Meta Tech - Cincinnati, Southwest Ohio Technical Support Company

Blog

trustedlink database maintenance TrustedLink Database Maintenance TRUSTEDLINK FOR WINDOWS DATABASE MAINTENANCE TLW 350x300 Technical Support

TrustedLink Database Maintenance


TRUSTEDLINK FOR WINDOWS (TLW) DATABASE MAINTENANCE

At Meta Tech we recommend TLW Desktop Users perform the following functions on a monthly basis. This will fix slow TrustedLink (slow TLW).

How to reduce the size of the database.

  1. Archive
  2. Delete any unnecessary documents and empty the trash bin.
  3. Delete text documents from the TLW Operations Support folder
  4. Clear/Delete Log Files, Events and Session Documents (VIEW from main TLW Window)
  5. Rebuild Tables
  6. Repair and compact the database files (ODBC data source administrator tool)

** Backup TLW\Work, Document, Table, Maps, Mapdata and Scripts. Users should maintain a good backup of your TLW computer.

How to archive TLW Documents?

  1. Select the TLW Operations Sent box (or the folder you wish to archive from), then click on the
  2. interchanges tab on the bottom right corner of the screen.
  3. Select the interchange(s) that you would like to archive, then right click and select Archive.
  4. An archive box will appear.
  5. Select location for the archive, then specify a filename.(Ex.Myarchive.mdb or Jun01.mdb).
  6. Click OK.
trustedlink database maintenance TrustedLink Database Maintenance TRUSTEDLINK FOR WINDOWS DATABASE MAINTENANCE TLW
TLW Screen by Anthony Johnson at Meta Tech

Note: Do not archive at the document level, rather than at the interchange level- if the archive is done by document, the interchange information linking the document to a trading partner will be lost.

How to delete Text Documents?

1. Open TLW Operations

2. Go to TEXT Documents

3. Click Edit, Select All

4. Return to highlighted documents (blue), right click then Delete

How to delete or clear Events?

1. Open TLW Operations

2. Click View -> Select Events

3. Click File, Clear All Events

4. Close the Window

How to delete Log Files?

1. Open TLW Operations

2. View -> Select Log Files

3. Select “Operations” and/or “Command line” > Click LOG

4. Select Purge Log File

5. Close Window

How to delete Session Documents?

1. Open TLW Operations

2. View -> Select Session Documents

3. Click on Edit -> Select All

4. Click on Documents Icon then Delete

How to Rebuild Tables?

1. Open TLW Administration

2. Select Tools/Rebuild Tables. A warning message appears if you have other TLW windows open. Close TLW Operations before rebuilding the tables.

3. Click Select All

4. Click Rebuild

How to repair a database in 6.x for Windows 7 64bit and Windows 10 64bit?

Note: Be sure to perform this process on both the stxfw32 and modmgr32 files.

1. Make sure that the TLW is closed completely

2. Navigate to C:\Windows\SysWOW64

3. Run “odbcad32.exe”

4. Click “System DSN” tab and select the appropriate source (stxfw32 or modmgr32)

5. Highlight the file, click Configure

6. Verify correct path to *.mdb file and then click Repair. Click OK (this might take a while depending on database size).

7. Click OK, select the Compact option

8. Click OK, verify the path is directed to the correct *.mdb file and then select Version 4.x, click OK to begin the compact process

9. Click Yes to replace. Wait until a success message is shown on the screen.

10. Click OK to close

How to repair a database in 6.x?

Note: Be sure to perform this process on both the stxfw32 and modmgr32 files.

1. Because TLW 6.x uses the Windows Installshield wizard, the OBDC repair must be done from the Windows Control Panel

2. Open the Control Panel in Windows, Start-> Administrative Tools -> ODBC Data Sources.

3. Click “System DSN” tab and select the data source (stxfw32 or modmgr32)

4. Highlight the file and click Configure

5. Verify correct path to *.mdb file and then click Repair. Click OK (this might take a while depending on database size).

6. Click OK on the success message and then select the Compact option

7. Click OK, verify the path is directed to the correct *.mdb file and then select Version 4.x, click OK to begin the compact process

8. Click Yes to replace. Wait until a success message is shown on the screen.

9. Click OK again to close

*** Repeat this procedure for any other data sources, such as STXFW32 or MODMGR32.

Note: If you receive the following error during the compact process, “Cannot perform this operation; features in this version are not available in databases with older formats” change from the default Version 3.x to Version 4.x on the “Database to Compact Into” screen and click OK. And then follow the directions above.

If you need assistance maintaining your database or with TrustedLink for Windows, contact Meta Tech today.

paint 3d Paint 3D Uninstall Paint 3D 350x300 Information Security

Paint 3D Uninstall

How to uninstall Paint 3D on Windows 10

Paint 3D is a Microsoft Default picture viewer and editor on Microsoft Windows 10. Unfortunately, it is very slow. Most users will want to view pictures in the traditional and super fast Microsoft Program Called ‘Picture’ or MS Picture Viewer. The best way to remove this app is to use PowerShell.

To remove Paint 3D from Windows 10, you must do the following steps:

  1. Open Start.
  2. Type PowerShell, right-click the result, and select Run as administrator.
  3. Type the following command to force Windows to uninstall Paint 3D from your computer and press Enter: Get-AppxPackage Microsoft.MSPaint | Remove-AppxPackage

After executing the PowrShell command Paint 3D will be removed from Windows 10.

**If you receive an error, please double check the command, or you’re running PowerShell as a standard user. You will need to right click PowerShell and click “Run as admin.”

paint 3d Paint 3D Uninstall image
USB 4.0 usb 4 USB 4 USB 4 Connection 350x300 Technology

USB 4

One connection to rule them all.

USB 4 will be more than two times as fast a USB 3.2. Totaling 40 gigabits per second. USB 4 will be able to run data, video, sound, etc. Even external graphics cards.

This will truly be one connection for everything. The connectors inside of a desktop will connect via USB 4.

Anthony Johnson HamiltonOhio anthony johnson Anthony Johnson Anthony Johnson 264x300 264x300 Hamilton Ohio

Anthony Johnson

CEO and owner of Meta Technology Services, Hamilton, Ohio

Qualifications

Technically-focused, team oriented IT Manager with broad-based experience and hands-on skill in the successful implementation of highly effective computer operations and cost-effective mitigation techniques. Ability to successfully analyze an organization’s critical computer security and technical requirements, identify deficiencies and potential risks, and develop innovative solutions for increasing security and risk management. A broad understanding of networking, including installation, configuration, management, troubleshooting, and support of open source programs and tools to ensure the three key principles that are the basis for computer security; Confidentiality, Integrity and Availability.

Education

Information Systems Management

Cincinnati State Technical College– 2004

Computer Forensics and Network Security

Southwest Florida College – 2007

Technical Skills

SEO · DMZ · SSH · Access Control · Business Continuity · Cryptography · IDS · Firewalls · SOX · HIPAA · IPS · DID · Data Dumps · Risk Mitigation · Access Control · CoreUtils · Linux · Windows  / Server · PHP · Snort · Foundstone · Disaster Recovery · Legal Compliance · Regulations · IIS · UNIX · JSOX · Toyota Scanning System  · EDI  · Zoho  · ManageEngine Desktop Central  · Zoho Service Desk Plus

Professional Experience

Pacific Manufacturing Ohio -Fairfield, Ohio 2014-Current

IT Manager

  • Manage a large network of computers and IoT devices
  • Manage all routers, switches and servers
  • Configured, migrated and maintained Active Directory
  • Configured and maintained a SecurityGateway Edge Server and MDaemon
  • Implemented a ticketing system that saved over 45K per year
  • Virtualized servers to streamline and save money
  • Finished a mobile device scanning and tracking system for Toyota Manufacturing

At my current position as an IT Manager for Pacific Manufacturing Ohio I serve as the main contact between the IT Department in Japan and USA. My team manages hundreds of computers at multiple locations. I am responsible for Pacific Manufacturing’s whole network, including setup, user support, maintenance, security and disaster recovery.

Empire Foods -Cincinnati, Ohio 2008 – 2014

IT Manager

  • Manage a network of over 1200 computers and more than 4000 devices
  • Manage all routers, switches and servers
  • Configured, migrated and maintained Active Directory with over 1200 accounts
  • Configured and maintained a BlackBerry Enterprise Server
  • Implemented a MPLS network that saved over 45K per year
  • Virtualized servers to streamline and save money
  • Finished a Mobile Device rollout saving the company $100,000.

As the IT Manager for Empire Foods I served as the main contact between the CFO and the IT Department. My team managed over 1200 computers at 26 locations nationwide. I was responsible for Empire’s whole network, including setup, user support, maintenance, security and disaster recovery.

Stream International -Tampa, Florida 2006 – 2007 (www.stream.com)

Dispatch Policy Expert for Dell Small Business

  • Monitor dispatches in DellServ queue for accuracy and policy guidance.

Dell Microsoft Vista Expert and Level II Technical Support

  • Promoted the streamline of the Microsoft Windows Vista launch.
  • Responsible for finding common issues with Microsoft Vista drivers and Dell Small Business.
  • Dells main point of contact between business owners and Dell support.

As a Policy Expert for Stream, I audited over 300 L2 techs on Dell’s policies and procedures; suchas password policies for government agencies and mid to large size business’. Educated L2 techs on the verification process to ensure the privacy of Dells customers and to follow Dells privacy policy to keep the integrity of Dells reputation. I provided in-house and level II remote support for small business owners.

Sting Marketing – Palm Harbor, Florida 2005-2007

Webpage Manager – SEO Expert

  • Maintain Content Management Systems.
  • Basic HTML and PHP editing.
  • Manage a remote Linux server.

As a practitioner of Web communications, I managed projects for designing, developing, marketing and maintaining websites on a remote server. Core responsibilities include; coordinating and overseeing the activities of outsourcers through web portals, the regulation and management of access rights of different users of websites and managing secure connections between the Palm Harbor, Florida office and the Linux server in Houston, Texas using OpenSSH. From SEO programming to link building software.

Certifications

  • CompTIA – A+, Network+, Linux+
  • BrainBench – U.S. Computer Forensics Certified
  • BranBench – Network Security Certified
Information Security

Let’s Encrypt

Let’s Encrypt is a free open-source SSL Certificate.  Let’s Encrypt provides X.509 certificates for Transport Layer Security (TLS) encryption at no charge. The certificate must be renewed every 90 days. Some web hosts offer a script that will automatically renew and upload the Let’s Encrypt certificate on your server.

Let’s Encrypt is sponsored by Facebook, Chrome, Cisco, OVH and many other technology companies. The certs given out by Let’s Encrypt are great for personal use. Blogs, Family Tree Websites and many other websites will benefit from this zero cost SSL.

Even though Let’s Encrypt is widely accepted, it should not be used on a business or corporate website for many reasons.

If you are using Let’s Encrypt for SEO purposes it will give you a large boost for a blog, a hometown or hobby website. For a business, Let’s Encrypt will not help you. For one there is no true verification of ownership of domain. You just need access to DNS. Google looks at a website as a whole. Does the website have good markup. Does the website have authority links. Does the website have a legal disclaimer. Does the website have a valid SSL certificate. No large corporation will use Let’s Encrypt as their SSL Certificate.

Don’t believe me, go check for yourself. Even the companies sponsoring Let’s Encrypt, won’t actually use Let’s Encrypt on their business websites.

Do not use Let’s Encrypt on your page and expect to rank higher than your competitors who use official SSL Certificates.

Facebook:

let's encrypt Let’s Encrypt Facebook SSL

Cisco:

let's encrypt Let’s Encrypt Cisco SSL

Chrome:

let's encrypt Let’s Encrypt Chrome SSL

If you need an SSL for SEO purposes for your business, please check out our $99 per year package.

https://seo.metatechnologyservices.com/product/seo-ssl-and-dns-security/

hamilton, ohio spooky nook Hamilton, Ohio Spooky Nook Spooky Nook Hamilton Ohio 350x300 Hamilton Ohio

Hamilton, Ohio Spooky Nook

We are excited to see the Hamilton, Ohio Spooky Nook facility being built in our own town. More news to come.

See video of Hamilton Chamber of Commerce – Spooky Nook Presentation

2019 virus threats 2019 Virus Threats anonymous 2821433 640 350x300 Information Security

2019 Virus Threats

2019 will be a horrible year for virii (computer viruses).

Polymorphic Viruses will hit iPhone (ios) and Android pretty hard. The Russians and Chinese are deploying thousands of new viruses each year.

A virus does not necessarily have to install itself on the device anymore. According to an FBI report, the latest Russian virus embeds itself into the edge router device of your home. This polymorphic virus (Russian VPNFilter) can then steal data from any device connected.

I HIGHLY recommend all computer and smartphone users to download Malwayrebytes.


2019 virus threats 2019 Virus Threats image 8890406 11985122

Click here to get Malwarebytes. Malwarebytes can be installed even if you already have antivirus protection.

You can find more information at the FBI Information Security Center.

https://www.fbi.gov/audio-repository/ftw-podcast-malware-targets-routers-053118.mp3/view