Wednesday, 28 February 2018

How to synchronize and share files using the original drive in Windows 10

OneDrive, Microsoft's cloud storage service, can back up personal and business files online. It is a built-in feature in Windows 10 that allows you to synchronize files from your Windows 10 PC to your cloud and your Windows PC. If you install the app on your smartphone or tablet, you can sync it. The original drive syncs cloud files to the Mac as well. 

It is also convenient to collaborate. You can share files in the original drive by sending a web link to the collaborator. Here are some basic things you need to know to use the Microsoft circle drive in Windows 10: 

Getting Started

There are two ways to log in as the original drive in Windows 10. When you log into a Windows 10 PC with a Microsoft user account, the original drive is already enabled by default. If you have a free webmail account on, you already have a Microsoft user account. If not , you can sign up for free . 

If you do not want to log in to Windows 10 with a Microsoft user account, you can log in to the original drive separately. Right-click the circle-like circle drive icon in the notification area of the taskbar, select Settings, and then click the Add Account button on the Accounts tab.

In the window that opens, enter the email address and password of your Microsoft user account. 

There is free 5GB of disk drive storage per person. If you pay $ 2 a month, you get 50G. The uploaded file size can not exceed 10GB. There are also two business fare plans. One terabyte per user per year can be spent for $ 60 or an unlimited $ 120. The file size limit also goes up to 15GB. The original drive is also included in Office 365

 Storing and Synchronizing Files with File Explorer In

Windows 10, the use of the original drive is mainly through the file explorer. The circle drive appears in the left navigation window that opens the file explorer. You can drag and drop files from one location to another, or you can save files such as documents, photos, and so on in most Windows applications.
 Every time you put a file or folder in the original drive directory on your PC, a copy is automatically uploaded to the cloud. If you delete a file or folder from the original drive on your PC, it will also be deleted from the cloud.
If you change the file on the PC's original drive and save it, the old version stored in the cloud will be replaced with the latest version. If you are offline when you make changes to a file, the latest version file will be uploaded to the cloud the next time you connect to the Internet

Unsync a specific folder

By default, all the circle drive files and folders are automatically synced to the cloud. To change this, right-click the circle drive icon in the notification area of the taskbar. When the menu window opens, click [Settings]. In the window that will open next, click the [Account] tab and click the 'Select folder' button. On the screen that appears, uncheck the folder where you want to stop synchronization.

Desktop, Documents, and Photo Folders
'm confused and confused, but the original drive itself has a separate folder called Desktop, Documents, and Photos. It is completely separate from the folder with the same name on the PC's hard drive. When you log in to the original drive, the original drive folder is used as the default storage location for the specific type file. For example, the .docx file is stored in the Documents folder on the original drive instead of the Documents folder on the hard drive. 

You can change this way to have your files stored on your PC's original desktop, documents, and photo folders (not synchronized with the original drive). Right-click the circle drive icon in the notification area of the taskbar, click Settings, and go to the AutoSave tab. Click the input box next to [Desktop, Document, or Photo] and select 'This PC only' from the dropdown.

 If you delete one of these new folders in the circle drive in the file explorer, the corresponding drop-down in the [Auto Save] tab above will return to 'This PC only'. 

One Drive Files On Demand With

the Windows 10 Fall Creators update released in October 2017, a feature called File On Demand has been added to the original drive. If you enable this feature, files stored in the cloud will not be forced to download to your Windows 10 PC. Instead, you can select a saved file. After uploading the file to the cloud, you can remove it from the hard drive of your Windows 10 PC. 

File on demand is enabled by default on a PC running the Windows 10 Fall Creator update. To disable it, right-click the circle drive icon in the notification area of the taskbar, click Settings in the menu window, click the Settings tab, and then click Save file space to save the space under File on demand. Uncheck the check box.

File synchronization status File synchronization status

of the circular drive in the file browser is indicated by a small icon next to the file name.
 If there is a cloud icon next to the file name or folder, it means that the file or folder is not on the PC and only in the cloud. 

• A green check mark appears on a white circle next to files or folders synchronized to your PC's hard drive and the cloud. 

• If you right-click on a file or folder and click 'Always on this device' in the menu that appears, the status icon next to it turns into a white checkmark on a green circle. This status icon is displayed next to all synchronized files and folders in the original drive when you disable file on demand. 

• When the file is being uploaded to the cloud or is being downloaded from the cloud to the PC's home drive directory, two blue arrows will be shown around the icon next to the file name.
 To remove the file from your computer's hard drive but save it in the cloud, right-click on the file and click "Free Space" from the menu that appears. 

To view the latest synchronization history, click the circle drive icon in the notification area of the taskbar. A window appears with a list of files added, deleted, moved, or renamed in the original drive.

Saturday, 6 January 2018

How to fix the Apple Meltdown Error

how to fix the apple meltdown error, call us @ 0557503724 for fixing meltdown 

Even Apple hit by Spectre and Meltdown security flaws

Apple has confirmed that all of its Mac systems and iOS devices are also "affected" by two security flaws involving the processor and that have recently been revealed: Specter and Meltdown. In an announcement, Apple said it had released defense patches against Meltdown in iOS 11.2, 11.2 MacOs 10.13.2 and TVOS.

The Cupertino company also said in a statement that it will release patches for Safari against the Specter virus " in the coming days ". " There are no known impacts that affect customers right now, " Apple said, echoing what other security companies and researchers have said.

Apple Watch is not affected by the Meltdown error

The researchers announced Wednesday the two flaws that affect virtually all computer processors. Here's the problem: modern processors are designed to do something called " speculative execution " to improve performance. Data should be protected and isolated, but researchers have found that, in some cases, information can be exposed while the processor collects it.

Experts also claimed that almost all computer systems (desktop computers, laptops, smartphones and cloud servers) are affected by the Specter error. The merger seems to be specific for Intel chips .
Apple users must make sure that their computers, iOS devices and all applications they use are up-to-date to protect against hackers who exploit defects. 

" Since the exploitation of many of these problems requires uploading a malicious application to your Mac or iOS device, we recommend that you only download the software from trusted sources such as the App Store, " the company said.

It's good advice regardless of whether your smartphone has a processor flaw.

Monday, 11 December 2017

The Google Home Mini is free, why buy it?

In this holiday season and after a very hectic Black Friday, many of us start to see their savings melt like snow in the sun, so why pay to afford the Google Home Mini?
Offer the Google Home Mini for free to conquer the world

If you are going to buy the brand new Goole Home Mini, we recommend you read these few lines, as you could enjoy this connected speaker at much better prices! Indeed, several current operations of many resellers include the Google Home Mini connected speaker for free.
Google seems to have forged numerous partnerships to accelerate the democratization of its connected speaker with the undisguised goal of catching up with its competitor Amazon. The ultimate goal is that users do not make the choice to use the personal assistant Alexa, but rather Google Assistant in their daily lives.
Indeed, Google Assistant is already on many smartphones thanks to the position of Android in this market and Google wants it to be everywhere, in your home or office through connected objects like connected speaker Google Home Mini for example.
It is therefore necessary to be vigilant because more and more large brands offer this mini speaker in their promotional offers.
It is therefore important to keep an eye open, because obviously Google has made the decision not to make a fortune by marketing this enclosure, but instead to do everything so that his product penetrates the largest number of homes.

Saturday, 9 December 2017

5 hidden Android enhancements to activate on each phone

5 hidden settings of Android that once activated make the phone better than before
When you open the settings menu of Android, on every smartphone with this operating system including Samsung Galaxy, Huawei, LG, HTC etc., there is a world of things, much wider than that of an iPhone, which remains large part hidden within the phone settings and applications. 

For those with less experience, in this article we discover some of the most significant improvements that you can configure on Android , present in almost all phones, easy to activate to make everything easier.
These are often hidden personalizations and functions, which are very useful to activate.

The following guide is based on Android 7, but the various improvements should still be activated on Android 6 and Android 8 or later.

1) Enable Chrome Home (address bar at the bottom on Chrome). 

Chrome Home is, at the moment, an experimental improvement of Chrome that can be enabled from the menu of experiments.
This feature brings the address bar down, making it much easier to write even when you pick up the phone with one hand.
To make this change to Chrome on every Android phone you have to open the browser on the page with address chrome: // flags .
Once the Flags page is open , press the menu button at the top right, tap the Find and search Home .
Then activate the Chrome Home and options Modern Layout for Chrome Home .
Restart Chrome and discover the convenience of the address bar and search located at the bottom instead of at the top.

2) Quickly open the camera

On every Android smartphone you can take a picture as you would a compact camera, pressing a quick key, without unlocking the phone and look for the icon of the application on the main screen.
In Android Settings, scroll down until you find the Gestures options and activate the switch that allows you to open the camera by pressing the power button twice in quick succession from any screen.
With this option activated, you can start the camera at any time by double-tapping the power button.

3) Hide important notifications from the lock screen

Notifications, by default, all appear on the lock screen, including SMS messages, those received in Whatsapp, Email and Facebook.
Having the messages preview on the lock screen, however, can be a privacy issue, if we have people around, at home or at school, who can read them.
To hide the notification content from the lock screen, go to Settings> Notifications to bring up the list of all applications.
From here, tap the gear icon at the top right to find the option that the sensitive contents of the notification are hidden on the lock screen.
Alternatively, you can tap on apps that you prefer to keep private to be able to hide, only for those, notifications from the lock screen.
On Android before version 7, this option can be found under Settings > Sound & notification > Lock screen > When the device is locked . 

4) Preventing app icons from being added to the main screen after installation

Each time you install a new app from the Play Store, its icon automatically appears on the main screen.
If we are people who like to keep the phone screen in order, it is much better to disable this automatic function.
To do this, open the Google Play Store, scroll left to right to open the main menu, open the Settings and turn off the " Add icons to Home screen " option . 

5) Automatically delete photos that have been backed up on Google Photos

Google Photos is that fantastic service from Google that automatically backs up photos and videos to the free cloud space made available.
In Google Photos there is then the option to free space by deleting photos saved from the device memory, but it is an action to be performed manually.
Much better, then, make sure that the photos backuppate and secured, are automatically deleted, thus leaving always free space in the internal memory. 

This will automatically delete photos and videos that have been backed up to Google Photos after 90 days.
This option can be found under Settings> Storage , then pressing Manage storage space (or Smart Storage).
To use this improvement, you need to have Google Photos installed beforehand and allow it to automatically back up your photos and videos.

Thursday, 7 December 2017

Five information security threats to dominate 2018

Call us @ 0557503724 for best security Solution in Dubai

If you think 2017 was a terrible year in terms of data infringement, you should be ready for 2018. The Information Security Forum (ISF), which focuses primarily on cyber security and information risk management, predicts that the organization's five major global security threats to face in 2018 will increase the frequency and impact of data breaches.

"Information security threats are broad and fast enough to jeopardize the reputation of today's most trusted companies," said Steve Durbin, executive director of Getty Images Bank ISF. "In 2018, The threats of the form will make the overall threat situation more complicated, and the risks are much greater now than in the past. "
Durbin said the data breach would increase and the scale of the leak would increase. That's why the 2018 attacks will cost much more than now, regardless of the size of the organization. Durbin predicted that these costs would include traditional costs such as network maintenance and customer notifications, but costs of new aspects such as litigation involving multiple parties. The ISF said that the costs would be incurred if the government presses angry customers to create tighter data protection regulations. 

The five largest global security threats that ISF expects companies to face in 2018 are: 

  • Crime as a Service (CaaS) tools and services are spread.
  • An unmanaged risk is added due to the Internet (IoT).
  • The supply chain will still be the weakest link in risk management.
  • Regulation complicates important asset management. 

There will be major accidents that do not meet board expectations.

1. Proliferation of the Crime as a Service (ISA) The

ISF projected that CaaS would grow dramatically in the past year, as criminal organizations pursued partnerships and collaborations with complex classes that mimic large private enterprise organizations.
Durbin said that in 2017, "cybercrime, especially Crime as a Service (CaaS), has increased dramatically," he said. The ISF predicts that this trend will continue into 2018 and that criminal organizations will diversify into new markets and expand their activities to global levels. The ISF expects to see an emerging organization that focuses exclusively on cybercrime, while some organizations are rooted in existing criminal structures.
Durbin said that the biggest difference in 2018 is that cybercriminals who have a desire for aggression but lack technical knowledge can purchase tools and services through CaaS, 

"Cybercrime is moving away from the past, which is attacking big targets unconditionally, to intellectual property and large banks," Durbin added. 

Let's take a look at Cryptware, the most popular malware category these days. In the past, cybercriminals using Ransomware relied on distorted forms of trust. In other words, if the criminal encrypts the computer, the victim pays the data for the ransom, and the criminal who receives the money unlocks the computer by keeping the trust.

Durbin, however, said that "trust" is breaking down as a large number of greedy cybercriminals in this area are being introduced. If you pay the ransom data, you do not get the encrypted data back, or cybercriminals repeatedly attack the same victim. 

"At the same time, cybercriminals' social engineering practices are becoming more sophisticated," Durbin said. The attack target is primarily an individual rather than an enterprise, but these attacks are still a threat to the organization. "The boundaries between businesses and individuals are becoming increasingly blurred, and individuals are becoming more and more of a business," Durbin said. 

2. Uncontrolled risks added by IoT spread

Organizations are actively introducing IoT devices, but most IoT devices are basically unsafe. In addition, the ISF warned that the rapidly growing IoT ecosystem is becoming less transparent. The problem is the ambiguous use terms that allow organizations to use personal data in ways that customers do not expect.
On the corporate side, there is a problem that it is difficult to understand what information goes out of the network or what data is secretly captured and transmitted from a device such as a smart phone or a smart TV. 

A regulatory body or customer may be held liable to the organization for any actual breach of data or a breach of transparency. In the worst-case scenario, a security flaw in an IOT device embedded in an industrial control system may cause injury or death.

"It's important to know the usage patterns from a manufacturer's perspective and to better understand individual devices," Durbin said. "Anyway, all of these elements will open up more ways of attacking than ever before." " What can you do to protect people and control your device without giving it permission? Is expected to be higher the associated security awareness, "he added. 

3. The supply chain is still weak links

ISF has been filed vulnerability issues in the supply chain for years. ISF is highlighted as the company supplies a variety of sensitive and valuable company information and 

"Since last year, large manufacturing companies have fallen into a dysfunctional state and supply chain management has become a reality," he said. "The supply chain is everywhere," Durbin said. "Theproblem we are facing now is how do we know where information is at every stage of the life cycle? All. How will the integrity of the information be shared when that information is shared? " 

ISF said corporate organizations should focus on the weakest part of the supply chain in 2018. While not all security incidents can be prevented in advance, Durbin has recommended the introduction of a powerful, expandable and repeatable process that is proportional to the risks faced.

4. Complexity of asset management due to regulatory complexity Further
complexity increases the complexity of core asset management, since it also implements the full European Union General Data Protection Act (GDPR) from 2018. 

"There is almost no case where GDPR has not emerged as a dialogue in conversations with people all over the world," Durbin said. "It's not just a matter of compliance. "We need to find out exactly how we are managing and protecting that data, and we have to prove it to the individual as well as the regulator at any time." "To get it right, you have to change the way you do business," Durbin added.
The ISF predicted that additional resources needed to meet GDPR obligations would increase interest in compliance with regulatory compliance and data management costs, thereby reducing interest and investment in other activities. 

5. Unmet expectations of the board According to the ISF, the discrepancy between the board's expectations and the realistic capabilities of the information security department will be a threat in 2018.

"The board understands the fact that it does business in cyberspace, and in many cases what the board does not understand is the various real barriers that it has," they said, "and they think the CISO has complete control over everything. The board still does not know what to ask, and CISO still does not know how to talk to the board or business unit. " 

The ISF said the board has approved an increase in information security budgets over the past few years and expects immediate results from the CISO and the Information Security department, but initially a perfectly secure organization is an unachievable goal. Even if the board understands it, it often does not make sense to improve information security to a meaningful level (even if the organization has the right skills and capabilities). 

These discrepancies in expectations and consequences mean that in the event of a major accident, the impact is likely to affect not only the organization but also the individual board members and the reputation of the board as a whole.

Durbin therefore said that the role of the CISO should evolve. "The role of the CISO is now to predict, not just to verify that the firewall is working," Durbin said. "We need to predict how the future problems will affect the business and explain it to the board. If you cannot persuade your own ideas, you will not get any results in the boardroom of the board.

Wednesday, 6 December 2017

How to recover a deleted Gmail account, Call us @ 0557503724

Recovering your Google account is not difficult, despite warnings that it will be permanently deleted. However, this should be done quickly because it is only for a while after deleting the account.
Deleting a Google account is not possible by chance. For example, unlike deleting an account on an Android phone. Anyway, if I deleted my account and something went wrong or changed my mind, I can restore my account.

This also applies to your Gmail account. Gmail is an email service and is part of a Google account, so you can not actually email without an account. 

Gmail account restoration period, two to three weeks

Google has a two to three week grace period in which to recover the account, and says it can send email to Gmail. 

This recovery process will restore the Google Drive documents and reactivate all other accounts for Google's services, such as YouTube, Google Play, and fetch their purchased content, such as movies, books, music, and more. If you have a subscription service, you may need to re-subscribe because your subscription may have been canceled. 

Just a quick look at the steps to recovering a deleted account. First go to Google's account support page. 

Answer the security question to verify that the account is the real person. If you cannot remember the account's most recent password, but you have an old account or other information, such as a recent backup phone number, it's possible.

If you find that you are the person, follow the instructions to restore your account.
However, the restoration process can take a long time and you should be patient. While waiting, prepare a new strong password for your account.

Friday, 1 December 2017

Laptop computer can not replace CPU ,CPU should be selected at time of purchase

There are various types of personal computers such as desktop PCs, laptop computers, tablets, etc. The smaller the equipment, the less parts you can customize after purchase.

The fact that custom after purchase is difficult means that you need to check the spec firmly before purchasing. Among them, it is almost impossible to replace the CPU of a laptop computer.
So, let me introduce how to select CPUs when purchasing.

Can not replace CPU of laptop computer? !

The CPU is the so-called brainstorm part of the personal computer.
It is a small part and it is installed on the motherboard part of the notebook computer.

Although you think that you can understand well by actually trying to disassemble the notebook computer, the motherboard of the notebook computer incorporates various equipment and it is very difficult to expand.
Especially when you try to change from a low spec CPU to a high spec one it will be almost impossible to change the size.

Also, even if you can actually replace it, you will not be able to deny the possibility that your computer will not start up properly, as it will damage the CPU and peripheral devices when removing or installing the CPU. It is also necessary to know that there is a lot of risk involved in CPU replacement.

High-performance laptops are large in size

Well, I explained that it is almost impossible to replace the CPU.
If it is difficult to replace the CPU, the laptop computer needs to decide the CPU before purchasing.

One guideline is the size of the laptop.

If the size is large, you can install various devices, but if the size is small, what can be installed is limited.

The CPU is similar.

Therefore, if you focus on the function of the CPU, you will absolutely need a larger laptop computer, that is, A4 size or larger.

If you value functionality such as tablet, CPU performance must be compromised.

Select by spec 

Even if you say a CPU with a bite, various kinds are sold.

First of all, it is important to clarify the purpose whether to emphasize specs, to emphasize cost, to take the middle of both.

For example, if you choose a CPU with emphasis on specs, a so-called high-end, high class laptop computer comes into view.

Intel's Core i 7 series and so on are applicable for high-performance CPUs.

It is a CPU suitable for applications requiring high performance such as video editing and game PC.
If you want to make it as high as possible to a laptop with as high a spec as possible, it is a good idea to select one with Core i7.

Also, since it is difficult to replace the CPU after PC purchase, I recommend you to purchase it carefully.
Select by cost

In the case of so-called low price laptop computers of tens of thousands to hundreds of thousands yen or less, low specification CPUs such as entry class and low class are used.
For example, Intel's Pentium and Celeron series.

A good aspect such as an entry class is that you can buy a laptop computer at a low price.
After all, if you ask for the performance of the CPU, as the result also specs of other hardware equipment such as attached memory will rise, price will also rise.

Choose this type if you do not need high specifications such as browsing the Internet or creating documents, and want to place importance on cost.

An intermediate CPU with specifications and cost


How to synchronize and share files using the original drive in Windows 10

OneDrive, Microsoft's cloud storage service, can back up personal and business files online. It is a built-in feature in Windows...