Wednesday, 30 September 2015

HTML5 VS HTML6 and 10 Advanced Features We Looking for in HTML6



Web is completely progressing towards developing an enormous app store that plays a significant role in web development. Since the day HTML has launched, it has been receiving striking responses from huge numbers clients across worldwide. 

We have been using already released versions of HTML for web development. But the question is how efficiently it works while designing a web page or website. The markup languages, we use should absolutely work as per the specific requirements. With existing markups, web developers are struggling to incorporate responsive features that make the website semantic and speedy. 

Especially developing high-end web solutions are challenging with HTML5. Custom web development companies demands are gradually increasing towards the improvement of HTML5!


Further, web developers are encountering various other problems while providing web development solutions. Thus, they are demanding for a brilliant markup language that overcomes the obstacles of HTML5 which is technically still incomplete. Here are some 10 proposals for incredible HTML6 which is sure to outpace the web developers. 
 

1. Dedicated Libraries :


jQuery has brought revolution in the world of JavaScript including standard libraries. The amount of energy used up on loading jQuery is very high. Numerous websites are utilizing cacheable versions of JavaScript libraries across the globe. When a huge number of web designers prefer a specific library, it can be diffused with the browsers. This is one of the reasons why developers are expecting for new HTML version that can do something better.
  

2. Camera Integration :



In the modern world, most users are communicating with browser which has a camera and a microphone connected, due to the extensive usage of Web cameras and cellular phones cameras around. Incorporation of a photo or a video capture feature in HTML6 helps to easily access photos which are stored in the device. The device will also provide better control over the camera and boost the detection rate. 
 

3. Pluggable Pre-processors :



Pre-processors are already available in existing HTML versions to convert languages into JavaScript. HTML5 always considers a general version of JavaScript while optimizing the code for the local machine. HTML6 should improve this code optimization process by adopting certain feature. 
 

4. Pluggable Languages :



If HTML6 arrives with effective and pluggable languages, it will be highly useful for web developers for creating unique designs in a prompt manner. Any browser can easily implement this feature within a few steps if it is an open source business model. 
 

5. Better Annotation :



A well designed HTML structure supports article annotations through paragraphs, sentences as well as words too. Developers are looking for a dynamic and powerful version that allows annotations even to images and videos.


6. Hardened Authentication :



For instance, the browser should provide high and fast authentication while accessing HTML6. Creating trusted software would help both the browser and site to work efficiently. For extreme confidentiality and security, the browser can offer sign tokens with embedded keys rather than cookies. 
 

7. More Control over Video Object:

 

In the next iteration of HTML, people are looking for additional control over how the structures of the video dispersed on the web pages. The current version is available with a rectangle that packs a set frame from a specific video and the control is given across a text track with annotations, subtitles etc. If HTML 6 embrace callback hooks and synchronization mechanisms, it will be helpful to come up with world class videos. 
 

8. Stronger Micro-formats :



As HTML tags vary from headlines, paragraphs and footers, it's very essential to build a standard to define the general details like parts of an address or a phone number. Creating standard tags will not only speed up search engines, but also boosts your website quality. Developers can also use HTML6 to specify locations, times, dates, selling products, bibliographies, and etc.


9. Browser-sizing of imagery :



The pixel size of any image completely differs from mobile to desktop screen. An improved version of HTML can suggest a preferred height and width of the image. This procedure will definitely provide optimal resolution. 
 

10. Guarded Accessing to Contact Information :



For the betterment, the interface should provide absolutely subtle control to allow people while giving automatic access to code arriving from some domains but not others.

Many Custom Website Development Companies are looking forward to HTML6 for enhancing and establishing original websites in the best possible manner.

Web developers always look for new features that dramatically make websites better, quicker, slicker, or more interesting. The above mentioned proposals for generating HTML6 would be really helpful for improving the web pages that amaze us!

Monday, 3 August 2015

HOW TO REMOVE READONLY FROM CMD



HOW TO REMOVE READONLY FROM CMD

 i will show how to remove readonly error from pendrive and memory card.and how  to make pedrive  write protected  or how to remove write protection from pendrive.there are many uses of this as we can protect our personal data from deleting or accidental  format.

How to do this

1.First click win key+R key a run window will open type CMD in it and press enter.

a black window will open like below image.

2.Then type   diskpart  then hit enter.A new window will open then type list disk.

3.Then select your disk by typing  select disk6

where 6 is your disk number as shown in the picture.

3.Then type attributes disk clear readonly     then hit enter a "Disk attribute cleared successfully" will be displayed.

now your write protection is removed from your pendrive or Sd card.

 How to Set write protect pendrive again

=> just type attributes disk  set readonly hit enter "disk attributes set successfully" will be displayed. that means you have set your pendrive or sd card write protected.

If You have any problem you can ask in comment section.happy learning.

Sunday, 2 August 2015

Boost Your Computer Startup

Boost Your Computer Startup




Start up must have less no. of applications. So that computer will start within a minutes. But how to check that how much applications are present in start up?
Here I will show you how to check the no. of applications present in start up and by removing these application how the PC will start with fast speed.

Steps:

1. Click on Start Menu then in search bar type as “Run”, then it opens Run Window as I shown in below image. Just type “msconfig” in that and click on “OK” button.

Step%2B1

2. Then it will open the window as “System Configuration” as shown in bellow image. You will see different tabs are present in that. Just click on “Start up” tab present in the second last option in tab list.

3. Then it will show you the list of applications present at the computer’s start up. Just remove the tick present in front of the application which is unnecessary, as shown in below image. Then click on “OK” button.

Step%2B3

4. After that it will ask you to restart computer immediately or later. Just click on “Restart” and see the magic. Your computer will start up with fast speed.

Step%2B4

Enjoy with this trick guys…!!!

Saturday, 1 August 2015

10 great new features in Windows10

10 great new features in Windows10



1. There's loads of stuff for touch, but it's different stuff
Designed to appeal to experts and novices alike, Microsoft was at pains to point out that it hasn't given up on touch with the new OS. The Charms bar remains for the moment although we expect it to die if you're using a non-touch PC (check out Continum below).
Microsoft says it wants to support touch users who have persevered with Windows 8 and "evolve" the touch UI. (Translated: That means it is changing quite a bit.) The task switching will no longer work on the left. So with that and the charms going, that's goodbye to most of the problem with Windows 8 - and a whole philosophy down the pan.
Microsoft's Joe Belfiore said at the preview: "We want Windows 7 users to feel like they upgraded from a [Toyota] Prius to a Tesla, but they don't need to learn a new way to drive.


2. It's BACK!
As we've covered before, the e most noticeable change is the new Start Menu, which looks somewhat like the old start menu. It brings some features from the Windows 8.1 Start Screen, such as live tiles, and can be resized.

3. Another new Task View (the Windows 8 flippy thing has gone)
Now the Windows 8 task switcher has been unceremoniously dumped, there's a new Task View in Windows 10, too, so users can switch between virtual desktops.That's because Microsoft now recognises that novice users use the taskbar rather than switching in other, cleverer, ways such as Alt+Tab (which also now switches between desktops).


4. Snap Assist helps you snap windows
A new Snap Assist feature also helps users work out which way is best to snap apps to. You can snap windows into new screens and tile Windows - just as you've been able to since Windows 2.0 or maybe 3.0.



5. The Command Prompt enters the 21st Century
Another quite amazing feature for those of us that use it is that the command prompt is now getting keyboard shortcuts! So you will be able to paste in your commands! Hardly groundbreaking, but actually pretty exciting.




6. Improvements to Windows Explorer
A new Home location is the new default view in Windows Explorer. There's also a Share button on the Windows Explorer taskbar (we really hope this is in the context menu, too).


7. Continum - the special one
This is the best new thing we found out today. Continum is an on-the-fly mode for 2 in 1 devices that can automatically change mode if it detects there is suddenly no keyboard attached. So, for example, a back button appears to help you navigate the Desktop with touch if the keyboard is removed. We reckon the charms will also disappear in non-touch mode, although we've heard conflicting news about that.




8. Windows 10 Universal apps
Windows 10 will also usher in a new app model - Universal Windows apps. Windows Universal apps are the new name for Metro apps/Modern apps/Windows Store apps. Take your pick on those old monikers, they've got a new one! Presumably (although we don't know as yet) that these will also work on Windows Phone. Windows 10 will be able to run on all devices from phones to servers and there will be a single app store across the lot.

All older Windows Store apps will work with Windows 10.


9. Modern (sorry, Universal) apps now float on the Desktop
The new Universal apps also work on the desktop and 'float' in their own Windows. Microsoft wants to banish the separation between the Modern UI and the Desktop.
These 'modern' apps on the desktop have a ... icon for more options - replacing the commands that used to be in the charms on the right-hand side of the screen




10. Windows 10 has lots for Business and Enterprise
Microsoft says it hopes to appeal to business with this release of Windows, more so than Windows 8 ever did. Belfiore said they were "starting the dialogue with businesses today".
To be honest, it needs to - Windows XP is now ancient and unsupported, while precious other businesses want to make the leap away from Windows 7. But part of the reason why Microsoft is demonstrating the OS without all the consumer features is to show enterprises what the OS is capable of at this stage.
This version of Windows will have plenty of other features for enterprise, including a customised store and protection for corporate data. Mobile Device Management will be able to be used for all devices.

Windows 10 will keep personal and corporate data separate.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/


Saturday, 4 April 2015

Nokia Was The Source Of Windows Leaks, Claims WZor



There is a sense of security these days. At least when it comes to Microsoft software, if nothing else. Windows leaks seem like they are now part of a distant past.

Which is true, considering we did not get leaked early build of Windows 10.

Part of that is because Redmond really amped up security of its products that are under development. And at the same time the company imposed new measures to prevent such leaks from happening in the first place, including providing access to early test builds to only a few, select partners.

Result being, Windows 10 has become the first Microsoft operating system in years that was not leaked in any capacity ahead of launch.

This has led WZor, the famous leak group, to talk about this, revealing that their main source of Windows leaks was Nokia. It appears that the telecom giant and some of its partners received early access to Microsoft products, which they passed onto WZor.

It could possibly be that someone in Nokia collaborated with the famous leak group — someone that had access to these operating systems and software from Microsoft.

And it were not only the bits that leaked.

Plenty of time information and screenshots on these projects in development reached the web, and very often these served to stir interest in what Microsoft was developing. Or planning.

Regardless, Redmond no longer tolerates leaks these days, and prefers to release the ISO files itself. No wonder there was talk that each test build of Windows 10 was individually signed with a unique code, meaning if anyone leaked a copy on the web, it would have been easy to find out who did it.

Still, the Nokia connection is rather surprising.

Suddenly, the phrase “Connecting People” has an all new meaning to it!


Windows 95 The Reason Why Microsoft Skipped Windows 9



makes sense on some levels, while remains perplexing on others. It is being said that Windows 95 is the reason why Microsoft skipped out on the Windows 9 name.

Redmond took everyone by surprise a couple of days back by announcing that its next operating system will be called Windows 10 — instead of names like Windows, Windows 9 and Windows Threshold that were being thrown around.

While we don’t have an official reason to go by, a Reddit user claiming to be a Microsoft developer has shed some light on this.

Speculation is that Microsoft decided to skip Windows 9 and go directly to Windows 10 because of Windows 95. And this because some third-party applications could incorrectly identify the version of Windows running on a computer.

And the reason for this?

The developer explains that a lot of software programs check for “Windows 9*” on a target computer, and it is this wildcard in the syntax that might cause the operating system to be identified as an old one.

Shades of the Y2K bug, don’t you think?

However, as Engaged writes, a similar issue arose some 10 years back with Windows 2000 and a few Pentium processors (remember those?), but that actually affected a lot fewer customers.

Still, wise of Microsoft to avoid any such potential errors in the future.

The software titan is very much entering a new phase, a new era, and the Windows brand is now going to be left, right and center of its new strategy. Best to play it safe, even it results in giving the operating system a wholly unexpected new name.



Intel, AMD Going All In With Windows 10 Tablets



Tablets still are an unconquered domain for Microsoft, and the plan is for Windows 10 tablets to take things to another level in terms of both performance and pricing.

Intel and AMD, the two chip giants, are two central figures for this plan to succeed.

Both companies continue to push their tablet oriented solutions, even as the tablet market is showing signs of fatigue — at least in terms of growth. Large screen smartphones and phablets have started to impact tablet sales.

For example, 7-inch tablets used to dominate with well over a 70% market share not too long ago, and this has now fallen to around the 60% mark, primarily thanks to handsets with larger screens.

According to this report, though both Intel and AMD are ready to unleash their new tablet platforms.

Intel is set to release Cherry Trail, early in the first quarter of 2015, with volume production on track to begin in March. This new processor platform is based on a 14nm process, and will be available for both Windows and Android tablets.

Expect a plethora of such solutions from brand vendors and Chinese white label companies by the time Windows 10 makes its public debut.

AMD is not out of the game, either. If anything, it’s just getting in.

The company has its Nolan and Armur platforms in the pipeline. The former utilizes an x86 architecture, while the other is a heterogeneous system architecture (HAS) specifically for Android and Linux slates.

With several new third-party hardware manufacturers on board, Windows 8.1 tablets are just now starting to make their impact. Windows 10 promises a similar response, provided Microsoft keeps up its current pricing strategy for tablets.


The US government under attack by Google over internet privacy rule change



For the past few years, the US government has been under attack a couple of times over its way of handling internet privacy. In 2013, former CIA system administrator Edward Snowden leaked to the mainstream media the NSA’s tools for operating an alleged “global surveillance network” over the internet. In 2014, German chancellor Angela Merkel was enraged by reports of alleged American spying on German citizens, as well as on Merkel herself. Now, in 2015, the internet search giant Google is taking a formal stand against the US government concerning its plan to amend what is known as Rule 41.

Rule 41 is one of the federal laws of criminal procedure, concerning the issuing of search warrants. Basically, the current rule allows a judge to issue a digital search warrant only within the boundaries of his or hers judicial district. According to the Justice Department, this rule became archaic and obsolete as far as criminal investigations of computers are concerned, because today’s technology makes it easy for any user to be able to completely hide the location from which he or she is operating.

When the FBI needs to seize computer data related to a violation of US laws, says the Justice Department, it needs to be able to do so without first finding the computer’s physical location.

Richard Salgado, Google’s director for law enforcement and information security, strongly objects. The amendment suggested to Rule 41, he says, implicates that the US government would in effect be allowed to carry out digital search warrants in computers across judicial borders. This, says Salgado, is both in contradiction of the US constitution 4th amendment, which protects people from unreasonable seizures and searches, and also gives the US government the power to spy on any computer in the world. As Salgado says, this is a matter concerning both the privacy of US citizens and the US recognition of the sovereignty of other nations, and should be decided by congress.

The Justice Department responds that the subject matter has been blown out of proportions and is merely a “tweak of protocol”. It does not, says the JD, grant the US government any authorization to carry out any form of digital search and seizure techniques not already permitted by law. The JD adds that just like in real-life search warrants, investigators are careful not to create any collateral damage, and of course not to overtake any sovereignty of any nation or other judicial body.

The proposed rule change, for which the public comment period has already ended, has so far gone unnoticed by the public, even though some privacy and civil-liberties groups have objected to it. It wasn’t until Google joined the objection, becoming the first and so far only major tech firm to do so, that the subject matter caught the public’s attention. The main objection of all parties involved is that the wording of the current rule change is “far too vague”, and that only congress should decide whether to extend the JD’s powers to investigate computers and computer data.
With all the objections, the change to Rule 41 still has a long way to go. It is expected to go for review by the supreme court and by congress. Now, as public awareness grows and the subject of network privacy is making headlines, it will be interesting to follow its course and see how the world we live in is affected by the changes brought by the digital age.



WTF!! What is the FREAK vulnerability? Why Should i care ?


Last year, the OpenSSL vulnerability called Heartbleed causes so much problem for the internet users. It was one of the most dangerous security flaws because it affected every big website and allowed hackers to hack SSL protected websites. However, There’s another widespread vulnerability on the internet called ‘FREAK’ and it has affected a lot of internet websites and browsers.

The FREAK is the acronym for Factoring RSA Export Keys flaw. FREAK is a bug that allows attackers access to secure communications. It was discovered in software that was used to encrypt data that went from web servers to web users. It has been in existence for a decade now but was only thought to affect Apple’s Safari as well as Google’s Android browsers. Now however, Windows has been added to that mix.

It affects all versions of Windows which use Internet Explorer. All Microsoft Software that utilizes the Secure Channel via the Windows — Secure Sockets Layer and its descendant, the Transport Layer Security also has FREAK Vulnerability.

FREAK vulnerability permits an attacker to easily intercept data that is moving between the source site and a visitor to use a weak encryption which makes it possible and easy to crack the data and reach sensitive information such as passwords as well as access the data on that page. This FREAK flaw was exposed by encryption and security guru Karthikeyan Bhargavan.

The FREAK vulnerability gives the attacker an easy channel to forcefully downgrade any coded suite that is used in SSL/TLS connections on the system of a Windows Client System. The FREAK technique is an issue that affects the whole industry and if left unsolved might lead to software crisis worldwide.

In an attempt to value the impact of this bug a group has been set up to evaluate and gather numbers regarding the worldwide risk. A 9.5% of the overall worldwide web’s one million websites have been found with Freak Vulnerability and are therefore prone to attacks. They have introduced an online tool so people can check whether the browser they are using is at risk.

To counter the Freak Vulnerability, Google has updated its Chrome Version for the Mac but Android is still on review. Apple is also geared to introduce a solution soon. There have been various advisories from Microsoft concerning how to eliminate the Freak Vulnerability. Unfortunately, these solutions can lead to very severe problems with other programs. Because of this, other better solutions are being sought. Microsoft is expected to address the issue with its scheduled patch Tuesday update or an irregular one.

Though there has been no report of the use of this flaw for cyber crime, the frenzy with which a solution is being sought reflects its seriousness. Microsoft has even suggested that Windows users disable their RSA export ciphers in the meantime.

Many experts blame the FREAK flaw on the earlier US policy bans that barred the strongest encryption standard appliance. This allowed the infiltration of weaker standards in most software including Web browsers and Windows. This was done so as to allow intelligence agencies to keep an eye on web action. The remnants of this ban are the cause of the FREAK vulnerability today.

According to the miTLS Team, which discovered this FREAK security hole in the first place, the following SSL/TLS client libraries, are vulnerable:

=> OpenSSL (CVE-2015-0204): < 1.0.1k version.
=> BoringSSL:  Older than Nov 10, 2014 version .
=> LibReSSL: < 2.1.2 Version.
=> SecureTransport
=> SChannel

Web browsers that use these TLS libraries are open to attack :

=> Chrome versions before 41 on various platforms are vulnerable.
=> Internet Explorer.
=> Safari is vulnerable.
=> Android Browser is vulnerable.
=> Blackberry Browser is vulnerable.
=> Opera on Mac and Android is vulnerable. .


It is advisable for all users to keep an eye out for updates so as to protect their systems once a solution is found or switch your web browser to Chrome 41 or Latest Firefox browser. Staying ignorant might cause a lot of long term losses that will be irreparable.


WhatsApp Calling Feature Invitation Spreading Malware in Phones






Many WhatsApp users are waiting for the invitation to enable WhatsApp calling feature in the app. You may have received an invitation too or you are waiting for it. Well, if you haven’t received any invitation yet and feeling unlucky than trust me you are very lucky. According to a report by the Daily Star, WhatsApp users across the world are becoming victims of cyber Scammers who are sending fake messages inviting users to test the new calling feature that installs a dangerous Malware in the phone. If user click on the invitation link, they are taken to another website where they are asked to take a survey on behalf of the popular messaging service.

After completing the survey, they are forced to download multiple third-party applications, which run the risk of spreading malware on smartphones. It doesn’t end here The malicious voice calling invite also ask users to invite friends, before testing the feature, thus putting other users at risk of losing confidential data.

The message looks like “Hey, I am inviting you to try WhatsApp Calling, click here to activate now”. Hence, if you receive any kind of message similar to this, Do not open it , Do not click on the link , Do not forward it to friends . WhatsApp has not announced the calling feature officially, It is in beta stage so users are advised to wait until WhatsApp enable this feature  for everyone.

However, now the big question is rising that if WhatsApp has added encryption for messages sent among its users to prevent messages from being hacked or monitored then how those scam messages are coming?. If WhatsApp itself is not collecting and selling its users data then – from where are these companies getting the mobile numbers of millions of WhatsApp users?



Tuesday, 31 March 2015

6 Tips To Design eLearning Courses That Appeal To A Wider eLearning Audience


How To Appeal To A Wider eLearning Audience

Regardless of the subject matter of the eLearning course you are designing, like all eLearning professionals, you ultimately want your eLearning courses to reach as many people as possible. But how do you extend your reach and leave your mark upon a greater number of learners? In this article I'll share 6 smart tips for creating eLearning courses that appeal to a wider eLearning audience.

1) Steer clear of content that is location or culture specific.
Ideally, you'll want to avoid using references or terminology that may only be found in a particular culture. For example, if you include various sayings in your eLearning course that may not be popular in several parts of the world, then your international audience will not be able to get the full benefit from the eLearning experience. They might even disengage altogether, because they simply aren't able to understand the significance of the old adage. Also, try to avoid pop culture references if possible, as they usually aren't shared globally. Last, but certainly not least, make sure that you are aware of what might be offensive in certain cultures especially if you are planning on selling your eLearning course in international markets. For instance, one gesture might be seen as commonplace in one country, but entirely rude and offensive in another.


2) Choose tools that allow quick and convenient modifications.
There are some cases where the content you currently have in your eLearning course may not be suitable for every eLearning market. You may have to add subtitles to your eLearning course or modify it in order to make it relevant for international audiences. This is why it is helpful to choose tools that allow you to make these changes without devoting a lot of time or money to the process. By creating templates that you can reuse and utilize eLearning authoring tools and Learning Management Systems that enable quick and convenient modifications, you can make your eLearning course engaging and informative for a wider eLearning audience.


3) Make it relevant and relatable.
Even though you are aiming your eLearning course to reach a wider eLearning audience, it should still address specific learning needs. Do your research to figure out what your learners want to gain from the experience, what learning goals need to be met, and what cultural, professional, and educational background your audience has. Every element of your eLearning course should not only appeal to a wider eLearning audience, but it should also help them engage in the eLearning experience and get what they truly need out of the content. You can determine this by conducting surveys, holding focus groups, and speaking with subject matter experts to see what should be included in your material, as well as how the information should be presented in order to achieve the best results.


4) Include assessments and multimedia elements that appeal to all learning needs.
The simple truth is that no two learners are alike. While one learner might respond well to audio presentations, another might get a better eLearning experience from interactive scenarios or games. As such, it is essential to include assessments and multimedia that cater to a wide range of learning needs. For example, you can create an assessment that includes both audio and visual components, or a variety of different multimedia elements (such as slideshows). Also, try to be as simple and straightforward as possible when creating the content itself. For instance, when trying to draw in a wider eLearning audience, you should not create an eLearning course that only someone who has advanced knowledge of a subject can complete. If you do plan on creating an eLearning course specifically for those with prior knowledge of the topic, then you may want to include this in the syllabus, so that other learners aren't caught off guard when they participate.


5) Use language that is both basic and informative.
Steer clear of lengthy paragraphs that contain complex language, and use words that are more basic. By doing so, you make the eLearning experience educational and effective for learners of all backgrounds, ages, educational levels, and cultures. Even learners who may speak English as a second language can benefit from your eLearning course if you use more simplified language, due to the fact that they won't have to struggle with complex terms or phrases. And if there is an elaborate word that you need to use but a wider eLearning audience may be unfamiliar with, they can look it up and expand their vocabulary as they improve their comprehension of the subject matter.


6) Include captions or subtitles.
One of the best ways to appeal to a wider eLearning audience is to include captions or subtitles in your eLearning course. This is particularly true if you have an eLearning course that contains an abundance of audio elements. By doing this, those who may be hearing impaired, have special learning needs, or use English as their second language will be able to easily absorb the information given. In addition, when learners can read the text while listening to the audio, they will be able to fill in the comprehension gaps they may have, which means that they will get more out of their eLearning experience.
Use these eLearning course design tips to reach a wider eLearning audience and take the success of your eLearning course to a whole new level. If your eLearning course is still in the development stage, put these bits of advice to good use now, in order to draw in a larger eLearning crowd when it's time for launch.

Want to know how to extend the shelf life of your eLearning courses? Read the article 6 Tips To Design eLearning Courses With Long Shelf Life which reveals 6 tips that will help you design eLearning experiences that stand the test of time while always being relevant and relatable for your future audiences.


3 Windows 10 Features That Every Admin Should Know




We don’t know exactly when Windows 10 will be released, but it’s a good idea for IT pros to start thinking now about deployment, training and security issues.

Windows 10 is on the horizon. While there is no confirmed ship date quite yet, there’s a good chance we’ll see the final OS this year -- possibly in the fall if Microsoft sticks to its normal release schedule.

To be prepared for any gotchas, it’s a good idea for IT admins to start thinking now about deployment, training and security issues.

1. Deployment and Management Strategy

One of the key enhancements in Windows 10 (which skips a version number from the current Windows 8) could be a godsend to IT admins. With any new Microsoft OS, deployment usually involves a so-called “wipe-and-load” process that essentially removes the existing OS and adds the new version.

With Windows 10, Microsoft is using a new in-place upgrade that retains user settings like desktop resolution or color scheme, but still fits within the management infrastructure for deploying the new release. It’s known as dynamic imaging and, with a new laptop or other device, it means IT can configure even brand-new devices without having to first do a wipe-and-load to meet corporate requirements.

It’s also worth noting that Microsoft says Windows 10 will have the same basic hardware requirements of both Windows 7 and Windows 8, and that there will be better integration between Active Directory and Azure Active Directory. For example, if a user signs in to Windows 10, he or she will also automatically sign in to the Windows Store and to Office 365 in the cloud.

2. Interface Changes

Of course, one of the most important changes in Windows 10 has to do with the interface, which will combine the Metro-style tiles more directly into the desktop. Users will see a new Start menu displaying the tiles that filled the entire screen in Windows 8. This could mean less user training, as users are likely already comfortable with the Start menu from Windows 7.

3. Security Features

“The biggest way in which Microsoft has addressed the needs of business users is that Windows 10 will provide built-in data loss prevention, often referred to as DLP,” says Benjamin Caudill, founder and principal consultant at Rhino Security Labs  . “This means that sensitive documents can take care of themselves, so to speak. Once a file has been secured with Windows 10 DLP, it will ‘phone home’ before allowing anyone to open it. This means that even if an employee accidentally forwards sensitive documents, or if a thumb drive full of charts gets stolen, these files will not allow themselves to be opened.”

Goretsky adds, “Microsoft has basically declared passwords dead, so they are looking into other forms of two-factor authentication. Whether it be out-of-band with a cellphone text, biometric or picture mapping, we will see a non-password form of authentication.”

Goretsky says that other security improvements include more encryption throughout the entire OS, for both managed and unmanaged files. He says Microsoft will also sell a “locked-down” version of Windows 10 hardware, including laptops and tablets that only include software loaded from the Microsoft Store without the possibility to add additional software -- something a business might use to keep employees from loading software that could contain malware.


what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...