Wisdom Wednesday : Taking and Printing Screenshots on Windows 10

Wisdom Wednesday : Taking and Printing Screenshots on Windows 10

Need a fast Windows screenshot? We’ll show you how to do it!

Do you need to take a quick Windows screenshot for work or fun, but can’t figure out how to do it? Don’t worry: Our guide will show you just how it’s done.

Copy the Screen for Posts

Traditionally, the “Print Screen” option is the quickest way to take an easy screenshot that you can use later on as desired. The only problem here is that these days Print Screen looks a little different based on what type of keyboard you may have. These steps may not all be available on some keyboards, especially more compact keyboards or non-Windows keyboards.

First, look at the top rows of buttons on your keyboard. Look for a button that says “PrtScn” or “Print Scr” or any other abbreviation (it may also be lurking around the Ctrl key, there are several places that they appear. If there’s a dedicated key, all you have to press it. This will instantly copy a snapshot of the screen. You can then go into any document and paste the screenshot wherever space is available.

Note that sometimes this feature is on a dual-purpose key, and you may have to access it by pressing the Ctrl or Fn key at the same time.

Automatically Save Screenshot as File

Let’s say that you don’t want to just copy a screenshot for pasting, but that you actually want to save a screenshot as its own photo file. In that case, you may need a combination of buttons. If your keyboard has both a Print Screen button and a Windows logo key, you can press them both at the same time: This will usually take a screenshot and then automatically save it as a separate file, typically in the desktop or its own screenshots folder.

Of course, it’s not always that simple. If you have a Windows key, an Fn key, and a Ctrl key, you may need to push some combination of these keys along with the Print Screen key to create an automatic save. A little bit of experimentation may be in order, but if you’re using a built-in keyboard (like on a laptop) then you can probably look up the best method.

Choose a Single Window as a Screenshot

This is a common case in many of today’s larger screens, where you have several windows open at the same time but only want to take a screenshot of one window, not the whole screen. There’s a way to do this, too: Click on the window you want to copy so that it’s highlight. Then press the Print Screen key and the Alt key at the same time. If your keyboard has an Fn key, you have to press Print Screen, Alt, and Fn at the same time to get this to work.

“Snipping” Screenshots

Windows also lets you select a particular area of the screen through a dedicated screenshot tool called the Snipping Tool. It’s not as fast as other methods, but it is very effective. Just type in “snipping tool” into your Windows search box and it will bring up the right link to select. This opens up a small bar that allows you to create a “New” screenshot and change the shape of the shot. You can then drag your mouse to create whatever size you need.

Looking for more information on how to use Windows 10? Remember to take a look at Computer Network Systems Wisdom Wednesday series for continued advice. If our  readers have any further questions or need help figuring out a problem, contact Computer Network Systems at 1.866.205.8123 and support.staff@compnetsys.com

How Viruses Worked 20 Years Ago

How Viruses Worked 20 Years Ago

There are viruses that can be implanted on a computer in 2017, and lie in wait until a network becomes vulnerable before attacking. Unfortunately, viruses have come a long way from 20 years ago. The term virus was coined early on in computer history, but it’s every bit as relevant today as it was then. Just like biological viruses adapt to Purell and antibiotics, so too have viruses learned to adapt to new security measures.

Brain in 1986

Brain was the first reported computer virus on DOS, and was announced in January of 1986. It spread via floppy disk, and spawned generations of hackers with its ability to move from computer to computer. Brain appeared to be little more than a prank (courtesy of two developers in Pakistan), a joke in which the hackers actually revealed their real location in the text of the virus. Because the virus did little to harm people’s data or machines, it often went entirely unnoticed by users.

The Evolution

Today we refer to viruses as a specific kind of malware, one that can self-replicate and continue its destructive path indefinitely. While Brain may be one of the famous early viruses because it came about when computers were experiencing more ubiquity, self-replicating programs date back to the 1940s. Programs in the early days might slow down processing time, taunt users with cryptic messages, or severely impact performance. Once Brain was no longer a news items, new forms started to pop up. The ones that followed famously infected files from Yale University, destroyed files in Jerusalem, and exploited computers that were known to have buffering vulnerabilities. Viruses could be the product of hackers, or sometimes of legitimate company’s software.

Viruses Today

Viruses have gotten faster and more efficient to make them a force to be feared. They can delete photos, files and entire storage libraries. They’re developed to target Word, Outlook, Windows OS, Mac OS — nothing is safe. They can be designed to affect Facebook or Twitter users, or programmed to steal credit card information straight for the source. Hackers may be out for pure destruction or chaos, or potentially for ransom. The more the average person understands them, the faster hackers create new tricks to get in. Viruses can come in the form of a pop up, an email from a coworker, or a completely undetectable program that waits until the time is right.

Protection for Everyone

The physical world will never provide total safety, and the same holds true for the virtual world. But there are preventative measures you can take to safeguard your company from viruses that go beyond anti-malware and perimeter protections. Security needs to have layers to fend off the intelligent viruses of 2017.

Computer Network Systems is the trusted choice when it comes to staying ahead of the latest virus developments and can provide you with tips, tricks and news. Contact us at 1.866.205.8123 or send us an email at support.staff@compnetsys.com for more information.

Master Snapchat For Your Business

Master Snapchat For Your Business

When it comes to social media marketing, Facebook, Twitter and YouTube are no longer enough. Get an edge over your competition by mastering Snapchat now!

Since all but taking over online communication, social media has become a viable business tool as well. Social media is easy and affordable to use, and it allows access to vast numbers of potential new customers. While Facebook, Twitter, LinkedIn and YouTube are being used liberally by today’s businesses, there’s one exciting platform that isn’t seeing as much traffic: Snapchat.

Snapchat is one of the fastest-growing social media options with millennials. There are well over 100 million active Snapchat users, and over 70 percent are under the age of 34. Put quite simply, businesses looking to connect with this crowd should be on Snapchat.

Easy to Use

Snapchat works by providing an interface through which users can easily send photos and videos, or “Snaps,” to their followers. The media sent is only viewable for up to 10 seconds (the user gets to determine the length of the display). Afterward, it disappears forever. Multiple snaps can be strung together to create a “story” viewable for up to 24 hours.

Some other compelling Snapchat facts and stats include:

  • Users are Highly Active. An impressive 65 percent of Snapchat users post new content at least once per day. You can do the same, and your business will stay active in the consciousness of potential customers.
  • Ready to Buy. Nearly 60 percent of college students said they were very likely purchase a product using a coupon they received via Snapchat.
  • Get More Personal with Users. Snapchat allows for showing current and potential customers a more casual, behind-the-scenes view of your company.
  • Builds Trust. Trust in your brand will grow the more you post on Snapchat. Users will come to feel as if they “know” your company and be more likely to choose you over your competitors.

Growing Your Snapchat Network

Unlike Instagram and Twitter, hashtags aren’t enough to entice new followers. On Snapchat, users must find and add you. To add users, you must know their Snapchat names. Snapchat does not have native discovery capabilities. Gaining Snapchat followers requires using your company’s online presence – including your other social media accounts – to raise awareness about your Snapchat account. Here are some tips for getting the ball rolling:

Promote Actively. Promote your Snapchat account name within your other social media profiles as well as in email signatures, blog posts and on your website.

Use the “Add Me URL.” This feature allows for sharing a customized URL on other social media platforms. It lets users easily and rapidly connect with you.

Use this link and replace “username” with your business Snapchat account name:

https://www.snapchat.com/add/username

Share Valuable, Compelling Content. Plan a content series that tells a story, teaches something new, allows users to play a game, or otherwise keeps them engaged.

Use Snapcodes. Grab your Snapchat QR code image as a cropped screen shot and use it within your other social media account profiles.

Getting active on Snapchat now can vault your business ahead of the competition on this fast-moving platform. If your company is ready to succeed on Snapchat, contact Computer Network Systems at . 1.866.205.8123 or email  support.staff@compnetsys.com. We look forward to helping you succeed!

Hidden costs of ransomeware

Hidden costs of ransomeware

The prospect of having to deal with a ransomware infection isn’t very appealing. But while every business owner is well aware of what ransomware is by now, many still don’t realize the extent ofthe financial damage it can cause.

But Wait … What is ransomwware?

Ransomware is computer malware or virus that installs covertly on a victim’s device (e.g., computer, smartphone, wearable  device) and uses an extortion attack that holds the victim’s data hostage, or  threatens to publish the victim’s data, until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it.

Ransomware demands have gotten pricier, but it’s not the initial fee you need to be worried about. You don’t have to pay the ransom demand, but you do have to keep paying your overheadcosts for the duration of your business’ downtime, while pulling in little to no profits.

To keep you from having to face a situation that could potentially cost you everything, Computer Network Systems has put together a comprehensive eBook on the true cost of a ransomware attack.

Don’t fall victim to a ransomware attack

Don’t fall victim to a ransomware attack

Protect your Data and Business From This Top Security Threat For 2017

Ransomware attacks are on the rise. It’s part of the top 10 threat predictions by security analysts and labs around the world. And for businesses that are victimized, the consequences can be paralyzing and destructive.

 When ransomware infects your computer or mobile device, your organization’s operations can come to a grinding halt. You’ll be denied access to your computer and in MOST CASES, lose yourdata. Ransomware attacks have cost U.S. businesses millions of dollars in losses. Don’t let your business be one of these.

FastFacts:

  • Ransomware is the most malicious andfrequently used form of malware today.
  • There’s more than one type of ransomware.
  • It’s important to know what to do if you experience a ransomware attack.
  • The best way to protect your organization from ransomware is to prevent it from landing on your computers in the first place.
  • Always back up your data so your IT professional can restore it in the event of an attack.

 

Ransomware is the most malicious and frequently used form of malware today.

We’ve put together a FREE, no strings attached report explaining how you can protect your data and business from this top security threat for 2017.

Enjoy The Benefits of Outsourced IT

Enjoy The Benefits of Outsourced IT

As a business owner, it can be hard to get past the idea that asking outsiders to handle asensitive aspect of your operations is like inviting the fox into the henhouse.This is especially true when you’ve built your business yourself from the ground up. You can’t help being protective.

But in today’s technology-driven world, the bigger risk is trying to take everything on yourself. Technology changes quickly, and when that’s not your only priority, it’s impossible to keep up. An IT ServiceProvider, on the other hand? It’s our job to keep up. We work hard – and work together – to make sure we:

  • Constantly develop new skills
  • Have quick access to internal expert knowledge
  • Continuously train on the latest technology
  • Concentrate on different skills to round out our team

Working with us provides your business with a team of experts that have diverse technology skills to handle your IT needs, leaving you free to focus on what you do best – run your business.

Interested in learning more about how your business can benefit from our outsourced technology experts?