Skip to Content

About: Gregory M

Recent Posts by Gregory M

How to present your video and content side by side in a Microsoft Teams meeting

Present your screen content and webcam feed side by side, on top of each other, or however you want, in your Teams meeting with this handy trick.

By Matt Wade

Today we’re going to cover a little workaround—this probably qualifies as a life hack, actually—for presenting both your face and shared content—like a slideshow, your browser, a file—at the same time during a Microsoft Teams meeting. Basically, you can present like a newscaster in a meeting and it requires no additional software or skills to do it. It can really amp up your presentation, class, meeting, whatever.

For a video version of this post, press play below. You probably want to watch the video. I go through a bunch of demos on how to actually do this and discuss a bunch of the nuances to maximize the professional look, which may help make it all make more sense.

Microsoft Teams has announced some major changes and improvements when it comes to how people’s faces and content displays during meetings, but there’s still a big need—at least in my opinion—for sharing your face with content in a configurable side-by-side way (and there will remain that need even with the announced updates). Think of a newscaster with a graphic above their shoulder or a gamer live-streaming their play with their face in the corner.

I see this having a big impact on meetings where there is one or only a few main presenters, not really for meetings where many people discuss or brainstorm back and forth. It’s also fantastic if you’re a teacher presenting slides or a white board in your browser and you want to show your face to keep students more engaged.

Read more where originally posted, HERE

0 Continue Reading →

Microsoft warns digital currency owners to be aware of new malware

In a tweet, Microsoft Security Intelligence (MSI) warned cryptocurrency owners who are also Windows users on August 27 that their funds in crypto wallets might be in danger because of a new malware.

The new malware, called Anubis, seems to use code forked from Loki. It steals crypto wallet credentials, credit card details and other valuable information from these Windows users.

According to MSI, it first discovered the malware in June in the cybercriminal underground. It has the same name with another potent banking Trojan that has been targeting Android smartphones for months.

MSI stressed that the malware seems to be controllable, stating that it has only been deployed in “what appears to be limited, initial campaigns that have so far only used a handful of known download URLs and C2 servers.”

Certain websites trick people into downloading Anubis, then the malware steals information and sends these to command and control servers via an HTTP POST command.

MSI says it will continue to monitor the threat. Cybersecurity experts suggested that the way to avoid the download is not to click on any email that seems fishy. Because the original code Loki used social engineering techniques to target its victims, sending attachments via email, which, once clicked on, would install the malware.

Read more from the original article HERE

0 Continue Reading →

4 Benefits of Using a FedRAMP Authorized Cloud Service Provider (CSP)

Security breaches and cybersecurity attacks happen every day, making it imperative that organizations have the proper security controls in place. In addition to having your own security measures established and tested, you also need to ensure that every service provider you work with is up to your standards, especially a cloud service provider (CSP).

This is why the U.S. government enacted FedRAMP (The Federal Risk and Authorization Management Program) in 2011. Establishing this set of security standards addressed the measures needed to keep sensitive government data secure when working with cloud service providers. FedRAMP addresses the assessment, authorization, and continuous monitoring processes these CSPs need to align with in order to be authorized to work with federal agencies.

Does your agency or business work with government data? Do you need to comply with FedRAMP regulations? If so, let’s take a closer look at two types of CSPs you can work with – FedRAMP Ready and FedRAMP Authorized. We’ll learn more about these two distinctions and the benefits of working with a FedRAMP compliant CSP.

Continue Reading Original Article HERE

0 Continue Reading →

New Python-scripted trojan malware targets fintech companies

PyVil RAT is capable of keylogging, taking screenshots and more – and the those behind it have gone to great lengths to keep it as under the radar as possible.

A well-resourced hacking operation has deployed newly-developed trojan malware in a campaign targeting financial tech organisations with the aim of stealing email addresses, passwords and other sensitive corporate information – and the malicious code is bundled inside code ripped from legitimate applications.

Known as Evilnum, the advanced persistent threat (APT) group first emerged in 2018 and one of the reasons for their success is how often they’ve changed tools and tactics as they take aim at targets related to Fintech mostly located in Europe and the UK, although some victims are located in the Americas and Australia.

Read More HERE

0 Continue Reading →

How to Fix a Bad Comcast Connection

I’m not going to begrudge anyone for using the modem and router that their ISP provides them. You shouldn’t—because you’re probably paying your ISP to “rent” a device that isn’t very good—but not everyone has the patience or inclination to understand the nuances of wireless networking, or even their monthly bill.

On Instagram the other day, a friend of mine—a teacher currently spending her days video-chatting a room full of kids—was complaining about her Internet connection. Her video chats kept dropping, and she was seeking any troubleshooting advice the Insta-masses could send her way. She admitted she know nothing about wifi, but presumed that was the problem.

Read more from the original article HERE

0 Continue Reading →

Just Because macOS Lets You Install an App Doesn’t Mean It’s Not Malware

As long as macOS lets you install an app, it should be safe, right? That’s the point of Apple’s Gatekeeper and notary service, which it began to enforce in macOS Catalina back in February. In theory, it means that any app you install on your Mac should have “been checked by Apple for malicious components.” But you would be wrong in assuming that any app with a Gatekeeper greenlight is actually safe.

As a recent article from Objective-See’s Patrick Wardle describes, there’s a new Mac attack making the rounds that uses Gatekeeper-passing payloads to distribute a particularly popular and problematic piece of malware: OSX.Shlayer.

Read the original article HERE

0 Continue Reading →

Cloudstar to Acquire Specialty Hosting Company

To Be Announced:

Cloudstar will be announcing the acquisition of a specialty hosting company mid-September 2020.  The hosting company specializes in open source containerized environments, VPS instances, open sources virtual machines, and dedicated open sourced private environments.

The model is entirely self-service, portal driven and built within the Open Stack ecosystem.

The acquisition will be completed shortly upon which all details will be announced.

0 Continue Reading →

Cloudstar to Offer ProDoc Hosting for Arm-Based MacBooks

Cloudstar, a leader in legal technology, and legal application hosting continues to look for new ways to help clients.

Later this year, Apple will start switching its Macs to its own ARM-based processors, but you won’t be able to run Windows in Boot Camp mode on them. This will present problems to many law offices. Microsoft only licenses Windows 10 on ARM to PC makers to pre-install on new hardware, and the company hasn’t made copies of the operating system available for anyone to license or freely install.  This leads to challenges to many Mac based law firms- specifically those who prefer to run ProDoc locally via Windows dual boot, or via Parallels.  ProDoc is a document drafting system that helps lawyers and legal professionals save valuable time by decreasing paperwork and increasing accuracy.

Cloudstar has solved this problem for our legal client base in our Citrix-based AND our HTML5 based compliant legal cloud.

Via hosted desktop, or published app, lawfirms can quickly and easily run ProDoc as if the application was naively installed on ANY apple device-  iPad, iPhone, Intel Macbook, or ARM Macbook (even Google devices such as Android and Chromebook).

Please contact us for additional information about ProDoc hosting, or how Cloudstar helps law firms embrace the latest in legal technology.

ProDoc for Lawyers

0 Continue Reading →

Cloudstar To Offer HTML 5 Desktops

Cloudstar is now please to announce HTML 5 based hosted applications, desktops and workloads.

Access Windows applications and desktops via any modern web browser without installing or configuring any client-side software with HTML 5 based solutions from Cloudstar.

With support for Windows, MacOS X, iOS, Android and Chromebook among others, Cloudstar HTML 5 Remote Access is leading the way in the remote working concept.

Benefits Include:

  • Lower costs
  • Simple, fast printing
  • Works on any device
  • No client side software to install
  • No plugins to install

Easily load balance workloads across multiple Windows Server 2019 application servers:  from just a few to several hundred.  Publish applications, desktops, complex workloads and more.

html 5

0 Continue Reading →

Cloudstar is Proud to Sponsor the 2020 Cybersecurity Special Report

It was the introduction of the CCPA 2 years ago that started it all. It was this breakthrough act with a 7/1 enforcement date that launched a wave of state regulations around data & privacy.

Cloudstar and The Legal Description are proud to offer this free report for download.  Click HERE for your free copy.

2020 October Research Cybersecurity Special Report

0 Continue Reading →

 

Recent Comments by Gregory M

    No comments by Gregory M