Tuesday, April 27, 2010
Monday, April 26, 2010
Recall sent item in Outlook
Have you ever clicked send by mistake or forget to attach your document? You can recall the message in outlook, here is how.
For Outlook 2003:
1. Go to the Sent Items folder.
2. Find the message you want recalled and double-click it.
3. Go to the Actions menu and select Recall This Message.
4. To recall the message:
Select Delete unread copies of this message.
(Note: the recipient needs to have Outlook opened for the message to be deleted)
To replace the message:
Select Delete unread copies and replace with a new message, click OK, and type your new message.
To be notified about the success of the recall or replacement:
Check the Tell me if recall succeeds or fails for each recipient check box.
5. Click OK.
How To Recall a Sent Message in Outlook 2007:
1. Click on Sent Items.
2. Find the message you want recalled and double-click it to open.
3. Go to the Ribbon.
4. In the Actions section, click Other Actions and select Recall This Message.
5. Select Delete unread copies of this message.
6. To be notified about the success of the recall, check the Tell me if recall succeeds or fails for each recipient checkbox.
7. Click OK.
If you would like more information on recalling email messages please contact us at info@mcdacre8tiveconsultinggroup.com
For Outlook 2003:
1. Go to the Sent Items folder.
2. Find the message you want recalled and double-click it.
3. Go to the Actions menu and select Recall This Message.
4. To recall the message:
Select Delete unread copies of this message.
(Note: the recipient needs to have Outlook opened for the message to be deleted)
To replace the message:
Select Delete unread copies and replace with a new message, click OK, and type your new message.
To be notified about the success of the recall or replacement:
Check the Tell me if recall succeeds or fails for each recipient check box.
5. Click OK.
How To Recall a Sent Message in Outlook 2007:
1. Click on Sent Items.
2. Find the message you want recalled and double-click it to open.
3. Go to the Ribbon.
4. In the Actions section, click Other Actions and select Recall This Message.
5. Select Delete unread copies of this message.
6. To be notified about the success of the recall, check the Tell me if recall succeeds or fails for each recipient checkbox.
7. Click OK.
If you would like more information on recalling email messages please contact us at info@mcdacre8tiveconsultinggroup.com
Thursday, April 22, 2010
Switching computers and don't want to lose your bookmarks?
Backing up your favorites is a very simple process.
You can keep a backup of your Favorites in case you accidentally delete any of your list. You can also use this backup to transfer your Favorites list to a different PC or another browser program.
Click on the File menu (in Internet Explorer 6,7,8 click the Add To Favorites button) then click Import and Export. You should see a window welcoming you to the Import and Export Wizard. Click Next, then select Export Favorites. Leave the main folder selected on the Export Favorites Source Folder screen and click Next.
Make sure Export to a File or Address is selected, then Browse to a location on your hard drive where you wish to store a copy of your Favorites list. Type a name for your backup, for example MyBookmarks and click Save. Click Next, then Finish and a window should tell you the export was successful.
The Favorites backup file is saved as a web page file and it can also be opened in your browser like a normal web page by double-clicking it. It will appear as a simple-looking web page containing your Favorites links.
Now that you are at a new machine or at a new browser you need to import!
To import a Favorites list, go back to the Import and Export Wizard. Choose Import Favorites, click Next, then make sure Import from a File or Address is selected. Browse to your saved Favorites file and click Next. On the Import Favorites Destination Folder screen, click Next then Finish.
You should see a message telling you your Favorites have been successfully imported from the backup file and it's as simple as that.
If you need assistance, contact us and we will be glad to help MCDA
You can keep a backup of your Favorites in case you accidentally delete any of your list. You can also use this backup to transfer your Favorites list to a different PC or another browser program.
Click on the File menu (in Internet Explorer 6,7,8 click the Add To Favorites button) then click Import and Export. You should see a window welcoming you to the Import and Export Wizard. Click Next, then select Export Favorites. Leave the main folder selected on the Export Favorites Source Folder screen and click Next.
Make sure Export to a File or Address is selected, then Browse to a location on your hard drive where you wish to store a copy of your Favorites list. Type a name for your backup, for example MyBookmarks and click Save. Click Next, then Finish and a window should tell you the export was successful.
The Favorites backup file is saved as a web page file and it can also be opened in your browser like a normal web page by double-clicking it. It will appear as a simple-looking web page containing your Favorites links.
Now that you are at a new machine or at a new browser you need to import!
To import a Favorites list, go back to the Import and Export Wizard. Choose Import Favorites, click Next, then make sure Import from a File or Address is selected. Browse to your saved Favorites file and click Next. On the Import Favorites Destination Folder screen, click Next then Finish.
You should see a message telling you your Favorites have been successfully imported from the backup file and it's as simple as that.
If you need assistance, contact us and we will be glad to help MCDA
Tuesday, April 20, 2010
Spammers attacking Gmail accounts
Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them to send spam messages.
The problem started about a week ago but seems to have escalated over the past few days.
"The Gmail team takes security very seriously and is investigating the reports we've seen in our user forums over the past few days," Google said Tuesday in an e-mailed statement. "We encourage users who suspect their accounts have been compromised to immediately change their passwords and to follow the advice at the following page: http://www.google.com/help/security/."
Gmail accounts are often compromised after phishing attempts or via malicious programs, which can seek out and log online credentials from a hacked computer.
It isn't clear what's behind this wave of Gmail compromises. But in forum posts, Gmail users note that the hackers appear to be sending spam via Gmail's mobile interface -- which gives mobile-phone users a way to check their Gmail accounts -- and wonder if there may be a bug in the mobile interface that is allowing criminals to send the spam.
Most of the victims are reporting that their accounts were accessed via the mobile interface when the spam was sent. They are reporting any security problems on their machines. Gmail users can check to see how their accounts were accessed at a given time by clicking on a "Details" button at the bottom of the Gmail page.
Google says there's no Gmail bug. "Our investigation has not given any indication of a bug in Gmail, either in the mobile interface or otherwise," the company said. "Spammers may sometimes use a mobile interface to access accounts they have already compromised because it's simpler for bots to use this method at large scale."
The New York Times reported Monday that Google's centralized login system, code-named Gaia, was compromised by hackers in late December. But this seems unrelated to the Gmail problem because of the different nature of the two incidents -- the December attack was a sophisticated attempt to steal data and intellectual property from Google; the Gmail spam is hardly sophisticated. It's being used to flog Canadian pharmaceutical Web sites that promise to send cheap drugs to U.S. customers.
Antispam vendor CloudMark noticed an uptick in Gmail-based pharmaceutical spam just a few days ago, according to Jamie Tomasello, the company's abuse operations manager. "We really saw this activity pick up on Friday and Saturday," she said via instant message.
Cassandra Robertson walked into a Gmail spam mess on Monday morning. "I noticed I had all these returned messages from people who were vaguely irate that I had sent them something that appeared to be spam," she said.
About 250 of her Gmail contacts received messages that contained a link to a Web site called Canadian Health&Care Mall, which offers Viagra for just $1.85 per pill.
That was embarrassing, said Robertson, a project manager with a Portland, Oregon, engineering firm. "I sent out that e-mail to everybody in my address book, which included people I had sent résumés to when I was job searching," she said.
"A lot of people were very savvy and said 'you've been hacked,' but some said, 'Why are you shilling for Viagra?'"
She has no idea how her account was compromised, but the spam was sent via a mobile connection from Serbia, she said.
The problem started about a week ago but seems to have escalated over the past few days.
"The Gmail team takes security very seriously and is investigating the reports we've seen in our user forums over the past few days," Google said Tuesday in an e-mailed statement. "We encourage users who suspect their accounts have been compromised to immediately change their passwords and to follow the advice at the following page: http://www.google.com/help/security/."
Gmail accounts are often compromised after phishing attempts or via malicious programs, which can seek out and log online credentials from a hacked computer.
It isn't clear what's behind this wave of Gmail compromises. But in forum posts, Gmail users note that the hackers appear to be sending spam via Gmail's mobile interface -- which gives mobile-phone users a way to check their Gmail accounts -- and wonder if there may be a bug in the mobile interface that is allowing criminals to send the spam.
Most of the victims are reporting that their accounts were accessed via the mobile interface when the spam was sent. They are reporting any security problems on their machines. Gmail users can check to see how their accounts were accessed at a given time by clicking on a "Details" button at the bottom of the Gmail page.
Google says there's no Gmail bug. "Our investigation has not given any indication of a bug in Gmail, either in the mobile interface or otherwise," the company said. "Spammers may sometimes use a mobile interface to access accounts they have already compromised because it's simpler for bots to use this method at large scale."
The New York Times reported Monday that Google's centralized login system, code-named Gaia, was compromised by hackers in late December. But this seems unrelated to the Gmail problem because of the different nature of the two incidents -- the December attack was a sophisticated attempt to steal data and intellectual property from Google; the Gmail spam is hardly sophisticated. It's being used to flog Canadian pharmaceutical Web sites that promise to send cheap drugs to U.S. customers.
Antispam vendor CloudMark noticed an uptick in Gmail-based pharmaceutical spam just a few days ago, according to Jamie Tomasello, the company's abuse operations manager. "We really saw this activity pick up on Friday and Saturday," she said via instant message.
Cassandra Robertson walked into a Gmail spam mess on Monday morning. "I noticed I had all these returned messages from people who were vaguely irate that I had sent them something that appeared to be spam," she said.
About 250 of her Gmail contacts received messages that contained a link to a Web site called Canadian Health&Care Mall, which offers Viagra for just $1.85 per pill.
That was embarrassing, said Robertson, a project manager with a Portland, Oregon, engineering firm. "I sent out that e-mail to everybody in my address book, which included people I had sent résumés to when I was job searching," she said.
"A lot of people were very savvy and said 'you've been hacked,' but some said, 'Why are you shilling for Viagra?'"
She has no idea how her account was compromised, but the spam was sent via a mobile connection from Serbia, she said.
Monday, April 19, 2010
Open Network Connections List in Windows 7 or Vista
One of the biggest annoyances for me in Windows 7 or Vista is that you can’t immediately open the Network Connections list to see the list of adapters like you could in XP.
In Windows XP, you could right-click any network connection and select “Open Network Connections”, but in Windows Vista, the only option you have is to open the Network and Sharing Center via the same right-click menu.
To immediately open the connection list, you can just type ncpa.cpl into the Start menu search box:
And up pops the network connection list just like I’m used to:
You can also create a shortcut somewhere to the full file path if you want even easier access.
Just use C:\windows\system32\ncpa.cpl as the location of the shortcut.
Note that we’ve also tested this on Windows 7 as well.
In Windows XP, you could right-click any network connection and select “Open Network Connections”, but in Windows Vista, the only option you have is to open the Network and Sharing Center via the same right-click menu.
To immediately open the connection list, you can just type ncpa.cpl into the Start menu search box:
And up pops the network connection list just like I’m used to:
You can also create a shortcut somewhere to the full file path if you want even easier access.
Just use C:\windows\system32\ncpa.cpl as the location of the shortcut.
Note that we’ve also tested this on Windows 7 as well.
Friday, April 16, 2010
Alright, alright....here is another prank you can play
I got a pretty good response to the last prank so here is another one for you. This is good to do if you have an IT guy on your staff that you would like to bug the crap out of.
Setup is simple and you need only a few seconds to set it all up. When you get a chance, right-click on your Internet Explorer or some other commonly used program. Edit the properties and change the target to: “%windir%\system32\shutdown.exe -r -t 00″ Every time you click on that program the computer will restart. You can see how long it takes your IT guy to figure out the problem and laugh at his frustrations.
I am evil, I know....but you all asked for another fun prank...so there you go.
Setup is simple and you need only a few seconds to set it all up. When you get a chance, right-click on your Internet Explorer or some other commonly used program. Edit the properties and change the target to: “%windir%\system32\shutdown.exe -r -t 00″ Every time you click on that program the computer will restart. You can see how long it takes your IT guy to figure out the problem and laugh at his frustrations.
I am evil, I know....but you all asked for another fun prank...so there you go.
Thursday, April 15, 2010
Apple Ipad
First of all, pretty cool little gadget here! I was able to demo the product and give a review which you will see soon. After playing around on it for quite some time, it was covered in finger prints and smudge marks and I wanted to return in to my friend nice and clean. I did some research on the proper way to clean it and was surprised by some of the results so I thought I would share.
How to Clean Your iPad
Apple recommends cleaning your iPad in one particular approach through the iPad User Guide (iPad Only Link) that can be found as a bookmark in Safari on your iPad.
They suggest to clean the iPad:
unplug all cables and disconnect the iPad from any accessories or docks
Turn off the iPad by holding the Sleep/Wake button and sliding the onscreen slider off
Use a soft, slightly damp cloth but be sure to not allow moisture in any openings in the iPad
DO NOT use window cleaners. These can damage the oleo phobic coating on the iPad screen and reduce the functionality of the iPad over time
Wipe the iPad in a circular motion and be sure that no sand, dirt, or dust is on the cloth used to whip the screen
The iPad Screen coating is designed to repel oil. That may be why finger prints show up so quickly on the screen. You can easily wipe them off with the lint-free cloth and have the iPad screen looking new and clean again.
I would recommend that you invest in some sort of Ipad case, this will prevent damage to the screen or the back of the unit as well. I do recommend that if you want something to play around with at the house to check email, etc. an Ipad is worth the few hundred bucks.
For more information on this product contact me at www.mcdacre8tiveconsultinggroup.com
How to Clean Your iPad
Apple recommends cleaning your iPad in one particular approach through the iPad User Guide (iPad Only Link) that can be found as a bookmark in Safari on your iPad.
They suggest to clean the iPad:
unplug all cables and disconnect the iPad from any accessories or docks
Turn off the iPad by holding the Sleep/Wake button and sliding the onscreen slider off
Use a soft, slightly damp cloth but be sure to not allow moisture in any openings in the iPad
DO NOT use window cleaners. These can damage the oleo phobic coating on the iPad screen and reduce the functionality of the iPad over time
Wipe the iPad in a circular motion and be sure that no sand, dirt, or dust is on the cloth used to whip the screen
The iPad Screen coating is designed to repel oil. That may be why finger prints show up so quickly on the screen. You can easily wipe them off with the lint-free cloth and have the iPad screen looking new and clean again.
I would recommend that you invest in some sort of Ipad case, this will prevent damage to the screen or the back of the unit as well. I do recommend that if you want something to play around with at the house to check email, etc. an Ipad is worth the few hundred bucks.
For more information on this product contact me at www.mcdacre8tiveconsultinggroup.com
Tuesday, April 13, 2010
Recording a barter transaction in Quickbooks
This is a good tip on barter transactions.....we used this tip to help out a family member who owns his own small construction business.
If you have customers who are also vendors you may decide to trade some or all of your services / products in exchange for payment.
To record such a barter transaction, invoice the customer for the goods provided or services performed as you normally would. To record the "payment" use the "Receive Payment" function to apply the barter amount against the invoice the same as you would when receiving cash or a check as follows:
Go to Customers: Receive Payment. Payment Amount will be the barter amount (the amount of the invoice you received from your vendor). Pmt. Method will be Barter. Check the radio button for "Group with other undeposited funds". Save this transaction.
Go to Banking: Make Deposits. The payment you just received will come up in the Payments to Deposit screen. If there are also other payments to deposit, make sure you select only the payment(s) being recorded for the barter exchange. When you hit OK the Make Deposits screen will come up with the barter deposit(s) showing. Before recording the deposit make a negative deposit entry on the next blank line below the barter deposit for the amount of the barter as follows:
Deposit To is your normal operating checking account. Date is the date you would have normally paid your vendors invoice. Memo should be changed from Deposit to Barter.
If you have entered the vendors invoice as a bill for payment, Received From is the vendor name and From Account is Accounts Payable.
If you have not entered the vendors invoice as a bill for payment, leave Received From blank. In the From Account column select the expense account you would charge the vendors invoice to, the same as if you were entering it for payment. In the Memo column note the vendors invoice number.
In the Amount column enter the vendors invoice amount with a negative sign first. This negative amount should exactly offset the deposit amount above, resulting in a "Zero" deposit transaction. Save the "deposit" and the transaction is complete.
For help with quickbooks or any other financial situation please contact us at www.mcdacre8tiveconsultinggroup.com
If you have customers who are also vendors you may decide to trade some or all of your services / products in exchange for payment.
To record such a barter transaction, invoice the customer for the goods provided or services performed as you normally would. To record the "payment" use the "Receive Payment" function to apply the barter amount against the invoice the same as you would when receiving cash or a check as follows:
Go to Customers: Receive Payment. Payment Amount will be the barter amount (the amount of the invoice you received from your vendor). Pmt. Method will be Barter. Check the radio button for "Group with other undeposited funds". Save this transaction.
Go to Banking: Make Deposits. The payment you just received will come up in the Payments to Deposit screen. If there are also other payments to deposit, make sure you select only the payment(s) being recorded for the barter exchange. When you hit OK the Make Deposits screen will come up with the barter deposit(s) showing. Before recording the deposit make a negative deposit entry on the next blank line below the barter deposit for the amount of the barter as follows:
Deposit To is your normal operating checking account. Date is the date you would have normally paid your vendors invoice. Memo should be changed from Deposit to Barter.
If you have entered the vendors invoice as a bill for payment, Received From is the vendor name and From Account is Accounts Payable.
If you have not entered the vendors invoice as a bill for payment, leave Received From blank. In the From Account column select the expense account you would charge the vendors invoice to, the same as if you were entering it for payment. In the Memo column note the vendors invoice number.
In the Amount column enter the vendors invoice amount with a negative sign first. This negative amount should exactly offset the deposit amount above, resulting in a "Zero" deposit transaction. Save the "deposit" and the transaction is complete.
For help with quickbooks or any other financial situation please contact us at www.mcdacre8tiveconsultinggroup.com
Monday, April 12, 2010
Display a legal message or any other message when windows starts
If you would like to display a legal message or any other message in a pop-up window when windows starts read below:
Start>Run>regedit
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Modify the key legalnoticecaption with what you want to name the window.
Modify the key legalnoticetext with what you want the window to say.
Restart.
We can install this as a server function if you would like to deploy this as a company wide policy on all user computers. We just helped a client deploy this out to 100+ users to be in compliance with their ITAR regulations. For more information contact us at www.mcdacre8tiveconsultinggroup.com
Start>Run>regedit
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Modify the key legalnoticecaption with what you want to name the window.
Modify the key legalnoticetext with what you want the window to say.
Restart.
We can install this as a server function if you would like to deploy this as a company wide policy on all user computers. We just helped a client deploy this out to 100+ users to be in compliance with their ITAR regulations. For more information contact us at www.mcdacre8tiveconsultinggroup.com
Friday, April 9, 2010
Shutting off check disk at startup
Does your computer run through a check disk every time you computer starts up? We will be helping a client tomorrow resolve this issue. It is a simple process to shut it off, there are actually multiple ways to do it, but here is a simple way.
Method 1: Using CHKNTFS utility
CHKNTFS is a utility that has been developed by Microsoft to disable disk checking on certain drives at Windows startup. To use this utility go to Start –> Run –> cmd.
If you want to disable check disk on C: drive, use the following command on command prompt.
chkntfs /X C:
If you want to disable check disk on two or more drives, just keep on adding the drives:
chkntfs /X C: D: E:
This will disable check disk on C, D and E drives.
If you want to restore what you have done, that is, enable automatic disk checking on all the drives again, just run the following command:
chkntfs /D
This will restore all the drives to automatic disk checkup.
Method 1: Using CHKNTFS utility
CHKNTFS is a utility that has been developed by Microsoft to disable disk checking on certain drives at Windows startup. To use this utility go to Start –> Run –> cmd.
If you want to disable check disk on C: drive, use the following command on command prompt.
chkntfs /X C:
If you want to disable check disk on two or more drives, just keep on adding the drives:
chkntfs /X C: D: E:
This will disable check disk on C, D and E drives.
If you want to restore what you have done, that is, enable automatic disk checking on all the drives again, just run the following command:
chkntfs /D
This will restore all the drives to automatic disk checkup.
Thursday, April 8, 2010
Locking your computer
It is always a good idea to lock your computer when you are away from it. You can do the traditional WinKey+L and it will lock it, or you can create a desktop icon to click on.
This is a cool little tool to lock your computer faster.....try it out.
Right-click on your desktop > New > Shortcut
In Location box, type (or copy/paste)
%windir%\System32\rundll32.exe user32.dll,LockWorkStation
Click Next. Give a name box type a name for the shortcut (i.e. Lock Computer)
Click Finish.
Then select an appropriate icon for it and you are done.
This is a cool little tool to lock your computer faster.....try it out.
Right-click on your desktop > New > Shortcut
In Location box, type (or copy/paste)
%windir%\System32\rundll32.exe user32.dll,LockWorkStation
Click Next. Give a name box type a name for the shortcut (i.e. Lock Computer)
Click Finish.
Then select an appropriate icon for it and you are done.
Wednesday, April 7, 2010
How about a practical joke....
I have been posting a lot of fixes, tips, etc... Time for a good joke that you can pull on a collegue. When he/she is away from their desk hold down the alt key, then the ctrl key and press the down cursor key. The screen will temporarily switch off, when it comes back on the screen will be upside down!
I think this will only work on XP.
To get the screen back just repeat the process with the up cursor.
To make it even funnier tell the person that this is a keyboard fault, hold the relevant keys in to switch the screen back and bang the keyboard on the desk, the screen will switch back. When your work colleague moves from his/her desk again switch it back, sit back and enjoy as they bang the keyboard on the desk!!!
I think this will only work on XP.
To get the screen back just repeat the process with the up cursor.
To make it even funnier tell the person that this is a keyboard fault, hold the relevant keys in to switch the screen back and bang the keyboard on the desk, the screen will switch back. When your work colleague moves from his/her desk again switch it back, sit back and enjoy as they bang the keyboard on the desk!!!
Tuesday, March 30, 2010
Calibrate your display in Windows 7
I have received at least 2 or 3 calls about the graphics on Windows 7 not being clean and clear. There is no difference really, they didn't do anything crazy between XP/Vista and Windows 7. If you would like to calibrate your display to make sure you are getting the picture you desire try this out, its a cool little tool.
Windows 7 includes a new tool to help you calibrate the correct gamma, contrast, brightness and color settings for your specific display.
Just click on the Start Button and type in dccw and hit Enter.
Then follow the on screen directions and adjust the sliders so that the test picture look like the “Good” sample picture.
Windows 7 includes a new tool to help you calibrate the correct gamma, contrast, brightness and color settings for your specific display.
Just click on the Start Button and type in dccw and hit Enter.
Then follow the on screen directions and adjust the sliders so that the test picture look like the “Good” sample picture.
Thursday, March 25, 2010
Can you recover a deleted mailbox in exchange 2003?
We recently helped a client who deleted a mailbox in Exchange 2003, and they were nervous that they could not recover that information.
The answer is YES, you can recover it!!!
Remember, in Exchange 2003 and even in Exchange 2000, if you delete a mailbox, it really isn't deleted. The mailbox goes into a disconnected state for a default of 30 days. This period of 30 days is called the mailbox retention period, and you can reconnect the mailbox during that 30 days. At the end of the 30 day mailbox retention period the mailbox is then deleted and completely purged from the system. You can also delete the mailbox by choosing the purge it at any time.
This also means that if you mistakenly delete a mail-enabled user account, you can recreate that user object, and then reconnect that mailbox during the mailbox retention period. You should configure the deleted mailbox retention period at the mailbox store object level.
To Delete a Mailbox in Exchange 2000/2003:
1.Right-click the user in Active Directory Users and Computers.
2.Click Exchange Tasks.
3.Click Next on the Welcome page of the Exchange Task Wizard.
4.Click Delete Mailbox.
5.Click Next, click Next, and then click Finish. The mailbox is now flagged for deletion and will be permanently deleted at the end of the mailbox retention period unless you recover it.
To Reconnect (or Recover) a Deleted Mailbox:
1.In Exchange System Manager, locate the mailbox store that contains the disconnected mailbox.
2.Click the Mailboxes object under the mailbox store.
3.If the mailbox is not already marked as disconnected (the mailbox icon appears with a red X), right-click the Mailboxes object, and then click Cleanup Agent.
4.Right-click the disconnected mailbox, and then click Reconnect. Pick the appropriate user from the dialog box that appears.
5.Click OK. Now you see that the old mailbox is no longer listed under the name of the old user. Instead it has the name of the user it was reconnected to.
Note: Only one user may be connected to a mailbox because all globally unique identifiers (GUIDs) are required to be unique across an entire forest.
To Configure the Mailbox Retention Period:
1.Right-click the mailbox store, and then click Properties.
2.On the Limits tab, change the Keep deleted mailboxes for (days) default setting of 30 to the number of days you want.
3.Click OK.
If you would like assistance with recovering exchange mailboxes or configuring your active directory, contact us at MCDA Cre8tive Consulting Group, Inc and we will be more than happy to assist you.
The answer is YES, you can recover it!!!
Remember, in Exchange 2003 and even in Exchange 2000, if you delete a mailbox, it really isn't deleted. The mailbox goes into a disconnected state for a default of 30 days. This period of 30 days is called the mailbox retention period, and you can reconnect the mailbox during that 30 days. At the end of the 30 day mailbox retention period the mailbox is then deleted and completely purged from the system. You can also delete the mailbox by choosing the purge it at any time.
This also means that if you mistakenly delete a mail-enabled user account, you can recreate that user object, and then reconnect that mailbox during the mailbox retention period. You should configure the deleted mailbox retention period at the mailbox store object level.
To Delete a Mailbox in Exchange 2000/2003:
1.Right-click the user in Active Directory Users and Computers.
2.Click Exchange Tasks.
3.Click Next on the Welcome page of the Exchange Task Wizard.
4.Click Delete Mailbox.
5.Click Next, click Next, and then click Finish. The mailbox is now flagged for deletion and will be permanently deleted at the end of the mailbox retention period unless you recover it.
To Reconnect (or Recover) a Deleted Mailbox:
1.In Exchange System Manager, locate the mailbox store that contains the disconnected mailbox.
2.Click the Mailboxes object under the mailbox store.
3.If the mailbox is not already marked as disconnected (the mailbox icon appears with a red X), right-click the Mailboxes object, and then click Cleanup Agent.
4.Right-click the disconnected mailbox, and then click Reconnect. Pick the appropriate user from the dialog box that appears.
5.Click OK. Now you see that the old mailbox is no longer listed under the name of the old user. Instead it has the name of the user it was reconnected to.
Note: Only one user may be connected to a mailbox because all globally unique identifiers (GUIDs) are required to be unique across an entire forest.
To Configure the Mailbox Retention Period:
1.Right-click the mailbox store, and then click Properties.
2.On the Limits tab, change the Keep deleted mailboxes for (days) default setting of 30 to the number of days you want.
3.Click OK.
If you would like assistance with recovering exchange mailboxes or configuring your active directory, contact us at MCDA Cre8tive Consulting Group, Inc and we will be more than happy to assist you.
Thursday, March 11, 2010
Quickbooks Situation
Situation - You need to write a refund check for an upfront deposit for a job (order) that was cancelled.
Here is a tip that might be able to help you out.
1. Create an invoice for the customer.
2. On the invoice, enter the item for the cancelled project or work.
3. Create a credit memo for the entire amount of the deposit.
4. Apply the credit to the invoice
5. Open the credit memo again and from there create a refund check (use a liability account under the EXPENSES tab.
If you have problems or this is not resolving your issue, please call us at MCDA Cre8tive Consulting Group, Inc. and one of our talented consultants will be happy to assist you.
Here is a tip that might be able to help you out.
1. Create an invoice for the customer.
2. On the invoice, enter the item for the cancelled project or work.
3. Create a credit memo for the entire amount of the deposit.
4. Apply the credit to the invoice
5. Open the credit memo again and from there create a refund check (use a liability account under the EXPENSES tab.
If you have problems or this is not resolving your issue, please call us at MCDA Cre8tive Consulting Group, Inc. and one of our talented consultants will be happy to assist you.
Saturday, February 20, 2010
Deleting Drop Down Addresses in Outlook
Do you use MS Outlook for e-mail?
Ever notice that as you type in an address to send an e-mail, a short AutoComplete list of recently used addresses is displayed?
Now, my question is, have you ever accidentally sent an e-mail to a bad address and then later, you've seen that same bad address on the AutoComplete list over and over again?
Wish you could remove it from that list altogether?
No problem. Two quick steps and you can say bye bye to that wrong address.
Step 1: Use the up or down arrow to select the bad address.
Step 2: Hit the Delete key on the keyboard.
It is as simple as that!
If you are having computer trouble, please contact MCDA Cre8tive Consulting Group, Inc. today!
Ever notice that as you type in an address to send an e-mail, a short AutoComplete list of recently used addresses is displayed?
Now, my question is, have you ever accidentally sent an e-mail to a bad address and then later, you've seen that same bad address on the AutoComplete list over and over again?
Wish you could remove it from that list altogether?
No problem. Two quick steps and you can say bye bye to that wrong address.
Step 1: Use the up or down arrow to select the bad address.
Step 2: Hit the Delete key on the keyboard.
It is as simple as that!
If you are having computer trouble, please contact MCDA Cre8tive Consulting Group, Inc. today!
Thursday, February 4, 2010
Switching back to the Classic Start Menu (VISTA)
One of the biggest changes in Windows Vista is the complete redesign of the Start Menu. While this change is a good thing for some people, others prefer to use the old style Start Menu. In this tutorial we will show you how to enable and configure the classic version of the Start Menu.
The procedure is very simple. Just follow these steps:
First, right click on the taskbar and select Properties.
The Taskbar and Start Menu Properties window will open. Here, go to the Start Menu tab and check the Classic Start Menu option. If you want to customize the items that appear in the Start Menu, click the Customize... button. If you don't want to customize anything, just press the OK button.
In the Customize Classic Start Menu window you have lots of configuration options: you can add or remove start menu items, you can sort them or you can enable special shortcuts like the Run or Log Off buttons.
Feel free to experiment with all the available options. When you have finished, press the OK button.
Now the Windows Vista Start Menu will look just like on the older versions of Windows.
The procedure is very simple. Just follow these steps:
First, right click on the taskbar and select Properties.
The Taskbar and Start Menu Properties window will open. Here, go to the Start Menu tab and check the Classic Start Menu option. If you want to customize the items that appear in the Start Menu, click the Customize... button. If you don't want to customize anything, just press the OK button.
In the Customize Classic Start Menu window you have lots of configuration options: you can add or remove start menu items, you can sort them or you can enable special shortcuts like the Run or Log Off buttons.
Feel free to experiment with all the available options. When you have finished, press the OK button.
Now the Windows Vista Start Menu will look just like on the older versions of Windows.
Wednesday, February 3, 2010
Encrypt Removable USB Drives (Windows 7)
Encrypting an USB drive has never been easier. Now you can right click on the removable drive and then on the “Turn on Bitlocker”.
This is a very nice tool to use and works quite well. If you store any sort of sensitive data on your USB flash drive, use this tool.
If you need any assistance with upgrading to Windows 7 or doing further encryption on your system contact MCDA today!
This is a very nice tool to use and works quite well. If you store any sort of sensitive data on your USB flash drive, use this tool.
If you need any assistance with upgrading to Windows 7 or doing further encryption on your system contact MCDA today!
Thursday, January 21, 2010
Batch File to start a program when you start your computer
Every time I startup my computer it is usually so I can start the same program, which in my case is FrontPage. I update my webpage everyday so I decided to create a batch file to start this program automatically at startup so it is always ready for me to use.
Here's how to write a simple batch file to start a program when you start your computer:
Open notepad. It is located at Start Menu>All Programs>Accessories>Notepad (Windows XP)
Then type start frontpg.exe
Choose File from the menu above. Then choose Save As
Navigate to save on the desktop and type the file name in with .bat filename extension. I have called mine startup.bat
Now you can double click on it on the desktop to test if it opens FrontPage.
Now If you want to automatically start this batch file when you start your computer then follow these steps:
Right click on the Start Menu in the bottom left corner. Choose open
Open the Programs folder, then The Startup Folder.
Copy your file from the desktop and paste it in the Startup folder.
Now when you start your computer, your program will automatically start for you. You do not even have to press on the batch file to start your program.
Keep in mind that you will be automatically starting a program when you computer starts, so startup will take a few seconds longer.
If you would like assistance with creating batch files, please contact MCDA today and a tech will be glad to help you out.
Here's how to write a simple batch file to start a program when you start your computer:
Open notepad. It is located at Start Menu>All Programs>Accessories>Notepad (Windows XP)
Then type start frontpg.exe
Choose File from the menu above. Then choose Save As
Navigate to save on the desktop and type the file name in with .bat filename extension. I have called mine startup.bat
Now you can double click on it on the desktop to test if it opens FrontPage.
Now If you want to automatically start this batch file when you start your computer then follow these steps:
Right click on the Start Menu in the bottom left corner. Choose open
Open the Programs folder, then The Startup Folder.
Copy your file from the desktop and paste it in the Startup folder.
Now when you start your computer, your program will automatically start for you. You do not even have to press on the batch file to start your program.
Keep in mind that you will be automatically starting a program when you computer starts, so startup will take a few seconds longer.
If you would like assistance with creating batch files, please contact MCDA today and a tech will be glad to help you out.
Wednesday, January 13, 2010
Cash Management Tips for Small Business Owners
Are you struggling to effectively achieve cash management with your small business? As a small business realize that in the unhealthy economy medium and large scale enterprises are struggling to cut back on the expenditures as well.
Reducing expenses is just the tip of the iceberg, small businesses need to compete and offer the lowest prices with the best service. To have to ability to do that -- good cash management is a must.
We have a few tips that will help you save money and help manage your business cash flow. You can also use these tips to better manage your home expenses.
Key things to watch
1. Energy Consumption
2. Save on your ink
3. Telephone and Mobile phone costs
4. Assess office space
5. Use the Internet
6. Save on lighting
7. Buy in bulk
For more detailed information on these items please feel free to contact us at (714) 872-2393 or at MCDA Cre8tive Consulting Group, Inc.
Reducing expenses is just the tip of the iceberg, small businesses need to compete and offer the lowest prices with the best service. To have to ability to do that -- good cash management is a must.
We have a few tips that will help you save money and help manage your business cash flow. You can also use these tips to better manage your home expenses.
Key things to watch
1. Energy Consumption
2. Save on your ink
3. Telephone and Mobile phone costs
4. Assess office space
5. Use the Internet
6. Save on lighting
7. Buy in bulk
For more detailed information on these items please feel free to contact us at (714) 872-2393 or at MCDA Cre8tive Consulting Group, Inc.
Monday, January 11, 2010
Hyperlinks stop working in outlook or word?
I hate when I receive a document with hyperlinks in them and can't just click on the link! I have to copy and paste the link in IE and go from there.
Fortunately, there is a quick fix to this problem.
To fix this problem, follow these steps:
Click Start, click Run, type the following command in the Run dialog box, and then click OK:
regsvr32 urlmon.dll
Repeat step 1 for each of the following commands:
regsvr32 mshtml.dll
regsvr32 shdocvw.dll
regsvr32 browseui.dll
regsvr32 msjava.dll
Once you complete that, you will be able to click on hyperlinks with no problem. I recommend that you make a backup of your registry just in case you type something wrong.
If you would like help with this, contact us at MCDA and we will gladly do it for you!
Fortunately, there is a quick fix to this problem.
To fix this problem, follow these steps:
Click Start, click Run, type the following command in the Run dialog box, and then click OK:
regsvr32 urlmon.dll
Repeat step 1 for each of the following commands:
regsvr32 mshtml.dll
regsvr32 shdocvw.dll
regsvr32 browseui.dll
regsvr32 msjava.dll
Once you complete that, you will be able to click on hyperlinks with no problem. I recommend that you make a backup of your registry just in case you type something wrong.
If you would like help with this, contact us at MCDA and we will gladly do it for you!
Saturday, January 9, 2010
Quickbooks Tip
Earlier this week, we helped a small business owner with this same issue!
Recovering lost user passwords or changing user privileges
1. Log in as the Administrator.
2. From the QuickBooks Company menu, choose Set Up Users.
3. Select the appropriate name from the User List, and then click Edit User.
4. Delete or change the password in the Password and Confirm Password text boxes, and then click Next.
5. Verify the correct access level is selected and then click Next.
6. If the user has access to selected areas of QuickBooks and you want to modify the choices, continue through each window, making changes as needed. If the access permissions are correct, or if the user has access to all areas of QuickBooks, click Finish, and then click Close in the User List.
7. From the File menu, choose Open Company/Login.
8. Choose the correct company name and then click Open.
9. Type the user name and password and then click OK.
10. Users can change their passwords by choosing Change Your Password from the Company menu.
If you are having problems or just have a question about Quickbooks, call us today!MCDA Cre8tive Consulting Group, Inc
Recovering lost user passwords or changing user privileges
1. Log in as the Administrator.
2. From the QuickBooks Company menu, choose Set Up Users.
3. Select the appropriate name from the User List, and then click Edit User.
4. Delete or change the password in the Password and Confirm Password text boxes, and then click Next.
5. Verify the correct access level is selected and then click Next.
6. If the user has access to selected areas of QuickBooks and you want to modify the choices, continue through each window, making changes as needed. If the access permissions are correct, or if the user has access to all areas of QuickBooks, click Finish, and then click Close in the User List.
7. From the File menu, choose Open Company/Login.
8. Choose the correct company name and then click Open.
9. Type the user name and password and then click OK.
10. Users can change their passwords by choosing Change Your Password from the Company menu.
If you are having problems or just have a question about Quickbooks, call us today!MCDA Cre8tive Consulting Group, Inc
Friday, January 8, 2010
Do you hate the startup and shutdown music in XP or Vista?
Well I do! LOL
Here is a cool and easy way to change your start up and shutdown music!
It’s a simple 4 step process. Step 1. Choose music that you would like to play at both startup and shutdown. XP and Vista have a little jingle. You do need to pick something that is in .WAV format, or use a converter to switch it to .WAV. The size of file should not be large, try to keep it to 1MB or less. You can upload a larger file, but your boot time will increase.
Step 2. Now rename these files as “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV” respectively.
Step 3. Navigate to “C:\WINDOWS\MEDIA”, here you will find files “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV”, move them to another folder or rename them in case you need to revert back to these sounds. If you don't care about restoring the original sounds, you can just ignore this step.
Step 4. Now take the files that you have chosen and renamed, just copy-paste or cut paste them in “C:\WINDOWS\MEDIA”, there you go, now you can enjoy the new Start-up and shutdown music of your choice!
To set your computer up with a bunch of cool stuff, call us.... MCDA Cre8tive Consulting Group, Inc.
Here is a cool and easy way to change your start up and shutdown music!
It’s a simple 4 step process. Step 1. Choose music that you would like to play at both startup and shutdown. XP and Vista have a little jingle. You do need to pick something that is in .WAV format, or use a converter to switch it to .WAV. The size of file should not be large, try to keep it to 1MB or less. You can upload a larger file, but your boot time will increase.
Step 2. Now rename these files as “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV” respectively.
Step 3. Navigate to “C:\WINDOWS\MEDIA”, here you will find files “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV”, move them to another folder or rename them in case you need to revert back to these sounds. If you don't care about restoring the original sounds, you can just ignore this step.
Step 4. Now take the files that you have chosen and renamed, just copy-paste or cut paste them in “C:\WINDOWS\MEDIA”, there you go, now you can enjoy the new Start-up and shutdown music of your choice!
To set your computer up with a bunch of cool stuff, call us.... MCDA Cre8tive Consulting Group, Inc.
Thursday, January 7, 2010
Tip for speeding up your computer (Vista)
Move Search Index to a Different Physical Drive and speed up Windows Vista
What is the search index you ask? Well, similar to the way the index in a book helps you to keep track of its contents, the index in Windows keeps track of the files on your computer. The index stores information about files, including the file name, date modified, and properties like author, tags, and rating. You will never see the index, but it is used by Windows to perform very fast searches of the most common files on your computer. In the taskbar on the bottom right of your screen you might see a magnifying glass, that is the search index working.
If you have more than one physical drive in your computer, this tip is for you. The search index can take a considerable toll on your systems drive; by moving the index to a separate drive, you can increase overall performance.
To move your search index, do the following:
1. Press Start, type index in the search bar and press Enter
2. Press the Advanced button
3. Press Select new at the bottom and select a new location on a different physical hard drive
4. Press OK. Your search index will now need to rebuild, which may temporarily slow performance.
Need help speeding up your computer or completing this fix in XP, Call us at MCDA and we will send a tech right over!
What is the search index you ask? Well, similar to the way the index in a book helps you to keep track of its contents, the index in Windows keeps track of the files on your computer. The index stores information about files, including the file name, date modified, and properties like author, tags, and rating. You will never see the index, but it is used by Windows to perform very fast searches of the most common files on your computer. In the taskbar on the bottom right of your screen you might see a magnifying glass, that is the search index working.
If you have more than one physical drive in your computer, this tip is for you. The search index can take a considerable toll on your systems drive; by moving the index to a separate drive, you can increase overall performance.
To move your search index, do the following:
1. Press Start, type index in the search bar and press Enter
2. Press the Advanced button
3. Press Select new at the bottom and select a new location on a different physical hard drive
4. Press OK. Your search index will now need to rebuild, which may temporarily slow performance.
Need help speeding up your computer or completing this fix in XP, Call us at MCDA and we will send a tech right over!
Wednesday, January 6, 2010
Trojan Virus - Is your computer infected?
A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application.
A Trojan Horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users.
These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. If you do not recognize the sender, try to refrain from opening the attachment until you verify that it is a legitimate email.
Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Yahoo Messenger and Skype. If you are not using these applications, try to shut them down. If you are leaving for the day, or going to bed at night, sign out. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus. For the business owner, it is not good to have one of your employees spamming out messages. Prevent these situations from occuring by contacting a professional to install an email and internet threat solution.
The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program.
We have numerous solutions to help protect your machine. We also have solutions for business owners who would like to protect their servers and users with a single application. Contact us today for a free security audit and evaluation.
Visit is by clicking here: MCDA Cre8tive Consulting Group, Inc.
A Trojan Horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users.
These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. If you do not recognize the sender, try to refrain from opening the attachment until you verify that it is a legitimate email.
Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Yahoo Messenger and Skype. If you are not using these applications, try to shut them down. If you are leaving for the day, or going to bed at night, sign out. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus. For the business owner, it is not good to have one of your employees spamming out messages. Prevent these situations from occuring by contacting a professional to install an email and internet threat solution.
The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program.
We have numerous solutions to help protect your machine. We also have solutions for business owners who would like to protect their servers and users with a single application. Contact us today for a free security audit and evaluation.
Visit is by clicking here: MCDA Cre8tive Consulting Group, Inc.
Tuesday, January 5, 2010
Quick Printing in Windows Vista - TIP
Quick printing in Windows Vista - I have to say, this is one of my favorite little gadgets!
If you have Windows Vista you can have a shortcut to your printer for quick printing by adding a sidebar gadget. If you don't have your sidebar enabled read how to enable Windows Vista sidebar gadgets.(Sidebar is usually there when you buy a Vista Machine) Once you have a sidebar, simply browse through the gadgets available and look for the drop printing feature. It is an awesome feature! All you have to do is drag and drop a file onto the printer icon. That's it! It will print your file. You can drop multiple files onto the icon to print them together.
Enjoy!
If you need assistance with any setup, please contact a tech at MCDA CCG
If you have Windows Vista you can have a shortcut to your printer for quick printing by adding a sidebar gadget. If you don't have your sidebar enabled read how to enable Windows Vista sidebar gadgets.(Sidebar is usually there when you buy a Vista Machine) Once you have a sidebar, simply browse through the gadgets available and look for the drop printing feature. It is an awesome feature! All you have to do is drag and drop a file onto the printer icon. That's it! It will print your file. You can drop multiple files onto the icon to print them together.
Enjoy!
If you need assistance with any setup, please contact a tech at MCDA CCG
Monday, January 4, 2010
ERP - Fact or Fiction?
ERP is bound to have its fair share of myths and misconceptions. Integration of ERP is an especially grey area. Most small business owners think of ERP in terms of old communication principles, and think of ERP as no more than an upgraded version of its old system.
Some ERP Myths are discussed below.
1) Information Transfer Is Unidirectional
Information can flow in both directions, either from or to the ERP. If the ERP is integrated with the site, it will have a bi-directional information flow.
2) ERP Integration Is All About Copying Data
Since older methods of integration follow a system of copying a tag and its profile, business owners think modern ERP system can be integrated the same way. However, there is more to ERP integration, since the business related-date that the ERP handles is very different from what the site handles.
3) ERP Can Come Up With Standardized Answers All the Time
Many people think that queries related to a business process follow a set pattern, as do their answers. They cannot be more wrong. Even if the system knows the right question, the right answer may depend on a number of factors.
4) You Must Use Only the Latest ERP Technology
Although the latest ERP integration technologies offer many advantages to small business owners, they have their own share of problems. The biggest problem is the integration of new technology to the old. In some systems, you will find that retaining older applications may be more useful than overhauling it completely. Financially, it might be beneficial to the organization. An experianced ERP Consultant can assist you in making that decision.
5) ERP to Site Integration Needs To Be Total
The ERP system deals with business process, while the site system deals with manufacturing and procurement issues. While the site capacity fluctuates, the ERP capacity remains stable.
6) Data Security Is Compromised When You Integrate Plant to ERP
Nothing can be farther from the truth. Many people are concerned about what happens to the data that is not on site. ERP programmers have spent a lot of time and money on making the system as foolproof as possible, so even data that is not protected by elaborate passwords are not easily accessible to unauthorized personnel. Just make sure that your servers are properly configured with appropriate security measures.
7) Installing ERP System Means That You Can Keep Fewer IT Staff
The ERP system is not meant to replace your IT staff, it is there to help them with day-to-day problems related to maintenance and troubleshooting. In some cases, IT Staff will need to be increased to maintain the database, write and create reports, and fullfil special programming needs.
Now that you the answers to some common questions regarding ERP, you can take a better decision regarding the kind of ERP system you need. If you need help in deciding which the best ERP is for you, you can contact MCDA Cre8tive Consulting Group, Inc and one of our consultants will put together a proposal for your enterprise.
CLICK BELOW and get started today!
MCDA Cre8tive Consulting Group, Inc
Some ERP Myths are discussed below.
1) Information Transfer Is Unidirectional
Information can flow in both directions, either from or to the ERP. If the ERP is integrated with the site, it will have a bi-directional information flow.
2) ERP Integration Is All About Copying Data
Since older methods of integration follow a system of copying a tag and its profile, business owners think modern ERP system can be integrated the same way. However, there is more to ERP integration, since the business related-date that the ERP handles is very different from what the site handles.
3) ERP Can Come Up With Standardized Answers All the Time
Many people think that queries related to a business process follow a set pattern, as do their answers. They cannot be more wrong. Even if the system knows the right question, the right answer may depend on a number of factors.
4) You Must Use Only the Latest ERP Technology
Although the latest ERP integration technologies offer many advantages to small business owners, they have their own share of problems. The biggest problem is the integration of new technology to the old. In some systems, you will find that retaining older applications may be more useful than overhauling it completely. Financially, it might be beneficial to the organization. An experianced ERP Consultant can assist you in making that decision.
5) ERP to Site Integration Needs To Be Total
The ERP system deals with business process, while the site system deals with manufacturing and procurement issues. While the site capacity fluctuates, the ERP capacity remains stable.
6) Data Security Is Compromised When You Integrate Plant to ERP
Nothing can be farther from the truth. Many people are concerned about what happens to the data that is not on site. ERP programmers have spent a lot of time and money on making the system as foolproof as possible, so even data that is not protected by elaborate passwords are not easily accessible to unauthorized personnel. Just make sure that your servers are properly configured with appropriate security measures.
7) Installing ERP System Means That You Can Keep Fewer IT Staff
The ERP system is not meant to replace your IT staff, it is there to help them with day-to-day problems related to maintenance and troubleshooting. In some cases, IT Staff will need to be increased to maintain the database, write and create reports, and fullfil special programming needs.
Now that you the answers to some common questions regarding ERP, you can take a better decision regarding the kind of ERP system you need. If you need help in deciding which the best ERP is for you, you can contact MCDA Cre8tive Consulting Group, Inc and one of our consultants will put together a proposal for your enterprise.
CLICK BELOW and get started today!
MCDA Cre8tive Consulting Group, Inc
Subscribe to:
Comments (Atom)