Category Archives: Tech Tuesday

Tech Tuesday Special: Windows XP End Of Support

It’s time for Tech Tuesday, where we answer reader questions!

TechTuesdays from Charland Technology

We’ve been asked a lot lately…What does the “End of Windows XP” mean?

The End Is Near with Grumpy Cat

As Microsoft announced some time ago, support for Windows XP stops on April 8, 2014. By all means hit the link for the official Microsoft countdown clock.

What’s the official Microsoft stance?

Simply, that Microsoft will not be working on any more Windows XP security updates after April 8. And if Microsoft isn’t fixing XP problems, no one else will be either.

But what does that mean?

For some people, it’s not a big deal. The sun will rise, the computer will start, and the world will go on.

If you use your computer in business it’s not so simple.

A major part of any security standard includes running a supported, up-to-date operating system.

PCI-DSS, HIPAA, Sarbanes-Oxley, and Mass 201 CMR 17.00 all mandate that your computer systems must be running supported operating systems with reasonably current security updates.

If you can’t update the operating system you can’t be in compliance.

The safest advice at this time:

  • If your business stores health care or patient information on your computers;
  • If your business processes credit cards using computers;
  • If your business is a publicly-traded entity that’s subject to SEC or other government oversight;
  • If you process or store account information concerning Massachusetts residents;

Then you are obligated to be compliant.

It’s early March…a bit late to get into a large-scale shift, but there’s still time for most smaller businesses to act. And starting to do something, even if you miss the “deadline” by a few weeks, is better than doing nothing.

What to do?

There are several approaches:

  • You can buy new computers that run a supported system like Windows 7 or Windows 8.
  • If your computers are relatively new (2010 or later) they may be able to upgrade to Windows 7 (or 8).
  • If you have a large number of older computers, we can install a Windows MultiPoint Server or Windows Terminal Server, and reload your desktop computers as “thin clients” that only are able to initiate a connection to your server.
  • You may be able to devise policies that restrict credit card entry, etc to certain computers.

It’s time to think about this, and act soon.

 

Windows XP sunset

Windows XP sunset

Tech Tuesday: #13: What Plants vs Zombies Can Teach You About Small-business Security

It’s time for Tech Tuesday, where we answer reader questions!

TechTuesdays from Charland Technology

We’re going to take a break from the questions this time, and talk about Internet Security for your small business.

Most everyone has played (or at least heard of) Plants vs. Zombies. It’s a fun game from PopCap Software. Go check it out if you haven’t yet. We’ll still be here when you’re done.

You’re welcome.

So, PvZ is a defense game. You place plants with different abilities on a game field and zombies come. If all goes well your plants will stop the zombies before they get to your home.

What does this have to do with business security? Plenty. Think about the game for a moment, in the screenshot above.

As soon as a zombie appears he gets pelted with peas.
If a zombie survives the peas he’ll run into a chomper.
Then he continues to get hit with peas.
If he survives that he’ll end up dealing with another Chomper.
If that Chomper is full and he gets to the end, there’s a lawnmower that’ll spring to life and run him over.

That’s how network security works in an ideal world. We’ve seen failures every step along the way.

To put it in another perspective,

It a bad guy wants to break into your office he’ll see the alarm company sticker and your security lights.
Then there’s the doorknob lock.
And the deadbolt.
If he gets through that then either door, motion, or glass-break sensors start the alarm.
After several minutes of sound and fury the police are contacted.
Meanwhile, the really valuable stuff is kept in locked cabinets.

And if all else fails you’ve got theft insurance on the really valuable stuff.

break-ins,buildings,burglars,cat burglar,cat burglars,gloves,jeans,occupations,photographs,roofs,securities,stocking caps,thieves,windows

So it’s a layered approach. Like an onion

agriculture,chopping boards,cutting,food,onions,vegetables

or a parfait.

Of course we’ve got antivirus. Massachusetts law says we need this.
And we’ve got a Unified Threat Management device, a business-grade firewall that can detect threats in all types of traffic.
And we have automatic operating system updates.
And our users work with limited accounts wherever possible.
And we have monitoring and intrusion detection on the firewalls and servers.
And we have users who know what their systems should look like and who to call when something looks suspicious.
And encryption and limited access on the really confidential stuff.

And we recommend cyberfraud insurance for our clients. Just in case all of these measures fail….because they can.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

(And FYI, you can make the gorgeous-looking parfait yourself at LowFat Vegan Cooking…)

Tech Tuesday #12? What’s up with Java?

It’s time for Tech Tuesday, where we answer reader questions!

TechTuesdays from Charland Technology

Chris from Devens asks….

I saw a report on the news about disabling Java before hackers steal all my info. What’s up with that?

Thanks, Chris

There’s a lot of panic about Java right now. Headlines abound that the US Department of Homeland Security is recommending that all computer users disable java until this cyber-storm blows over. The media, has naturally jumped on this. Is it because “Department of Homeland Security” sounds more impressive than “Computer Emergency Readiness Team at Carnegie-Mellon University?”

Partly, I’m sure. And partly because we love to panic about our computers. Let’s start with the basics…but first this important message.

I don’t think any of these posts explain clearly WHAT Java is. So…What is Java?

Java is a web programming language. It allows websites to run programs on your computer. Similar to Adobe Flash and Microsoft ActiveX.

Allowing websites to run “stuff” on your computer sounds scary..and there are scary elements to it, but it’s also a powerful thing:

  • Want to use web-based remote control like GotoMyPC or Logmein? You need to run a Java, Flash, or ActiveX program on your computer.
  • Want to play Angry Birds, Texas Hold’Em or Bejeweled? The game runs a program on your computer.
  • Want to use web-based e-mail? You need several of these web-based programs to do that.
  • On a site like Facebook…the ticker, chat, and scrolling page updates are all implemented in these programming languages.

There are a number of flaws, recently revealed, that make it easy for someone to trick you into visiting a page that launches code that can take over your computer.

This can be “weaponized” by sending you e-mail that claims to be from the IRS, Quickbooks, the lottery, or your bank. Click on the link in the e-mail…and your computer is compromised.

This also can be brought to bear by compromising other websites and forcing them to host the bad code. This can be a problem for smaller websites without full-time monitoring and support staff.

It’s important to remember…any time you visit a website or load a program on your computer you are trusting the author of that program and the keeper of that website.

For example, if you want to play the online game Pirate Galaxy, you’re exposed to whatever code the developer (Splitscreen games seems pretty trustworthy) has decided to put in the game. You’re also exposed to whatever the host of the game publishes (Kongregate is also legit).

If the chain of trust ended there we’d be in decent shape. However, that’s not the case.

The ads in most pages are not necessarily vetted on a regular basis. It’s entirely possible for a rogue ad to link to a compromised site that looks like the game you want to play.

So for now I think it makes sense to disable java unless you find an important site that absolutely will not work without it. Don’t like those instructions? Try these.

Another way to go is to disable Java, Flash, etc in your primary browser…and use another one ONLY for trusted websites that require running code.

Of course, Java 7 Release 11 fixes the most glaring and commonly-exploited security issues, and adds a major new concept…that the user needs to actively click to let a java program (called an “applet”) run.

We’ll discuss best practices for business Internet safety later this week.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

Tech Tuesday #11: Are We Business-Grade?

Another Tech Tuesday, where we answer reader questions!

TechTuesdays from Charland Technology

Cathie from Rindge asks….

My new technology company says I need to replace my router…or firewall…not sure which. The sales guy said my D-Link is not made for business. Is he just trying to sell me a more expensive one?

Thanks, Cathie…most small businesses have a single device that acts as both a router (moves traffic between networks) and a firewall (inspects each  packet of traffic and allows/blocks based on a set of rules). Many small-business techies use the words interchangeably now, but you’ve almost certainly got a single device that does both.

Here’s a nifty older picture (despite the mid-90’s iMacs the theory still works)

But the bigger question is….

GMC Professional Grade Logo

Is it “professional grade?”

The simple answer? It depends. Many businesses can get by with less-expensive, consumer-grade networking gear. It’s 2013 and nearly any firewall/router you can buy will give a few years of trouble-free connection to the internet.

Take this one, for instance. It’s a TrendNet N150 Router. This is a typical $40 consumer-grade router.
TrendNet N150 Home Router

A basic Internet and Wireless connection! Who could ask for anything more?

Well… Looking at the specifications…this is a router that does not claim to have a Stateful Packet Inspection Firewall.

It might be nice to set up a second wireless network for guest access.

And, setting up more than a few connections at the same time the lil TrendNet will start to lag….

and what happens if something doesn’t work? Send an e-mail to Trendnet support and hope for the best?

Level up!

So we can consider an entry-level business firewall…like the Netgear FVS300.
Netgear FVS318

These cost around $200. For the extra money we get:

  • Better network speed
  • Real SPI firewall
  • Phone or chat support
  • VPN connections (limited)

What could be better?

Well…

“I want to block job hunting/porn/shopping websites, except on my computer… or at break time.”

“We use voice over IP phones, how do we make sure that gets priority?”

“We need a reliable connection between our two buildings…”

“Our regulations say we need to monitor for unauthorized access…”

“Can I get a report of what websites employees are going to?”

“Can this system collect evidence in case of an attack?”

This is a job for a Sonicwall! (Or Cisco ASA, or WatchGuard, or Meraki, or Fortinet)
Sonicwall TZ-series wireless Threat Management System

Here’s where we leave the “router/firewall” and enter the “Unified Threat Management” systems. These devices have:

  • Comprehensive router/firewall systems designed for setup by a professional technician
  • Additional services like Intrusion Detection, Web filtering, Remote administration, and incident logging
  • Secure wireless systems that offers segmented guest access
  • Reliable, highly-secure VPNs for remote and site-to-site connections
  • 3G/4G wireless backup connections

What are YOU using for a firewall? Drop a post in the comments!

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

Tech Tuesday #10: 2013 Predictions!

Another Tech Tuesday, where we answer reader questions!

TechTuesdays from Charland Technology

Joan from Athol asks….What are your tech predictions for 2013?

I’ve got a few thoughts, in no particular order:

  1. Windows 8 will fail. Miserably. Sure, Microsoft will make it sound like it’s been accepted in the market, and will use accounting tricks to make it look like money has been made (they count new systems with Windows 7 that include Win8 “upgrade” disks as net sales, for example)

    It will be so bad that Windows 2014 (they’ll change naming conventions again) will come out in December, 2013. Look for 2014 to be like Windows 8 desktop-mode, with a visible Start button and…well…stuff to click.
    Microsoft Surface and Windows Phones will continue to sell to dyed-in-the-wool Microsoft fans. Exclusively.
  2. There will be a new iPhone and iPad. Apple will make them sound magical and revolutionary even though they’re not. They’ll add some nice features and cost a lot of money. Millions will be sold, mainly to Apple fans who are upgrading from their iPhone 5’s.

    Apple stock will continue to rise for the foreseeable future. I still wouldn’t buy it.
  3. As many i-Devices as Apple sells…Samsung will sell twice as many of their not-yet-announced Galaxy S4s (this is a link to a concept video, not even “good” rumor yet.) Still a couple more years before these win the coolness war, though. Here’s a link to a more realistic look at what the actual 2013 S4 could be like. A lot of those will be to Galaxy S3 fans who have gone all cult-like over their phones…becoming every bit as ugly as the i-Fans they hate.
    samsung Galaxy S4 i9500
  4. There will be a major outage and/or security breach involving Quickbooks Online. Intuit hasn’t shown the management wherewithal or the development muscle to keep QBO running as a stable, truly redundant architecture. Many of the promised changes after the last several outages are still in the early planning stages.
  5. Speaking of big companies sucking really badly, I predict outage-prone Microsoft Office 365 will re-brand their service to distance from the current name. Maybe something like Office Anywhere… despite the name change there will be lawsuits from customers who will lose substantial data. Heads will roll, which at Microsoft means several Directors and VPs will make lateral moves to other divisions.
  6. Seems everyone is talking about BYOD (bring-your-own-device) right now. That’ll turn out to be a fad that no one will be talking about this time next year. It sounds good, ’til you think about what will really happen: We’ll “save” the cost of a $1,200 laptop by having Joe co-opt his kids’ computer, or do everything on an iPad. We’ve been hooking up new employees’ phones to the mail server and key resources for year. Add one clause in the employment agreement that says,
    “Employee consents to installation of Company geolocation and monitoring software on employee-owned mobile devices; if such device is lost, stolen, or employment terminated the Company will securely erase all information contained on the device. Employee agrees that personal information on the device will be erased in this operation and holds Company and its agents harmless regarding deletion of such information.” (You should obviously ask you lawyer before you go sticking clauses in your employee handbook!)
    There are some places where BYOD desktop etc strategy can work, and we’re ready to support it there, but it’s just a buzzword that’s going to go away.
  7. We’ll talk about Gesture Control as a next big thing. It won’t go anywhere. I won’t care ’til I can have my own J.A.R.V.I.S. (Y’know, Ironman’s house computer):

  8. This will be the year of the Linux Deskt……HAHAHAHAHAHAHAHA!
    Even IF a good linux-based accounting system came out, and despite the confluence of Windows 8 sucking, Apple being evil, and mobile devices being too hard to actually do work on…it still wouldn’t be enough for a linux desktop to take hold.

I guarantee that at least four of these predictions will be completely wrong and that we’ll laugh about them (hopefully together) in 2014.

Happy New Year!

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

Tech Tuesday #9: Oh, crap!

Another Tech Tuesday, where we answer reader questions!

TechTuesdays from Charland Technology

Sharon from Lunenburg asks….

Q: Oh, crap!

Which is not really a question per se. So we followed up.

Q: My work computer won’t start!

A: Still not a question. We press on.

Q: My system doesn’t start. It comes up with a black screen that says, “BOOT DEVICE MISSING.” What’s wrong? And by the way, I last backed up about three months ago.

A. It could be something simple, like a flash drive plugged in or a DVD left in a drive. Make sure there are no usb connectors hooked up, and no discs in a drive.

If that’s not the case, there’s a small chance there’s a configuration problem keeping the computer from recognizing the hard drive. Sometimes we can attach the drive to another system to fix data errors. Ideally the hard drive will just attach and Windows will identify and correct file system damage.

Less-than-ideally the hard drive will attach, Windows will say something witty, like, “The disk in drive G: is not formatted. Do you want to format it now?”

Don’t format it. We have tools that can often recover files even if Windows can’t see them. We have had good results with Runtime’s GetDataBack recovery products.

On the other hand, there are some drives you just can’t get to. Either they won’t show up at all…or they’ll make a tell-tale sound of hard drive death

Bzzzzzzt
Bzzzzzzt
Tick-click
Tick-click
Tick-click
Bzzzzzzzt

Many “tech guys” will tell you it’s toast and there’s no possible way to save files from a disk that’s dead. They’re not entirely correct. It’s often possible to recover stuff from a disk that’s physically damaged or failing.

If your hard drive is making clicking or grinding sounds, using software MAY be able to retrieve some files but will reduce the chance of successful professional recovery.

For that we’ll need a cleanroom.

No, not THAT kind of clean.

That’s better. A professional service company like Kroll/Ontrack, DriveSavers, or Gillware will take apart your hard drive in a dust-free environment, replace broken pieces, and copy the data onto another disk.

Cost varies from around $500 to over $2,000 depending on:

  • How quickly it gets done
  • How big your disk is
  • If there’s anything special like encryption, it’s linux, mac, etc
  • Which provider you use

For that kind of money it’s usually not worth recovering the kids’ school projects. But for a master’s thesis…the only copy of your Quickbooks file…wedding pictures….the external hard drive that has 15 years’ worth of family pictures…

it just might be worth it.

Remember, though, that all of this could have been avoided with a simple backup.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

Tech Tuesday #7: Mobile Printing

Tech Tuesdays. It’s your chance to send in your tech questions, and we’ll answer one per week for everyone. To ask a question, just message us. They can be on any topic from security to cloud computing, or anything in between. And we’re featuring Media Mondays over on the CT Media sister page. Be sure to fan us over there, too!

TechTuesdays from Charland Technology

Debbie from Gardner asks, “How do I print from my iPad?”

I’ll extend the question to include iPad, iPhone, Android phone (including my current Samsung Galaxy S3), android tablet (including my current favorite Kindle Fire HD).

If you’re just using Apple iDevices along with computers…it makes sense to look for a printer that supports Apple’s AirPrint standard. AirPrint simplifies printing by automating discovery and driver loading for these devices. Most new wireless printers and all-in-one devices are AirPrint-ready.

Second choice, search the App Store for your printer. Many printer manufacturers like Brother, HP, and Epson have apps that will let you print pictures and other content to your printer.

If you don’t want to buy a new printer, or your printer doesn’t support wireless, try Collobos’ FingerPrint. This program runs on your Windows or Mac computer and shares your printer for your iDevices. Make sure to run the trial before paying the $20 to buy it. There’s a great step-by-step guide on how-to geek for setting this up.

For Android devices things are a little more complicated. Android doesn’t have a built-in print handler like AirPrint. There is the Google Cloud Print program and app…there are about a dozen models of printer that will  automatically connect to the Google service,  Otherwise install the Cloud Print server to your computer and use the mobile-enabled service to print to your printer.

For business use, a nice choice is EFI PrintMe/PrintMe Mobile. This solution turns a computer into an AirPrint print server, similar to FingerPrint, but also offers an Android app to facilitate printing from other devices.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

Tech Tuesday #6: Battery Basics

Tech Tuesdays. It’s your chance to send in your tech questions, and we’ll answer one per week for everyone. To ask a question, just message us. They can be on any topic from security to cloud computing, or anything in between. And we’re featuring Media Mondays over on the CT Media sister page. Be sure to fan us over there, too!

TechTuesdays from Charland Technology

Nadine from Leominster asks, “Should I keep my laptop plugged in or let the battery discharge?”

Laptop batteries have come a long way from the old Ni-Cad batteries of the 1990’s, and (for the most) part Nickel-Metal-Hydride batteries from the early 2000’s.

There are a lot of myths about how to best maintain your laptop and battery. There are also a lot of “best practices” that are not feasible in real life. The average laptop battery lasts about 3 years. This varies widely depending on how you treat the battery.

First Key point: Laptop batteries HATE HEAT. Their ideal storage temperature is ZERO. As in freezing. Every degree above freezing shortens the lifespan of the battery. So use your laptop on a desk, on a table, on a hard surface, or one of those laptop coolers that I always used to make fun of.

Similarly, tossing a running laptop into an insulated bag is not so helpful. Let it get into suspend or hibernate first.

Second key point: Laptop batteries are damaged by full discharge. Which means, turn it off BFORE the battery is completely dead and it shuts down.

 

Third key point: Laptop batteries have a finite life. That means that the chemicals inside the battfery degrade each time the system is discharged and recharged. So while there’s no “memory effect” per se…a partial discharge of the battery has the same effect as a full discharge. So it makes sense to charge the battery fully, unplug, and discharge it to 5-10% left then do a full charge.

Fourth key point: Today’s laptops are smart. Use the power features. They can shut down the DVD (if there is one), reduce brightness, slow down the processor, and take many other measures…simultaneously reducing power consumption (giving you more time per charge) and heat (giving you more charges per battery).

It can be helpful to remove your laptop battery when running for long periods of time on AC power. This can reduce the battery’s exposure to heat and cut the number of unnecessary cycles.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

 

Tech Tuesday #5: Maintenance

Tech Tuesdays. It’s your chance to send in your tech questions, and we’ll answer one per week for everyone. To ask a question, just message us. They can be on any topic from security to cloud computing, or anything in between. And we’re featuring Media Mondays over on the CT Media sister page. Be sure to fan us over there, too!

TechTuesdays from Charland Technology

Today’s question, from Diane from Leominster: “What do I need to keep my new computer healthy?”

Many people don’t realize that computers do need attention and maintenance.

Most computers don’t need much for physical maintenance (we recommend proper ventilation, a good battery backup power supply, and protection from excessive humidity), but they do need regular attention.

1. Backups, backups, backups! We now offer an automated (because you won’t run it yourself), online (to protect your from fire/theft/etc), and monitored (because it’s IMPORTANT) backup solution for home users to complement our more advanced business-grade backups. Contact us for details, plan starts around $15/mo.

 

 

 

 

2. Antivirus. All computers, Windows, Mac, or linux, need software protection. GFI VIPRE has worked well for us and runs well on older computers. We don’t recommend Norton/Symantec or MacAfee products. But yeah, even Mac computers need active protection with automatic updates.

3. System Updates. You should schedule Automatic updates to run, well, automatically. Any system now can be configured to run these updates at a time when you’re not using your computer…for most people this is at night. Most updates fix security problems or solve usage issues, and they’re almost always safer than NOT installing them. And if you’re running Windows make sure you activate Microsoft Update to included MS Office patches as well.

4. Other updates. Make sure your Java, Flash, and Adobe Reader are all kept up-to-date.
a) Java: go to http://www.java.com and click “Free Java Download.” Watch it during the install, though, as it will often try to sneak in the worthless MacAfee safe-scan tool, or the equally-worthless Ask toolbar. Un-check the boxes for those.

b) Adobe Flash and Reader. Go to http://www.adobe.com and look at the bottom-right for “Get Flash” and “Get Reader.” Again, make sure you’re ONLY getting what you want, un-check the boxes for the other crud.

And whenever Adobe Flash, Adobe Reader, or Java ask to do updates, let them!

Otherwise….we haven’t found much value in cookie cleaners, registry “optimizers,” and disk defrags, even the legit ones.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.

Tech Tuesday #4: What do you think of Windows 8?

Tech Tuesdays. It’s your chance to send in your tech questions, and we’ll answer one per week for everyone. To ask a question, just message us. They can be on any topic from security to cloud computing, or anything in between. And we’re featuring Media Mondays over on the CT Media sister page. Be sure to fan us over there, too!

TechTuesdays from Charland Technology

Today’s question, from Jim in Gardner: “What do you think about Windows 8?”

Windows 8 is a mixed bag.I’ll be writing in-depth coverage later this month.

Of course the newest version of Windows always has the most up-to-date security features. The Win-X menu is great, the expanded Start menu isn’t my cup of tea but seems useful. The new Task Manager provides loads of useful information for us techies, and the Win 8 systems I’ve used are very, very fast to boot and sleep.

On the other hand, there’s a lot of redundancy…you’ll see two completely separate Internet Explorer items, one of which is an “app” and runs full-screen. Many tasks have changed from clicking things to “hovering” your mouse in a certain corner of the screen, or keyboard combinations. Win-I, Win-E, Win-X are very useful but it’s my opinion that good user interfaces don’t leave the users guessing like Win 8 does. I’m also concerned about patching and updating the multiple Internet Explorers, Flash, Java, etc for each part.

And don’t get me started on Microsoft Office 2013. The previews make it significantly less usable than Office 2010 (which contained a few minor but appreciated improvements over Office 2007)

Bottom line: If you have a convertible system, tablet, or other touch-screen then Windows 8 can work nicely. For instance on a Lenovo ThinkPad Edge Twist it makes perfect sense…Use the tile-y block-y tablet-y “apps” when you’re folded over in Tablet mode, then use the Windows Desktop to run “programs” like a real computer. When properly assembled this Frankenstein makes sense…but on a conventional computer it’s just schizophrenia.

In general, though, Windows 8/Office 2013 are just bad interface design. I’m supposed to say, what? “Move your mouse to the bottom-left corner of the screen and wait for something to happen…now go to the upper-right corner, wait for the icons to slide in from the right, and click the gear.”

To say nothing about running this system remotely…on an unstable internet connection.

Got questions? Send them to CharlandTech via Facebook, post as a comment on this article, Tweet ‘em to @gregc00 or @CharlandTech, or find another creative way to get them to us.