Jason Palmer, CPA, CITP

Cyber Insurance Auditing

  • Home
  • Blog
  • Services
    • Break/Fix
    • Network Infrastructure
    • Installation
    • Web Hosting
    • Web Applications
  • Consulting
  • Vendors
  • U.S. Federal Courts
  • About Us
  • Contact Us
  • Product Showcases

Microsoft Windows 8 vs. Apple Mountain Lion is like comparing Gasoline vs. Diesel Fuel

July 25, 2012 By Jason Palmer Leave a Comment

The blogosphere has been in overdrive with reviews of the latest operating system releases from both Microsoft and Apple.  It is very entertaining to read the endless commentary debating the merits and faults of each operating system.  In many respects it is a classic “Coke vs. Pepsi” style debate.  Most people have a definite taste preference that is unlikely to change.  We all recall age old question: “Are you a Mac or a PC?”

Both camps seem to miss the point entirely:  Unlike Coke vs. Pepsi where both are Cola products that can, and frequently are substituted for each other, the same does not apply to the Windows and Apple operating systems.  Apple operating systems only run on Apple hardware.  And, barring 3rd party software (Parallels or VMWare Fusion) or custom installations (Boot Camp), no version of Microsoft Windows can run on Apple Hardware.  (And if you are running Microsoft Windows in some capacity on an Apple computer, is that not making them equal? – but I digress.)

I view Apple like Diesel powered vehicles and Microsoft like Gasoline powered vehicles.  You can sing the praises of Diesel engines and their increased fuel efficiency vs. the performance of Gasoline engines.  The fact is that no matter how many Diesel vehicles are sold this year, the number will pale by comparison to the number of Gasoline vehicles.  And, if you were to add up all the gas vs. diesel fueled vehicles in similar fashion to the installed base of Microsoft Windows vs. the Apple operating systems, you start to see the futility of debating who is going to win the operating system war.

Does it really matter how great Diesel is vs. Gasoline as a Fuel for an engine?  If you have a Gasoline powered car, you are using Gasoline in the fuel tank.  Diesel is not an option or substitute.  The same holds true for running most line-of-business software applications:  The Apple operating system is just not an option.   Microsoft Windows, and its’ many flavors are the only choice on the menu.  As an example, virtually all Professional Tax preparation, Accounting System, and Audit/Write-up software applications are Microsoft Windows only.   (Cloud based products excluded.)

We can discuss how spectacular Apple Mountain Lion is:  the iPad/iPhone like experience brought to an iMac or MacBook Pro, the new cool graphics, widgets, whatever…  But, the practical reality is that if I am in a Microsoft Windows world, debating the merits of Microsoft Windows 8 vs. Apple Mountain Lion just makes for either wishful thinking or great cocktail conversation.  We can even marvel at the new interface of Windows 8 and how Microsoft is trying to unify the user experience across all devices but you will never see it running on an iPad or an iPhone.

Some will say it is not about the Business environment but about Consumers and which operating system, Microsoft or Apple, is going to power my Toaster, or on a more serious note, my Smartphone, Tablet, and possibly Computer – if not replaced by a Tablet.

I respond that the conversation is not about which Fossil Fuel will power my next car: Gasoline or Diesel – but what comes next?   Using the car analogy, it will most likely be a hybrid or perhaps a fully electric vehicle.  Maybe Fusion technology will be available in my lifetime.

The next operating system to power my Smartphone, Toaster, or Computer could be Android or ChomeOS – both from Google.  If that becomes true, where does that leave the Microsoft vs. Apple operating system debate?

It is spectacular that Microsoft and Apple are definitely making technology easier to use than ever before with their evolutionary changes in the operating systems.

The concern is that Microsoft and Apple may be perfecting the Buggy Whip for the the Horse Drawn Carriage, both of which were completely replaced by the Motor Carriage, within one generation.  And, Microsoft and Apple may wake up one day and realize that Google has completely changed the model by eliminating the concept of an operating system and having everything run in “The Cloud.”

Filed Under: Commentary, Consulting, Google Apps, Office365 Tagged With: Apple Mountain Lion, ChromeOS, google, Microsoft Windows 8

Blackberry Email Account Architecture and Sync Issues with Gmail

July 24, 2012 By Jason Palmer Leave a Comment

Blackberry Sad Gmail Due to a fundamental change in the architecture of the Blackberry software, the synchronization of Contacts and Calendar entries between accounts is no longer supported.  In the early days of a Blackberry, if you had a company email address that was connected to a Microsoft Exchange Server and a personal use account at Gmail, you could use the Google Sync App to keep the contacts and calendar synchronized between the two.

Since the Blackberry device supports Gmail natively as a specific type of email account type, the functionality has significantly changed.  RIM has taken the position that your Business Contacts and Calendar should be separate and apart from your Personal Contacts and Calendar.  Each account you create on a Blackberry device gets its’ own email folder, calendar, and contact list.  The problem is that RIM does not maintain this separation in the default view when displaying the Contacts or Calendars for business and personal items.

In what I term, “Defective by Design”, the Blackberry commingles all personal and business contacts in one view.  It does the same for all personal and business calendar entries.  Even though you can select to display the Contacts or Calendar associated with just one account, i.e. your Gmail account, as soon as you return to the main menu or leave the contacts or calendar app, the selection changes back to “all.”  This would seem to contradict RIM’s reasoning of personal vs. business because the default view for contacts and calendar events always commingles the personal and business accounts.

It is interesting that in addition to having an “All Messages” commingled folder, the Blackberry device also has individual folders (App icons) for each mail account.  Why they do not give the same option for quickly and permanently allowing one specific view, personal or business, for Contacts and Calendar entries as a default or as dedicated App button is a mystery.

This is a problem because many people were previously using Google Sync to keep all of the Gmail Contacts/Calendar Events and all of the Microsoft Exchange Contacts/Calendar Events in complete and perfect synchronization. Make a change in one, and it magically appeared in the other.  Because of the current Blackberry architecture, users see all of their Contacts and Calendar Entries duplicated unless they select just one of the views, personal or business every time the return to the Contact or Calender App.

With the new architecture, each account and its corresponding mail, contacts, and calendar stand alone.  Each account can sync back only to its’ respective Mail Server:  Gmail or Microsoft Exchange.

If you truly separate your personal life using Gmail and your business life using Microsoft Exchange on your Blackberry, then this is nothing more than an incredible annoyance.  All of your Personal and Business Contacts and Calendar Events, by default, will display all of the time – unless you make a selection each time you enter the Contact or Calendar App.  There will not be any duplicates but your personal and business life will be forever commingled in the display on your Blackberry.

If you use want to use your Gmail Account and Microsoft Exchange account interchangeably, accessing the same set of synchronized contacts and calendar events, this feature will no longer be supported.  Google has announced that it will be discontinuing Google Sync for Blackberry effective September 1st, 2012.  This will require you to do some serious housekeeping and separation of your personal from business contacts to avoid displaying duplicates on your Blackberry.

Filed Under: Google Apps, Office365, Tech in Plain English Tagged With: Blackberry, Blackberry Sync, Email Sync, Google Sync for Blackberry, RIM

Why Blackberry is a dead product – The six-hour support phone call.

July 23, 2012 By Jason Palmer Leave a Comment

RIP RIMLack of efficient and timely support by RIM is the number one reason why the Blackberry Smartphone is soon to be a completely dead product.

Today, I spent over six hours on the phone with Blackberry support simply to get an AT&T 9810 Torch Blackberry to sync contacts using the Blackberry Cloud Services for Microsoft Office365.  Unconscionable.  What was so incredibly frustrating was the endless trial and error solutions being suggested, each followed with the support technician saying, “Well, that should have worked.”  This is the manufacturer of the device fumbling around and guessing instead of  instilling confidence with proper diagnostic procedures and tested solutions.

The Blackberry platform has always had a myriad of quirks.  I have always been amazed at the willingness of people to accept sub-par quality in technology, specifically software.  If your dishwasher was as finicky as Blackberry devices, GE would be out of business.

Love or hate the Steve Job’s “Walled Garden”, Apple products work as advertised and provide a superlative user experience.   Blackberry too lives in a completely proprietary closed loop and yet cannot even begin to approach that which has been accomplished by Apple.

Solutions tried today, (excuses for the technology), were, in no particular order:  “The device needs another Security Wipe”; “The device needs a factory reset”; “The Service Book is corrupted”; “The Service Book did not register correctly”; “We have to delete the account here at RIM so you can properly recreate it in the device”; “There may be a problem with the Blackberry Cloud Servers connecting to Office365”; “Try a hard reset by pulling the battery”; (Did that at least ten times.) “Do an RSET” – (deletes all entries and reloads them from the server); “Completely delete all accounts and re-create them”; And the list went on…

How does RIM run a business and more importantly, how can anyone else run a business with Blackberry technology that lacks hard fast solutions to resolve technical issues?  When Blackberry was the leading edge, we accepted these issues as part of being “early adopters.”  When you compare the near seamless connectivity experience and stability with an Apple IOS device or even an Android device to Microsoft Exchange, the fact that the Blackberry platform is still so susceptible to significant connectivity synchronization issues is borderline criminal.

Blackberry, having practically invented mobile Smartphone synchronization should be the absolute best and most stable platform available.  To yield slightly, I will concede that when the Blackberry devices work, they work well, within the limitations of a device that is significantly behind in the feature set of a modern day Smartphone.  When a Blackberry fails, the trial and error guessing game begins and hours of time will be wasted to get the device to re-connect

To be fair, the Blackberry support technician completely understood the problem and to RIM’s credit was a USA based employee on the East Coast with English as a first language.  Unfortunately, there was no higher level of support engineer available without submitting extensive log files from the device and awaiting a call back.  My only option was to muddle through with the current support engineer.

By the fifth hour, we started to retry things we had already done “crossing our fingers” and hoping that the solution would work “this time.”

Eventually, we were able to get the Microsoft Exchange contacts to sync but there was still an issue with the Google Calendar that remained unresolved.  Seems that the Blackberry 9810 will not remember the Calendar view selection.  The client wanted to see just the default Microsoft Exchange Calendar and only view the Google Calendar when specifically selected.  We were not able to remove the Google Calendar view – no matter what – until we physically deleted the capability of the Blackberry 9810 to display it.  This is a short term fix pending the resolution from the next level of support at RIM.

As a Consultant, there is no possible way I can bill my client full rate for six hours on the phone with Blackberry support.  Nor can I bill the additional one to two hours of follow-up time with the higher level Blackberry support engineer that will call me back after reviewing the log files and case notes from the initial support call.

If I had known and was able to tell my client in advance that this service call would take six to eight hours and cost as much as two iPhones, I am certain they would have tossed the Blackberry in the trash and headed to the Apple store or out to get a top-of-the-line Android Smartphone.

And therein lies the issue:  In the five years of the iPhone’s existence (see my article, Apple iPhone turns 5 – A Proven Formula for Success Copied), and the approximate three years of Android, I have NEVER had a support call for one of those devices last more than one to two hours.  With Blackberry, the minimum support call is never less than two hours and, as you can see from today’s experience, usually much longer.

There is no reason to believe that RIM will change any of its’ current policies or the way in which it fails to deliver an acceptable support experience.   Entrenched in a mindset that is over a decade in the making, even if Blackberry 10 is evolutionary as a Smartphone platform, RIM will be unlikely to ever meet the expectations of the overall customer experience as set by the competition.

 

Filed Under: Commentary, Office365 Tagged With: Blackberry, RIM, RIM RIP, RIM Technical Support

Help – My Computer is infected with a Virus!

July 22, 2012 By Jason Palmer Leave a Comment

Computer VirusIt is not a question of if your computer will get infected a Virus, Trojan, or some form of Malware/Spyware, it is just a matter of when.  The Microsoft Windows family of operating systems are targeted by hundreds of thousands of malicious software programs regularly.  Even with the most up-to-date Antivirus software, infections do happen.  No Antivirus software can catch every attack and variant all the time.

If you can still access the Windows “Start” button, access the Internet, and install Programs, the Antivirus Scan and Removal Tools listed in my article, “What did your Antivirus Software Miss?” will usually resolve and remove the minor infection from the offending software.

If the virus has taken your computer desktop hostage and is holding it ransom, telling you to click on a link to access a web site to make a payment for an “unlock” code – which will magically “fix” your computer, then more drastic measures are required.

Such is the case with a recently encountered, “File Recovery” virus that has started to make the rounds this past week.

Note:  The majority of viruses, even Root Kits, can be removed and your Computer restored to its’ “pre-infection” state.  It may just take an incredible amount of time and patience to go through the steps required to remove the virus.

This would be a great time to remind everyone that if they had an “Image Backup” of their computer prior to the infection, they could simply perform a “Restore” and roll-back the computer to a time BEFORE it was infected.  See my article, “Image Backup – True one-click Restore for Disaster Recovery.”

As an example, the “File Recovery” virus encountered displays fake alerts and warnings claiming a number of hard drive errors and that failure of the hard drive is imminent.  In reality, NONE of these warnings are real.  The entire purpose of the malicious program is to scare you in to purchasing the “File Recovery” software and stealing your personal financial information.  (You will presumably be entering in a credit card number to make the purchase.)  In addition to bogus alerts, it changes the Windows desktop to solid black, hides any desktop shortcuts, and hides all of the program files and many other folders.  It definitely gives the appearance that all of your programs and data are missing.  The File Recovery Self-Defense tactics block access to the Windows Task Manager, Windows Registry, and all Windows system utilities.

Just for reference, a sample screen shot of the fake warning page is shown below.

File Recovery Fake Warning Screen Shot

Regardless of if it is the “File Recovery” virus or some other nasty virus, they all tend to exhibit many of the characteristics described above.  Most importantly, to the average individual, they strike a sense of fear and panic hoping you will pay them the ransom to “clean your computer” of the dreaded infection.  DON’T.

Instead, start by seeing if you can figure out which specific malicious software program is infecting your computer.  For example, in the screen shot above, the title in the window on the upper left hand side is called “File Recovery.”

Visit your favorite search engine, like Google.com and type in “File Recovery Virus”.  You will immediately see dozens of sites with instructions on how to remove the File Recovery Virus.  In most cases, the steps are well documented for removal.  Many include screen shots and instructions telling you exactly what to click and type and the expected response from the computer after each step.

Here is an example of the comprehensive instructions which I used to remove and clean up after the “File Recovery” virus infected one client computer this week.

http://malwaretips.com/blogs/file-recovery-virus

Most of the well-known Antivirus vendors provide hundreds dedicated removal programs for specific well known viruses that are available free-of-charge from their support sites.  Each specialized removal program is optimized to disinfect your computer from a specific virus infection.

In addition, most of the vendors provide some level of advanced “Rescue” Antivirus scanners and removal tools that are available free from their web sites to assist in extreme lock-out cases.  These are programs that run in command line mode or have a custom boot image that bypasses the severely infected Windows operating system so that the Antivirus program can “kill” the malicious program BEFORE Windows starts.

For example, even if the computer seems to lock you out in Windows “normal” mode, many viruses can be tricked or stopped by restarting the computer in Windows “Safe Mode with Networking.”  In extreme cases, when the only thing you can do is restart the computer in Windows “Safe Mode Command Line Prompt”, the “Rescue” utilities are the solution of last resort and will start you on the path to recovery.

Much of the above depends on not on your technical ability but on your willingness to methodically follow a specific set of instructions and be patient.  From any given search, there will be dozens of responses.  Review a number of them to make sure that your situation applies, (based on the symptoms) and see if they are all basically providing the same steps to remove the virus.  Then pick one and stay with it until completed.  In my example with the “File Recovery” virus, the instructions had screen shots, told me exactly what to type at each step of the way, and the responses I should expect to see if successful.

Depending on the Antivirus software product you use, the vendor may provide advanced virus support removal assistance.  With some vendors this is free, like Vipre from GFI.com, with others, like Trend Micro there is a $50 support charge for assistance.  Do not expect to find live human support if you are using one of the many “free” versions of Antivirus software such as AVG, Avira, Avast, or ClamAV.

Understanding the support and virus removal services provided and associated fees, if any, available from your Antivirus vendor should be a major consideration in choosing your Antivirus Software.

I personally like Vipre from GFI.com for their outstanding, free virus removal support available via Web Chat and Telephone.  GFI/Vipre Support has helped me remove the nastiest of virus infections at no additional cost.  Support was included with the nominal cost annual virus update subscription which every vendor requires for you to obtain and download the latest threat definition databases to the Antivirus software.

Finally, there are a number of well-known sites that specialize in providing free virus removal assistance and tools through a community of volunteers.  Most provide support and response that exceed that of the major Antivirus vendors.  Realize that with rare exception, any virus infection on your computer has been seen before by the “community at large” and therefore Google.com will have a wealth of references to sites with information on how to remove it.

Computer Doctor Examining Sick PCIf you are faced with a complex virus problem or would just like some professional guidance on what to do after your computer has become infected, feel free to contact me for assistance.  “The Doctor” is always in.

 

Antivirus Removal Sites – All have specific popular virus removal instructions.

Either Search the sites below for the specific virus, or join for free and post your problem.

http://www.bleepingcomputer.com
http://www.malwaretips.com
http://www.myantispyware.com
http://www.im-infected.com
http://trojan-killer.net

Specialized Antivirus Removal Tools – Major Vendors

Symantec
http://www.symantec.com/security_response/removaltools.jsp

Kaspersky
http://www.kaspersky.com/virus-removal-tools

McAfee
http://home.mcafee.com/virusinfo/virus-removal-tools?ctst=1

Trend Micro
http://esupport.trendmicro.com/en-us/home/pages/virus-and-threat-removal.aspx

GFI.com – Vipre Rescue – Command Line – Last Resort – Removal Tool
http://live.vipreantivirus.com

Mac Users

McAfee OS X/FakeFlash Detection and Removal
http://www.mcafee.com/us/downloads/free-tools/macstinger.aspx

Filed Under: Security, Tech in Plain English Tagged With: Antivirus Tools, Virus Removal Support, Virus Removal Tools

Wi-Fi® Wireless Range Extenders – Expanding the Wireless Coverage Area

July 21, 2012 By Jason Palmer Leave a Comment

Wireless Router - Range ExtenderA Wi-Fi® Wireless Range Extender expands the coverage area of a wireless network by repeating the signal from another Wireless Router or Access Point.

Wi-Fi® – Is a certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.

Using a Wireless Access Point with a hard wired connection is the preferred and more reliable method of adding additional Wi-Fi® coverage.  If data network cabling is not available and Powerline Ethernet adapters do not work due to electrical interference, the Wireless Range Extender is the answer.  (For more information on Powerline Ethernet, see my article, “Powerline Ethernet – The Infrastructure in your Walls” and for Wireless Access Points, my article, “Wi-Fi® – Wireless Router vs. Wireless Access Point.”)

Configuring a Wireless Range Extender is exceptionally easy:

  • Use the Ethernet Cable provided (or any available Ethernet cable) and plug one end in to your computer and the other end directly in to the Ethernet Jack on the Wireless Range Extender;
  • Use any web browser (i.e. Internet Explorer, FireFox, Safari, or Chrome) to visit the special web page address in the instructions;
  • Select the EXISTING Wireless Network Name you want to EXTEND;
  • Enter in the security key/password for your EXISTING wireless network;
  • Name the Wireless Range Extender.  (This needs to be a DIFFERENT name from your existing wireless network and is the name you will see in your “available wireless networks” name list when looking to connect from your wireless device, (i.e. iPad, Smartphone, Internet enabled TV.)
  • Enter in either the same or a new security key/password for the NEW Wireless Range Extender Network that you just created.
  • After the Wireless Range Extender resets, unplug the Ethernet cable, and move the Wireless Range Extender to a distance of about half to three-quarters of the coverage area from your EXISTING Wireless Router or Access Point.

When the Wireless Range Extender powers up in its’ new location, use any wireless enabled device to look for the NEW network name in the list of “available wireless networks.”  Select the NEW network name from the list and enter in the security key/password and you should now be connected to the Internet.

Wireless Router with Wireless Network ExtenderExact placement of the Wireless Range Extender is a matter of trial and error as many factors affect the quality and range of the Wi-Fi® signal from your primary Wireless Router or Access Point.  If you find that the Wireless Range Extender network “appears then disappears” from your list of available wireless networks in its’ initial location, then the Wireless Range Extender must be moved closer to the primary Wireless Router or Access Point until the coverage/signal is solid and reliable.  Usually the Wireless Range Extender has a series of colored lights that indicate the quality of the Wi-Fi® signal being received from the primary Wireless Router or Access Point which will help in determining the best placement location.

Wireless Range Extenders are available in single (2.4Ghz) and dual band (2.4Ghz/5Ghz) models.  Purchase a Wireless Range Extender that matches the bands available on your Wireless Router or Access Point.  The Wireless Range Extender can only extend the range of an existing signal.  If your Wireless Router or Access Point does not provide a 5Ghz signal, then there is nothing available for the Wireless Range Extender to repeat and extend.  There is no harm in purchasing a dual band Wireless Range Extender and leaving the 5Ghz repeater function turned off.  The advantage of a dual band unit is that when and if you upgrade the Primary Wireless Router or Access Point to dual band (2.4Ghz/5Ghz),  the Range Extender will already be in place to support the 5Ghz band.  (For an explanation of 802.11 standards and the 2.4Ghz/5Ghz bands, see my article, “Understanding the WiFi 802.11 Network Standard.”

 

Here are links to Popular Wireless Range Extenders:

Belkin Range Extenders

D-Link Range Extenders

Linksys by Cisco Range Extenders

Netgear Range Extenders

 

 

Filed Under: Networking, Tech in Plain English Tagged With: wifi, Wireless Access Point, Wireless Range Extender

Wi-Fi® – Wireless Router vs. Wireless Access Point

July 20, 2012 By Jason Palmer 2 Comments

Wi-Fi® Routers act as a gateway and translate one external Internet IP address to many private internal IP addresses, one for each Wi-Fi® device.  Access Points act as a bridge and add wireless Wi-Fi® capability to a wired network.

Wi-Fi® – Is a certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.

When obtaining Broadband High Speed Internet access (Cable, xDSL, or FiOS) for your home or office, the Internet Service Provider (ISP) may give you the option of either a Broadband Modem or a combination Broadband Modem and Router with or without Wi-Fi® capability.

A Broadband Modem takes the broadband data signal from the Cable, xDSL, or FiOS and translates it in to Ethernet, which is the data signal format compatible with a computer.  It provides a single IP address. (Internet Protocol Address – think of it as unique phone number for your computer so the Internet can call you back after you call it.)  This is perfectly fine if there is only one computer device that needs Internet Access.

If the ISP give you a Broadband Modem, then to share the single IP address with multiple devices in your home or office, you need to use a Router with or without Wi-Fi® capability.  With the number of devices supporting Wi-Fi® such as Internet enabled TV’s, Blu-Ray players, Smartphones, Tablet computers, notebook computers, appliances, and Smartphones throughout the home, Wi-Fi® is no longer an optional luxery, it is now a necessity.

Most ISP’s are providing a combination Broadband Modem with Router functionality and Wi-Fi® as standard issue equipment included.

Router to Wireless Access PointThis is great except the placement of the ISP provided combination Wi-Fi® Router/Modem may not be optimal for full Wi-Fi® throughout your home or office.  The solution is the addition of a Wireless Access Point (WAP) to the network.  A Wireless Access Point is usually connected to the Router through one of the wired ports via specialized data network cable meeting a standard known as Category 5e or Category 6.  The Wireless Access Point is located in another part of the home or office away from the Wi-Fi® Router/Modem and acts as an additional transmitter of the Wi-Fi® signal.

If the home does not have any data network wiring available to provide a hard wire connection to the Wireless Access Point, then you can use Powerline Ethernet Adapters, which use the existing electrical wiring to connect the Router to the Access Point.  See my related post, “Powerline Ethernet – The Infrastructure in your Walls.”

The important point to remember is to only have one Router in the network, wired or Wi-Fi® enabled, to act as the gateway between the Internet and your home/office network.  If you need to add or extend wireless Wi-Fi® capability to other parts of the home or office, use a wired connection or Powerline Ethernet Adapter to one or many additional Wireless Access Points.

Configuration Note:  It is best to give the Wi-Fi® enabled Router and each Wi-Fi® Wireless Access Point its’ own “network name.”  I suggest that you name each wireless network based on the location in the home.  Use names like “Second Floor”, “Main Floor”, and “Basement”, as applicable.  If you try to name all of the wireless networks with the same name, the signals will overlap and collide as well as confuse the devices trying to attach.  It is also important to select different Wi-Fi® channels (1 to 11) or select the “auto channel selection” option during configuration and the Wi-Fi® Router and WAP’s will select different channels that do not overlap.

Security Note:  NEVER use any personally identifiable information as the name of your Wi-Fi® Wireless network name.  Since these names are usually broadcast so that the wireless device can see the network name in the “list of available wireless networks”, this would be advertising to anyone passing within range of the signal that it is your network.  Telling him or her that this is “Jason’s Network,” is the same as telling the criminal where you live.

Finally, it is critical that each wireless network be encrypted with a reasonably strong password which is used and stored with your Wi-Fi® enabled device for access to the network.  This helps keep your data private and secure.

Here are links to popular Wireless Access Points:

Netgear Wireless Access Points, click here.

Linksys Wireless Access Points (Bridges), click here.

Dlink Access Points, click here.

 

Filed Under: Networking, Tech in Plain English Tagged With: WAP, wifi, Wireless Access Point, Wireless Router

Understanding the Wi-Fi® 802.11 Network Standard

July 19, 2012 By Jason Palmer 1 Comment

Wi-Fi® – Is a certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.

But the Wi-Fi® 802.11 network standard comes in many flavors – 802.11a, 802.11b, 802.11g, and 801.11n.  The key difference is the maximum speed at which data can be transmitted under optimal conditions as well as the frequency of the radio waves, 2.4Ghz or 5Ghz.

Router WiFiMost Wi-Fi® Routers (acts as a gateway and translates one external Internet IP address to many private internal IP addresses for each Wi-Fi® device) and Access Points (acts as a bridge and adds wireless Wi-Fi® capability to a wired network) are 100% backward compatible.  They support the highest speed of 802.11n which operates at up to 150Mbit/s, to 802.11g (54Mbits/s) down to the slowest speed 802.11b (11Mbits/s) and operate at 2.4Ghz.  Almost every modern Wi-Fi® certified device, such a Smartphones, Blu-Ray players, Internet Enabled TV’s, Tablet Computers, and Internet Radio’s support at least 802.11g with the newest devices supporting the current standard of 802.11n.

WiFi 802.11n CertifiedWhen shopping for a Wi-Fi® Router or Access point, look for the 802.11n standard.   When reviewing the number of products available, you may see those that claim greater than the standard indoor range of up to 230 feet.  The manufacturers are able to accomplish this by using a technology called MIMO (pronounced my-moh) which stands for “multiple input and multiple output.”   In simple terms, the manufacturers add more antennas to transmit and receive the wireless data signal.  This improves the efficiency and reliability of the Wi-Fi® data signal between the Router/Access Point and the Wi-Fi® enabled device.

Within reason, the claims of greater distance and better coverage are accurate.  A Router/Access Point that has three antennas is better than one with two antennas.  More antennas mean better coverage and range.

802.11a Logo802.11a supports up to 54Mbit/s like 802.11g but offers the advantage of operating in the 5Ghz frequency range which is significantly less crowded than the 2.4Ghz range.  The 2.4Ghz frequency is used by a number of devices including microwave ovens, baby monitors, cordless phones, remote controls, TV’s, Blu-Ray Players, Notebooks Computers, and is the most popular hence the crowding.

Although less crowded, the one disadvantage of 802.11a is that the higher frequency 5Ghz signal uses a shorter wavelength which is more easily absorbed by walls and other solid objects.  802.11a works best in wide open areas with line of sight between the Router/Access Point and the device you want to connect.

WiFi CertifiedSome manufacturers offer the best of both worlds:  Wi-Fi® Routers and Access Points that support both 802.11a and 802.11n/g/b operating simultaneously on both the 5Ghz and 2.4Ghz frequencies.  The Router/Access Point creates two separate Wi-Fi® networks: one at each frequency.  The particular device you are trying to connect will figure out which frequency/ Wi-Fi® network it supports and use the best signal available to the Router or Access Point.

Note:  It seems contradictory but in some cases Wi-Fi® operating at the 802.11b standard of 11Mbits/s with the ability to drop down to 5Mbits/s or even 1Mbits/s may have a greater effective range than the longer range 802.11g at 54Mbits/s.  This is because the slower speeds are subject to less interference.

Less expensive Routers and Access Points may only support the 802.11b/g standards but provide a value priced alternative.  They also offer the greatest level of compatibility for both old and new Wi-Fi® devices.  If you have devices that support 802.11n, then make sure to purchase a Router or Access Point that supports 802.11n to get the maximum benefit of the newer standard.

In short, the more expensive the Router or Access Point, the better the feature set and the more configuration options available for the best possible Wi-Fi® experience.

Filed Under: Networking, Tech in Plain English Tagged With: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, wifi, Wireless Access Point, Wireless Router

Powerline Ethernet – The Infrastructure in your Walls

July 18, 2012 By Jason Palmer 5 Comments

Powerline Ethernet

Powerline Ethernet

Powerline Ethernet uses the existing electrical wiring in your home or office along with special adapters to connect your computers to the data network and Internet router.

Powerline Ethernet adapters convert and transmit the data signal by using a different frequency then the one used by the electrical current.  The concept is similar to how dozens of radio stations transmit signals at the same time in the same city and yet your FM tuner can pick them out of “thin air” so you just get the one frequency you selected.

The key advantage of Powerline Ethernet is that there is usually an electrical outlet in every room and on every floor and they are all connected through the same Electrical Circuit Panel in your home or office.  Many homes were built decades ago and were not hard wired for computer network connections.  Older construction techniques that used Plaster have mesh in the walls that acts like a shield blocking WiFi signals between rooms.  If rewiring your home or office with computer grade network cable is not an option, and the WiFi signals cannot penetrate the walls, Powerline Ethernet may just save the day.

One problem with Powerline Ethernet is the way the technology works.  In the United States, homes tend to be wired in what is called “Split Phase.”  Electricity enters at 240v and splits in to two 120v legs.  In short, the rooms you want to connect may be on different 120v legs and therefore Powerline Ethernet speeds can be a little slower than if both outlets in the two separate rooms were on the same 120v leg.  In most cases, even rooms on different 120v legs can still connect but in extreme cases, special jumpers need to be installed at the Electrical Panel to help the signals cross between the 120v legs.

Powerline Ethernet networking can achieve speeds of up to 500Mbps under perfect conditions or as low as around 50Mbps.  All of these speeds are sufficient for browsing the Internet and even streaming music or videos.  Realize the average broadband download speed is between 5Mbps and 30Mbps so even the slowest Powerline Ethernet connection is adequate.  These slower speeds may not be optimal for local area networking for data intensive business applications on an Office File Server where the minimum acceptable speed is usually 100Mbps and the current standard is 1Gbps but it is better than no connectivity at all.

I use Powerline Ethernet as connectivity of last resort in Apartments were the WiFi signals will not penetrate the walls even between two side by side rooms or the range of the WiFi signal is significantly degraded by interference.  Another issue especially in Apartment Buildings is lack of signal separation.  If the twenty nearest apartments within 1500 feet all have WiFi and there are only eleven available WiFi channels, there will be overlap.  The laws of physics state that two objects cannot occupy the same space and the same is true of WiFi channels.

Here is a real world example:  I was in a large hi-rise Apartment building in New York City and the Time Warner UBEE combination cable modem and wireless (WiFi) Router signal could not get between the bedroom and the living room.  I plugged in two Powerline Ethernet Adapters, one in each room and within five minutes I had a rock solid wired Ethernet connection using the Electrical wiring to transport the data signals.  In this case, I put a Wireless Access Point (converts a wired to a wireless data signal) in the living room but I could have just as easily put a multi-port network switch for wired connections to share the Internet connection to the TV, Blu-Ray player, and Sirius Radio.

Remember, Powerline Ethernet allows you to use the electrical copper infrastructure in your walls to build out a data network of last resort when traditional wired and WiFi network solutions are not an option.

For more information on Powerline Etherner, visit:

Home Plug Alliance
http://www.homeplug.org/tech

Here are some Powerline Ethernet Options:

Actiontec – 500Mbps Powerline Network Adapter Kit
http://www.actiontec.com/products/product.php?pid=265

Belkin Powerline Solutions
http://www.belkin.com/networking/powerline

D-Link Amplifi Powerline Products
http://amplifi.dlink.com/Amplifi_PowerLine

Netgear Powerline Products
http://www.netgear.com/home/products/powerline-and-coax

Filed Under: Networking, Tech in Plain English Tagged With: Data Nework, Homeplug, Powerline Ethernet

Is your Wireless Router not going the Distance?

July 17, 2012 By Jason Palmer Leave a Comment

Linksys Wireless RouterAre you having problems with your Wireless Router and access to the Internet?  Do you find that wireless (WiFi) coverage in your home or apartment is not what it used to be?  Do file or movie downloads and general web browsing just seem to take longer?  If so, then it may be time to replace your Wireless Router with a new one.

With the reduction in cost comes a general reduction in quality and longevity.  Wireless and Wired Routers tend to get placed in dusty closets, under desks, or on shelves.  The combination of lack of ventilation and heat bakes the internal components and weakens them to the point where they start to degrade and eventually fail.

There is a reason the manufacturers only provide a one or two year warranty as that is the expected lifespan.  Even if your Internet connection and Wireless connectivity continue to work, once you start to see performance issues, you should think about replacing or upgrading your Wireless or Wired Router.

Another telltale sign of heat taking its’ toll is to look at the case of the Router and see if the color of the plastic has started to change to yellow or brown. Using your nose, do you smell a burnt smell near the vent holes?  If so, you are seeing and smelling the effects of the heat baking your Router.

If your Wireless Router uses 802.11b or 802.11g, which is usually marked right on the case, you are using an older wireless communication standard with both slower speeds and a shorter range.  The current standard is 802.11n and many manufacturers have incorporated a series of enhancements in the antenna technology to improve the range and performance beyond the standard.

If your Wireless Router is more than two years old and not using the 802.11n standard, it may not be going the distance and it is time to replace it with current generation technology.

Filed Under: Networking, Tech in Plain English Tagged With: router, wifi

Image Backup – True one-click Restore for Disaster Recovery

July 16, 2012 By Jason Palmer Leave a Comment

Drive ConeImage Backup is the only true one-click Restore option for recovering from a hard drive failure.  An Image Backup makes an exact mirror copy of your hard drive at a point in time.

It is the best of both worlds as you can either Restore your entire computer, like to a brand new hard drive after a failure, or you can select individual files, like that important proposal that you accidentally deleted today, but you know you backed up a few days ago.

The true value of Image Backup software is the incredible time savings in the recovery process and the speed at which you can get back to work and be productive after a hard drive failure.  Everything on your computer will be restored like a photocopy back to the time of the last Image Backup.  If you backup nightly, the amount of potential data loss is minimized to less than a day.

[Mac users with current generation equipment have Apple Time Machine which offers a proprietary Apple backup solution that essentially accomplishes the same effect as an Image Backup and Restore.]

Many of you are probably thinking, I use DropBox or Mozy, or Carbonite or some other File-by-File, (more specifically “File only”) backup solution.  Well some form of backup is better than none but here is the dark secret:  Sure your critical data files are protected, but what about everything else?  How do you get back all of those Windows Operating System files, software applications like Microsoft Office, your Outlook email and calendar, printer software, scanning software and drivers so that you can access your critical “backed up” data files?  The short answer is you really don’t – at least not easily.

Question:  How many of you have “all” of your original software installation disks for every software application presently installed on your computer AND the license keys?  Did you make that set of Windows Operating System Recovery Disks that you were prompted to make in the first weeks of owning your computer?  I am sure that everyone here has their Microsoft Office License Key right?  No?  I thought so.

Let’s use the following example:  Assuming you had all of the above, after a hard drive failure, the manufacturer sends you a replacement hard drive that is completely empty.  (Regardless of if you install it or the manufacturer sends out a tech, it is still empty.)  It does not even have the original Windows Operating System on it.  (Blame Microsoft who claims it is to prevent piracy.)  Instead, you have to play computer technician and install a factory fresh copy of the appropriate version of Windows to your computer from a set of Recovery Disks.  (Even if you paid for Software Support from the Manufacturer, all the tech will do is install the Windows Operating System – nothing else.)  This takes about one to two hours.

Then, you have install any hardware manufacturer specific drivers for your Video Card, Network Card, Motherboard, Audio/Sound card and possibly WebCam and apply the hundreds of megabytes of Microsoft Security Updates and Operating System Patches.

Now it is on to the Applications:  You have to re-install Microsoft Office, your Printer Driver Software, Adobe Acrobat Reader (or perhaps Professional), Adobe Flash, Adobe Shockwave, JAVA, and maybe iTunes, AOL Instant Messenger or Skype.  If you have a label printer or scanner, you have to re-install that software too.  Are you getting the picture here?  Hopefully there is a Star Wars Trilogy on TV because you have about six hours to kill while your computer dutifully takes in disk after disk.

And, every piece of software just mentioned in our example probably has an update so Microwave another bag of Popcorn and see what’s on Comedy Central because at this point you really need some Comic Relief.

If you had an Image Backup of your hard drive before the failure, you would place a CD-Rom Boot Recovery Disk (or bootable USB drive) in to your computer after installing the replacement hard drive and simply turn the computer on.  In a few moments, you would be asked to point to the location of your Image Backup Set – which would most likely be on the External Hard Drive you use for your daily backup.  Then, after selecting the most recent Image Backup, you would sit back for about 45 minutes to an hour and upon completion of the restoration process the Computer would restart and all would be as it was before – EXACTLY.

Your desktop wallpaper, every icon on the desktop, every application fully functional, every file exactly where you left it, every song, picture, Word document, PDF – everything would be identical and 100% operational as if nothing had ever happened (up to the point of the time and date of the Image Backup.)

The last paragraph is a real world example.  Today I was at a Business client where Symantec System Recovery for Desktops is installed.  (The data files are synchronized and stored on the Office Network File Server and backed up separately.)  The hard drive of one notebook computer failed and a replacement hard drive arrived today.  This notebook is used by a CPA and it had at least twenty Accounting specific applications, many of which were complex to install and configure, along with dozens of desktop icon short-cuts on the desktop.  (Because the applications and configuration do not change that often, we refresh this notebook Backup Image about once a week or when applications are updated.  Daily Backups are recommend for any home or single PC user where both the applications and data are stored on the local hard drive instead of an Office Network File Server.)

I installed the new hard drive in the notebook in about ten minutes, started the notebook with the Recovery Program (on a USB drive instead of a CD-Rom), did a couple of mouse clicks to point to the latest Backup Image and in under an hour, the user had his computer back EXACTLY as it was with every application fully functional and icon in its’ place.

File-by-File backup makes Recovery of the Operating System and Applications a Disaster.

Image Backup Software provides true Disaster Recovery that is completely painless.

Note: This article discusses Image Backup Software for Desktops.  Similar editions exist for File Servers.  For complex Server environments, a combination of both Image Backup Software and dedicated File-by-File Backup Software is more appropriate especially when applications such as Microsoft Exchange, Sharepoint or Microsoft SQL are involved.  All of the vendors listed below have a full line and range of Image and File-by-File products for desktops, Servers, and Virtual Machines.

Here is a list of Image Backup Software Products that I like and work:

Symantec System Recovery – Available for Desktops and File Servers
http://www.symantec.com/theme.jsp?themeid=system-recovery

Storagecraft Shadow Protect Desktop
http://www.storagecraft.com/shadow_protect_desktop.php

Acronis – True Image Home Desktop
http://www.acronis.com/homecomputing/products/trueimage

Acronis – True Backup & Recovery Business Workstation (Desktop)
http://www.acronis.com/backup-recovery/workstation

 

Filed Under: Security, Tech in Plain English

« Previous Page
Next Page »

Connect

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Categories

  • ACT! Premium CRM
  • Cloud
  • Commentary
  • Consulting
  • Disaster Planning
  • Google Apps
  • Management Consulting
  • Networking
  • Office365
  • Printer Issues
  • Security
  • Tech in Plain English
  • Tech Tips
  • Virtualization
  • Wordpress

The Tweetisphere

  • Just now
  • https://twitter.com/palmercomputer

Pages

  • About Us
  • Blog
  • Break/Fix
  • Consulting
  • Contact Us
  • Cyber Insurance Auditing
  • Installation
  • Network Infrastructure
  • Product Showcases
    • Brocade Product Showcase
    • Cisco Product Showcase
    • EMC Product Showcase
    • Emerson Product Showcase
    • IBM Product Showcase
    • Intel Product Showcase
    • Juniper Product Showcase
    • Veeam Product Information
    • VMWare Product Showcase
    • Xerox Office Products
  • U.S. Federal Courts
  • Vendor List
  • Web Applications
  • Web Hosting

Copyright © 2025 · Log in