Dell Announced its New Range of Laptops

Dell is a renowned name in the list of PC developers and manufacturers and today it is one of the best PC brands in the world. Its devices are creatively designed and intelligently built which stay at the top of their performance for long. Recently Dell has made some impressive announcements in its laptop range.

Dell Latitude 2-in-1 business laptop

Ahead of CES 2017, Dell announced its new range of laptops including XPS 13 2-in-1, Latitude 2-in-1 business laptop, new Alienware and Inspiron 7000 Gaming laptops. In the event that will be held in Los Vegas, Dell has more in its lineup to showcase. Alongside a new Canvas device, it may unveil a range of new Latitude, OptiPlex, and Precision devices. Dell revealed the new Latitude 7285 2-in-1 detachable laptop, Latitude 7280 and Latitude 7480 models, OptiPlex 7050 desktop, Precision 5520 laptop, Precision 5720 all-in-one model, Precision 7720, and Dell Canvas.

Dell XPS 13 2-in-1

The company has expanded its all-new Dell Latitude 7000 Series and announced two more models of this series: Latitude 7280 and Latitude 7480. Both the Latitude models include touch finger print reader and sport optional multi-factor authentication options, FIPS 201 Smart Card Reader, and contactless smart card reader/NFC with Control Vault 2 FIPS 140-2 Level 3 certification. Display screen of the Latitude 7280 and Latitude 7480 laptop models will be featuring 12.5-inch and 14-inch screen sizes respectively. They will be in HD and full-HD screen resolution options and their top-end model will be featuring Corning Gorilla Glass. Seventh generation Intel Core vPro processors with DDR4L RAM up to 2133MHz will be empowering both the models and both of them will be available in non-backlit and backlit keyboard options.

Inspiron 7000

The Latitude 7280 and Latitude 7480 laptop will be having Intel’s Integrated HD Graphics GT2 GPU along with either Windows 10 or Ubuntu OS options. Dell has revealed the cost of the Latitude 7480 model which will start at $1,099, however, it hasn’t ponder light upon the cost of the new Latitude 7280 and Latitude 7480 models and it is promoting them as “premium business-class Ultrabooks” for commercial use case. Dell also revealed the new Latitude 7285 2-in-1 detachable laptop and the company claims that it will be the first wireless charging keyboard.

The new Latitude 7285 2-in-1 detachable laptop will be available with seventh generation Intel Core i and Core ivPro processors coupled with Intel HD 615 GPU and up to 8/16GB 1600MHz of RAM. Dell has integrated a 12.3-inch touch Sharp IGZO display with 2880×1920 pixels and Corning Gorilla Glass 4 on top. It includes an 8-megapixel rear camera and a 720p front-facing camera (with Infrared) and will be available with Windows 10 Home and Pro editions. The Latitude 7285 2-in-1 gives you options in 128GB, 256GB, and 512GB SSD and while will also come in 256GB SED (self-encrypting drive) option and it will also feature 2x USB Type C Thunderbolt 3 ports. There is no idea about the cost of the Dell Latitude 7285 2-in-1 and it will be available starting May.

Dell introduced its new OptiPlex 7050 desktop in three sizes: the tower, small form factor, and micro and the new OptiPlex 7050 desktop will be available with seventh generation Intel Core i7 processors. The new OptiPlex 7050 desktop will support Microsoft’s Windows 10 Home and Pro editions as well as Ubuntu operating system. The micro will include two DIMM slots and the tower and small form factor of the OptiPlex 7050 will pack four DIMM slots.  It will support hybrid disk drives and hard disk drives of up to 2TB. The Dell OptiPlex 7050 micro may be available at a starting price of $679 and may be available for buying from February 17. Dell has not disclosed prices for the tower and small form factor as of now.

Dell also announced Precision 5520 laptop and claims that it’s “world’s thinnest, lightest and smallest 15-inch mobile workstation in a stunning design.” This model will include the latest seventh generation Intel Core and Intel Xeon processors as well as Nvidia Quadro professional graphics card alongside 2400MHz DDR4 memory. Dell has integrated the higher capacity battery on the Precision 5520 laptop that may survive through day of use and it also supports up to 2TB SSD storage. The display screen of the Dell Precision 5520 laptop is of 15.6-inch UltraSharp full-HD IPS (1920×1080 pixels) with anti-glare LED-backlit along with in touch option. The company has been priced Dell Precision 5520 laptop at $1,399.

Dell also has expanded its Precision series and launched the Precision 5720 all-in-one model. This model will be featuring a 27-inch UltraSharp 4K Ultra HD (3840×2160 pixels) display with 100 percent Adobe RGB color gamut, with an optional touch display with articulating stand, and Dell PremiereColour. The AIO will also be featuring Jack Joseph Puig Signature Series powered by Waves MaxxAudio Pro audio solution sporting front and down firing speakers. The Precision 5720 AIO will be powered by seventh generation Intel Core and Xeon E3-1200 v6 series processors along with AMD Radeon Pro GPU. Moreover, this series will also be VR Ready. Windows 10 Pro and Ubuntu operating system options will be powering its performance. It will be available with up to 64GB 2133MHz Non-ECC DDR4 memory. The Dell Precision 5720 AIO will go on sale in April and may come at a starting price of $1,599.99.

Dell is promoting its Precision 7720 as the company’s first “VR-ready mobile workstation” which sports a 17.3-inch full-HD (1920×1080 pixels) UltraSharp IPS display with anti-glare backlit with up to 64GBDDR4 DDR4 2400MHz memory. It is available in two options with latest seventh generation Intel Core and Intel Xeon processors alongside gives you choice of choosing between NVIDIA Quadro or Radeon Pro graphics cards. This VR-ready model supports RAID and up to 4TB storage. The Dell Precision 7720 will go on sale next month and has been priced at $1,799.

Dell also unveiled the new Canvas system and the company is promoting it as a new horizontal “do” surface as this professional space can be used through touch interaction, a pen, and totems. The new Canvas system sports a 27-inch QHD Adobe RGB display with anti-glare Corning Gorilla Glass for durability and the has added a highly-precise pen which will be very convenient for sketching and drawing something, plus it also supports dual-handed productivity. For making it more easy-to-use, Dell Canvas 27 supports 20 points of touch recognition and the 27-inch IPS display comes with a screen resolution of 2560×1440 pixels. The Dell has priced Canvas at $1799 and will be available starting March.

Dell also revealed its first 32-inch 8K monitor with Dell PremierColor and the company claims that the 8K monitor can show content four times more than Ultra HD 4K resolution and 16 times more content than full-HD as it sports over 33.2 million pixels of resolution and a pixel density of 280ppi. Dell has been priced its first 32-inch 8K monitor at $4,999.99.

If you want to buy any of Dell device and configure it, but don’t know how to do that or want any other assistance related to your new Dell devices, you can ask PCTECH24.COM.AU for complete support for Dell computers.

Call 1800 83 24 24 to Get Complete Solution of All Your Dell Computer Related Issue

Dell is a big brand in designing and delivering high-end personal computers that look elegant, stylish, and perfectly mixed with performance. Dell is an American multinational that you can reckon as a brand which is dedicated to perfection.  Dell laptops are known for their great performance, designs and looks. Though it is piece of equipment to flaunt and make others envious, but what if it doesn’t give you desired performance or start showing technical issues.

How to fix Dell Computer Related Issue

If your Dell computer is showing some issues and you are also struggling to fix them, there is no need to be worries about, just dial the number 1800 83 24 24 to get instant technical support for Dell computers anywhere in Australia This number will directly connect you to the expert technicians at the same instant so that you get on-time solution. Computers are complex systems that may experience numerous technical issues ranging from booting complexities to BIOS related troubles. These are multiple issues which are difficult to handle and computer users cannot find the apt solutions of them.

If you are stuck in an annoying situation, don’t get panic over the issue as tech experts are available round the clock and you just need to connect to them for correct resolution of the problem that has encountered. They will provide you the solution on immediate basis.

Some common issues that users face:

System not Booting

Have you been trying to boot your system but getting nothing except a black screen and an error, then, your system is experiencing a booting issue. This is a situation which can be handled by the experts only. Call the Sony experts at Sony Computer Help Number for getting immediate relief from the issue.

BIOS Related Issues

BIOS is an interface between the software and hardware of your machine. Usually this issue arise if your system’s experiencing BIOS related issues or its BIOS has gone corrupt or has got outdated. These are complex issues and hard to handle for those users who don’t have expert skills. To handle such issues, it is better to call experts for reliable solution in minimum possible time.

Reinstallation of Windows OS is Taking Too Long and the Process is Aborting Abruptly

These days all the instructions to install or reinstall the OS are given and it has become easy as it requires just basic skills to do that. Although, installation or reinstallation of windows is a fairly simple procedure, but sometimes, it gets tough because of unknown reasons and may take hours or abort abruptly. If it is bothering you and taking hours to finish or getting aborted in between, you need to handover this task to the experts. As only they can find the cause of problem and fix it. For instant support for Dell devices, you should call experts at the same instant.

Apps and programs are Taking Too Long to Open

This problems encounter when your system’s hardware is not capable of performing accordingly or there are some programs which are hogging your system resources and not letting other program to function. Redundant applications running in the background slow down the overall performance of the system. A slow system is very annoying and you need to fix it as early as possible.

System issues seem very harassing and annoying especially when you are in the middle of some urgent work. A small issue may lead to frustration and if the work is too urgent, you cannot wait for long to get it resolved. In such situation, PCTECH24.COM.AU is your one stop solution to fix all such issues immediately as we are 24*7 available to help.

Types of Security Threats and Network Attacks and their Counter Measures

A security breaching attempt and network attack is defined as a threat. Most of the attacks including intrusion, denial of service or other on a network infrastructure analyze the entire network in order to gain the information. After gaining the required information, such attacks eventually cause your network to corrupt or crash. Different attackers may different types of network attacks as they might not be interested only in ‘exploiting software applications, but also get unauthorised access of your network and the devices connected to the same network.

Types of Security Threats and Network Attacks

Within an organization or at home also, unmonitored network devices are targeted by the attackers as the primary source of information leakage and breach. If your organizational network is not secure, the risk factor increases by multi-folds as every email message, user logon, web page request, and every transmittable file is handled by a network device. Under some setups, network devices also handle telephone service and voice messaging. It becomes very risky once the attacker is able of owning your network devices, as it allows them owning your entire network.

There are multiple types of network attacks cut across all platform types and categories of software and most of the common ones are as follows:




DoS and DDoS



Social engineering

Spoofing (Identity or IP Address Spoofing)

Any internet connected device sends IP datagrams which are internet data packets into the network. These datagrams carry application layer data and the sender’s IP address and if the attacker is able of getting the control over the software running on a network device, it gets easy for them to alter the device’s protocols and putting an arbitrary IP address into the data packet’s source address field. Spoofers do it so that it becomes difficult to find the actual host who sent the datagram.

Ingress filtering is the countermeasure of spoofing and routers usually perform this. Routers perform ingress filtering to check the IP address of incoming datagrams and try to find out if the source addresses which are to be known, to be reachable via that interface. Router discards the source address of the packets which are not in the valid range.

Hijacking (man-in-the-middle attack)

Hijacking is an attack technique where man-in-the-middle takes advantage of the way headers are constructed in a weakness in the TCP/IP protocol stack. Hijackers perform hijacking by actively monitoring capturing, and controlling your communication transparently when you are communicating with another person. The attacker may re-route a data exchange and while your computers are communicating at low levels of the network layer, they might not be able to find with whom they are exchanging data. Man-in-middle attacks takes the advantage of this technique as the person with whom you communicate will think that it is you (actual user) who has sent a message whereas the fact is, it is the hacker who actively responding on your behalf using your identity. So if you find anything unusual while having conversation with your friend of receiving any message from the unauthorized contact, avoid any kind of communication as this may be either a hacking attempt or hacker.


These are malicious programs that seem like legitimate software, but actually they when launched, they perform unintended or malicious activities behind the scenes. Most of the remote control spyware programs are of this type. A Trojan program file will look, operate, and appear to be the same size as the compromised system file.

To avoid the effects of such attacks, early use of a cryptographic checksum or binary digital signature procedure is the only protection.


Packet sniffing is a way of intercepting data packets travelling to a network. To capture all traffic travelling to and from internet host site, a sniffer program executes its functions at the Ethernet layer in combination with network interface cards (NIC). The sniffer program will collect all communication packets floating by anywhere near the internet host site if any of the Ethernet NIC cards are in promiscuous mode.

A sniffer placed on any inter-network link or backbone device or network aggregation point will therefore be in a state of monitoring the entire lot of traffic. There are multiple sniffers programs on the internet that are free and most of them are passive. Packet sniffers listen all data link layer frames passing by the device’s network interface and among them which are more sophisticated ones allow more active intrusion.

It is required to detect network interfaces that are running in promiscuous mode in order to detect packet sniffing. There are two ways of detecting sniffing:

Host-based: If the NIC is running in promiscuous mode, several software commands exist that can be run on individual host machines to tell the same.

Network-based: Sniffer programs consume a lot of running processed and log files, but there are solutions which tend to check for the presence of log files and running processes. However, sophisticated intruders almost always are able of hiding tracks by disguising the process and cleaning up the log files.

End-to-end or user-to-user encryption is the best countermeasure against sniffing.

Mapping (Eavesdropping)

Before attacking a network, attackers try to find out some important information like IP address of machines on the network, the operating systems that machines are using connected to a network, and the services that they offer. Using this information, attackers can be more focused on their attacks and it is less likely to cause alarm. The process of gathering all the information is known as mapping.

Strong encryption services that are based on cryptography only are its counter measures. Otherwise, it gets easy for attackers and others to read your data as it traverses the network.

Denial-of-Service attack (DoS) and Distributed-Denial-of-Service (DDoS)

A denial of service attack is a special kind of Internet attack on a network that is carried out at large websites. This attack is designed to perform on the network in order to bring it down to its knees by flooding it with useless traffic. Denial of Service can result if a system (like web server) if flooded with a huge number of illegitimate requests. This act makes the web server unable to respond on legitimate and real requests or tasks.

A Dos attack can be executed in a number of ways, but its three basic types of attacks are:

  • Consumption of computational resources, such as disk space, CPU time, and band width.
  • Disruption of configuration details, such as routing information.
  • Disruption of physical network components.

DoS attack may bring the following consequences:

  • Slow network performance.
  • Unavailability of a particular web site.
  • Inability to access a particular web site.
  • Dramatic increase of spam in your account.

Common forms of denial of service attacks are,

  1. a) Buffer Overflow Attacks simply send more traffic to a network address than the programmer’s expectation on size of buffers.
  2. b) In Smurf Attack, the perpetrator sends an IP ping request to a receiving site.
  3. c) SYN floods are a type of attack when a computer tries to make a TCP/IP connection to another computer.

To control DoS attack, only ingress filtering is the only counter measure and that too to a small extent.

Social Engineering

For attackers, social engineering is a way of deception in order to gain access to information systems. Attackers usually use a telephone or e-mail message medium for the same purpose.

The attacker usually pretends to be an authorised person of the company and pressure the help desk to give the toll-free number of the RAS server to dial. Sometimes, they use the same trick to get their password reset. The main aim behind social engineering is to sport the human element in the network-breaching loop and using it as a tool to perform breaching and hacking attempts.

Faked email sent by fake administrator to one or more users in a domain about resetting the password for a limited period of time. When user try to do so, hackers who keep on monitoring users activities exploit the user’s system.  Or the social engineer traps the users in a fictitious competition and tries to manipulate a group of users for participating in some fake competition to win a jackpot prize.

Another trick that social engineers play is they impersonate a user and pretend to forget their password and ask the helpful helpdesk to reset the password. In many cases the help desk change the user’s password over the phone and now when the hacker now a legitimate user name and password to work with, they misuse it.

If you are also victim of any such attempt and still haven’t applied counter measures, it’s high time to do that. Otherwise, you will repent for such a long delay. In case you are not sure what to do to stay safe and avoid any kind of infection and attack, comprehensive protection is required for your device as well as network. For the same purpose, you can hire tech experts who are experienced in handling all tech issues and provide tech support for Trend Micro.

How to Find Out the License Agreement for the Installed Version of Windows

While installing Windows, you are shown a screen that explains the Windows license agreement that includes all the information about all the legal language, the responsibilities of Microsoft, and what you can and cannot do with Windows. Users come across the license agreement at the point of installing Windows only and if you ask someone in general to see or show it again after installing your version of Windows, it will be tough for him/her. This is a veru usual case and may of the Windows users found it tough to see and read the license agreement again. So this is the guide to help the users like you who found it difficult to find license agreement for all editions of Windows you currently installed.

First of all you need to identify the version of Windows that is currently installed on your machine and if you already know the version of installed Windows, skip the instruction that explain how to identify what version of Windows you are using.




Windows 7 and Windows 8 users need to left-click on the Start Menu, then right-click on Computer, and then click on the option Properties. Windows 10 users need to right-click on the Start Menu and then left-click on the option System.

Following the above step will show the System control panel that will show you the detailed information on what version of Windows you are running as shown below:

If you need experts help for knowing which version of Windows you are using, call PCTECH24.CO.AU experts to get support for Windows 7 and support for Windows 10. Now when you know what version of Windows you are running, you may open the folder which contains all of the license agreements for your version of Windows. To open license agreements for your version of Windows, press Windows key, and while holding Windows key down, press the letter R key to open the Run dialog.

Copy and paste or type c:\windows\system32\en-US\Licenses\_Default in the blabl space of the run box and click or tap on OK button.

Clicking or tapping on OK button will open a folder that will show individual subfolders for every edition of the Windows version installed on your computer. Each of these folders have the respective license agreement for the version of Windows that is installed on your machine.

Scroll through the list of folders and click twice on the one that corresponds to the edition of Windows you have installed on your machine. When the folder opens, you will see a single file called license.rtf there and this file is the license agreement for your version of Windows.  Double-click on it to view  and read it in Wordpad or Word.