Search This Blog

Showing posts with label Tech Update. Show all posts
Showing posts with label Tech Update. Show all posts

Friday, January 19, 2018

Multiple desktops in Windows 10

Multiple desktops in Windows 10
Multiple desktops are great for keeping unrelated, ongoing projects organized, or for quickly hiding from the boss that browser game you can't stop playing. To create multiple desktops: 
  • On the taskbar, select Task view > New desktop .
  • Open the apps you want to use on that desktop.
  • To switch between desktops, select Task view again.

Saturday, March 5, 2016

Acquiring mobile users is expensive, but here's why they're worth the cost

Even as cost-per-install rates soar, the cost of loyal users is going down. Here's what businesses building mobile apps should know.
Image: iStockphoto/Nongkran_ch
Apple's App Store may have created 1.9 million jobs, but it's unclear how many of those jobs pay a living wage. After all, VisionMobile's survey data has long revealed that most developers live below the app poverty line, making less than $500 per app per month.
There are signs, however, that life is getting better for mobile app developers.
SEE: Mobile device computing policy (Tech Pro Research)
App Annie, for example, is forecasting that the App Store will generate $101 billion by 2020. More importantly, however, the cost for acquiring a loyal app user, and not simply someone who installs an app, is in decline. With roughly 30% of all mobile advertising currently focused on getting people to download apps, everyone benefits if those billions of dollars start to create real brand loyalty, and not simply app churn.

Loyalty comes at a price

The cause for hope comes from recent Fiksu data. Fiksu, which specializes in helping brands build and run app acquisition and re-engagement campaigns, issues a monthly index that tracks the cost of generating app downloads and app loyalty, defined as a user that opens an app three times. Those numbers show though the cost per install (CPI) keeps going up, the cost per loyal user (CPLU) has declined a bit over the past year.
On iOS, CPI rose 12% to $1.64, a 28% increase over January 2015. On Android, CPI went the opposite direction, declining 44% to $1.91 from December 2015 while rising 25% since January 2016:

Now, compare this to the cost of acquiring a loyal user (CPLU), which plunged 34% since last month to $2.78, and experienced a year-over-year decline of 4%:

In short, the cost of corralling new users into your apps keeps going up, but the cost of generating loyal users seemingly paradoxically has been going down.
What gives?

Are we there yet?

The Verge's Casey Newton writes that "the App Store's middle class is small and shrinking. And the easy money is gone," which is correct, but doesn't tell the whole story.
For one thing, more and more companies aren't even trying to sell apps. Either they offer in-app purchases or, if they're a big brand like a hotel chain, they generate revenue through their app. For these companies, it doesn't matter whether the App Store economy is $101 billion or $1.01, because the revenue they generate is facilitated by apps but not counted as part of the "app economy."
Selling apps, in other words, is old school.

This is implied by the Fiksu data. When I asked Fiksu co-founder Micah Adler why CPLU has declined even as CPI has gone up, he made it clear that it has a lot to do with "higher quality" of installs.
And yet, big brands still need to find ways to get users to download and engage with their apps, and so should be concerned by CPI inflation. The good news is that mobile marketers appear to be getting better at generating app loyalty, and not merely app installs.
"This is because the average install this year has a higher likelihood of turning into a loyal user, compared to last year," Adler said. "So, even though it is more expensive to get a download, this is more than made up for by the higher quality."
By higher quality Adler really means better use of data, or "the ability to extract the right audiences from that data," as he told me. "By getting the right people to download the app, they are more likely to be long term users of the app."

Spending on engagement

Adler's response is understandably focused on optimization of ad spend, given that's what Fiksu does. But, lost in that analysis are the myriad other things that app developers are doing to foster loyalty in their user base.
While companies have increasingly focused on app engagement for years, it's only been in the last year that mobile marketing automation and related technologies have become more science than art. What used to be "dumb pipes" has become real-time, data-driven orchestration of notifications that nudge a user along a desired purchasing path.
Between optimized app user acquisition campaigns and ongoing improvements in engagement strategies, marketers are finally starting to get real value for their mobile marketing spend. That's good news for the app economy, but it's great news for every business that depends on mobile...which is every business.

Intuit sells Quicken to private equity firm in management buyout

33-year-old personal finance software will be bolstered by more Mac development, improvements in reliability on Windows, says current Quicken manager

Credit: Intuit
Intuit yesterday said it had sold its Quicken personal finance software unit to H.I.G. Capital, a Miami-based private equity firm.
Financial terms of the deal were not disclosed.
The announcement put an end to a sales process that went public last August, when Intuit told customers it was unloading three parts of its business -- Quicken, QuickBase and Demandforce -- to focus on its most profitable software and services, the QuickBooks small business accounting division and the seasonally-skewed TurboTax tax preparation group. In January, Intuit sold Demandforce to Internet Brands for an undisclosed amount.
Last summer, Intuit's CEO explained that Quicken, which unlike QuickBooksand TurboTax lacked a cloud-based service or subscription offer, was essentially a dead end for the company. "Quicken is a desktop-centric business and it doesn't strengthen the small business or tax ecosystems," said chief executive Brad Smith in a conference call with Wall Street last year. "Our strategy is focused on building ecosystems and platforms in the cloud."


Quicken's contributions to Intuit's bottom line have been minuscule: In the 12 months preceding the August announcement, Quicken, which starts at $35.10 (Amazon price), contributed just $51 million to the firm's total revenue of nearly $4.2 billion, or slightly more than 1%.

But the company pledged to find a buyer who would invest in the 33-year-old Quicken software. That buyer turned out to be H.I.G. Capital, a global private equity firm that manages some $19 billion.
Eric Dunn, the head of Quicken, announced the sale in amessage and video posted to Intuit's website.
"[H.I.G. is] confident, as am I, that Quicken will thrive with increased investment, leading to product improvements and advances that will allow Quicken to continue to serve you well for decades to come," Dunn said.


The sale, said Dunn, will allow Quicken to double the number of engineers working on the Mac version -- which has long lagged behind the Windowsedition in features and functionality -- and devote more resources to improving the program on the dominant platform, Windows.
"We all know that Quicken could use some TLC, some tender loving care, to be as great as it can be. I'm very aware that Quicken isn't perfect," said Dunn. "Quicken [for Windows] could probably use some attention to the fit and finish, the polish, usability, resilience and reliability."
Dunn has his work cut out for him.
In many ways, Quicken is software that users love to hate. With years of data in the company's proprietary format -- and few alternatives -- they not only feel trapped but also regularly rail about the product. Quicken's listing on ConsumerAffairs.com, the consumer advocacy organization's website, makes for dismal reading: The overall satisfaction rating is one star out of a possible five.

"Like many other Quicken users, I ran into problems with Quicken 2016," complained someone identified only as "John" last month on ConsumerAffairs.com. "Quicken has the worst customer service of any major company with which I have had to deal. Their representatives are uninformed and untrained in the most simple issues."
The sale was a management buyout: Dunn confirmed that he was a "significant personal investor in the transaction." How that will work out over the long term was, not surprisingly, unclear.
Typically, a private equity firm that has partly financed a management buyout -- in such deals, managers are required to make personal investments to guarantee that they have a vested interest in success -- wants out after several years to recoup their investment and, assuming the transition has worked, to take a profit. At that point, the firm may be in the hands of management; or the equity firm's stake could be sold to another buyer or investor.
H.I.G Capital has invested in other software or software-based services recently. In January, H.I.G. was among the investors that bankrolled the purchase of Salary.com, a Wellesley, Mass. firm that focuses on employee compensation data, software and services. That was a management buyout as well: Salary.com's founders bought the company from IBM, which had acquired it in 2012 as part of a larger purchase of Kenexa.
The Quicken sale is expected to close by April 30.

Ubuntu convergence finally impresses me

Image: Jack Wallen
It's taken me a long time to get on board the Ubuntu convergence train. I've been very pessimistic about the whole platform, based on the terrible state of Ubuntu Phone (as run on the Bq Aquaris handset).
But then, I happened to watch a video, by the wonderful people of XDADEVELOPERS, from Mobile World Congress, in which John Lee (of Canonical) demonstrates convergence with Ubuntu Phone running on an older Nexus 4 handset.

This video came just a week or so after Canonical made the first official announcement of a Ubuntu tablet to be released. This table will be manufactured by Bq and will be a part of the same Aquaris line as is their Ubuntu phone. The specs for the tablet aren't too shabby:
  • Display: 10.1-inch IPS touch display (1920×1200 pixel resolution at 240 ppi)
  • CPU: 64-bit MediaTek MT8163A 1.5GHz quad-core processor
  • RAM: 2GB of RAM
  • STORAGE: 16GB (micro SD memory card is included, adding storage expansion of up to 64GB)
All of this is fine and good...but up until now everything I have seen from Bq has been less than impressive

Let me explain.
However, after digging around a bit (and watching the above video from WMC), I realize that all the criticism tossed at Ubuntu Phone has been premature.
First and foremost, we get what convergence is. You use a single device for all your needs:
  • You carry your phone with you all day
  • You work on your phone
  • You plug your phone into a monitor and switch it to desktop mode
  • You work at your desk with your phone
  • You unplug your phone, switch it to phone mode
  • You go home
  • You plug your phone into your monitor at home and switch it to desktop mode
  • You play on your phone at home
  • Wash, rinse, repeat
For some of us, this doesn't make sense. Why? Because we're of an older mindset that precludes us from making a smartphone or tablet our only device. I do things that require some serious power (rendering videos and audio). But the truth of the matter is, a large percentage of people (especially of the millennial generation) have forsaken the tried and true form factor for their mobile devices. So when you consider this, convergence makes perfect sense. And, after watching the Canonical demo, the light goes off over my head and I can finally shout, "Ah ha!"

But what about...

The first question that comes to mind, when you consider this relative newcomer to the mobile space, is that of apps. As it stands, there are very few apps available for the Ubuntu Phone platform. To settle that issue, there is one thing you must consider:
Ubuntu Phone is still very much in development.
In fact, I would go so far as to say Canonical was quite premature in the releasing of devices. You see, this whole schmear isn't going to spread properly until Unity 8/Mir is released. At that point, everything changes. Once the Ubuntu desktop is in conjunction with the phone/tablet space, everything will be running the same platform, the same code. That is when things get interesting. When we finally see phone/tablet/desktop running the same release of Ubuntu, we'll see convergence finally work as it should. Why? Because all those apps we depend upon (LibreOffice, Audacity, Gimp, etc) will run on the convergent platform.
It should be noted, however, that the Bq Aquaris M10 will ship with LibreOffice, Mozilla Firefox, The GIMP and Gedit pre-installed. That's right, full-blown legacy apps running on the mobile platform. The current release date of the M10 is set for March, 2016.

Premature release of the platform

Lots of work still must be undertaken before this will come to fruition. That is why I believe Canonical was premature in releasing any devices. So far everyone has been less than kind to the Ubuntu Phone platform. What we really didn't understand (even though it was staring us in the eyes) was that we were seeing software very much in beta...maybe even alpha. It's a very rare occasion that a piece of beta software is ready for release. That was the disconnect. Ubuntu Phone has not (and is still not) ready for release.
The good news is that Unity 8/Mir are just around the corner. Canonical has given us every indication that Ubuntu 16.10 will ship with the new platform. I will, however, offer up this piece of advice. When Ubuntu 16.10 does ship (October, 2016), make sure Ubuntu Phone is ready to deliver on the promise of convergence...completely. If Canonical can pull off the full blown convergent experience (as in all legacy apps run on the platform), then they will have a major victory on their hands (as well as a platform ready for public consumption).
I hope this happens. Canonical and the Ubuntu Phone developers have been working tirelessly on this project and it needs (nay, deserves) a win of this magnitude.
Do you think Canonical's take on convergence will succeed? If not, why?

Friday, March 4, 2016

Are Your Kids The Latest Target Of Hackers?

The short answer is yes. V-Tech and Hello Kitty join the depressingly long list of companies to have been hacked in 2015. This time, however, the data taken were overwhelmingly about children – their usernames, passwords, addresses, birthdays, photos, and other personal information.
At first glance, you may be wondering why hackers would bother, but there are three major reasons for targeting toy companies. First, they are an easy target. V-tech representatives admit that the company’s security was subpar. Second, children tend to reuse passwords just like adults do, so getting a password for one site may unlock most, if not all the sites that child uses, and of course, some sites require payment for various features to be unlocked, or are purchasing portals, so the child’s information may inadvertently expose a parent’s credit or debit card information.
Third, and perhaps most chillingly, it could well be about the long game. A hacker need only wait until the child is old enough to get a credit card and then steal his or her identity. It’s not like it costs anything to store the data and wait, and given how easy it was to breach V-Tech and Hello Kitty’s security, that’s as good as being handed free money.
There are two tragedies rolled into one here. The first and most obvious is that not even our kids are safe from hackers, and nothing seems sacred to them. The second is that the breach could have been avoided. It’s not like V-Tech or Hello Kitty didn’t have ample warning or ample opportunity to protect themselves against such things. Online tech portals have been screaming from the rooftops all year about the dangers, and outlining the steps companies need to take if they want to be secure. V-Tech and Hello Kitty simply opted to do nothing with the information. That makes it somewhat difficult to feel sorry for them. They got lucky for a while, skating by with minimal security. Looks like their luck ran out. How’s security at your company? If you are unsure, a network audit is probably your best first course of action.

Thursday, March 3, 2016

IT Growth Outlook is Bright

With spending on hardware and software reaching record amounts, new research shows the IT industry's growth outlook has reached its highest level in five years.
Fueling the growth, according to the CDW IT Monitor, is the anticipated record-high demand for hardware and software investments. The data shows 80 percent of IT decision-makers are planning hardware spending, up 4 percentage points from October. Small businesses and local and state governments are expected to see the most significant increases.
Additionally, 82 percent of IT decision makers are anticipating making software purchases, up 7 percentage points.
Neal Campbell, senior vice president and chief marketing officer for CDW, said the data indicates that the IT spending outlook, first established in 2007, has reached a significant milestone.

"More IT decision-makers are feeling optimistic about the prospects of their IT budgets increasing, and they are anticipating significant IT investments in the next six months, especially on the hardware and software fronts," Campbell said. "We believe that organizations will continue to look at technology investments as ways to boost efficiencies, increase productivity and gain new competitive advantages in 2012."
Optimism regarding increased IT spending is the strongest among IT decision-makers in the health care, manufacturing and IT industries, according to the research.
The retail industry also continues to increase its investment optimism. IT leaders anticipate hardware and software purchases to increase by 3 and 9 percentage points, respectively, from October.
The CDW IT Monitor is based on surveys of more than 1,000 IT decision-makers representing all sizes of companies and multiple industries, across three levels of government.

Meet the Man Who Keeps Microsoft Safe and Secure

As the chief security officer for Microsoft, Mike Howard has more than a passing interest in the things he sees on the nightly news. Whether it's an uprising in the Middle East, the ongoing threat of terrorism or a natural disaster somewhere in the world, the former CIA officer is prepared for the impact various events could have on his company and its employees.
"Cybersecurity is a big issue on everyone's mind as we've become more globalized as a society and businesses have expanded their footprints and everything is digital," Howard said. "But, traditional security issues of theft, violence against employees, terrorism and natural disasters are all still paramount in terms of being the big security challenges for businesses."
This is especially true when your company is so large and so much in the public eye. Howard's security team is ultimately responsible for the safety and security of Microsoft's entire executive team, its 90,000 employees, roughly 90,000 contractors, 700 facilities in more than 100 countries worldwide and all of the visitors to those facilities. He's also responsible, of course, for all of their computers and hardware and the information it they contain.
The Microsoft security teams deals with threats of violence against executives and employees, employee violence, kidnapping threats, terrorism, natural disasters, property theft and, peripherally, intellectualproperty protection (which also falls under the purview of a separate, cybersecurity group at Microsoft).
Security "evangelist"
In Howard's time at the company, the security team has had to evacuate employees from Beirut and the Ivory Coast, has contracted forensic psychologists to examine threatening letters and regularly provides emailed safety information and warnings to all employees who travel overseas.
But it may be his role as an "evangelist" for the company's physical security business group that looms the largest in Howard's job description. Finding ways to communicate and demonstrate the importance of security — both physical and cyber — to the company's executives is the linchpin of developing a security program that manages to keep such a large and public company running smoothly, he said.
"A lot of [Microsoft's commitment to security] has to do with the evangelizing of security on several fronts within the last decade," Howard said. "My IT securitycounterpart and I have worked diligently to really get the movers and shakers, the decision makers here to understand security and to support those security efforts and the pushing down of that message throughout the enterprise."
Howard believes that his work driving home the importance of both physical and cybersecurity is part of the reason that Microsoft's company culture has come to reflect those values.
"We brief all new corporate vice presidents on security, we bring senior executives to the Global Security Operations Center in Redmond, [Wash.] and show them what technologies we employ to keep the company safe," Howard said. "We're not just guys checking doors and responding to emergencies."
Howard believes that Microsoft has come to understand what many companies never do: That cyber and physical security is integral to the company's overall business, and even its marketing plan.
"Security is important to the entire company," he said. "Intellectual property could be compromised and it can affect the company's brand reputation or lead to lawsuits," Howard said. "This realization led to cultural shift with company becoming more security conscious."
Employee assistance
To facilitate the rollout of solid security plans throughout the company, Howard's team has had to essentially deputize every employee to be the eyes and the ears of the company. Microsoft does that with a formal training program.
"Having a training program in place is essential to any security program," Howard said. "Without it, you don’t have a well-rounded security program. We have a certain amount of full-time employees and vendors to cover Microsoft globally; we could never cover the world adequately without educating and creating awareness programs that teach people what to look for."
Today, regular Microsoft employees are instructed to stop a stranger entering a building and ask to see their badge.
"That never would have happened ten years ago," Howard said.
Howard said that good security also involves working with the company's human resources department, which offers employee assistance programs that can help workers in difficult times and potentially prevent an employee problem from becoming a security threat.
"A robust employee assistance program is very important to security issues," he said. A bad economy, problems at home, even dealing with a sick relative can be things that can trigger security issues at work and having a team in place to help solve those problems can prevent them from ever turning into an incident of violence or theft, he said.


Small Business Cyberattacks Getting More Creative

CREDIT: Cyber attack image via Shutterstock 
Small businesses, government organizations and even online gamers were targeted last month by cybercriminals, new data shows.
Conducted by GFI Software, the study examined the most prevalent threat detections encountered in January, which included phishing emailsaimed at small business owners. The emails posed as notices from the Better Business Bureau and claimed a customer had filed a complaint against the recipient, but the notes actually contained links to malware created with the Blackhole exploit kit.
A number of government organizations were targeted by spoofed messages from the United States Computer Emergency Readiness Team, while gamers looking to score pirated release games [TK – What are release games? Do we mean access to these games before they are released?] fell victim to several different attacks that offered bogus beta invites in return for filling out surveys and recommending links on Facebook and Google+.
Chris Boyd, senior threat researcher at GFI Software, said anyone on the Internet is a potential target for cybercriminals looking to infect systems and scam users.
"They purposefully cast a wide net when picking their methods of attack in order to reach as many targets as possible," Boyd said. "Whether you are a young gamer, a successful business owner or a government employee, you need to be wary when clicking on links that appear to pertain to your interests, especially when asked to submit personal information online."
Malware writers and Internet scammers also sought to attack a wider cross-section of the population by creatively piggybacking on hot news topics and highly trafficked websites. An example is the shutdown of the file-hosting website Megaupload, which led to a domain typo scam targeting both regular users of the website and visitors interested in seeing the FBI notice posted on the site. Once victims reached the misspelled URL, they were redirected to various sites promising fake prizes and seeking personal information.
"While cybercriminals may not be picky about their choice of victims, their choice of tactics is anything but haphazard," Boyd said. "Cybercrime campaigns are designed to cripple systems and steal personal information."


Tuesday, October 29, 2013

Extend your Wi-Fi network throughout the house

                                         Extending a Wi-Fi network can be as easy as playing with cardboard and tape, or as difficult as rewiring your house. It all depends how big a boost you need, and how much time and money you're willing to devote to the task.
Here are three ways to increase your signal's range.

Boosters

You know those little antennas that screw onto your router? You can improve the signal by replacing them with bigger antennas, or more directional ones.
You can also improve the existing antenna, making it directional. All you need is a few minutes and some common household materials. See Extend Your Wi-Fi Range With a Parabolic Reflectorfor detailed instructions.
If you're not the do-it-yourself type, or if you need to boost the signal in all directions, you can buy a generic antenna for a few dollars. I've seen this same antenna (see image to the right) sold under different brand names--priced from $2 to $7. And yes, I've tried it and it helps…a bit.
For a more powerful boost than either of those, try the directionalTP-Link TL-ANT2409A. You can get it for $25 if you shop around.

Extenders

You plug one of these devices, also called repeaters, into a wall socket as far from the router as you can get and still receive a good signal. The extender picks up the signal and rebroadcasts it.
In general, I find these more effective than boosters. But they're also more expensive, and are trickier to set up, since you have to find the best location and connect them to the network.
The best one I've tested (and I haven't tested all that many) was theAmped Wireless REC10. If you look around, you can buy one for $70.In general, I find these more effective than boosters. But they're also more expensive, and are trickier to set up, since you have to find the best location and connect them to the network.

HomePlug

I used to be a fan of this technology, which carries network data over your house's electric wiring. The adapters are basically power bricks with Ethernet ports. Some also have Wi-Fi Antennas.
You won't have much trouble adding HomePlug to your network--you just plug it in and it works…if it works.
All sorts of things can interfere with HomePlug signals--wiring, the location of the washing machine, the type of light bulbs you use.
I used HomePlug happily for years. It didn't give me Ethernet speed or even 802.11n speed, but it was faster than my Internet connection and that was all that I needed. Then it just stopped working.




Thursday, October 3, 2013

Remote Network Access: Objectives and Architecture

In the this mini-series of posts, I am going to diverge from my usual System Center-only focus to take a fresh look at deploying a Microsoft Remote Network Access solution. First, we'll get you online and working using SSTP, and then extend this base implementation with Network Access protection before finally coming back a little later and elevating these SSTP servers to Direct Access.

Why Remote Network Access?

So why I am doing this? As we build out solutions for System Center, we need a foundation from which to work, and within the latest versions of Configuration Manager we have the ability to integrate with the Windows Network Access Protection and manage our off-site computers with a dial out approach over Direct Access. Also, in the new R2 releases we can integrate both our Certificate Servers (Certificate Authority – CAs) and we finally have the ability to distribute VPN Profiles to our end users. Therefore, I am considering this miniseries as a foundation for illustrating these features and abilities in later posts.
I am building this solution out using the recently published RTM builds of Windows Server 2012 R2, but almost everything I will cover in this series will work from 2008 R2, with some minor adjustments and wizard changes.

Architecture

The environment which we will use for the scenarios is illustrated in the graphic below, showing our client establishing a connection with the RRAS server over TCP443 or what you might better recognize as the HTTPS port. SSTP utilizes this same supporting environment, including the SSL certificates used to protect the tunnel.
I have tagged a number of the components with a  to indicate the initial systems which are engaged in the basic SSTP implementation, including the Network Policy Server (otherwise known as RADIUS), which is used to check the client's authorization to proceed with establishing the requested tunnel.
The remaining servers are added to the scenario as we enable the NAP services, including the Certification Authority, and as an example, a simple Windows Update Server to offer simple remediation to non-compliant clients.

Each of the servers are responsible for different roles in the overall solution. To get a brief understanding of what these are, let's take a quick look at their primary functions.
  • NPS Server – This hosts the Network Policy Services and Network Access Protection services. This server can also be referred to as the Radius Server. When we extend the solution with support for Network Access Protection, we will add a second role to this server called Health Replication Authority (HRA), which will connect to our Certificate Server to request and Issue health certificates
  • SSTP Server – This server hosts the actual Routing and Remote access installation. It will be configured to primarily offer SSTP-only tunnels, and it will connect to the NPS server for authentication and accounting (storing auditing) information, with the purpose of determining if the clients are indeed permitted to establish the tunnels
  • CA Servers  These host PKI certificate templates and issues certificates based on these templates to our systems. It is also responsible for issuing the Health Certificates via the Health Responsibility Authority. We will need to actually create the templates for these Health Certificates as part of the deployment.
  • Client Computers – These are domain-joined machines that will subscribe to the new SSTP service that we are implementing. SSTP is supported from Windows 7 and newer versions of the client. Non-domain-joined machines can of course work with SSTP, but for the scope of this mini-series I am focusing on domain-joined systems.

We now have the background and an idea of how the different servers will be used. Our next objective will be to implement this solution. Now would be a great time to get your environment ready and spin up some servers for the jobs we are about to face.

How to back up the registry in server

How to step by step back up of registry in server 2008, if you are editing in windows registry make sure you have backup of registry. If any problem occurs you can safely restore your registry. You can backup Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 by this method. Before create a backup you should login with administrator.

Follow these steps to backup registry:-

 1.      Click Start, and then click Run.

 2.      In the Open box, type "regedt32", and then click ok.


 3.      On the Registry menu, click Export.

 
4.      In the Save inbox, select a location in which to save the .reg file, type a file name in the File name box, and then click Save.

Tuesday, October 1, 2013

How to change the listening port for Remote Desktop

Remote desktop listening port 3389 is working by default in server 2008. You can change and define custom listening port for remote desktop. You can define port number between 1025 and 65535.

How to change the Remote Desktop listening port on Windows Server 2008?

You can change remote desktop listening port on server 2003, windows xp and windows 7 by same method.


  1. Click on Start and type “regedit” or you can press windows key + R to lunch run and type “regedit”  and press enter  Registry Editor will open.
 
  1. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber
  1. Select PortNumber and double click on it then click Decimal.
  2. Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389)
  3. Type the new port number, and then click OK.
  4. Quit Registry Editor.
  5. Restart the computer.
Now you can check form other computer start Remote Desktop Connection form start -> all programs -> accessories -> remote desktop connection.

Now type ip address with port of server (IP address:Custom port).


Troubleshooting 

Note When you try to connect to this computer by using the Remote Desktop connection, you must type the new port. Maybe you have to set the firewall to allow the new port number before you connect to this computer by using the Remote Desktop connection.


If you got this message “The remote computer requires Network Level Authentication, which your computer does not support. For assistance, contact your system administrator or technical support”