Tag Archives: Program

How to Disable the Option “Use printer metrics to lay out document” and use the option “Allow background saves”

How to Disable the Option “Use printer metrics to lay out document”

Disable the Use printer metrics to lay out document option when you work with documents which were created in Microsoft Word for Windows 95 and Microsoft Word 6.0 for Windows. If you disable this option, Word does not check printer settings to calculate layout and formatting, hence scrolling speed gets increased.

Important Note: Use printer metrics to lay out document option is enabled by default in documents which are converted to preserve Word 6.0 for Windows document formatting or Word for Windows 95. Minor changes in document pagination or line wrapping may occur when you disable this option.

pctech24au

Follow the steps given below to disable the Use printer metrics to lay out document option:

  • Start the Word program on your computer.
  • Click the Microsoft Office Button in Word 2007 and click File in Word 2010 and then click Word Options.
  • Click on Advanced option in the Word Options dialog box, scroll down to the Compatibility options for section, and then click on the option All New Documents.
  • Expand Layout Options, click in the check box to clear it available along side Use printer metrics to lay out document option, and then click on the OK option.

How to use the option “Allow background saves”

The Allow background saves option is enabled by default. You can continue to work in Word while you save a document if this option is enabled.

When this option is enabled, it uses additional system memory. You can disable this option if you want to conserve system resources. Follow the steps given below to do this:

  • Start the Word program on your machine.
  • Click on the Microsoft Office Button and then click on Word Options.
  • Click on the Advanced option in the Word Options dialog box, and then scroll down to the Save section.
  • Clear Allow background saves check box by clicking on it and then click on the OK button on your computer screen.

Important Note: A status indicator bar appears on the status bar when Word saves a document in the background. If Word may not save a document in the background, it saves the document in the foreground.

If you are a Windows user and facing any problem with any of the Microsoft or any other software program, you can ask the experts at PCTECH24.COM.AU to help you with the issues. PCTECH24.COM.AU provides support for Windows 10, Windows 8, Windows 7, and for other operating systems also.

High Popularity is the Menace for Android

Android is one of the most popular platforms which acquire more than 80 percent market share whereas iOS has a market share in the teens and rest is distributed among other smartphones operating platforms. With every new smartphone launching in the market is stretching more and more share that is why Android phones rule. One of the major reasons of Android popularity is Google’s decision to make it an open OS, but this also makes this platform vulnerable to attacks.

As Android is an open OS, it allows many manufacturers to make devices that can run Android. However, when so many venders are there to use and release it in several models, it leads to OS fragmentation and results in thousands of active version of Android. Tough it is not a big deal if the vulnerabilities of each version of software are patched as soon as they come to notice. Actual problem starts when Google, a smartphone manufacturer, or an OEM is not able to release the patch on time.

Android

Attackers have taken notice that most of the times there is a delay in releasing the security patches so they trade on such delays and mange to attack on the vulnerabilities of an Android device. Hackers and attackers may put malware in the Google play store to exploit these vulnerabilities. Google uses a tool called Bouncer to scan apps before allowing them to be listed and sold through the Google Play store, but attackers do this by obfuscating infectious contents of their apps to slip past Bouncer.

Using a dropper is another way to get malware past Bouncer security scans. A dropper attack initiates when the attacker uploading an app to Google Play that doesn’t have malware. Once the victim downloads and installs the dropper app, it communicates with the attacker’s server to downlaod malware and other infections to the user’s device. One more case in point for Android devices that security researchers recently analyzed is “Charger” ransomware. Researchers found that Charger is embedded in an app, which is available through Google Play. Once Charger infected the app, it steals SMS messages and contacts from user’s device and asks for admin permissions. Once you give it permission, the ransomware locks down your device and send you a message demanding payment.

Attackers are not using only these three ways to attack Android user’s devices, but they are also using malware for Android in more dangerous ways. Attackers are putting redundant components in malware to make their attacks successful. To execute their attacks successfully, the second component keeps attacking if in case security disables one component. Camouflaging malware to look like a legitimate, hiding the app’s icon, delay to run a program when malware runs, and using social engineering to get elevated privileges in order to stop users from uninstalling the app are other persistent threats that deter user from getting rid of malware..

An alarm should go off in your head if your organization’s employees connect their Android devices to your network services like email and VPNs. To prevent users’ mobile phones from becoming an entryway for hacking and attacking attempts in your organization, make sure that you have mobile security controls in place.

If you are facing any issue in android device contact Avast Technical Support.