cookies_353673440_400.jpg

What Are Browser Cookies, Anyways?

cookies_353673440_400.jpg

What do a bakery and a web browser have in common? Both have cookies—but, what are browser cookies, and what do they do? Let’s take a few moments to explore the concept of the browser cookie and what their function is.

So, What Are Browser Cookies?

A browser cookie is quite simply a text file that your computer uses as a kind of identification as it connects to a network, nowadays most associated with the Internet. HTTP cookies help to differentiate between users and make each of their browsing experiences the best they can be.

To accomplish this, HTTP/browser/Internet cookies enable your browser to track and save data about each user’s browsing sessions—jargon for the time spent on each website. Whenever you visit a website for the first time, the server that hosts the website’s data shares information with your browser that is recorded in a cookie on the browser. The next time you visit that website, the cookie tells the website what information to show you from your past sessions.

This is how websites are able to remember that a user has logged in after the browser is closed, or keep track of items that have been added to a shopping cart. In fact, cookies are responsible for allowing the “back” button to work on your browser. 

Not All Cookies are the Same

Okay, to this point, we’ve primarily discussed first-party cookies, or those that the websites you visit create directly. So long as you’re browsing safely, these cookies will generally be safe to collect.

However, there are also third-party cookies, those that come from another website than the one you’re visiting. These are frequently spread through advertisements to help track a user’s surfing patterns.

Session cookies are those that only last as long as a user is on a website, and marketing cookies are those that help shape the ads that a user sees based on their browsing history—they’re the reason that you might keep seeing ads for a tortilla press after looking up recipes for homemade tortillas.

Other cookies include performance/analytical cookies, which give those who run websites the metrics they need to improve them. These metrics include things like the length of time spent on a website, the levels of activity different parts of the website see, and if visitors manage to find what they are looking for.

Some Cookies Should Be Avoided

Generally speaking, a business should only enable the minimal cookies needed to function. Otherwise, more data may be shared than you are comfortable with, and you might be exposing your data to threats. Fortunately, most cookies are relatively simple to remove if need be.

How to Remove Cookies in Different Browsers

Google Chrome

Access the three-dot menu, and from there, Settings. Under Privacy and security, click Clear browsing data and proceed to Advanced. Once you’ve selected a time period, select Clear data.

Microsoft Edge

Select Settings, and then Privacy and services. You’ll see a section labeled Clear browsing data, where you can Choose what to clear. You’ll be prompted to select the time range to clear data from, which you can accomplish by clicking Clear now.

Mozilla Firefox

Click on Options, and then on Privacy & Security. You’ll see Cookies and Site Data, and the option to Clear Data.

As always, NuTech Services is here to assist you with all aspects of your technology. Find out how else we can assist you by giving us a call at 810.230.9455 and asking us about our IT support and consulting services.

Internet_Reliability_12554756_400.jpg

What is It that Impacts the Quality of Your Internet Connection?

Internet_Reliability_12554756_400.jpg

For something as fundamental to a business’ processes as its Internet connectivity, it can be challenging to determine how reliable and fast your Internet connection is. We wanted to review the different factors that would impact the connectivity that your business gets.

What Impacts My Business Internet Speeds?

There are assorted influences that need to be considered to figure out the potential connection speeds you might achieve for your business:

The Infrastructure Connecting You to Your ISP

Regardless of your contract, your Internet speeds are going to be dependent to some degree on the infrastructure that is delivering them to your business. Cable and fiber-optic lines can deliver Internet at speeds that are far faster than what the antiquated DSL connection over the telephone network can.

How Far Away the Network Centralizer is from Your Business

Fast as data moves, it still takes a bit of time to make it from point A to point B. Therefore, the further away that the network centralizer is, the longer it will take for the transmitted data to reach your business and vice versa.

How Many Users and Devices are Connecting at Once

Naturally, when more people are getting a piece of the pie, the pieces are going to get smaller and smaller. The same goes for your Internet bandwidth. Each device that connects to the Internet impacts the availability and speeds available to the rest—the more there are, the slower the connection will be.

There is only so much that you can do to increase your business’ Internet speeds, short of shelling out more of your hard-earned dollars. We’re here to help you make up for the lost efficiency in other ways, through improved and optimized IT solutions.

Give us a call at 810.230.9455 to find out more.

routerPlace_99947271_400.jpg

Tip of the Week: Placing Your Router in the Ideal Spot

routerPlace_99947271_400.jpg

Whether in the home or office, getting work done nowadays is very reliant on a reliable Wi-Fi signal. This makes it important to have your router placed in the right spot. Let’s go over a few best practices so that you can set up your router in a place where it does you the most good.

Keep Your Router in a Central Location

Let’s face it—if you’re trying to cover the entirety of a building, putting your router at one end or the other is going to be counterproductive. Not only is the signal generally directed outward in all directions from the hardware, putting the router on one side of the building potentially doubles the number of walls the signal will have to penetrate to reach a device on the other side. Plus, that also means that half of your signal is being sent where nobody will be using it. Keeping your router in the middle helps to keep the signal as centralized to your business as possible.

Minimize the Obstacles the Signal Will Have

On the topic, the more your Wi-Fi signal needs to go through to get to your devices, the weaker it will be by the time it gets there. Avoid putting your router in an enclosed space (as aesthetically preferable it may be to do so) to help keep your signal as strong as possible.

Other electronic devices count as obstacles as well, as they can let out interference that, well, interferes with your Wi-Fi signal. Try to keep your router away from these if at all possible.

Position the Antennas Appropriately

Depending on where you need your signal to go, you’d be wise to adjust how your router’s antennas are positioned (if your router allows you to adjust them, that is). If you only need your signal to cover the floor that the router is also on, keeping the antennas vertical will be your best bet. If multi-floor coverage is required, angling them slightly (to about a 30-degree angle) may be best.

Truly optimizing your wireless connection may take a bit of fiddling, but keeping these practices in mind is bound to help. For more assistance with your business’ IT, give us a call at 810.230.9455.

325656030_privacy_settings_400.jpg

Browser Privacy Settings that You Should Know

325656030_privacy_settings_400.jpg

You’d be hard-pressed to find a business that doesn’t rely on the Internet in some way, and everyone uses web browsers as a method of interfacing with the Internet. These browsers, however, are not necessarily the most secure applications by default. With some adjustments to the features, you too can optimize security and privacy when using your preferred web browser.

Optimizing Chrome’s Security

Chrome might be one of the most popular browsers out there, but it’s also one that needs to use certain extensions to optimize security and privacy. Consult your IT resource to install extensions from the Chrome Web Store. These extensions can be added or removed by using the three-dot menu and following this pathway: More > More Tools > Extensions.

In Privacy and security, you can also see the Cookies and other site data. Click on the option to Block third-party cookies, just so you don’t wind up storing passwords that shouldn’t be stored.

Optimizing Firefox’s Security

Firefox actually has some decent built-in security standards which you can adjust by going through Preferences > Privacy & Security. There are options for Standard, Strict, or Custom settings.

  • The Standard option, the default, blocks trackers in private browsing, cryptominers, and third-party cookies.
  • Strict takes everything included in Standard and blocks trackers and fingerprints.
  • Custom allows the user to adjust how these trackers are blocked.

These settings can be applied to all active tabs just by reloading them with the Reload All Tabs button.

Optimizing Edge’s Security

Edge also tries to keep security as basic as possible, though there are some features that include Tracker prevention, as well as built-in Basic, Balanced, and Strict settings.

  • Basic blocks the trackers utilized for fingerprinting and cryptomining.
  • Balanced, the default setting, blocks trackers from unvisited sites while allowing those that can help speed up browsing.
  • Strict blocks the most trackers, potentially interfering with the functionality of some sites.

Optimizing Safari’s Security

Safari has several built-in features that allow it to stop ad tracking present on websites, as well as a list of trackers that you have sent traffic to over the past 30 days. Safari provides this feature through the Preferences and Privacy settings. Just make sure that Prevent cross-site tracking is selected and delete your cookies manually. This information can also be managed in the Manage Website Data setting. Furthermore, Safari also allows you to Block all cookies, so use this feature if you want to do so.

NuTech Services can help your organization optimize its security and privacy settings in all aspects of your operations. To learn more, reach out to us at 810.230.9455.

191230366_wi_fi_400.jpg

The Correct Wi-Fi Setup Can Really Enhance Your Business

191230366_wi_fi_400.jpg

Just about all modern businesses rely on the Internet—especially the wireless kind—for at least part of their day-to-day operations. This means that there is a direct correlation between the strength and speed of their connection and the amount of productivity they can experience as a result of this connection. As your business grows, it is incredibly important to think about your Wi-Fi setup and how you can support its continued growth. Let’s go over the process for properly scaling your wireless network to accommodate its growth.

Identify What Your Needs Are

Your business needs to scale its Wi-Fi solution in the way that best addresses its current shortcomings and limitations. Therefore, you must make a concerted effort to understand your current needs and goals. Consider factors such as how many users will need the network at any given time, how the traffic will be dispersed throughout the office space and across the network, and how much bandwidth these processes will take up.

Once you have these details ironed out, you will be in a much better position to make the appropriate changes to your network. This might include access points, bandwidth, or connectivity.

Establish Your Current Capabilities

Before making any other changes to your Wi-Fi network or adding any access points, you should first determine what you can accomplish with your current setup. A site survey should give you a decent idea of where you stand in this regard, and with this baseline for your existing technology’s performance, you can move forward with intention. You should have information on how many devices you can expect to host at maximum capacity, as well as where the dead zones in your office are located.

While adding access points can help address dead zones, it is considered a best practice to minimize the number of access points your business’ Wi-Fi connection has. This is done for the simple fact that it cuts down on interference and decreases the security risks. A Wi-Fi analyzer can help you place your access points in a way that maximizes coverage without interference.

Furthermore, if you can use wired connections, it might be worth doing so to further minimize your bandwidth challenges.

Adjust Your Existing Connections

You can also adjust the range that your access points can reach, providing your business with enough signal without extending it into the surrounding areas. Proper use of these features can keep unauthorized users from accessing your wireless network. You can also slightly extend your wireless signals just beyond your location’s walls, such as into your parking lot, a secondary building, or other locations as needed.

Do you have any questions about extending your wireless network? NuTech Services can help. Just give us a call at 810.230.9455 to learn more.

419050379_internet_outage_400.jpg

What the Recent Internet Outage Tells Us About Its Potential Vulnerability

419050379_internet_outage_400.jpg

Over the week of June 14, a lot of applications and websites experienced outages, creating problems for many companies until it was resolved. Not only did these outages create business continuity issues, they’ve also exposed just how vulnerable the Internet is to these kinds of issues. Let’s take a look at what happened.

To begin, let’s review the situation at hand.

A Small Firm’s Challenges Created Significant Ripples Online

Fastly provides a content delivery network for numerous influential websites. Basically, they support a network of duplicate servers across 26 countries around the world so that websites can store data and content on them. The closer the user is to where the data is being stored, the faster it can be accessed—which is exactly why news sources use Fastly to ensure users don’t have to wait before they get their news.

However, on Tuesday, June 10th, a large number of websites and applications went down, many of which ranking as some of the most popular on the Internet.

While this outage was relatively quick to be resolved, it still caused significant business interruptions and cost countless millions of dollars. Pretty impressive… particularly when you consider that these damages were the result of a 75 percent decrease in traffic for approximately one hour. Additionally, it wasn’t as though these affected websites could switch to another service on a dime without some proactive preparations (which would do little to simplify the complicated process of doing so).

Let’s consider this scenario as indicative of a concerning factor in how the Internet is now constructed.

The Concerns Underlying the Modern Internet

While a content delivery network helps to support efficient content delivery (as it should), there are a few potential drawbacks that a CDN presents… despite their growing popularity online. First off, because the CDN draws from a central server, any issues in this server could easily render this content inaccessible. The same could be said of any cybersecurity issues that impact the central server.

CDNs offer considerable speed boosts and cost savings as compared to the undersea infrastructure that would otherwise be used to distribute content, but at the cost of vulnerability to any issues in the system’s backend processes.

Furthermore, because a lot of the Internet’s software specifications are so open, a simple issue could impact millions or even billions of devices. Since it is far more often the case that the issue is a small one, tools like machine learning are now being used to troubleshoot and identify the root causes of Internet outages.

Of course, not all businesses make use of a CDN. Many are now using cloud computing services to support their needs, but even these aren’t immune to issues. Some of the largest cloud providers—Amazon Web Services, Microsoft, and Google—have been known to experience outages from time to time, creating challenges for the businesses that rely on them.

This is not to say that cloud services are useless… quite the opposite. However, it is important that you understand the risks involved in all of your options. NuTech Services can assist you in identifying your needs and customizing your IT to meet them.

To find out how we can make your IT more resilient and effective for your business’ processes, reach out to us at 810.230.9455.

125307929_internet_400.jpeg

Look How Much the Internet has Changed

125307929_internet_400.jpeg

When the Internet was established, it was a marvel. Now people could move information across the world in a matter of seconds. This is why the term “world wide web” was coined. Nowadays, there are literally billions of users on the Internet and the rules have had to be changed. This has some online services in conflict with government regulations and has an impact on how users are able to use the Internet. Let’s look at a couple of examples. 

Shifting Forces are Dictating Users’ Internet

The Internet has changed a lot due to geopolitical considerations, which admittedly was not the interface that was intended by its creators. With the growth and importance of the Internet today, however, it isn’t a surprise that governments seek to regulate the medium to promote security. Some examples of this include:

  • The United States government has considered blocking TikTok and WeChat, as they are hosted in China.
  • The Indian government has blocked dozens of applications (including these two) for similar reasons and are now looking critically at Twitter.
  • The Australian government was at odds with Facebook over a proposed law, leading to Facebook changing its functionality in the country until an agreement was struck.

These are clear disputes between corporate entities and the countries they do business in. These considerations (and literally thousands more from all over the world) makes “the Internet” different depending on what country you are accessing it from. The recent sweep of nationalism that has been spreading in nations all over the world for the past decade or so is exacerbating these differences. 

Look at What Has Changed

If you consider when Facebook first went global, it brought a swelling of perceived freedom to people that had considered themselves repressed for a long time. Almost immediately, however, some nations including the Democratic People’s Republic of Korea and the People’s Republic of China decided to limit what users in their countries could access. There were other nations that censored the use of the social network, but for the most part Facebook spread around the world fairly rapidly at the turn of the last decade. Today, however, after years of Facebook-cited negative situations, many nations are limiting Facebook and other social media platforms. Now, with leaders of several nations, including the United States, suggesting these companies simply have too much power and influence, you are beginning to see some very public decrees citing Facebook and other social media companies attempting to limit their influence.

The Australian situation is probably the most internetesting of the bunch. Australian government passed a law that’s intent was to require tech firms and platforms like Facebook to pay for the capability to share human-related stories. This has resulted in news organizations, and affiliated companies (including charities) being wrapped up in the situation. The issue was amicably resolved, but it highlights some of the problems with how the Internet is going to be governed going forward. 

The Call for Globalized Regulations

Like any other system that is used throughout the world, there are calls for a standard to be put in place that dictates how the Internet can be used and regulated. Thus far, traction on this has been moving at a snail’s pace. The logistics are difficult with some nations depending more on the Internet than others, and therefore the financial aspect of the situation is going to be a problem in order to get nations to agree on a reasonable standard. 

What are your thoughts? Should there be a worldwide standard to what can and can’t go on on the Internet? Should nations be limited in the amount of control they have over their people’s use of the tool? Leave your thoughts in the comments section below and stop back to our blog for more great commentary.

81574946_internet_400.jpeg

Examining the FCC’s Efforts to Fix Internet Access in the US

81574946_internet_400.jpeg

Internet connectivity is an increasingly important component to a business’ capabilities in this day and age, as well as all the more crucial to an individual’s everyday life. However, with financial difficulties restricting this access for many, the Federal Communications Commission has stepped in. With a $50 subsidy being made available to low-income homes each month, this situation warrants a closer look.

On Thursday, February 25, the FCC unanimously adopted a program that would discount broadband internet service to low-income households by up to $50 each month ($75 for those on tribal lands) and a one-time discount of $100 on a computer or tablet, utilizing $3.2 billion of the $900 billion coronavirus relief package that Congress approved back in December.

This has been shown to be a prescient need, as the average bill for stand-alone broadband service (calculated by the Wall Street Journal) totals about $66 per month. Unfortunately, this fee is too expensive for many, even without the additional challenges presented by the pandemic.

Eligible households include those that are already participating in pandemic relief or low-income Internet programs, households eligible for free or reduced lunch meals, Medicaid and SNAP recipients, Pell Grant recipients, and the recently unemployed. This program is set to be opened sometime in the next few months.

However, there are a few potential issues surrounding this situation—first, the limited funds allotted to a massive pool of eligible households. With 117 million households being made eligible, the $3.2 billion won’t last all that long… and once it dries up, so will the program.

This isn’t the end of the problem by any stretch, either. Millions of families across the country currently lack any form of broadband access, creating a serious problem as the pandemic has forced many schools and workplaces into remote operations. This problem is likely even bigger than figures would suggest.

Here’s why: while the official total released by the Federal Communications Commission estimates that 18 million people lack reliable connections to the Internet from their home, the methods used to count these households can easily skew the data. In order for a ZIP code to be seen as broadband-compatible, just one household within that block has to have Internet service. Considering that remote areas have census blocks that can stretch hundreds of square miles, this measurement seems to be woefully inadequate.

Hopefully, these measures are the first few steps toward a more equitable and accessible quality of Internet service, as the need for it has finally been made clear.

What do you think? Is this the measure that people need right now, or is it too little for too few? Leave your thoughts in the comments.

79265714_net_neutrality_400.jpg

Net Neutrality and the Digital Future

79265714_net_neutrality_400.jpg

In the United States, the political atmosphere in 2020 was extremely testy and one element that we typically keep our eyes on is the net neutrality rules that seem to change every few years or so. Today, we thought we’d revisit the issue and tell you what to expect over the first few months of the new administration. 

So, What is Net Neutrality?

Net Neutrality is the theory that the Internet should be viewed as a utility and therefore be regulated in a way where use of it is fair throughout. The debate rages between pro-net neutrality people and pro-business people who believe that by having so many rules in place, innovation of Internet-based technology suffers. Some variables that are part of the argument include how the services are deployed, how telecommunications companies set prices and service packs, and how to get the Internet to everyone who needs it (which is everyone these days).

The Federal Communications Commission, led by FCC director Ajit Pai, successfully oversaw the repeal of the net neutrality regulation in 2017, which effectively re-categorized Internet services from being a utility to an independent service. Of course, this was met with extreme frustration by the masses, who overwhelmingly believe that the Internet should be a universally regulated entity, just as electricity and water services are. 

Where We Stand Now

The Internet has been extraordinarily busy in 2020 as people socially distance because of the COVID-19 pandemic. ISPs, to their credit, did rally to provide some value to customers during the start of the pandemic. Months later they put together a list of how they’ve “Gone Above and Beyond” during the COVID-19 pandemic.

If net neutrality were still in place, who knows what would have happened, but you could bet that the FCC, as a regulatory body would have done what it could to ensure that lines of communication weren’t obstructed because of profitability issues. 

What Will Happen with Net Neutrality in 2021? 

Some people believe that net neutrality will be revisited in 2021; and, while that could happen, with everything that is going on today, and the changes in the FCC mandate, it will be interesting to see if the new administration thinks that it’s a big enough issue to address early on. First thing is first, a new FCC director will be named and that process could take months to iron out. One thing is for sure, the Internet has shown that it is extremely important today and should be protected against any entity that can make it difficult for people to gain access to it. 

What are your thoughts about net neutrality? Are you of the belief that ISPs need oversight to maintain fair practices or do you think that the natural market competition will keep ISPs from taking advantage of their positions? Leave your thoughts in the comments section below.

244341955_chrome_actions_400.jpg

Tip of the Week: Making Use of Chrome Actions

244341955_chrome_actions_400.jpg

As the most common Internet browser, Google Chrome is in a position where they always need to be coming up with new draws to maintain their hold on the market. Their latest efforts may help them to do so. Let’s take a moment and examine what Chrome is implementing, and how you can use it to your advantage.

Introducing Chrome Actions

Chrome Actions take the familiar address bar of the Chrome Internet browser and add some extra utility to it. Rather than specifying a webpage or network location to visit in the address bar (known as the “omnibar” to very few of us), Chrome now accepts very basic commands as input, and will follow these commands when they are entered.

For instance, opening a window in Incognito mode is as easy as simply typing “incognito” into the address bar.

As of yet, there are a few Chrome Actions that have been implemented:

  • Clear Browsing Data – type ‘delete history’, ‘clear cache ‘ or ‘wipe cookies’
  • Manage Payment Methods – type ‘edit credit card’ or ‘update card info’
  • Open Incognito Window – type ‘launch incognito mode‘ or ‘incognito’
  • Manage Passwords – type ‘edit passwords’ or ‘update credentials’
  • Update Chrome – type ‘update browser’ or ‘update google chrome’
  • Translate Page – type ‘ translate this’ or ‘ translate this page’

Of course, they come with the promise of more being added in future updates.

Is This Something You See Yourself Using?

Leave your thoughts in the comments and tell us why or why not. For more information and assistance pertaining to your business’ IT, give us a call at 810.230.9455.

261850896_captcha_400.jpg

CAPTCHA and Its Many Challenges

261850896_captcha_400.jpg

We’re all familiar to some degree with the security measure known as CAPTCHA. You know the one—you usually see it when filling out forms or logging into sites online, where you have to prove that you’re a human being by identifying which of a variety of images fit a certain description. You may have noticed that these tests have gotten far more difficult over time. This is because, predictably, computers are getting better at beating them.

Let’s discuss what this signifies, and how this may shape how users authenticate themselves in the future.

Defining CAPTCHA

Short for Completely Automated Public Turing Test to tell Computers and Humans Apart, CAPTCHA has long been the standard tool used by Google to prevent automated spam from polluting the Internet by requiring (in theory) a human being to interact with content in some way before allowing access or a task to successfully be completed.

Back in the early 2000s, CAPTCHA was effective against spambots, being able to bamboozle them by simply requiring images of text to be identified.

The Growing Issues with CAPTCHA

However, once Google gained ownership of CAPTCHA and used it to help digitize Google Books, the text needed to be increasingly distorted to continue to fool optical character recognition. Adding to this was the fact that human beings solving these CAPTCHAs gave optical character recognition the information needed to improve its skills.

This is the downside to CAPTCHA that its creators foresaw from the beginning: at some point, machines would ultimately overtake human capabilities when it came to identifying these images. Furthermore, these tests also need to be universally applicable, working wherever someone is located despite any cultural biases and differences that a user might have.

Since then, CAPTCHA has been replaced by NoCAPTCHA ReCAPTCHA (the one where your user behavior is used to judge your humanity) in 94 percent of websites that use CAPTCHA. Further research and development is in progress to reinforce the security of these tools.

However, automated bots can already bypass CAPTCHA more effectively than most humans can. In fact, in 2014, a machine learning algorithm was made to compete with users to solve distorted text CAPTCHAs and managed to bypass the security measure 99.8 percent of the time, as compared to the humans’ 33 percent. There are also various CAPTCHA-solving programs and services available for use that can effectively access vast amounts of pages for little cost.

What is Being Done to Resecure CAPTCHA

There are many different approaches under consideration to improve the practical efficacy of CAPTCHA—making it simpler for human beings and more difficult for machines as originally intended. To accomplish this, a few different tactics have been explored, some more plausible than others:

  • Rather than identifying text or images, users would be asked to classify images of faces, based on expression, gender, and ethnicity (probably not the best option, in today’s contentious environment).
  • CAPTCHAs based on trivia and regionalized nursery rhymes, with these culturally based questions designed to overcome bots and overseas hackers alike.
  • Image identification that uses cartoons, hidden-image illusions, and other relatively subjective content to outfox automated CAPTCHA-cracking tools.
  • CAPTCHA tools that test users by having them perform basic game-like tasks, with instructions given in symbols or contextual hints.
  • Device cameras and augmented reality being used as a form of physical authentication.

Finally, a lot of consideration is being put to authentication measures that examine a user’s online behaviors and actions to determine whether there’s a real human being at the controls, or if a clever piece of software is trying to gain access—whether the mouse moves, for instance, or how precise it is as it does. Google itself is starting to examine traffic patterns to test “users” on a case-by-case basis.

There’s even a chance that these kinds of Turing tests will only be passable in the future by selecting an incorrect answer.

Regardless of how, it is only going to become more important to secure your accounts and the information they contain as time passes. NuTech Services is here to help you secure your business and its data. Learn more about how we can protect your business with the right IT solutions by calling 810.230.9455 today.

169963245_search_400.jpg

Tip of the Week: Specifying Your Google Queries

169963245_search_400.jpg

Searching for something on Google seems stunningly self-explanatory: type in what you’re looking for, press Enter, and like magic, it appears. However, there is a lot more that you can do, if you know how to use Google’s full capabilities. Let’s go over how these capabilities can be harnessed to your advantage as you perform your next search.

Improving Your Google Queries

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around Michigan, you could type in (IT services) Michigan.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: www.nutechology.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give NuTech Services a call at 810.230.9455.

334145770_internet_pandemic_400.jpg

The State of the Internet in a Pandemic

334145770_internet_pandemic_400.jpg

Millions of Americans are suddenly working from home. Students are now learning online. We’re all surviving the quarantine by binge watching our favorite shows on Netflix and Zooming with our friends and family. How does this bode for the Internet, and security in general? Let’s discuss some recent findings.

A Look at the Numbers

Before the pandemic hit, it was believed that roughly 5.2 percent of Americans worked out of their home. That’s about 8 million people, and that number is fairly recent, from 2017. By the end of 2019, we can estimate it was maybe between 5.5 percent to 6 percent.

We can simplify this and say one out of every 20 American workers worked from home before the pandemic.

According to the Bureau of Labor Statistics, only a mere 29% of Americans can actually work from home. That takes into consideration jobs that simply require a person to be at the workplace, like many in the food industry, delivery, construction and many more.

At the time of writing this, I have yet to find solid statistics for the number of Americans working from home right now, but there is a general consensus that it’s somewhere around one in five to one in three. 

That falls right in line with what the Bureau of Labor Statistics shows, and we’re talking about the whole of the United States – things are going to feel different in different states and different areas.

How is the Internet Holding Up?

Back on topic, up to a third of all workers are now doing their jobs from home, plus kids of all ages are taking classes and doing their homework online, on top of the normal traffic that we see everyday. I’m talking about Netflix and other streaming services, online video games, YouTube and social media; all of these services are seeing a huge swing in traffic as more people are stuck at home.

Netflix’s usage, which is normally about 15% of all global Internet traffic, has hit all-time highs, and ISPs are seeing record-breaking amounts of Internet traffic all in all. Thankfully, many ISPs and mobile carriers have loosened or temporarily lifted data caps that would have otherwise caused massive expenses for users trying to work from home (Interestingly, these data caps were supposedly in place to ensure the service functions well. It turns out that in general, the service can still work as intended without them. Let’s hope service providers don’t revert back to the old ways after all this is over).

All that said, it’s not perfect for everyone. Rural users with limited access to broadband are still struggling, and in larger, more populated areas where the infrastructure might be a little older have been bumping into frustrating downtime. Still, all in all, a large part of our workforce is able to get things done effectively while maintaining quarantine, and that’s huge.

Cybersecurity is More Important Than Ever

Here’s the thing; being able to stay in business and keep your customers happy and your employees safe during this trying time is a big deal. That said, you can’t do all of that without also understanding the additional risks you might be opening up to. This isn’t meant to sound like doom and gloom – I want businesses to survive and strive. I want to hear success stories. I want business owners coming out of this with a new perspective on how they operate their business, trust their employees, and bolster their bottom line.

This could be a renaissance for the modern office, shifting the paradigm to normalize a remote workforce. Suddenly, you have fewer expenses, happier employees, and everyone can wear comfy pants more often. Or, maybe we’ll all decide we miss working together in the office so much and never look back. Either way, I digress…

Your business might not be able to see how this all turns out if you don’t secure all those new endpoints. Everyone who is working from home on a personal device just opened up a new weakness in your IT’s armor, especially if you aren’t providing the proper means of accessing company data and applications.

Ensuring that your users are able to work securely is going to be critical, because the last thing you need to deal with is additional downtime or data breaches.

NuTech Services can help review your needs and provide the right solutions to ensure your remote workforce can effectively do their jobs without risking your data. If you need help or advice, give us a call at 810.230.9455 to get started.

271320614_network_setup_400.jpg

Considerations for Your Business Networking Setup

271320614_network_setup_400.jpg

A business’ network is one of its key assets, which means that it is particularly important that yours is well-developed and planned. Here, we’ll go over a few basics and best practices for you to familiarize yourself with for when you need to reconsider your business network.

One of the first things you should know is what might be a part of your network infrastructure. You’ll likely be working with at least one network switch and at least one router. A network switch allows all the technology on your network to communicate with one another through network cables, while the router provides wireless capabilities and connectivity. Your modem enables you to access the Internet.

Networking Best Practices

As your network is such an important tool to your business’ success, you need to be sure that it is sufficiently prepared for this task. To do so, it will help to keep to the following tips in mind:

  • Skip the consumer level. Networking products come in a variety of “grades,” intended for consumer or business use. When equipping your business with these solutions you should only use options made for professional applications. This is because the consumer-based ones are simply not secure enough for business purposes, and likely will not be able to support your business’ needs.
  • Incorporate some redundancy. In the event that your business suffers from a disaster, you will want to be sure that your network is reliable enough to make it through and bounce back. Having a data backup and disaster recovery platform will build the redundancy you need to protect your network. 
  • Plan for future growth. Or in other words, make sure that the network you put in place can be scaled to your business’ future expansion, and that it can incorporate the solutions you will ideally grow into.

NuTech Services is here to assist as needed. Our team can help optimize your business’ network to best fit its needs and your professional development. To learn more, reach out to us at 810.230.9455.

304657402_network_slow_internet_400.jpg

Tip of the Week: Fixing a Slow Internet Connection

304657402_network_slow_internet_400.jpg

The modern business uses IT in so many ways that aim to make a business move faster, be more efficient, and ultimately, produce more than it would have without that technology. Each of these technologies are powerful in their own right, but they depend on two variables: electricity and a reliably fast Internet connection. When your Internet connection isn’t doing your business any favors, you need to look into why you aren’t getting the network speeds you are paying for. After all, your business depends on it. Today, we will take a look at a few ways you can go about troubleshooting a slow Internet connection.

You Don’t Have Enough Bandwidth

When you purchase an Internet package, you get certain speeds. Today, these speeds are faster than ever, but if your business has too much going on, it can wreak havoc with your Internet speeds. There is a situation that happens when too much data is trying to pass through a network connection. This situation is called bottlenecking and it is potentially the reason your speeds are slow. Think about it, if you try to put several gigabytes through a connection that is only rated for a few megabits per second, it’s going to take some time to get all the data through. To check this, audit how many devices are at work. Most of the time you’ll be surprised how much data you are sending and receiving. We can help you with this audit before you make the call to upgrade your Internet package.

Outdated Equipment

Another potential issue is that your networking equipment may simply be old and not be able to use the dual bands that are often necessary to get the most out of your wireless network. If you have enough bandwidth, but your Internet is just slow, chances are upgrading the modem, switches, or routers would be a prudent move and will likely fix any problems you have. 

Misconfigured Equipment and Environmental Factors

Once you’ve made sure that the physical components of your network are working as intended, but your Internet connection isn’t improving, you probably need to reconfigure your software on your devices or move your hardware to avoid interference. Specifically, if your wireless network signal is having problems making it through obstructions, you will want to consider using the 2.4 GHz connection rather than the 5.0 GHz channel. The max speed you’ll see will decrease, but the 2.4 GHz connection makes its way through obstructions better. Unfortunately, however, the 2.4 GHz signal can be a victim of electronic interference more than the 5.0 GHz channel. 

If you need help with your business’ networking, don’t wait and lose more money. Contact the professionals at NuTech Services today at 810.230.9455.

website_228145272_400.jpg

URL Manipulation and What to Do About It

website_228145272_400.jpg

Most people know what a URL is. It’s the address of a website, typically starting with http:// or https://, and it is essentially the location of a web page or application that can be accessed through a web browser or application. Nowadays, URLs are being manipulated by actors for both positive and negative means. Let’s take a look at URL manipulation and how it could affect you.

The URL

Before we get into the manipulation of the URL, let’s define its parts. 

The first part of the URL is called the protocol, which tells the computing network which language is being used to communicate on said network. Most of the time, the URL will use the protocol “HTTP”. The HyperText Transfer Protocol makes it possible to exchange web pages. Other protocols that are used include File Transfer Protocol, News, and Mailto. 

The second part of the URL is the ID and password, which makes it possible to access secure servers on the network. This part is typically removed because the password will be visible and transfer unencrypted over the computer network.

The third part of the URL is the server name. It allows users to access information stored on specific servers whether through a domain or the IP address associated with the server. 

The fourth part of the URL is the port number. This number is associated with a service and tells the server what type of resources are being requested. The default port is port 80, which can be left off the URL as long as the information that is being requested is associated with port 80.

Finally, the fifth, and last, part of the URL is the path. The path gives direct access to the resources found tied to the IP (or domain).

Manipulating the URL

By manipulating parts of the URL, a hacker can gain access to web pages found on servers that they wouldn’t normally have access to. Most users will visit a website and then use the links provided by the website. This will get them to where they need to go without much problem, but it creates their own perimeters.

When a hacker wants to test the site for vulnerabilities, he’ll start by manually modifying the parameters to try different values. If the web designer hasn’t anticipated this behavior, a hacker could potentially obtain access to a typically-protected part of the website. This trial and error method, where a hacker tests directories and file extensions randomly to find important information can be automated, allowing hackers to get through whole websites in seconds. 

With this method they can try searching for directories that make it possible to control the site, scripts that reveal information about the site, or for hidden files. 

Directory traversal attacks, also known as path traversal attacks, are also popular. This is where the hacker will modify the tree structure path in a URL to force a server to access unauthorized parts of the website. On vulnerable servers, hackers will be able to move through directories simply.

What You Can Do?

Securing your server against URL attacks is important. You need to ensure that all of your software is updated with the latest threat definitions, and keeping a detailed configuration will keep users in their lanes, even those who know all the tricks. 

The IT experts at NuTech Services can help you keep your business’ IT infrastructure from working against you. Call us today at 810.230.9455 for more information about how to maintain your organization’s network security.

216149188_400.jpg

Looking Back at ARPANET

216149188_400.jpg

I don’t think we’re going too far out on a limb when we say that the Internet is one of the most amazing inventions ever concocted by humans. 50 years ago, the precursor to the Internet, ARPANET was launched by the U.S. Department of Defense at four west coast universities, changing the way people shared data forever. Let’s take a look at ARPANET and how it grew into the Internet we all use constantly today.

DoD Advanced Research

During the Cold War there was a constant need for coded systems to transmit data quickly. In the mid-1960s, the U.S. Department of Defense created what they called the Advanced Research Projects Agency (ARPA), which worked on integrating new technologies that would help the United States achieve its foreign policy goals. One of the scientists that was commissioned was Joseph Lickliter, who had the idea of connecting computers at important research centers. It was a way for engineers and intellectuals to collaborate on DoD-funded projects. The network, called ARPANET, was launched in 1969.

At first, growth was slow. Small packets were sent over telephone lines, but along the way there were many innovations that set the tone for the shared computing constructs that we regularly use today. One such innovation was packet-switching. Packet-switching allows a computer to connect to several other computers at once by sending individual packets of information. In this way, computers were able to constantly send and receive information. With this method each computer on ARPANET would have (what amounts to) an address book that is constantly updated. 

As the network grew, however, this packet switching model, which was beneficial, was just too slow to facilitate an accurate account of addresses on the system. So in 1973, the engineers at ARPA decided that Stanford University (a founding member) would keep a master address book that was kept up to date by network administrators. This decongested the network significantly.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing starting to rear its head, changes started to come fast. It was about this time that other computing networks began to pop up. As they first started to connect with each other there was no interoperability between them, but this problem was remedied early in the 1980s with the standardization of what is called Transmission Control Protocol/Internet Protocol (TCP/IP). This was the first time the world Internet was used. 

ARPA engineers realized pretty quickly that the connecting networks that were now using the same protocol set (TCP/IP) were too numerous and were going to be unmanageable. This is when the modern Domain Name System (DNS) was introduced. They separated all addresses by domains. The first level, or top-level, domains would dictate the type of organization that a packet was being sent to. Examples include .com and .edu. Today, there are over 1,000 top-level domains out there. 

A second-level domain provided the host where data packets would be delivered. Examples that you see today are amazon.com or cornell.edu. This system provided specific data packet routing, setting the stage for the modern-day Internet. 

The Internet

By the late 1980s the DoD decided that ARPANET was a success and shut it down. It was handed off to a private company called NSFNET in 1990. In 1992, the modern Internet Service Provider (ISP) was created as the U.S. Congress passed a law allowing commercial traffic on the newly formed Internet. 

Nowadays, the United Nations has proclaimed that Internet service is now a fundamental human right. This marvel of human ingenuity would not have been possible without ARPA and ARPANET. If you would like to see more articles about technology’s history, subscribe to the NuTech Services blog today.

199393098_rights_400.jpg

What Does Internet Rights Advocacy Mean?

199393098_rights_400.jpg

The Internet is a vast and amazing place. Some have even argued that it is one of people’s best-ever inventions. Some would push it further by actively attempting to outline what rights an Internet user has. Advocacy groups have been popping up, and while it has had a marked effect on public policy in more progressive nations, some nations look on these groups with disdain. Today we will take you through human rights advocacy on the Internet, and what to expect going forward.

Initially, the advocacy of Internet Rights was just that: the right to have access to the Internet. While this isn’t a problem for as many people as it once was, some places still don’t have fair, affordable access to high-speed Internet service. Some nations, despite providing access, have Internet laws that subdue use due to an overlaying censorship. This issue, and the monetization of collected consumer data, are two of the hot-button issues today for Internet Rights advocates.

Lead Up

The Internet is a relatively new technology, especially in the manner it is being used by people today. As a result, there are different views on how these technologies are disseminated, who profits from them, and how non-controlling entities have their rights repressed. As a result, you’ll find from the early days of Internet rights advocacy, the largest voices were from organizations that found the equitable portion of the Internet either unnecessary or repressive to the rights of consumers.

Notice that the access to the Internet was not even on the roadmap. The nature of the early commercial Internet was such that it could be successfully described as libertarian. Through the end of the 1990s, as the first round of dot com investments started to tank, it became obvious that the technology would end up bigger than anyone had anticipated and needed regulation.

In the U.S. many fights have been undertaken in the subsequent 20 years. Many of which were pushed by Internet rights advocates. One of the most famous is:

Reno v. American Civil Liberties Union (1997)

In an attempt to clean up what some people considered indecent content on the Internet (pornography and the like); and more accurately, to keep kids away from this content, Congress passed the Communications Decency Act. The ALCU, which is a well-known civil rights advocate group, filed suit. The provision was eliminated by two federal judges before being heard in front of the Supreme Court, which upheld the lower courts’ rulings. This was a major blow against censorship; paving the way for free expression on the Internet.

While the ALCU isn’t exactly an Internet Rights Advocate, the landmark case ushered in a new world of free speech on the Internet; and, it sets the tone for Internet rights advocates to this day.

Personal Privacy

Today there are many organizations looking to protect people on the Internet. Sometimes their views overlap, sometimes they don’t. One of these groups, the Electronic Frontier Foundation (EFF), is a major player in the fight to keep speech (and content) free from censorship on the Internet, the fight against the surveillance state, and most notably, the ongoing fight for individual privacy.

Businesses of all kinds, as well as government agencies have grown to take significant liberties with people’s personal information. Organizations like the ALCU and the EEF work tirelessly to get the topic of personal data privacy in front of decision makers.

Have you ever wondered how you just had a conversation with your friend via some type of app about fingerless gloves and now your sidebar on every website is now filled with fingerless glove ads? Most users don’t fully understand that organizations that you interact with online keep a profile on you. All of your actions, any personal or financial information that you share, and more is stored in a file that is often packaged and sold off by those organizations to advertising firms.

These advocates, among the other issues they stand up for, are trying to push the issue of personal data privacy. The main point of contention is that companies profit off of the information people provide, and since this information is very clearly personal in nature, it is their belief that individuals are being taken advantage of. This debate has been ratcheted up significantly with the European Union’s General Data Protection Regulation (GDPR) that intends to protect individual information.

While it might be a matter of time before the U.S. gets a data privacy law in the same vein as the GDPR, Internet rights advocates will continue to act in the public’s favor on this issue, and many others.

Net Neutrality & Access to All

One of the biggest fights that Internet rights advocates are undertaking is against the companies that deliver the Internet itself: The Internet service providers (ISP). For those of you who don’t know, over the past several years the U.S. Government created mandates that forced ISPs to provide access to applications and content without favoring any, even if they are the ones that use the most bandwidth.

The theory is that the typical Internet user only does so much on the web. They typically access the same sites and use their Internet connection for the same things. This creates a situation where ISPs, using market adjustments would want to get more money per byte than if users used a variety of sites to do the same. With federal control, they were forced into charging a flat rate.

The net neutrality laws that were instituted in 2015 were repealed in 2017, as controlling bureaucrats argued that there were enough people without fair access to the Internet and the only way to persuade the ISPs to commit to investing in infrastructure that would curb this problem is by repealing the net neutrality laws. Needless to say, this caused quite a stir.

Internet rights advocates were quick to point out investment in Infrastructure is in these ISP’s best interest and giving them the ability to slow down Internet speeds as they see fit is not good for consumers. Unfortunately for most Americans, these ISPs are the companies you have to get your Internet service from if you want speeds that allow you to use it the way you want. Advocates are still trying to do what they can to educate people about the benefits of net neutrality and have set up websites with information and for people to give their support. Organizations like the aforementioned ACLU and EFF,  the American Library Association, and Fight for the Future, Demand Progress, and Free Press Action currently sponsor www.battleforthenet.com, a one-stop site for all things net neutrality.

Advocacy can go a long way toward giving a voice to people who may not think they have one. What Internet-related topics do you find to be problematic? Leave your thoughts in the comments and subscribe to our blog.

142845438_isp_400.jpg

ISPs Have Finally Started Rolling Out 5G

142845438_isp_400.jpg

If there is one thing that we all know about 5G it is that it’s coming? It’s been coming for years. For a decade, the next biggest thing has been 5G. We’ve routinely heard statements like “When we get 5G…” Many of which came from people that had no idea what the “G” in 5G even means (It literally stands for “generation”). Today, we’ll separate the facts from the fiction to get you up to speed on 5G.

To begin, we have to say that anyone that is talking about 5G as a selling point for any product or service in early 2019, you are looking at a marketing strategy. As the year goes on, however, we will be getting the first 5G networks and devices that can run on them. So, while it is true that some 5G wireless networks will be online in 2019, the lion’s share of networks will be using the same wireless platform that you’ve had for the past decade.

Fourth Generation

In December 2009, 4G wireless broadband networks went online for the first time, with the U.S. finally getting 4G LTE in June of 2010. Much like 5G will be for us, 4G was a revelation for mobile consumers of the time. At the time, 3G networks were doing 200 kilobits-to-five megabits per second and boosting to 4G’s 100 megabits-to-a-gigabit per second is a huge jump. It allowed for cloud computing and streaming media to be possible, and opened up a massive market for mobile applications, and devices that could handle these applications. The effect 4G had on society was massive.

Fifth Generation

Like the 4G networks before it, 5G networks will improve bandwidth speed, reduce latency, and provide a whole new layer of application support. It will effectively bring office Internet speeds to mobile devices. With speeds up to 100 gigabits per second, the 5G connection will be nearly 1,000 times faster than current 4G speeds. This will make any streaming communications seamless and give application developers a whole new construct to work in, improving mobile computing with each new innovation. To put this into perspective, with a solid 5G connection, you could, in theory, download a full movie in a few seconds

This gives people better network stability to ensure that business-critical mobile functions are reliable and has the speeds necessary to provide users the digital tools they need to be productive anywhere they are. The problem many organizations (and individuals) will have is that with this amazing upgrade, when your area gets 5G (Verizon has announced they are launching their 5G the second week in April in Minnesota and Chicago) you will have to get a phone that is capable of working with the new 5G networks. Thus far here is the list:

  • Samsung Galaxy s10 5G
  • LG v50 ThinQ
  • Huawei Mate X
  • ZTE Axon 10 Pro 5G
  • Unnamed OnePlus 5G Smartphone

That’s it. No Apple version. No Eurpoean version. In fact, of these phones, the Galaxy s10 5G is the only one that will be available in the United States at the time of Verizon’s 5G launch in April.

Also, Verizon is also making available a 5G mod for the Moto z3 for $50. The retail price comes in at a cool $349.99 if it isn’t purchased in the promotional period.

Users should also know that if they are lucky enough to get access to a 5G network, they will be forced to pay extra for access to it. The price currently is an additional $120 per year on Verizon, other Telecoms haven’t announced a true 5G pricing strategy, even though most of them have rolled out some products claiming to have 5G capabilities on handsets that only offer 4G LTE speeds. As we stated above, these are marketing ploys.

Do you plan on using 5G when it’s rolled out? Leave your thoughts in the comments section below. If you would like to know more information about the technology behind 5G subscribe to our blog today.

176338853_bandwidh_400.jpg

Tip of the Week: Bandwidth Questions

176338853_bandwidh_400.jpg

Consider the following question: is your business’ Internet connection feeling a bit sluggish lately? If you haven’t examined your bandwidth since you started your business, then there’s a chance that you aren’t being as productive as you could be if you took a closer look at it. We’ll discuss some ways you can make the most of your IT solutions with proper bandwidth.

What is Bandwidth?
In its most basic form, bandwidth is how quickly you can download content from the Internet. Bandwidth is measured in megabits per second, or Mbps. The more bandwidth you have, the faster downloads will run. Some high-speed connections can be measured in Gigabits per second.

How Exactly Does Bandwidth Translate to Download Speed?
If you’re trying to calculate your projected download speed, keep in mind that there are eight bits for every byte. This means that if you’re trying to download eight megabytes of data on a one Mbps connection, it will take about one minute. A 512 megabyte file, on the other hand, would take just over a hour to download on the same connection.

Estimating Your Business’ Needs
In order to reach an appropriate estimate for your business’ bandwidth, you’ll need to use a little math. Take the estimated traffic that you expect each of your processes to take up, as well as the number of users that are engaged in this process. You’ll want to assume that this is during peak operations; otherwise you might not have enough during an important operational period. You can generally rely on the following speeds for bandwidth estimation:

  • 100Kbps and below: Low-end, single-line VoIP phones and e-fax machines. Some more basic computers have processes that use less than 100Kbps, but in the business world, you probably aren’t using them.
  • 100-500Kbps: More computers and laptops fall into this range, as they are more likely to be the ones streaming, downloading, emailing, and browsing than other less intensive devices.
  • 500Kbps-2.0Mbps: Cloud solutions and standard definition video conferencing take up about this much bandwidth. This is the general range for Enterprise Resource Planning solutions, Customer Relationship Management platforms, and Point of Sale devices.
  • 2.0Mbps and more: High-definition conferencing solutions, remote access, heavy cloud access, and other resource-intensive tasks fall under this category.

If you keep peak activities at the top of your mind, use them to add up what your staff will need to stay on task and ahead of schedule. For example, let’s say you have ten users, including yourself. You might be using 450Kbps for correspondence, while six of your employees are using a CRM solution at 2.0Mbps each. The last three are using high-definition video conferencing software for 2.5Mbps each. Add all this up and you can expect to use about 20Mbps at heaviest use, but you want to go a little beyond this to 25Mbps, just to be safe.

What are other tips that you might want us to share? Leave us a comment and let us know.