LTech Solutions Blog

LTech Solutions has been serving the Hudson area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Think Through Which Employees Have Access to What Files

b2ap3_thumbnail_windows_admin_400.jpgIt’s clear that your IT department should have administrator privileges with your business’s technology, but the average employee is another story altogether. Administrator privileges provide users with the ability to do many things, such as install programs and access admin settings. Administrator privileges are exactly what you want to keep users away from, and it turns out that the majority of flaws in the Windows operating system depend on these privileges.

Continue reading
0 Comments

Tip of the Week: Take Advantage of Your Mouse’s “Snap To” Feature

b2ap3_thumbnail_snap_to_mouse_400.jpgComputers are designed to save people significant time when it comes to getting work done, and with a few simple tweaks and adjustments, you can trim even more seconds off a project, which really adds up in terms of gaining productivity. Your PC’s Snap To mouse feature is a classic example of this.

Continue reading
0 Comments

Microsoft Salutes the US Navy for Sticking with Windows XP

b2ap3_thumbnail_xp_logo_for_navy_400.jpgHave you already arranged for your upgrade to Windows 10 on July 29th? If so, good for you. You’ve made a decision that, last year, several Windows XP users went without. However, those who went without upgrading to a more recent operating system are now feeling the effects of having to purchase custom support from Microsoft following Windows XP’s expiration; including the United States Navy.

Continue reading
0 Comments

Microsoft Takes a Business-Centric Approach With Its Mobile Strategy, Part II

b2ap3_thumbnail_windows_tablets_productivity2_400.jpgIn our last blog article, we looked at Microsoft’s mobile computing strategy for businesses. In part II, we want to follow up by looking at some specific mobile technology from Microsoft, including a preview of its newest mobile computing venture, Windows 10.

Continue reading
0 Comments

Vulnerability WinShock Gets Patch 19 Years Later

b2ap3_thumbnail_problem_solved_400.jpgAfter a long 19 years, a critical vulnerability found in the Windows series of operating systems has been patched. IBM informed Microsoft of the flaw back in May 2014. The flaw, which allows for remote code execution via a packet to a Windows server, is found in every Windows operating system since Windows 95.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Technology Productivity Hackers Google Cloud Workplace Tips Miscellaneous Mobile Devices Email Business Internet Efficiency Microsoft Backup Hosted Solutions Browser Malware Windows 10 Android User Tips Marketing Holiday Innovation Windows Save Money Small Business Business Computing Employer-Employee Relationship Office Smartphone VoIP Hardware Data Application Server Communication Mobile Computing WiFi Microsoft Office IT Services Automation Hacking Social Media Remote Computing Chrome Business Continuity Computer Disaster Recovery Upgrade Software Going Green Gmail IT Solutions Big Data IT Support Bandwidth Lithium-ion battery Gadgets Health Managed Service Provider Mobile Device Management Mouse Passwords Retail Business Management Network Saving Money History Social Engineering Budget Telephone Systems Fax Server Operating System Quick Tips Biometrics Networking Apple DDoS App Entertainment The Internet of Things Recovery Mobility Smartphones Virtualization communications Spam Website Environment Memory Office Tips Social Networking Bluetooth Network Security Facebook Hacker Vendor Management YouTube WIndows 7 User Error Robot USB Best Practice Virus Science NarrowBand Managing Stress Wearable Technology Virtual Reality Customer Relationship Management Phone System Settings Windows 8 Compliance Bloatware Wireless Technology Running Cable Customer Service People Analytics Tablet Data Management Entrepreneur Worker Commute Chromecast Mobile Office Tablets Uninterrupted Power Supply Bring Your Own Device Two-factor Authentication Windows Media Player Cleaning PowerPoint Online Currency Meetings Hard Drives Laptop Consultant iPhone Distributed Denial of Service Maintenance Computers Human Resources Tech Support Humor Office 365 Programming Touchpad Best Available Collaboration Shortcut Twitter Shadow IT Risk Management Safety Privacey Streaming Media BYOD Remote Monitoring Internet Exlporer Avoiding Downtime Wireless Analyitcs Encryption Ransomware Search Sports SharePoint Social User Notifications Unified Threat Management Excel Save Time VPN eWaste

Blog Archive