How To Move a Time Matters and PCLaw Database to a New Server

sqlThis is an updated post to my previous entry regarding moving LNTPA Practice Advantage 9 to a new server.  This time I had to move Time Matters 11 from SBS 2003 server running SQL 2005 SP2 (Server A) to Server 2012 R2 running SQL 2008 R2 Express (Server B).  Time Matters specifically has to be installed as a blank database first to let the built in SQL security accounts be created, then you run a SQL query to reset the permissions after attaching the copied MDF / LDF files.  Here is how to do it. Continue reading “How To Move a Time Matters and PCLaw Database to a New Server”

0

How to Remove a Clio Matter from My Drive

When you sync a matter to your local desktop from Clio using Google Drive, every change you make to that folder and its files is reflected in Clio.  That includes deleting the folder!
DO NOT DELETE a folder from your My Drive if you are done working on a matter and no longer need it to sync to your computer.  This will delete the folder in Clio for everyone!
Instead, when you are finished with a matter and no longer need it to sync to your My Drive, follow these steps to REMOVE the folder:
RemoveDirectory
Continue reading “How to Remove a Clio Matter from My Drive”

0

Open PDF Files from Clio in Adobe (not Chrome)

When you open a PDF file from Clio (or Google Drive), the file likes to open in your web browser as a preview.  Here is how to force Chrome to open that PDF in Adobe Acrobat (or any default PDF application).
Open Chrome and in the address bar, type:   chrome://plugins/
(Hit Enter)
Disable “Chrome PDF Viewer” and “Adobe Reader”  (click “Disable” – disabled items appear to have a grey background)
disablechromepdf Continue reading “Open PDF Files from Clio in Adobe (not Chrome)”

0

Superfish, Man-in-the-middle, and SSL


A new type of malware has been discovered that breaks SSL encryption, mainly to insert ads in your browsing.  This “Superfish” style vulnerability means that even when you connect to your email, bank, 401(k), or even health insurance site, the connection is being re-routed on the fly to the bad guys servers but your browser will still show that green lock saying the connection is secure.

Continue reading “Superfish, Man-in-the-middle, and SSL”

0

Using Google Drive instead of Email Attachments

GoogleDriveLogo
There are many reasons you may want to use your Google Drive to send a file to a client or colleague.  It is a secure way to send very large files easily.  In this post, I will outline how to set up Google Drive on your computer to sync your files to the cloud and how to share those files.
Traditional email is like sending a postcard.  Every stop along the way (called “hops” on the Internet) can read everything on that postcard / email.  This includes the email attachments.  There are a few ways around this.  You could ZIP encrypt your email attachment, but then a passphrase key must be exchanged separately.  You could use PGP encryption for email, but that requires additional setup and configuration on both the sender and receiver’s end. Continue reading “Using Google Drive instead of Email Attachments”

0

Syncing Clio Files to your PC using “Add to My Drive”

 
ClioTraining
You can use the “Add to My Drive” option in Google Drive web to automatically sync your Clio matter documents to your PC.  First, you must install the Google Drive Sync for PC on your computer.  Also, you need to update Google Drive web to “Experience the New Drive“.  (Click the Settings gear and choose Experience the New Drive).  All set?  Ok, let’s go!
Continue reading “Syncing Clio Files to your PC using “Add to My Drive””

0

Internet Explorer Remote Code Execution Vulnerability

A zero day bug in Internet Explorer was found by FireEye research labs and released to the public on Saturday, 4/26/14.  This virus does not have a super fancy name but is being actively exploited on the web:  Microsoft Internet Explorer Remote Code Execution Vulnerability (CVE-2014-1776).

The Department of Homeland Security recommends you DO NOT USE Internet Explorer at this time.  It is recommended to use Firefox or Chrome until a security patch is released by Microsoft.  Because Microsoft has discontinued support of XP, this vulnerability will never be fixed for Windows XP.
Microsoft’s security advisory detailing the bug can be found here.
If you must use Internet Explorer, only use it for those specific sites that it is required.  Also be aware that many other applications such as Outlook and Word use Internet Explorer as the engine to render HTML objects.  There are a few steps you can take to mitigate your exposure to the security flaw.  Continue reading “Internet Explorer Remote Code Execution Vulnerability”
0

Heartbleed Aftermath

A security exploit was discovered on Monday, April 7th, 2014, that affects the entire Internet.  This vulnerability, called Heartbleed, is a flaw in the security protocol used by websites called OpenSSL.  This flaw is not specific to Mac or PC or iPhone or Android as it affects traffic between your device and the web.  It is important to note that changing all of your passwords at this point is not wise.  Changing a password on an affected site that has not been updated to a patched version of OpenSSL could potentially lead to both the old and new passwords being exploited.
 
Mashable has put together a list of some top websites that were known to be affected AND have patched their site.  These are the sites that you should change your password RIGHT NOW.  The highlights of this list include: Continue reading “Heartbleed Aftermath”

0

Malware and Virus Removal

::UPDATED:: 4/17/14
The best post-infection removal success rate can be had by using a Rescue CD / USB.  Here are three that are free:
Bitdefender RescueCD
Kaspersky Rescue Disc 10
Avast! 2014
note: Avast! requires a full installation on an unaffected machine to download and create the ISO file.  Bitdefender and Kaspersky will let you download ISO files directly to burn to disc or create a bootable USB drive.  In addition, Bitdefender comes with Team Viewer for Linux pre-installed to allow easy remote desktop sharing for support.

Business Protection

The best real time protection for your business is the one that gives you a complete overview of your company network health.  I have found these two products to be the best in terms of features and confidently recommend Webroot Secure Anywhere for their great support.  Bitdefender does get the highest marks in online A/V tests.  However, I have found their tech support completely underwhelming, often taking days to respond to phone calls.
Webroot Secure Anywhere Endpoint Protection for Business
Bitdefender Cloud

The following is a round-up of many available free antivirus programs and malware removal tools.

Continue reading “Malware and Virus Removal”

0