:
    1. Open Gmail and locate the suspicious email.
    2. Click on the email to open it.
    3. In the top left panel of the email interface, look for an icon like this Report Spam Icon representing the "Report Spam" feature.
    4. Click on this icon to report the email as spam.
    5. Confirm your action if prompted.
    Reporting an email as spam helps Gmail improve its spam filtering system by analyzing patterns in reported emails, which ultimately protects all users from similar threats.
  • Document Details: If possible, take note of any details that may help identify the phishing attempt, such as the sender's email address, subject line, and any specific content that raised your suspicion.

Conclusion

Reporting phishing attempts is a critical responsibility for all employees. By being vigilant and proactive in reporting suspicious emails through Gmail's "Report Spam" feature, you play a vital role in protecting our organization from cyber threats. Together, we can create a safer workplace and minimize risks associated with phishing attacks.

Remember: If you see something suspicious, say something! Your actions can make a significant difference in our collective security efforts.

Thank you for your attention and commitment to security.

2024-12-23 07:19
Sherin

Technology Updates

Go to category

WhatsApp Privacy Policy

"When something online is free, you're not the customer, you're the product."

Since its founding in 2009 by two former Yahoo employees Brian Acton and Jan Koum, WhatsApp has been one of the principal places to message family and friends across the globe. It enjoys more popularity outside of the United States with 2 billion users worldwide, mostly in Europe, India, Latin America, and many African nations.

Recently people have been fleeing from the service after it was announced that a new update will be making the messaging app share data with Facebook. If users don’t accept the new terms of the update, they’ll no longer be able to use the app. So, is it time for WhatsApp users to run for the hills? Is it all over? Let’s try and take a balanced look at this.

In 2014 WhatsApp was bought by Facebook for $19 billion in cash in stock. At the time 8 million users fled to the rival Russian app Telegram and the buyout was called, “A 9/11 for the Internet” by TechCrunch. Despite Facebook’s ownership, WhatsApp was still seen as a privacy-focused service. Since 2014 its developers built state-of-the-art end-to-end encryption into the app-based upon an open-source protocol that could be independently verified.

With this latest privacy update, user data can be shared with Facebook and any of the other companies it owns such as Instagram, Oculus VR, etc. So, what’s happening? Those who don’t accept the revamped privacy policy by February 8, 2021, will no longer be able to use the app. So what data is being with Facebook and Instagram? The shared data is,

  • Profile Name
  • Profile Picture
  • IP Address
  • Battery Level
  • Signal Strength
  • App Version
  • Browser Information
  • Mobile Network
  • Connection Information (Phone Number, Carrier/ISP)
  • Language and Time Zone
  • Device Operations Information (Including identifiers unique to Facebook company products associated with the same device or account)

According to WhatsApp the purpose of this is to, “Offer integrations into cross Facebook company products which also includes Instagram and Messenger”, in other words to target adverts to you. For example, when you share a link of a product like a new smartphone you’re interested in or a wireless headphone to a friend or a family member in a WhatsApp message, WhatsApp can share that information to other Facebook companies to display targeted ads to you on Instagram or Facebook. The policy also notes that even after deleting the app some data will remain with the company.
The new policy is so aggressive that it doesn’t apply in the EU because it violates GDPR (General Data Protection Regulation) laws. It is interesting to note that in 2019 on their company website WhatsApp stated that that privacy was in their DNA but in 2020 this statement was removed. To many users, it seems like WhatsApp is no longer a privacy-focused product.

Signal and Telegram messaging apps are now seeing a sudden increase in demand after the news broke on Social Media. Signal’s popularity shot up even further after it was endorsed by Elon Musk, more than 100K users installed Signal on Apple’s Appstore and the Google Play Store. And in just a few days following the news Telegram picked up 25 million downloads. New installs for WhatsApp fell 11% in the first seven days of 2021 compared with the prior week. It should be noted that a singular data point isn’t a trend.

While some media outlets are claiming that the sky is falling, WhatsApp has actually been sharing user information and metadata with Facebook since 2016. In fact, the European Commission would find Facebook for being misleading during its 2014 takeover of WhatsApp. Facebook at the time said that “It would be technically impossible to automatically combine user information from Facebook and WhatsApp”, but in 2016 they did just that. Facebook’s explanation for the misleading statements in their filing was simply that was “Not Intentional”.

Besides, Facebook also promised to keep WhatsApp as a standalone product, but this promise too was broken. Back in 2016, they offered existing users 30 days to opt-out of the data sharing with Facebook. If you chose to opt-out at that time, WhatsApp would continue to honor that choice. This opt-out feature has been long gone and all new users after this time automatically had their data shared with Facebook. But according to Wired Magazine, the most recent privacy policy changes do not actually impact WhatsApp’s existing practices or behavior around data sharing with Facebook. The policy update was simply a clarification on how user data was shared. So, the buzz on the internet is mostly an overreaction, since this has been going on since 2016.

But that being said, the amount of data WhatsApp can collect and share about you and the fact that it’s been consistently sharing this with Facebook is still concerning. The merger of Facebook and WhatsApp was controversial within the company and it may have contributed to the departure of both WhatsApp’s co-founders in late 2017 and 2018 respectively. One of whom went on to work on Signal. Though the new WhatsApp privacy policy doesn’t change WhatsApp’s behavior since 2016, it can be a reminder that a lot of the apps that we use for free cost nothing because it’s in fact us that are being sold to product advertisers. Fortunately for users, there’s some great alternative privacy focussed messaging apps like Signal or Telegram. So, what do you folks think, are you going to switch to alternatives like Signal or Telegram, or are you okay with targeted advertising? Feel free to discuss below and thanks for reading the whole article. 

2021-01-19 20:38
Sebastin SironMani A

The crux behind Apple’s Silicon Strategy

A cursory glance might make us think that the M1 is just a beefed-up mobile chip, as it is quite similar to the 'Apple A14 Bionic' in the current iPhone 12 lineup, with 4 high-performance and 4 high-efficiency cores. And it has I/O controllers and built-in memory that makes it more of a mobile system-on-a-chip (SoC) than a plain CPU.

Apple claims that it has the world’s fastest CPU core in low-power silicon. And early reviews show that this claim isn’t far from reality, with many reviewers gushing over its performance. But how did Apple pull this off without fundamentally changing the design from what it’s using in its smartphones?

Part of the answer is that Apple used a lot more transistors in the M1 than the A14, over 4 billion more according to the company. But while this may have boosted performance, the real secret sauce lies in how Apple’s design, both in the A14 and the M1 fundamentally differs from x86, which is the architecture that Intel has been using for decades.

Apple has an Architecture License agreement with ARM Ltd. (owned by Nvidia), the broadest license that ARM sells. ARM was founded in 1990 as a joint venture between Apple and Acorn Computers. Apple's license is also perpetual that is the reason why Apple isn't interested in acquiring ARM. Apple does not use standard ARM designs, they use custom cores based on ARM architecture and the ISA, that is the reason why we see a big performance difference between Apple-designed SoCs vs. the Qualcomm or Samsung designs based on standard ARM Cortex-Ax cores. In 2013 Apple went a year ahead and delivered the first 64-bit SoC with iPhone 5S before even ARMs 64-bit design was finalized. 

Apple’s philosophy was to make the chips much more parallel than conventional CPU designs. Both the M1’s decoder which translates incoming instructions, and the execution units that process them, are wider, meaning they can accept more instructions at once. Additionally, the M1 can go significantly deeper with out-of-order execution, meaning that it can read ahead on the page and anticipate which instructions the program will need to have processed ahead of time to a greater extent than that of x86.

Then you have the fact that the M1 features a lot more L1 cache than x86 processors, which is the fastest cache memory available to a CPU core. And because it’s based on a chip originally meant for mobiles, it does all this while drawing significantly less power. But hold on a second, couldn’t Intel just implement some of the changes themselves and catch up with Apple? Well, it turns out that might be quite a challenge as the x86 architecture has some inherent limitations.

This all made M1 chip much faster than the Core i7 in the previous generation Mac Mini, that’s especially impressive when we consider that this is a CPU with no hyper-threading and with fewer cores. In single-threaded performance, even the lowly MacBook Air, which is the slowest of the three new M1 machines, surpassing the performance of a Core i9 iMac. This shows that if Apple had included 8 performance cores in the M1 instead of just 4, the M1 could’ve met or beaten the Intel Core i9’s 20 threads in multi-threaded performance.

This is exactly the reason why Rosetta 2 doesn’t face the huge performance penalty like other x86 emulators that we’ve seen in the past, like Microsoft’s for example. This is mostly down to hardware tweaks made in silicon to accelerate common x86 load/store instructions. Essentially, Apple Silicon can take x86-like instructions and process them directly rather than having to fully translate to ARM. As of right now, the only ARM CPU that can run x86 programs like this is the M1.

Apple is betting that because developers who have large user bases on the Mac platform would like to it that way, those developers will adapt and come out with versions specifically written for the Apple Silicon sooner than later. This approach is more or less in line with Apple’s playbook for other new products. They bring a new platform to market and use their brand power to force developers to catch up, which is something that they hope will again happen with the M1.

Ultimately, it’s not hard to imagine offering a more tightly controlled App Store experience for Macs, with programs being specifically vetted for full compatibility with Apple Silicon, especially as we expect to see more of Apple’s chips in desktop Macs down the line after seeing how powerful their first crack at a laptop processor has been.

2021-01-25 20:30
Sebastin SironMani A

USB4

USB 4 is actually based on the Intel Thunderbolt 3 specification and is going to share many of the same features starting with speed. Just like Thunderbolt 3 USB 4 boasts speeds of up to 40 Gbps provided you have a compatible cable and will exclusively use the USB-C connector.

Intel owns the Thunderbolt specification while they released it to the USB-IF (USB Implementers Forum) to make high-speed versatile connections possible across a broader range of devices. Since Thunderbolt is proprietary and owned by Intel, device manufacturers have to pay Intel royalties in order to put a Thunderbolt certified logo in their peripherals and accessories. 

All USB4 ports and devices will also support USB power delivery for using a device like your laptop to power an external display or fast charge your phone and there will be an added benefit and that the specification will be able to use all of its extra bandwidth more efficiently.

For example, you’ve got a PC connected to a monitor over USB4, you’re also using that USB4 connection to move some files to an external drive while an older specification would simply split the bandwidth in half and bottleneck your data transfer. USB4 can intelligently adjust how much bandwidth it assigns to each device. So, having a monitor plugged in won’t slow down your connection with that external drive.

The platforms that natively support USB4 are Apple Silicon M1, Intel 11th Generation Core (Tiger Lake/Rocket Lake), and the upcoming AMD Zen 4.

Some of the benefits of USB4,

  • External GPU support*, 10 GbE Networking, High-Speed External Flash Storage, etc.
  • DisplayPort Alt-Mode 2.0 for 8K 60Hz with HDR.
  • Power Delivery up to 100 Watts.
  • Backward compatible with USB 3.2, USB 2.0, Thunderbolt 3* accessories.

Note: External GPU is currently not supported on M1 MacBooks due to I/O limitation

2021-02-01 22:25
Sebastin SironMani A

What are Microservices?

Software becomes much easier to manage if we split it up into smaller chunks before using it. This approach is used by lots of larger services today where they split whatever it is they're providing into lots of small microservices.

To explain what a microservice is let’s imagine we’re using a site like Netflix, every time we perform some small action on the website like skipping forward, logging in, paying a bill, all of these functions are handled by different dedicated microservices, a concept that Netflix actually pioneered and all of them are held in virtual containers.

We see the traditional way for a site to handle tons of users at once was to run lots of separate instances of the same code in virtual machines or VMs. 

A VM is a separate session of an operating system running inside another OS and a typical physical server can run many VMs at once which helps a great deal when many people are accessing a site and also improves the overall resource utilization.

But running a full VM and the associated software that we need typically requires millions of lines of code and often a user wanting to complete just a simple task might require the server to spin up full-sized VMs which is pretty inefficient and it can end up hogging CPU cycles and other resources.

Microservices in containers by contrast only contains the code for a specific task so we could be talking about just a few thousand lines of code instead of millions. Going back to our Netflix example, we might have one container for credit card authentication, another for the review system, another for the volume slider, and so on. So, if lots of people are using certain microservices the system can just create more instances of that specific container instead of having to open up more full-fat VMs.

In fact, Google runs about two billion containers at any given time because they’re so easy to scale thanks in part to a system called Kubernetes the Greek word for Captain which Google developed to manage containers automatically and although this seems like it might only be relevant to DevOps Engineers it actually has real benefits for us the end consumer.

If there’s a problem with a service or if the developers want to add a new feature, they don’t have to search through 10 million lines of code to find the issue and then possibly break the entire thing in the process. Instead, they can just change one or two microservices that they want and leave the others untouched meaning that fixes and new features can be pushed out quickly with less risk of causing other problems.

The container paradigm also offers speed enhancements as servers can run smaller microservices much more easily without tons of VMs slowing them down. This has backend reliability implications too because it usually takes mere seconds to deal with a problematic container meaning that the potential for lengthy amounts of downtime is lower.

So, all this means that containers are being used for tons of applications. Online games like League of Legends and Fortnite rely heavily on containers to reduce lag by easing the load on their servers and Pokémon Go also used containers to fix issues shortly after the game’s launch and add new features without disrupting the millions of users who were playing the game at the time. 

Banks and eCommerce sites are also using containers with Kubernetes to handle loads of transactions at once without slowdowns and even IBM’s AI supercomputer Watson which has been heavily utilized in the healthcare industry has transitioned to using containers instead of monolithic virtual machines. 

So, it turns out that small containers have actually made life a lot easier. 

2021-02-09 03:30
Sebastin SironMani A

The CPU Duopoly - Explained!

Life is great when we have lots of choices. But this isn’t the case in the CPU world where we basically only have two choices on PC, AMD or Intel. So how did this happen?

Over 70 million PCs were shipped during the third quarter of 2020 alone, with as many computers as there are in the world, no other companies want a piece of the pie? 

To understand why there are only two CPU options for our PC, we have to go back to the first PC, the original IBM Personal Computer from 1981. IBM chose the Intel 8088 CPU to power the machine, which was based on the x86 instruction set. This ended up being an enormously consequential choice as the IBM PC exploded in popularity, and pushed lots of its competitors out of the market because it was a versatile, well-built computer that offered great value for money at the same time.

This meant that software developers wanted to write programs for the IBM PC and compatibles that utilized x86 CPUs. Meaning Intel quickly became a very powerful name in the microcomputer CPU space. So powerful in fact, that they ended up licensing out the x86 architecture to other companies to keep up with demand, without having to manufacture x86 chips completely on their own, but still make money. Ironically, AMD was one of these licensee companies and although Intel and AMD obviously remain rivals to this day, AMD still has an x86 license, which is used at various times, to beat Intel at its own game.

In the mid-80s the chip manufacturing industry convention was that when a computer vendor purchased CPUs, they would require a second source for the chip, a legacy business move from military contractors who needed a reliable supply. In effect for Intel or anyone to sell their chips, they would agree to enable a competitor to license their technology.

Obviously, AMD's Ryzen line-up is the one currently giving Intel great challenge but this was also true back in the 1990s when AMD started improving upon the x86 design and competing directly with team blue, rather than just being Intel’s second source chip supplier. Although AMD wasn’t the only x86 licensee that tried to make inroads into the market, they did have the knowledge and resources to become a serious contender, as they were already a publicly-traded company that had multiple chip fabrication facilities.

Other firms that had access to the x86 architecture, simply didn’t compete all that well. One notable example is Cyrix, who tried to go toe to toe with Intel’s new Pentium line-up in the mid-1990s. Cyrix promised big-time performance but their chips were rarely delivered. And they made an infamous mistake when they decided to focus on integer performance to compete with the Pentium. At the time, Cyrix thought that the trend of most desktop programs using mostly integer-based processing would continue. But what actually happened is that the low-cost but powerful Pentium became so popular, developers instead coded for its floating-point unit.

So, Cyrix’s challenge didn’t last very long. And other potential competitors were typically late to the game compared to what teams red and blue were offering. Think about how Apple switched from PowerPC to Intel partly because Intel chips were simple more powerful per watt. And of course, the next major innovation in desktop CPU was 64-bit processing, which was developed by none other than AMD, who subsequently cross-licensed that technology to Intel, paving the way for the modern ear of x86-64 computing employed by virtually all modern PCs and making it even harder for smaller chip makers to get a foothold in time to be relevant.

Now, of course, because most of these issues revolve around the x86 architecture, chipmakers who have focused on other instruction sets have done quite well. Qualcomm for example is a huge force in the mobile space with its ARM-based chips. And Apple has made headlines recently for releasing its M1 processor which offers very impressive performance for Mac users.

For the PC loyalists, they can't expect this duopoly to disappear anytime soon. 

2021-02-19 05:20
Sebastin SironMani A

Wi-Fi 6

The latest generation of Wi-Fi, known as Wi-Fi 6, brings with it some significant performance improvements that aim to address limitations in older generations. While plenty of routers and clients are already available with chips using the 802.11ax certification, Wi-Fi 6 is just beginning its rollout. It will become part of the official IEEE specification in September 2020. This is ushering in a wave of updated devices touting new wireless capabilities that will contribute toward next-generation networks with more speed and less congestion.

Before we get too far, it's important to understand that 802.11ax, also known as "high-efficiency wireless," is the same thing as Wi-Fi 6. It's just easier to say Wi-Fi 6 than 802.11ax.

This is a new naming standard set by the Wi-Fi Alliance, with previous generations now being known as Wi-Fi 5 (802.11ac) and Wi-Fi 4 (802.11n). This labeling convention is expected to appear on devices as shown below.

Technically, Wi-Fi 6 has a single-user data rate that is 37% faster than the previous generation, but what's more significant is that the updated specification will offer four times the throughput per user in crowded environments, as well as better power efficiency which should translate to a boost in device battery life.

To achieve those improvements, Wi-Fi 6 implements a variety of changes including several multi-user technologies which have been borrowed from the cellular industry – namely MU-MIMO (multi-user, multiple inputs, multiple outputs) and OFDMA (orthogonal frequency-division multiple access) – techniques that greatly improve capacity and performance by enabling more simultaneous connections and more thorough use of spectrum.

Home users who upgrade their hardware can look forward to some improvements from these technologies, especially over time as the number of devices per household increases – some estimates suggest there will be as many as 50 nodes per smart home by 2022.

While Wi-Fi 6 isn't designed to boost download speeds significantly, the new features will really shine as the device count in an area increases. It has a more nuanced approach that is expected to bring move benefits over time. This will ultimately aid in laying a foundation for the number of nodes expected on upcoming smart infrastructure. Along with addressing overlapping coverage from the sheer number of devices and network deployments emerging as IoT rolls out, Wi-Fi 6 will be equipped to handle the ever-increasing demand for faster multi-user data rates.

Overall, Wi-Fi 6 builds on 802.11ac with more than 50 updated features originally proposed, though not all of them are included in the finalized specification.

Here are some of Wi-Fi 6's main benefits:

  • More overall bandwidth per user for Ultra-HD 4K and Virtual Reality streaming
  • Support for more simultaneous streams of data with increased throughput
  • More total spectrum (2.4 GHz and 5 GHz, eventually bands in 1 GHz and 6 GHz)
  • Said spectrum split into more channels to enable more routes for communication
  • Packets contain more data and networks can handle different data streams at once
  • Improved performance (as much as 4x) at the maximum range of an access point
  • Better performance/robustness in outdoor and multi-path (cluttered) environments
  • Ability to offload wireless traffic from cellular networks where reception is poor

Released in 2013, 802.11ac (now also known as Wi-Fi 5) was standardized in 2013. While this specification is largely adequate for today's typical home usage, it only uses bands in the 5GHz spectrum and lacks the level of multi-user technologies that will support a growing number of devices connected at once.

There aren't currently many Wi-Fi 6 clients, so the adoption will take a while. The improvements in this generation won't really be felt until a larger portion of devices uses the standard. As usual, Wi-Fi 6 is backward compatible, but older devices won't be able to take advantage of the newer features.
Contemplating Wi-Fi 6 more broadly, the boost in multi-user support and particularly the increase in simultaneous upstream connections are arriving alongside an accelerating demand for user data. This data will be gathered from IoT devices and used for purposes such as machine learning, fueling artificial intelligence, the future of technology as a whole, and a growing digital economy.

2021-02-23 02:30
Sebastin SironMani A

5G

We’ve been talking about it for a while and now it’s finally starting to arrive. It’s a revolutionary kind of internet that promises to change everything from your phone to home internet, to more futuristic fields like self-driving cars and even remote surgery. But 5G is also been in the headlines lately for a lot of bad reasons with bizarre conspiracy theories and rumors. So, to help clear things up, we’re going to explain to you, what exactly 5G is, how we got here, what the technology behind it is, and any real concerns that might exist around the new technology.

So, what is 5G?

Well, 5G or fifth generation, is the next step in mobile internet technology. It’s what all of the next waves of phones and tablets are going to us for speeds that are even faster than the LTE networks that we already have.

All the big US carriers are well underway with rolling out 5G and that wave recently got a huge boost with the introduction of iPhone 12, but what 5G means on each carrier is different i.e., speeds and coverage.

Verizon’s 5G is blazing fast, we can get download speeds of over 1 Gbps. That’s up to 10 times faster than most home Wi-Fi connections. We can download a whole season of a Netflix show in just minutes, but their problem is coverage. Verizon’s 5G is very, very spotty. It’s there on one street and gone the next, and indoor coverage is pretty much non-existent. That’s because Verizon bases its whole 5G plan for now, on what’s called high-band millimeter wave technology or mmWave. We’ve seen those commercials as Ultra-Wideband 5G. But the issue is, the signal can’t travel very far, son in a city where it wants to roll out 5G, Verizon’s got to put up all these nodes all over the city, and that’s not really practical to do nationwide, so Verizon started rolling out low-band 5G network from late 2020. But there the speeds aren’t that much faster than what our 4G LTE phone can do today. So, for now, Verizon’s 5G network isn’t really worth upgrading to a new phone for unless you’ve got a node right outside your apartment or your house.

T-Mobile has the most comprehensive 5G plan of all the US carriers. It’s also using mmWave on the high end, plus Sprint’s mid-band spectrum in the middle, and its own low-band 5G at the base. Now Sprint’s mid-band spectrum is much faster than LTE is today. Think of mid-band as the sweet spot for 5G. It’s much faster than phones today, it’s not quite as fast as mmWave, but it makes big difference day-to-day.

And last is AT&T which has a similar strategy to Verizon, in that we get the high-band mmWave and low-band Sub-6 GHz 5G, but they’re missing that middle part of the cake, that mid-band spectrum, so you’ll have really fast speeds in small parts of some cities and somewhat faster speeds than your phone today everywhere else.

Now, none of this is to be confused with AT&T’s fake 5G, which is called 5GE. You’ve probably seen it in your phone’s status bar at times. That’s just fast LTE. It’s got nothing to do with real 5G that’s rolling out right now.

These are still the early days of 5G. We’ve seen less than a dozen phones hit the market that offers these new faster speeds and some of the early ones were very buggy and would overheat in the summer. Now those concerns along with battery life, have largely been overcome with Qualcomm’s latest chips.

So, when we talk about 5G, we’re not really talking about anything radically different than our current and past mobile technology. Let’s put that in perspective. The earliest generation of mobile technology, 1G networks, was launched back in the 1980s. Unlike the other generations, 1G networks used analog signals and could really only do voice calls. You’ve probably seen phones that use 1G networks like the Motorola Dynatac, that classic oversized cell phone from the 80s movies. 2G networks kicked things up a notch. More bandwidth meant that in addition to calls, users could start sending data, enabling text messages, SMS, and even pictures, MMS, like the most famous 2G device ever sold, the Nokia 1100 (250 Million Units). Later versions of 2G phones could even access basic internet that paved the way for the smartphone revolution. 3G networks offered even more bandwidth and faster speeds, and 4G LTE, which is what most of our current phones use, made truly fast wireless internet a possibility.

And 5G, takes things a step beyond even that, with speeds that are faster in some cases than home Wi-Fi. But the key thing is that all these technologies aren’t fundamentally different. They’re based on the same science, which means that it’s time to talk about the electromagnetic spectrum.

Take the low-band network used by all three carriers. They’re in the 600 – 850 MHz bands, effectively the same are of the spectrum as existing LTE, but the fact that they’re new bands of spectrum that aren’t already clogged up with existing customers, combined with new transmission technologies, means that these low-band 5G networks can offer faster speeds than LTE, even though they’re basically using the same spectrum bands as LTE. And that low-band nature, also means that they can transmit over a much wider range than other types of 5G. It’s why T-Mobile, for example, can claim to have nationwide 5G coverage while Verizon was stuck to just a few street corners.

Next is mid-band 5G, which is basically just used by Sprint and now T-Mobile, which owns Sprint. Located at the 2.5 GHz range of the spectrum, it offers faster speeds than low-band 5G, but it has a more limited range. For comparison, 2.5 GHz is about the same area of the electromagnetic spectrum as your home Wi-Fi. Now, mid-band is the middle of the road in almost every respect. It’s a higher frequency and more bandwidth than low-band 5G, but it’s not going to be quite the speeds and frequency that you’ll get from high-band or mmWave which is the ultrafast 5G.

Now, high-band 5G is located around 30 GHz, a much higher frequency than any other types of 5G and they offer blazing fast speeds; but those radio waves are also really small, between 1 and 10 millimeters, hence the name, which is actually really bad at passing through objects like walls or buildings, which means that the range is incredibly limited. So, even though it offers the fastest 5G speeds, it’s also the 5G that you’ll probably end up using the least, because of that rollout, it’s just going to be really small.

But those increases in bandwidth are only part of the story. A lot of the improvements in 5G, come from new transmission technology. Things like Carrier Aggregation (CA), which combines multiple LTE bands into one data stream for faster speeds, or MIMO antennas (multiple inputs, multiple outputs), where we use antenna arrays, made up of lots of little antennas to improve connectivity.

Is 5G safe?

But is 5G, or really any cellular radiation, safe? Well, there’ve been a lot of inaccuracies going around about 5G. Some are completely absurd, like the idea that 5G somehow caused the Coronavirus, but the simple answer is that 5G is basically the same as any other type of cellular radio technology and we already have a pretty good idea that cellular radiation is not harmful. We know that cellular radiation falls into the non-ionizing region of the spectrum because the energy content of that type of radiation is not enough to break chemical bonds in our cells.

Conclusion

While 5G doesn’t pose any health risks, there are going to be practical issues with the transition to 5G. Some of the growing pains are just switching to a new generation of technology. Things like more expensive plans. That faster data speed means that you can burn through your data cap really quickly, and that’s something that we’re going to have to figure out. The first wave of the 5G phone was more expensive, although prices are starting to come down after they removed the chargers and headphones. And of course, there’s just building out the networks. The low range of mid-band and mmWave networks means that it’ll take longer and cost more to build more towers, to get that kind of coverage that people expect.

The good news is that we’ve already started. Qualcomm, for example, has made 5G the default in all of its new Snapdragon chips. Flagship as well as more midrange phones in 2021 from companies like Google, Samsung, Apple, OnePlus are either already shipping with 5G, or expect to have it by the end of the year. And that’s to say nothing of the big advances that carriers like Verizon, T-Mobile, and AT&T have made in building out the actual networks. And more importantly, none of these issues are really new. The transition from 2G to 3G, or from 3G to LTE, saw similar problems and the tech industry was able to solve them. The only difference is that we’re a lot more reliant on our phones than we were 10 to 15 years ago, and that’s why these issues seem so much more important now. But the key thing to remember is that 5G and the technologies around it aren’t really new. It’s just our perspective on them, and our reliance on our phones that’s really changed. 

2021-03-05 11:00
Sebastin SironMani A

Blockchain 101

Blockchains are incredibly popular nowadays. As the name indicates, a Blockchain is a chain of blocks that contains information. This technique was originally described in 1991 by a group of researchers and was originally intended to timestamp digital documents so that it’s not possible to backdate them or to tamper with them. Almost like a notary.

However, it went by mostly unused until it was adapted by Satoshi Nakamoto in 2009 to create the digital cryptocurrency Bitcoin. A Blockchain is a distributed ledger that is completely open to anyone. They have an interesting property: once some data has been recorded inside a Blockchain, it becomes very difficult to change it. So how does that work? Well, let’s take a close look at a block. Each block contains some data, the hash of the block, and the hash of the previous block. The data that is stored inside a block depends on the type of Blockchain. The Bitcoin Blockchain for example stores the details about a transaction here, such as the sender, receiver, and amount of coins.

A block also has a hash. You can compare a hash to a Blockchain terminology called a Fingerprint. It identifies a block and all of its contents and it’s always unique, just as an actual Fingerprint. Once a block is created, its hash is being calculated. Changing something inside the block will cause the hash to change. So, in other words: hashes are very useful when you want to detect changes to blocks.

If the Fingerprint of a block changes, it no longer is the same block. The third element inside each block is the hash of the previous block. This effectively creates a chain of blocks and it’s this technique that makes a Blockchain so secure.

Let’s take an example. Here we have a chain of 3 blocks. As you can imagine, each block has a hash and the hash of the previous block. So, block number 3 points to block number 2 and number 2 points to number 1. Now the first block is a bit special, it cannot point to previous blocks because it’s the first one. We call this block the Genesis Block. Now let’s say that you tamper with the second block. This causes the hash of the block to change as well. In turn that will make block 3 and the following blocks invalid because they no longer store a valid hash of the previous block. So, changing a single block will make all the following blocks invalid.

But using hashes is not enough to prevent tampering. GPUs these days are very fast and can calculate hundreds of thousands of hashes per second. You could effectively tamper with a block and recalculate all the hashes of other blocks to make your Blockchain valid again.

So, to mitigate this, Blockchains have something called Proof-of-Work (PoW). It’s a mechanism that slows down the creation of new blocks. In Bitcoin’s case: it takes about 10 minutes to calculate the required Proof-of-Work and add a new block to the chain. This mechanism makes it very hard to tamper with the blocks because if you tamper with 1 block, you’ll need to recalculate the Proof-of-Work for all the following blocks.

So, the security of a Blockchain comes from its creative use of hashing and the Proof-of-Work mechanism. But there is one more way that Blockchains secure themselves and that’s by being distributed. Instead of using a central entity to manage the chain, Blockchains use a Peer-to-Peer (P2P) network and anyone is allowed to join. When someone joins this network, he/she gets a full copy of the Blockchain. The node can use this to verify that everything is still in order.

Now let’s see what happens when someone creates a new block. The new block is sent to everyone on the network. Each node then verifies the block to make sure that it hasn’t been tampered with. And if everything checks out, each node adds this block to its own Blockchain. All the nodes in this network create consensus. They agree about what blocks are valid and which aren’t. Blocks that are tampered with will be rejected by other nodes in the network.

So, to successfully tamper with a Blockchain you’ll need to tamper with all blocks on the chain, redo the Proof-of-Work for each block and take control of more than 50% of the Peer-to-Peer (P2P) network. Only then will your tampered block become accepted by everyone else. So, this is almost impossible to do!

Blockchains are also constantly evolving. One of the most recent developments in the creation of Smart Contracts. They are just like contracts in the real world. The only difference is that they are completely digital. In fact, a Smart contract is actually a tiny computer program that is stored inside a Blockchain.
 
 
So, let’s create a Smart Contract for this. We can program the Smart Contract so that it holds all the received funds until a certain goal is reached. The supporters of a project can now transfer their money to the Smart Contract. If the project gets fully funded, the contract automatically passes the money to the creator of the project. And if the project fails to meet the goal, the money automatically goes back to the supporters.
 
And because the Smart Contract is stored on a Blockchain, everything is completely distributed. With this technique, no one is in control of the money. Since Smart Contracts are stored on a Blockchain, they inherit some interesting properties. They’re immutable and they are distributed. Being immutable means that once a Smart Contract is created, it can never be changed again. So, no one can go behind your back and tamper with the code of your contract. And being distributed means that the output of your contract is validated by everyone on the network. So, a single person cannot force the contract to release the funds because other people on the network will spot this attempt and mark it as invalid. Tampering with Smart Contracts becomes almost impossible.
 
Smart Contracts can be applied to many different things, not just crowdfunding. Banks for example could use it to issue loans or to offer automatic payments. Insurance companies could use it to process certain claims and postal companies could use it for payment on delivery and so on. So, now you might wonder where and how you can use Smart Contracts. Right now, there are a handful of Blockchains that support Smart Contracts, but the biggest one is Ethereum. It was specifically created and designed to support Smart Contracts. They can be programmed in a special programming language called Solidity. This language was specifically created for Ethereum and uses a syntax that resembles JavaScript. It's worth noting that Bitcoin also has support for Smart Contracts although it’s a lot more limited compared to Ethereum.
The creation of Blockchain technology peaked a lot of people’s interest. Soon, others realized that the technology could be used for other things like storing Medical Records, detecting Deep Fakes, creating Digital Notary or even collecting taxes. So now you know what a Blockchain is, how it works on a basic level and what problems it solves.

2021-03-19 04:29
Sebastin SironMani A

Data Breach

A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. Stolen data may involve sensitive, proprietary, or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security. To protect our data from hackers, we should make sure to keep our data secure.
GitHub: 
  • GitHub repositories should not have public access. Those should have only private access.
  • The private repos also should not have credentials stored.

Google docs:

  • Never ever share any credentials through Google docs/Sheets with anyone.
  • Wherever the password is shared for some unavoidable reason, please change the password as early as possible.

Google Password Manager/Online Platforms:

  • Never save any confidential information like credit card numbers, passwords, UAN details, etc in Google password manager or any other online platforms.
  • Please make sure to change the required passwords at least once a month.

General Info:

  • Please keep the Windows Firewall ON and system anti-virus applications up-to-date.
  • Don't click on any unverified links which lead to multiple re-directions.
  • Never download/install any application from an untrusted website/source.
  • If you need any technical assistance, please contact IT Support immediately.

2022-11-16 08:35
Sebastin SironMani A

Devops

Go to category

Pushing Code to Remote Repository Directly!

Cloning, Making Changes, Committing, and Pushing

In this chapter, we will cover the process of cloning a Git repository, making changes, committing those changes, and pushing them back to the remote repository.

This workflow allows you to collaborate with others and manage code changes effectively.

Step 1: Cloning the Repository

To start, clone the repository and checkout the desired branch:

git clone -b <branch-name> <git-url>

Replace <branch-name> with the name of the branch you want to work on, and <git-url> with the URL of the repository you want to clone.

Step 2: Adding Files and Making Changes

Navigate into the cloned folder and add new files or make changes to existing files as needed.

Step 3: Staging Changes

Use the following command to stage the changes you made:

git add .

This command adds all the changes within the repository to the staging area, preparing them for the next commit.

Step 4: Committing Changes

Commit your changes to create a record of the modifications made:

git commit -m "<comment the reason>"

Replace <comment the reason> with a concise comment explaining the purpose of your changes.

Step 5: Verifying Repository Status

Check the status of your repository to ensure that the changes are ready to be pushed:

git status

This command displays information about the current status of your repository, including the changes you made and the branch you are on.

Step 6: Pushing Changes

Finally, push the committed changes to the remote repository:

git push

 

Note: This command uploads your local commits to the remote repository, updating the branch you are working on.

By following these steps, you can effectively clone a repository, make changes, commit them, and push them back to the remote repository. This enables collaboration and ensures that your code changes are safely stored and shared with others.

2023-07-14 14:44
Ajai Krishna