Archives

Wharton Woods Family Law

By Michael Birman on July 2, 2022

Kenet Family Law

By Michael Birman on July 2, 2022

Top 10 Issues with Windows 10 and How to Solve Them

By Michael Birman on July 2, 2022

Top 10 Issues with Windows 10 and How to Solve Them

Learn how to solve common Windows 10 issues

Increase your productivity and efficiency

Windows 10

Back on July 29th 2015, when Microsoft released its latest operating system into the wild, it was expected to come with fewer issues and to ultimately make life easier for its users. However, what the world noticed was entirely on the contrary. Users, who took Windows 10 for a spin in its early days helped Microsoft discover a lot of problems in Microsoft Edge (the new web browser to replace Internet Explorer and Finally compete with Chrome and Firefox) and other areas of the system. This brought about frenzied  subsequent updates that each came with a fair share of additional challenges.

Four years down the line, the latest version of the Windows Operating System still brings pain to users on various fronts. While some of these issues are brand new others have been carried down from the previous versions, a solution to each of these issues, ranging from the start page to Office 365, is sought after.

Here we show you some quick tips and tricks to solve some common problems.

 

Windows 10 Tips and Tricks

Here are a few problems that you must be aware of before you click the install button for installing Windows 10 on your system.

 

1. Space need for installing updates

While Windows 10 is out of the world in looks and feels, the installation part is where most of us have a hard time. While this may not seem like an issue at all to users with newer PCs, the guys with old desktops see bugs and issues in the installation of the updates.

Inside a Computer

If you don’t have a ton of money to spend on new systems with enhances disk space, here’s what you can do: You can use an external cleaner app that is at times more efficient and brings you more free space when compared to the inbuilt disk cleanup tool. Here is the guidebook to follow for cleaning up space on your hard drive.

 

2. Slow loading (slow boot time)

People have been reporting issues of slow boot time on their Windows 10 PCs, and some have even claimed it to be so slow that they literally prepared a cup of coffee and came back to their desks. Well, there’s nothing to be surprised at! 

Slow loading timer

This slow boot time can be due to many reasons, out of which the main reasons are an outdated Windows version, less space in the hard drive, or if your system is attacked with malware. Now, you can replace the HDD with an SSD as the safest way to deal with the situation. Ivan Jenic has prepared a whole list of other solutions to get quick boot times.

 

3. File association – files opening with the wrong app

If you are running into issues with files trying to open with a completely different application, then you are in the right place. Well, you can always open it with the best app on clicking “open with” option on right-click, but we want to prevent you from doing that every time you want to open something.

 

You can easily change this from the default apps section in the settings of your PC. Once and for all, this will be a solution for a lifetime. In the default section, you can change the default search engine or the default music player and others.

 

4. Data use – uses 4G data when you don’t want it to

Even in times when you can’t have the benefit of getting access to 4G data, Windows 10 tends to use 4G data and eat all of it in the background without you even knowing it. You can set up the connection as metered and use your hotspot without any worries about the data being eaten up.

Follow the steps below:

  • Click on the Start menu and then Settings.
  • Find the Network & Internet option there and then select Wi-Fi.
  • Next, find your network name and set it to a metered connection, and Windows will take care of the rest.

IT Support and Consulting

5. Too many notifications

Although Windows provided with the feature to view at all notifications in the Action Center, sometimes these notifications can eat our head when they are in bulk. Atop this, most of these are useless. And yes, there’s a way to banish all these unnecessary notifications.

Open Settings from the Start button. Open the System section and then go to Notifications & Actions. From here, you can remove any links from where you don’t need notifications every time.

 

6. Privacy settings not optimum for most businesses

The privacy of a business in the 21st century becomes of the utmost importance with leaks and piracy happening now and then. Windows has a dedicated Privacy screen in the Setting panel from where you can set your privacy according to the needs of your business. Here’s a full guide to check your Windows 10 privacy settings right now.

Network Infrastructure

7. Where did system restore go?

A manual intervention to ensure recovery from problems in necessary at times. However, in Windows 10, some people may find difficulty in finding the System Restore button, which may come as one of the biggest problems with Windows 10 at times.

 

  • Type “system restore” after clicking on the Start button.
  • Select “create a restore point.”
  • Next, click on the System Protection tab.
  • Select the C drive and press Configure.
  • Turn On the system protection.

 

8. Printer issues

Printers have always been problematic on certain Windows versions, and it is the same with Windows 10 too. Well, here’s a quick way to fix any printer issues on Windows 10.

 

9. Is your PC powerful enough to support Windows 10?

It’s a dream of every computer owner to run the latest versions of the Operating system on their desktops. However, with Windows 10, there are specific criteria from Windows, which you need to follow to ensure that Windows 10 works fine on your PC. 

 

10. How to manage and schedule software updates, so they don’t get in your way

Windows 10 comes with exclusive and necessary updates now and then. For users, it becomes essential to schedule the updates so that they don’t get n the way. You can set the Update to Automatic from the Services option, after which Windows will take care of the updates every time you are connected to the Wi-Fi.

 

CONCLUSION

The features on board with Windows 10 are amazing but being aware of all the issues that you may face and how to come out of these issues becomes essential. The problems stated above are all understandable, and you don’t have to panic in any such situation.

Toronto Businesses at Risk from Cyber Security Threat

By Michael Birman on July 2, 2022

Toronto Businesses at Risk from Cyber Security Threat

In the time of 1950s, Cyber word used to refer to Cybernetics – The technology of understanding the control and movement of machines and animals.  But today, the term is almost exclusively used to describe cyber security matters. Because it’s hard to visualize how digital signals traveling across a wire can represent a harmful digital attack, we’ve taken to visualizing the digital phenomenon as a physical one.

A cyber security threat is an attack that is mounted against us by means of cyberspace. Cyberspace, a virtual space in the digital device or system that doesn’t exist, has become the metaphor to help us understand digital weaponry that intends to harm us.

Network Infrastructure

As noted the evolving threats to Canada’s cyber network, the government of Canada has outlined a robust plan to make top level security to address the risks to the Canadian government and its business owners from the cyber attacks, and cyber crime.

Most parts of Canada cyber security strategy are focused at protecting confidential information of government, business owners and critical infrastructure, but the plan does directly affect ordinary Canadians through a series of specific security measures designed to make Canadians more secure online. In particular, the government of Canada has concerned itself with what ordinary Canadians worry about most: the security of their sensitive personal and confidential business information.

The National Cyber Security strategy of Canada recognizes that each Canadian has a significant role to play in protecting themselves from becoming the victim of cyber threat. 

As such, much of the government’s initiative is aimed at Canadian centers for cyber security to educate citizens on the most critical cyber security practices, frequently changing key passwords, including keeping antivirus protection up-to-date and only using secured wireless networks. 

The government of Canada is also trying to increase general awareness of the types of cyber threats that common online crimes generally present.

The Risk from Cyber Security Threat:

There are many risks from a cybersecurity threat. It is vital that information security is taken seriously within an organization’s information technology systems.

What are the risks of a cybersecurity threat?

  1. Data Breach
  2. Loss of Data
  3. Internet of Things (IoT) 
  4. Malware
  5. Social Engineering
  6. Hacking

 

The following are some of the cyber threats or risks that you should watch out for.

 

Data Breach:

Cloud data storage is very popular and rapidly increasing in popularity. Many businesses follow traditional methods of data storage and are transferring their data to the cloud. This leaves you vulnerable while you are backing up your data. It is possible that some systems can have unauthorized access to your information. Your cryptographic keys can be vulnerable during this process. There are also some transfer protocols that transmit sensitive data in plain text which is a significant vulnerability and not always obvious it exists. 

 

To mitigate the risks of a data breach, business owners need to be picky when it comes to choosing a cloud provider. Cloud security is an important part of protecting sensitive information such as intellectual property, credit card data and other important sensitive data that is at risk if a data breach were to occur.

 

Loss of Data:

Loss of data can be devastating to a business and it happens far too often. Sometimes important data may get lost due to many reasons. The reason behind loss of sensitive data may be through deletion, alteration and use of an unreliable, unsecure storage medium. 

Loss of data or a data breach can ruin the reputation of a business, cause a loss of customers, and drain your finances. 

 

Internet of Things Insecurities:

Internet of Things (IoT) technologies connects and networks devices across the world. They are perhaps the most vulnerable and prevalent type of cybersecurity threat in existence today. Many IoT devices are treated as “set and forget” when it comes to cybersecurity. They typically reside on a process network with default or admin-level credentials at the patching and firmware versions they were released with. 

 

This is a very vulnerable state and they are significant targets, representing a large part of the attack surface a potential hacker may try and exploit. Given the nature of IoT devices, they are usually not considered as directly connected to the internet and usually don’t use protocols and interfaces people are familiar with and consider as the “internet”

 

Malware/Ransomware Attack:

A malware attack refers to the activity when cybercriminals create malicious software that’s installed on the owner’s device or system without their knowledge to gain access to personal information or to damage the system, usually for financial gain. There are many causes of malware attacks from cyber criminals. 

 

Some common reasons are behind the malware attacks, the use of many free software programs, removable media, and not having an internet security software program in place. To prevent this, Software updates are important because they repair security holes that have been discovered on a regular basis, and fix or remove computer bugs.

 

 

Social Engineering or the Human Factor:

Whether with intent or without malice, people are the biggest threat to cybersecurity. Most of the businesses continue to face insider threats as a major form of cybersecurity breaches. The users in organizations are the weakest link.

 

This can be due to a lack of cybersecurity awareness — such as using easy-to-guess passwords or falling for phishing emails.

 

Social engineering is a very real problem. It is the practice of using human nature and tricking people either directly or to circumvent security systems.

 

The best solution for this problem is training staff on cybersecurity measures, monitoring their activities, and testing. 

 

Hacking:

Hacking is a general umbrella term. Most hacks are multifaceted and not as direct as people imagine. Sharing or leaking of seemingly benign information can lead to a privilege escalation that forms the basis for a broader more substantial hack. Many hacks are automated, at least on initial attack surface probing. 

Conclusion:

Are you concerned that your business is not secure from the cyber attacks? Our expert at Eyes Everywhere, have experience in analyzing and implementing robust security plans, from prevention all the way to mitigation, to protect our client’s critical information. Contact us Eyes Everywhere today to secure your systems and reduce your risk from cyber security threat.

Network Support

Network Security and Support in the Toronto Area

By Michael Birman on July 2, 2022

Network Security and Support

Eyes Everywhere network support will get your network up and running in no time.

Keeping your business productive and your network secure.

Eyes Everywhere offers IT support and consulting services in the greater Toronto area. We keep your network running and your business productive. We have vast experience and expertise in network security and network support. Call Eyes Everywhere on 416.731.1012 today for support.

Network Support

Network Support

We provide Tech Support Services for small business computer networks. Eyes Everywhere will keep your business going and keep you productive.

  1. Managing wireless networks
  2. Disaster recovery & Backups
  3. Cloud services
  4. Mobile devices
  5. Software and Hardware Setup.
  6. Application support

 

Network Infrastructure

Information technology is evolving at a rapid pace. Managed it services and support companies are needed to help keep your business running and reduce downtime. Outsourcing this support to us saves a lot of money over hiring a support technician / system administrator full time, or addressing emergencies and downtime when those happen. Eveys Everywhere mobile technicians can be rapidly deployed to your facility anywhere within a 100 KM radius of Toronto.

Every company and situation is different but our experienced technicians will be able to quickly diagnose and resolve your problems. As all our staff is highly-trained and highly-experienced.

 

Networked Computer Systems

Whatever your network topography, we have the solutions to fix your problems. We can help fix and identify problems with a wide variety of network services such as

  • Databases
  • Cloud services
  • Servers and Virtual Services
  • Email and Email Servers
  • Desktops
  • Laptops
  • Security
  • Firewalls
  • Disaster recovery
  • Backups
  • Setting up new hardware and software

We deal with all 7 layers of the OSI Model  from application specific details right down to the physical network hardware that data is transferred over to.

OSI Network Layer Model

Image Source: Fossbytes

 

Network Security

Harden and protect your Network Security with the Eyes Everywhere Service

Keep your business data secure and your company up and running.

Eyes Everywhere has been securing networks since 2004, we have the skills and experience to meet the demands of your business.

Network Drives

Businesses can’t ignore the importance of a modern network infrastructure, which includes good security and intrusion prevention systems (IPS). Most networks are constantly under attack by malicious actors trying to gain access.

Don’t be one of the businesses that gets hacked! Let Eyes Everywhere help to make sure your network is secure, stable, fast and productive.

 

Most network breaches take advantage of holes in your network and systems on your network in a multi hierarchical fashion. They prey on the weakest point in your network and pivot and escalate privileges through your systems. The stronger your weakest link, the safer you will be.

Eyes Everywhere can help set up, configure and harden

  • Antivirus
  • Anti-spam
  • Backups
  • Configuration and Enhancement
  • Disaster Recovery
  • Integration
  • Intrusion Prevention Systems (IPS)

Where do we provide support?

We serve the following locations within a 100 KM radius of Toronto and can be on site fast.

We have been providing fast response IT support and tech support services for businesses since 2004 and have built up a great reputation with many references from happy customers.

  • Brampton
  • Oshawa
  • Vaughan
  • Bowmanville
  • Toronto
  • North York
  • Mississauga
  • Scarborough
  • Markham
  • Whitby
  • Thornhill
  • Richmond Hill
  • Pickering
  • Oakville
  • Burlington
  • Georgetown
  • Orangeville
  • Newmarket

Toronto Area Map

Dronejacking

By Michael Birman on July 2, 2022

The world in which we live gets more technologically advanced every day and things that were previously accessible to only a select few have now become available to pretty much everyone. During the 1980’s when personal computers were the newest thing, the desktop devices were much more expensive (not to mention cumbersome) than they are today.

Thirty plus years later, personal computers are commonplace in homes around the industrialized world and everything on the internet is now available anywhere at anytime thanks to a large variety of handheld mobile electronic devices, including cell phones, laptops and tablets.

Another electronic device that is quickly changing the way we live and work is the drone that began as a hobby for flying enthusiasts or expensive gifts to kids from parents who could afford them. Today multiple companies are manufacturing affordable drones which have made them more popular and the devices are quickly becoming mainstream business tools.

Multiple government agencies and a variety of businesses are now using drones to assist in accomplishing their goals which include photography, news media, farming, law enforcement, shipping and more uses for drones are always being found.

Both UPS and Amazon plan to start delivering packages using drones instead of the typical mail transporting services. When that becomes reality you will have to worry about your package even making it to your doorstep to be stolen by someone watching for package deliveries because hackers will be able to gain control of drones in-flight and redirect them to another location.

As we have seen in the past any type of electronic device that gets connected to a network becomes a potential target for hacking. These nefarious efforts are made easier by devices that have little or no security measures in place and are easy to set up facilitated by using open ports and unencrypted communications.

A recent example sparked anxiety in the up-and-coming drone industry when a drone was found outfitted with hacking capabilities that would allow it to hack into local wireless networks after landing on roofs of businesses, homes or government facilities.

DefCon demonstrated in 2015 that someone could very easily take control of a drone while in flight. Since shipping drones will likely be launched each time from a specific location, it won’t take long for hackers to determine flight patterns and easily assume control of regularly flying drones and their cargo.

The logistical nightmare created by dronejacking for companies like Amazon and UPS could negatively impact the success of such programs even though successful dronejackings would be unreliable and package contents are unknown.

Drones have also been known to annoy people when they fly over their houses and many have resorted to throwing rocks or shooting guns to bring them down. This presents questions about invasions into personal space and “no-fly zones,” which are just a few of the issues currently being considered by national and local authorities. Ordinances and regulations about drones are still being formulated so many agencies don’t know how to handle drone complaints.

The media and photography enthusiasts use drones to get pictures that are not easily accessed otherwise using expensive high-quality photographic equipment. Hackers could easily assume control of not only the expensive drone, but the costly equipment it carries which creates a tempting target for dronejacking by those who resell various devices including drones and camera equipment.

Multiple federal, state and local law enforcement agencies use drones for surveillance and to assist with crowd control in highly charged scenarios like protests and situations involving active shooters. Protesters could look to technology to take out surveillance drones and security feeds upon which law enforcement agencies rely.

Researchers have found open ports and weak authentication tools in many drones used for consumer shipping which allows hackers to send remote commands to drones to redirect them. Most of these redirections are currently being done manually but it won’t be long before someone produces a format that makes exploitation easier.

Most vulnerabilities are easily remedied with a software update from the drone manufacturer and those who manufacture more expensive high-end drones will probably offer fixes sooner than cheaper drones for which fixes will be a long time coming.

Cybersecurity experts predict that drone exploit kits will soon start making the rounds on the internet and more media stories about dronejackings will appear in newscasts worldwide. Questions about personal no-fly zones will abound and debates on social media will be heated about solutions that may include running software from a laptop instead of hurling rocks and loading weapons.

Experts also predict drones will be taken out of the air by individuals using directional antennas and that hackers will develop a way to quickly eliminate surveillance drones used by law enforcement.

Commercial aviation grew slowly over a long period of time as did rules and regulations governing it. Drones are advancing at a much more rapid pace which is leaving the United States Federal Aviation Administration scrambling to formulate regulations governing where and when both private and commercial drones can fly and local authorities are awaiting those rules and regulations, as are individuals who operate or are affected by drones.

Microsoft Windows 10 Tips & Tricks

By Michael Birman on July 2, 2022

 

Introduction to Windows 10 and Windows history

Before Microsoft introduced its Windows Operating System operators had to access data on computers using Microsoft MS-DOS which was a “command-line” operating system that required knowledge of multiple codes and was very different from and much more complicated than the latest icon laden operating system known as Windows 10.

In this article you will learn the following tips

  • Signing in with a Local Account
  • Revert to the Classic “Start” Menu
  • Pin Internet Explorer to your “Start” Menu or Task Bar
  • Unpin Microsoft Edge from Start Menu and Task Bar
  • Make Internet Explorer Your Default Web Browser
  • Have File Explorer Open to Your Personal Computer
  • Disable Cortana
  • Removing Cortana from the Task Bar
  • Removing the Task View Option from the Task Bar
  • Removing the Action Center Option from the Task Bar
  • Changing the Color of Title Bars

 

MS-DOS contained no graphics or windows and users would see a “DOS prompt” when they booted up their computers. You had to know the commands necessary to launch certain computer programs or run utilities that were built into the system.

This complicated operating system required various commands for operating the computer that included typing “A:” at the prompt to switch between a floppy drive and drive “A.” To change directories you would use the “CD” command; to view files in a directory you would use the “DIR” command and to run a particular computer program you would have to type in the name of the program’s “executable file” at the prompt.

MS-DOS did only one thing at a time so that multitasking with which we are so familiar today was impossible. If you were in a program and wanted to use another, you’d have to close the current program and enter the command to open the other program. If you wanted to add a new program from a floppy disk, you would have to insert the floppy disk into your computer’s “floppy” drive and wait for the computer to read the contents on the disk. Then you would have to follow a series of commands to actually be able to access and use the new program.

The old DOS system didn’t support electronic hardware devices that are needed to run various programs. For example if you purchased and installed a new game onto your computer, that game had to include options for supporting every type of sound card that computer users may use and you would have to use a SETUP program to configure settings for every computer program you added to your computer.

Thankfully, Microsoft developed its Windows technology that simplified computer use and increased the demand for personal computers. Multiple software applications have been developed to accommodate every computer user and provide software solutions for basically everything you need to accomplish.

Microsoft continually upgraded its Windows Operating System and is currently on Version 10. Windows 7.0 has proven to be the most popular version of the operating system and many people prefer it over Windows 10. However, if you purchase a new computer the upgraded Windows 10 is the only option available.

Many computer operators would like to incorporate some of the features of the older 7.0 version into the newer 10.0 and, if you are one of those people currently using Windows 10 but would like to make it seem more like 7, the following is a list of things you can do to accomplish that.

 

Signing in with a Local Account

Of course Windows 10 prefers you sign in using your Microsoft account but you can do a few things to enable signing in with a local account instead following these steps:

  1. Click on the “Start” button.
  2. Click on the “Settings” button which resembles a gear.
  3. Click on “Accounts.”
  4. Click on “Sign on with a Different Account.”
  5. Type the password used to access your Microsoft account.
  6. Click on “Next.”
  7. Type a “User Name.” You can also create a “Password” but it’s not required.
  8. Click on “Next.”
  9. Lastly click on “Sign Out and Finish.”

Revert to the Classic “Start” Menu

Windows 10’s “Start” menu is very different than the menu in 7 and you can revert back to that 7 menu if you prefer using the following steps:

  1. Use the “Start” menu, task bar or desktop to launch your preferred browser.
  2. Navigate to “www.classicshell.net.”
  3. Click on “Download.”
  4. After the file finishes downloading, click on “Run.”
  5. Click on “Next.”
  6. Click on the box next to “I accept the terms….”
  7. Click on “Next.”
  8. Click on “Next” again.
  9. Click on “Install” and then “Finish.
  10. Click on the “Start” which brings up the “Settings” menu.
  11. Click on “Windows Style 7.”
  12. Click on “Select Skin.”
  13. Click on the down drop arrow next to “Skin.”
  14. Select and click on a “Skin.”
  15. Click on “Okay,” which will make your “Start” menu look like Word 7.

Pin Internet Explorer to your “Start” Menu or Task Bar

Newer personal computers are already equipped with Windows 10 which uses “Edge”
as its web browser but you can use the following steps to use Internet Explorer instead.
These actions will remove the IE browser from storage, display it on your “Start” menu
or task bar and you can then begin using it as your browser instead of Edge.

  1. Right click on the “Start” button.
  2. Click on “Search.”
  3. Type “Internet Explorer.”
  4. Right click on “Internet Explorer.”
  5. Click on “Pin to Start” or “Pin to Task Bar” or both, if you want.

Unpin Microsoft Edge from Start Menu and Task Bar

If you want to get rid of the “Edge” icon you can follow these steps to remove it from your Start menu and Task Bar:

  1. Right click on the “Edge” button in your task bar.
  2. Click on “Unpin from task bar.”
  3. Click on the “Start” button.
  4. Right click on the “Edge” tile.
  5. Click on “Unpin from Start.”

Make Internet Explorer Your Default Web Browser

Computer users can make Internet Explorer their default web browser in Windows 10 by using the following steps:

  1. Click on the “Start” button.
  2. Click on the “Settings” button which looks like a gear.
  3. Click on “System.”
  4. Click on “Default Apps.”
  5. Click on “Microsoft Edge” or whatever is your default web browser.
  6. Click on “Internet Explorer.”
  7. Click on “Switch Anyway.”

Have File Explorer Open to Your Personal Computer

When you open “File Explorer” in Windows 10 you are automatically directed to a “Quick Access” section where frequently used files and folders are stored. Use the following steps to make File Explorer open those files and folders on your computer instead of Quick Access.

  1. From your “Start” menu, desk top or task bar, launch “File Explorer.”
  2. Right click on “Quick Access.”
  3. Click on “Options.”
  4. Click on the drop down arrow next to “Open File Explorer.”
  5. Click on “This PC.”
  6. Click on “Apply.”
  7. Click on “Okay.”

Disable Cortana

Cortana is a digital assistant included in Microsoft Windows 10 which can be helpful as well as annoying. Cortana could previously be disabled with the click of one button, but that is no longer an option. Options included for those using Cortana are: “Hey Cortana” which will make the digital assistant respond; “Lock Screen” allows Cortana to work when your electronic device is locked; “Taskbar Tidbits” allows Cortana to interject occasionally while you are in the “search” field; “Send Notifications Between Devices” allows Cortana to provide updates about any additional electronic devices that are connected to Windows; “History View” is self-explanatory in that it shows your history in the home screen of Cortana; and “My Device History” is the means by which your history is collected from all devices.

Although the one click option for disabling Cortana is no longer available you can adjust some settings to make it at least seem like you got rid of it by following these steps:

  1. Right click on the “Start” button.
  2. Click on “Search.”
  3. Click on the “Settings” button which, again, looks like a gear.
  4. Click on the switch that appears beneath “Settings” options to turn it off.

Removing Cortana from the Task Bar

Although having a “search” option on your task bar might be convenient, it doesn’t resemble the one in Windows 7 and many people would like to remove it which can be achieved by following these steps:

  1. Right click on a blank spot on your computer’s task bar.
  2. Click on “Cortana.”
  3. Click on “Hidden.”

Removing the Task View Option from the Task Bar

The “Task View” button on your computer’s task bar was designed for electronic hand held tablets. When you click on that button, a screen appears that shows all of your open windows (basically the same function as the Alt + Tab shortcut). You can remove it from your task bar by using these steps:

  1. Right click on a blank spot on your task bar.
  2. Click on “Show Task View Button” so the checkmark disappears.

Removing the Action Center Option from the Task Bar

Using the following steps will remove the “Action Center” option from your computer’s task bar:

  1. Right click on a blank spot on the task bar.
  2. Click on “Settings.”
  3. Scroll down to and click on “Turn System Icons On or Off.”
  4. Click on the “Switch” option next to “Action Center” to turn it off.

Changing the Color of Title Bars

In Windows 7 the title bars on open windows is blue but Windows 10 uses white as its default bar color. You can change the color of title bars following these steps:

  1. Click on the “Start” button.
  2. Click on the “Settings” button.
  3. Click on “Personalization.”
  4. Click on “Colors.”
  5. Click on whatever color you want to use.
  6. Turn it on by clicking on “Switch” under “Show Color on the Title Bar.”