Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We had a great response to our first month's issues and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Lets POST and get started with this issue.
Evil USB Cable Can Remotely Accept Commands From Hacker
Even though the linked article is nearly two years old this information still applies today. We all have several devices that we need to connect to our computers via a USB cable. Sometimes our cables get worn out and need to be replaced. When you go online or go to a store to buy a new USB cable it is important to only buy from trusted sources and trusted brands.
As the linked article, and the video within, will demonstrate that a regular looking USB cable can be a hacked or compromised cable. While the researcher in the article only created his cable for research purposes, many third party cables (the very cheap ones typically) could be the most likely sources of these malicious cables.
Always be aware of where your purchases come from. Ensure that they are in original packaging and that the packaging has not been tampered with. If you suspect there is something wrong with a cable stop using it immediately and replace it with a known good working cable.
These are the Windows 10 apps and services Microsoft is killing off in 2021
It is not uncommon for technology companies to discontinue their products and services. This is usually because the technology has become outdated or it was replaced by another product or service. Check out the linked Article for a current listing of the apps and services Microsoft is discontinuing in 2021.
Are you using one of the affected apps or services? Need to know how best to replace them? Reach out and we will be happy to help.
How Law Enforcement Gets Around Your Smartphone's Encryption
By now we should all be well aware of lawmakers and law enforcement agencies around the world have a keen interest in having backdoor access to our devices. What we may not have been aware of until now is that many of them already have ways to access our devices. Many of the methods available to these entities do require physical access to your device.
How can you protect your device and data? First and foremost if you abide by the law then you should not have to worry about any government or law enforcement agency needing access to your device. Secondly, ensure you know where your device is at all times. Even malicious actors could have some of the same capabilities to access your data if they get your device. Confirm you are able to track your device and, if stolen, you can remotely wipe the device to protect your data. Also verify you have a backup of the device's data should you need to restore it to a new device.
The linked article provides more details on how some of the built-in protection works on Android and iOS. Please take a moment to read through it. If you have any questions about the information please reach out and we will be happy to answer them.
3 tips to top up your privacy
Today we are online and more connected than we have been in our entire history. While this brings convenience it can also lead to having less privacy. It is important to know how to be safe online and to protect the information you share. This linked article provides three simple things you can do to improve your privacy.
Why is this important? The more information you share about yourself the easier it is for others to learn about you which could lead to identify theft, hacks, and more!
Do you have questions about your online privacy or how to better protect yourself? We can help, just reach out.
Microsoft to Remove Handy Windows Feature in Upcoming Update
Windows users, have you used the Shake to Minimize feature in Windows? Even if you have never used it you may have accidentally triggered it. When you grab onto an open window and shake it around the screen it would minimize all the other open windows revealing the desktop while keeping the one window open.
If you are an avid user of this feature there is still some good news. You still have the option of two keyboard shortcuts that can replace the Shake to Minimize feature. The feature can be brought back by adding a new registry key in the system registry. Any edits to the system registry should be left to IT professionals as one wrong or bad edit could prevent the system from working.
Check out the linked article for more information about this feature and its alternatives. Want to bring it back? Reach out and we would be happy to add the registry key for you.
Microsoft Is Planning a "Sweeping Visual Rejuvenation" for Windows 10
If you are someone who is not a big fan of changes, especially with your tech, then brace yourselves. Microsoft is planning a major visual overhaul of Windows 10. While we don't have many details yet as to when this change would show up we do know there will be ample notice of the change and many opportunities to preview the new look.
Now for the good news (we are very optimistic here): You have advanced notice of this change and can prepare for and anticipate it. We will continue to bring you updates as more information becomes available to help you prepare.
Apple Has Plans to Reinvent the Computer Keyboard
Apple's plan for the future of the keyboard is a very interesting concept and one I hope comes to fruition. While this may be an Apple focused product it will no doubt influence many other tech companies who will likely develop and release their own version.
Why would a programable keyboard be good? There are many benefits. The biggest would be having a universal keyboard that can essentially be programed to function anyway it is needed. This could also provide a huge boost in productivity as there could be layouts with functions specific to a particular application or different characters on the keys for different languages or programming. The possibilities are nearly endless.
Will we see this as an actual product? It is too early to tell right now but there could be a lot of potential if this idea does make it into an actual product.
You Can Finally Save Articles to 'Read Later' in Chrome
Anyone who has found an interesting article or blog may have had a need to save it to read at a later time. If you are a user of Google Chrome you now have a native option (directly in Chrome) to save these links without the need for a third party extensions or cluttering up your bookmarks. While a relatively minor feature to some this will be a welcome addition. Check out the linked article for more details and to learn how to enable and use the feature.
If You Charge Your iPhone Like This, You Could Be Ruining Its Battery
Oh, no! Most people do this every day, and they have no idea the consequences could be this bad.
This linked article has some great tips on how to protect your phone while charging. It is important to know how to properly take care of your phone to ensure it will last and remain functional. Do you have concerns about your device's health? We are here to help, just reach out.
FAQ of the Week
How Do I Get Into My Phone if I Forgot My PIN or Password?
Each week we will address a frequently asked question. This week we are looking at the topic of accessing your phone when you forgot your password. Please read the linked article for more details (it isn't long at all).
Out best advice would be to securely store your phone's password or PIN in a password manager. This way you will be able to look it up if you ever forget it. See our past issues for more information on password managers. Not all phones have an online recovery option or a local recovery option. With most devices, especially Apple, your only option would be to reset the phone. However, if you regularly backup your phone you can restore the reset phone from the backup. Just be sure to reset the PIN or password once you get back in.
Again, our best recommendation to securely store your phone's password or PIN as your recovery options are very limited if you forget the password or PIN.