31 August 2016

Use this tool to quickly port your Chrome app to Electron and run it on any OS

Use this tool to quickly port your Chrome app to Electron and run it on any OS
  • BB

Don't you just love it when companies kill off useful services and platforms? Yeah, neither do we. Earlier this month, Google announced its plans to phase out Chrome apps for every OS except Chrome OS, starting in the second half of 2017.

That means that the Chrome app you painstakingly built won't work on anything other than Chrome OS in 2018. Sure, you could port your creation to the Web or to Electron for desktop use, but the latter would entail rewriting every component and distributing fresh binaries for each OS.

Thankfully, code wizard Koushik Dutta, a.k.a. Koush, who's previously built amazing things like Vysor and AllCast, has come to the rescue. His Electron Chrome tool lets you compile your Chrome app into Electron programs in no time. That should make it a whole lot easier to re-release your Chrome apps for Windows, Mac, and Linux.

Koush noted that Chrome's file system API isn't yet working and he's yet to implement the USB API – but hopefully it's just a matter of time before those are fixed. You can find Electron Chrome in this GitHub repository.



System Admin
Integrated Solutions
✆ +60 (19) 2222 376  |  ✉ admin@iznd.com.my  |   www.iznd.com.my

iZND Services Helpdesk Support

29 August 2016

Why Google Apps?

Why Google Apps?

Integrate your business with apps that are designed to bring people together.

Transform the way teams work by eliminating the hassle of traditional file transfer methods.

Enjoy the same suite of features whether you work from home or at the office.

Cut cost by reducing the need for infratstructure and multiple licenses.
All the apps you need to run your business


Access your email on your browser, phone, tablet, IMAP and POP
Powerful built-in search
99.9% guaranteed uptime, no ads and 30GB of storage


Save work files in Drive, access them from any device and share them instantly with teammates
No more sending attachments or merging different versions


Schedule an event at work and get reminders on your mobile device
Send out invitations via Gmail and keep everyone up-to-date on the latest project status

Docs, Sheets and Slides

Create documents, spreadsheets & presentations
Collaborate in real-time
Work anywhere – everything is saved to the cloud


Video conferencing with collaborative features such as screen sharing
Gmail and Calendar integrations – schedule and join meetings easily


Retain, archive, search and export email and chat for legal eDiscovery and compliance requirements
Web-based – no installation needed
Here’s an example of how Google Apps can help your business

Interested? Contact us for more information
- via Yes.my

21 August 2016

Why should you own your personal domain?

Take control of your online identity. Stop others from registering your personal domain, and choose where you send visitors.
Make it even easier for people to find you with a shorter, easier-to-remember domain name at an affordable price.
Easily connect your personal domain to your Facebook, LinkedIn, Tumblr or other profile page with just one click.

Why don't visit hosting.iznd.com.my to register your Own Personalised Domain at http://hosting.iznd.com.my
For more info, you may contact inquiry@izndgroup.com

16 August 2016

Windows 10 anniversary update is here.

The latest news from the Windows Insider Program.

Windows Windows Insider Program

Hello, Windows Insider!
As you might already know, we recently released our Windows 10 Anniversary update!
It's been an incredible ride and we have loved hearing from you during this journey. In fact, many of the new features in this update were directly inspired by feedback from Windows Insiders like you. Some of the highlights include:
  • Our new Windows Ink pen recognition software*
  • An even more productive Cortana digital assistant**
  • A faster, more accessible and more power-efficient Microsoft Edge browser
  • Advanced security features for consumers and enterprises
  • Exciting, new Xbox gaming experiences
The Windows Insider Program will continue to be a key part of our development process. On that note, we're pleased to announce that, just after the Anniversary update, we released our latest Insider Preview build for PC. You can also find out about the latest Insider Preview build for Mobile.
With a major release cycle complete, now would be a good time to check your Insider Preview build flight status. Just type "Insider" in your Windows search box to find "Get Insider Preview builds" in "Settings". Then choose your Insider level (based on whether you want our earliest builds – or prefer slightly later builds with less bugs.)
A few other noteworthy things that you all might be interested in:
  • Got an idea to create good in the world? As part of the Windows Insiders Program, we are bringing together Windows Insiders and members of the local creative and non-profit communities to create lasting solutions for the issues we care about. Want to join IN? Click here for details about #WINsiders4Good.

  • Continuum Competition 2016 winners. The competition wrapped up last month with Windows Insiders submitting more than 1600 entries. V. Chung from Vietnam was selected as the grand prize winner for his "Perfect Workout" app and received a fully loaded Surface Book and other great prizes. Check out all the finalists' apps here. Thanks to all who participated and to HP for co-sponsoring the competition.

Info for Developers


Info for IT Pros

  • Microsoft best practices for seamless Windows 10 deployment. We've just published the materials that Microsoft IT used to support our Windows 10 deployment to all employee devices within the Microsoft global enterprise. Use these resources to facilitate your own employee adoption of Windows 10, promote best practices, and ensure a direct path to productivity. Download the materials here.
As always, we look forward to your continuing feedback.

The Windows Insider team

* Hardware requirements apply.
** Cortana available in select markets; experience may vary by region and device.
This email is part of your Windows Insider Program membership.
Microsoft respects your privacy. To learn more, please read our online Privacy Statement.

This email is sent from an unmonitored address. Please do not reply. Please use links inline above to get additional information or help.
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA


Isaac Govind Andy

iZND Services - Corporate Group of CompaniesDirector - Integrated Solutions
 A-5-10, Empire Tower, Jalan SS16/1, Subang Jaya, 47500 Selangor Darul Ehsan, Malaysia

    All views and opinions expressed in this email message are the personal opinions of the author and do not represent those of the company. No liability can be held for any damages, however caused, to any recipients of this message.

01 August 2016

Take precautions on public Wi-Fi

KUALA LUMPUR: If you are surfing the Internet on a public Wi-Fi, always assume someone is watching you out there.

Better yet, do not connect to any public Wi-Fi at all, said LE Global Services (LGMS) executive director Fong Choong Fook, whose private cybersecurity firm employs hackers to test the network security of the country’s major banks.

“I would never use a public Wi-Fi,” he said.

“Even an IT person may not be able to tell if the access point he is connected to is safe or if the activities are being watched.

“There may be signs like your Internet is slowing down but hackers can make it so elegant that you won’t even notice,” he said in an interview.

Malaysia’s national cybersecurity agency CyberSecurity Malaysia (CSM) said hackers could position themselves between a person’s device and the Wi-Fi router and are able to record sensitive data that the surfer is keying into his device.

Hackers can also “create” their own Wi-Fi and trick people into thinking they are connected to a credible public access point like the one from a restaurant, airport or office – when in actual fact these devices are connected to the criminals’ hardware.

Thus, they would be able to remotely watch everything a person is sending out on the Wi-Fi like passwords, e-mails or credit card information.

As frightening as these attacks may sound, Fong said this had been going as early as the 1990s.

Demonstrating to The Star how a hacker could steal information, LGMS set up an “evil twin” Wi-Fi using a laptop and named it after a famous franchise restaurant just below its office in Puchong, Selangor.

Fong connected two devices to this Wi-Fi and proceeded to log into social media, e-mail and Government websites.

Within seconds of logging in, the hacker’s computer began recording the activities in both devices in the experiment – recording every e-mail address, username and password that was keyed in.

Though the demonstration was only meant for the devices in the controlled environment of the LGMS office, three other users got connected to the dummy Wi-Fi, thinking they were linked to the franchise restaurant’s Internet, during the experiment.

“Hackers can target one specific person or they can target everyone in a cafe to get their devices to send all their data through their dummy Wi-Fi

“When they have your information, they can steal your identity. They can pose as you on Facebook, or send out e-mails to your contacts under your account,” he said.

Fong advised users to avoid connecting to public Wi-Fi or to only limit their browsing to Internet searches if they must connect to one.

The firm also suggested users to subscribe to VPN (virtual private network) technologies to secure their traffic.

VPN encrypts data on devices, making it hard for hackers to spy on the user’s online activities. Most VPNs are available on a subscription basis, much like an anti-virus programme.

So far this year, CSM has recorded eight instances where private Wi-Fi networks were hacked and 1,462 cases of online intrusions have been reported, which is nearly double the number of incidents compared to the same period in 2015.

It advised users to keep their Internet browsers up to date and to disable the feature which automatically saves password in the cache –as it makes it easier for criminals to steal.