Mysterious OneDrive Check Marks and Cloud Takeover of Your Computer

Mysterious OneDrive Check Marks and Cloud Takeover of Your Computer

If you’re a Microsoft Windows user, have you ever noticed those subtle check marks next to your files on your desktop and file explorer, thinking they’re just a harmless indicator of synchronization? Well, buckle up, because there’s more to it than meets the eye. In this detailed blog article, we’ll delve into the concerning phenomenon of Microsoft OneDrive quietly relocating your files to the cloud without so much as a warning.

OneDrive 1

The Silent Migration: OneDrive and Your Local Files

In recent developments, Microsoft OneDrive has undergone changes that might catch users off guard. Files once comfortably residing on your local computer are now being stealthily moved to the Microsoft cloud, and the implications may be more significant than one might first think.

  1. Default Cloud Pointing in Office Applications

As part of recent updates, Office applications have undergone a default configuration adjustment, seamlessly integrating with the cloud. This alteration may lead users to unknowingly engage with files stored in the cloud, inadvertently diverting their work from local machines to cloud-based storage. The default file location changes from the local device e.g. C:/Users/John to “OneDrive” aka The Cloud. Windows moves all of those files “Off” your computer into the cloud,

OneDrive 2

  1. Many are unaware their files are even in the cloud:

One of the primary issues is that many users are blissfully unaware that this file migration is even taking place. The lack of awareness can lead to unexpected consequences.

  1. Offline Access Challenges:

If you find yourself offline, disconnected from the internet, accessing your files could be an impossible task. Your files now rely on an internet connection for accessibility. You must manually adjust settings to “Always Keep On This Device”.

  1. Backup Program Limitations:

Automated backup programs like iDrive, designed to safeguard your files, face a hurdle. The changed file location disrupts the backup process, potentially leaving your data vulnerable. OneDrive can be infected and encrypted with ransomware as OneDrive is mounted to a local folder on a local computer. Be sure to adjust backups accordingly.

  1. Encryption Concerns:

Files stored in Microsoft’s cloud may lack encryption at rest. Unlike some encryption processes that occur during file transmission, files stored in the cloud without encryption at rest pose potential security risks. While encryption at rest is supported, it may not always be on unless “BitLocker” local file encryption is enabled.

  1. Irrecoverable Deletions:

Once files are deleted from OneDrive, users have a limited 30-day window for recovery. This may pose challenges for users who discover missing files months or even years later. There have been cases where entire “folders” were deleted and not noticed missing until months later.

  1. AutoSave of Microsoft Office Documents no longer works for saving files to the local PC.

In a Microsoft Office update, the AutoSave feature no longer saves files to the local PC. Now, users must be logged into the Microsoft cloud for AutoSave to function, requiring manual “SAVE” clicks during document edits. This shift disrupts the traditional AutoSave process, requiring users to adapt their workflow to this new cloud-dependent approach. Be sure to save your files periodically.

  1. Data Cross-Pollination: Potential Mix-Up of Personal and Work Files in Microsoft Accounts

A potential data cross-pollination concern has emerged for users juggling both a Microsoft Work account and a Microsoft Personal Account. Situations have arose where “personal files” may have been inadvertently saved to the “work account,” creating a potential mix-up of sensitive data. This unexpected overlap raises privacy and security implications, urging users with dual Microsoft accounts to exercise caution and verify the account context before saving or accessing files.

Some OneNote notebooks have been syncing and saving to the wrong account. One way to know where a OneNote Notebook is saved to the wrong location is by listing the notebooks and hover over the notebook in question, the location should be in the hover text.

As Microsoft addresses this issue, it’s crucial to stay informed about updates and take proactive measures to prevent unintentional data mingling between their work and personal accounts.

  1. CoPilot Connection:

The timing of this file migration raises questions, especially with the introduction of Microsoft “CoPilot.” Was your data used to train CoPilot? The possibility is worth considering.

  1. Privacy Policy Shift:

Recently  pop-ups alerting them to a “Privacy Change” policy from Microsoft. Many often click right through these without reading the agreement. The interpretation suggests that Microsoft now has the liberty to use any data stored or used on its services as it sees fit, introducing potential privacy concerns.

Navigating the Cloud Takeover: What You Can Do

  1. Awareness is Key:

Educate yourself and your team about these changes to ensure everyone is aware of this shift in file management. Be familiar with your data structure and configuration, check settings and file locations regularly.

  1. Review and Customize Settings:

Explore OneDrive settings to customize syncing preferences and file locations, providing better control over your data.  In OneDrive , select the “Gear” icon, settings and check “Always Keep On This Device”, this should keep a copy of files on your device as well as OneDrive.

  1. Microsoft OneDrive Menu

  2. OneDrive 3Offline File Management:

Some users have noted instances where, despite adjusting settings to ” Always Keep On This Device,” the configuration reverted to the default cloud storage, leading to files not being stored locally on the PC as intended. This appears to occur during Windows updates. Be vigilant in monitoring and confirming your offline settings to ensure a consistent and reliable offline file access experience.

Notice the white arrows are shortcuts, while the green checkmarks are OneDrive files.

  1. Regular Backup Checks:

If you rely on backup programs like iDrive, regularly check and adjust settings to accommodate the changes in file location.

  1. Privacy Policy Understanding

Take the time to understand Microsoft’s updated privacy policy to make informed decisions about your data.

Conclusion:

The mysterious check marks next to your files now carry a weighty significance. As technology evolves, staying informed and proactive is the key to navigating these changes seamlessly. Microsoft OneDrive’s cloud takeover demands our attention and understanding to ensure a smooth transition without compromising the security and accessibility of our valuable data.

Microsoft may be conditioning users into the next phase, which seems to be centered around moving away from local machine software licensing to “Cloud-Only” software licensing. In this scenario, all data storage and processing will occur exclusively in the Microsoft cloud, rendering your local PC or device as nothing more than a “Terminal.” Interestingly, this concept harkens back to the approach adopted by Wyse Technology in the 1990s, where amber text “Character Terminals” connected to a server via a “Dial Up” connection.

Stay tuned for updates and adjust your file-saving habits accordingly.

This information is based on interpretation, it is essential to recognize that Microsoft’s motivation for changes in their services are often multifaceted. Microsoft has been progressively integrating cloud services into their ecosystem, and this shift aligns with broader industry trends towards cloud-based computing. The exact intentions behind these changes, however, may involve various factors, including enhancing collaboration, security, and providing users with flexible and accessible computing environments. Users are encouraged to stay informed about Microsoft’s official announcements for the most accurate and up-to-date information.

Need help? I can assist via a remote support session and telephone call. (424) 532-1633

IDrive Cloud Backup

Navigating Change: iDrive’s Recent Pricing Adjustment

Navigating Change: iDrive’s Recent Pricing Adjustment

IDrive Cloud Backup

 

 

There are some important changes in the world of data backup, specifically regarding the exceptional product that many of you have come to rely on – iDrive. As your dedicated IT professional consultant, it is my responsibility to keep you informed about developments in the tech landscape that may impact your digital well-being.

In recent times, iDrive, the robust data backup tool we have come to trust for its simplicity and enterprise-level capabilities, has made a necessary adjustment to its pricing structure.

From $79 a year to $99 a year any price increase may raise concerns, it’s crucial to delve into the reasons behind this decision and explore the continued value that iDrive brings to the table.

Why the Change? Understanding the Dynamics

In the ever-evolving landscape of technology, the costs associated with maintaining a cutting-edge product like iDrive have seen a notable increase. As the demand for advanced data protection and backup solutions continues to surge, iDrive has consistently enhanced its features, security measures, and overall user experience.

The team at iDrive is committed to delivering a product that not only meets but exceeds the expectations of both individual users and enterprises alike. This commitment involves ongoing investments in research, development, and infrastructure to ensure that iDrive remains at the forefront of the data backup industry.

The Unmatched Value of iDrive

Let’s take a moment to appreciate what sets iDrive apart and makes it an indispensable tool for all your backup needs. From seamless PC backups for everyday users to the comprehensive capabilities required by enterprises, iDrive stands as a versatile solution that doesn’t compromise on ease of use or security.

  • User-Friendly Interface: iDrive’s intuitive interface ensures that even those with minimal technical expertise can effortlessly navigate the backup process, making data protection accessible to everyone.
  • Enterprise-Grade Features: Behind its user-friendly exterior lies the depth and breadth of an enterprise-level tool. iDrive doesn’t just backup; it empowers businesses with features like real-time syncing, server backups, and robust security protocols.
  • Cross-Platform Compatibility: Whether you’re on Windows, Mac, iOS, or Android, iDrive ensures a seamless experience across all major platforms, making it a reliable choice for diverse technological environments.
  • Cloud Backup and Accessibility: iDrive allows users to securely back up all their computers and access their data in the cloud. This means your important files are not only protected but also easily accessible from anywhere, providing the flexibility needed in today’s dynamic work environments.
  • End-to-End Encryption: iDrive takes data security seriously. With encryption at rest, your sensitive information remains private and secure, giving you peace of mind in an era of increasing cyber threats.
  • Add-On Capabilities: iDrive offers powerful add-on capabilities, such as the iDrive Express (e2) service. This service extends your backup coverage to include cloud data from platforms like WordPress sites/databases, Cloud Databases, virtual machines, and even Network Attached Storage (NAS) devices like Synology. This ensures that your entire digital ecosystem is safeguarded, providing a comprehensive solution for your evolving backup needs.
  • Protection from Microsoft OneDrive issue: with recent,  unannounced updates to Microsoft OneDrive, a significant shift has occurred in the way files are handled, impacting user access and file management. Instead of merely backing up files, OneDrive now moves them into OneDrive rendering you no longer to access your files on your local drive. If your system is being backed up with iDrive, your local files get backed up and stay there until you delete them.
  •  ( If you’re a Microsoft OneDrive user, be sure to read my blog article “Navigating Changes in Microsoft OneDrive: Understanding File Movement and Access.”
  • Exclusive Promos and Offers for Our Community

I know all too well changes in pricing can be an adjustment, but I am excited to share exclusive promos and offers available to you, our community. By leveraging our affiliate partnership, you can still access iDrive at a competitive rate while enjoying the same high-quality service.

  • Exclusive Promos and Offers for Our Community

I understand that changes in pricing can be an adjustment, but I am excited to share exclusive promos and offers available to our community. By leveraging our affiliate partnership, you can still access iDrive at a competitive rate while enjoying the same high-quality service.

 IDrive® Mini for computer users with only 100GB ($2.95 yr) or 500GB ($9.95 yr) of data. (select “Pricing” to see Mini Plan)

iDrive’s Personal 5TB to 100TB starting at $69.95 yr.

iDrive360 Endpoint Cloud Backup

iDrive’s official website – FREE 5GB for New Users!

Final Thoughts

Change is a constant in the tech world, and iDrive’s commitment to adapting and improving ensures that your data remains in safe hands. As your dedicated IT consultant, I endorse iDrive not just as a product but as a partner in securing your digital assets.

For more details on the pricing adjustment and to take advantage of exclusive offers, visit iDrive’s official website.

Thank you for your understanding and continued trust in South Bay Computer Solutions.

Best Regards, John Costa, John@SouthBaySolutions.net

Authorized Reseller

What is a Gmail 8-digit backup code? Why should I retrieve this 8 digit security code?

What is a Gmail 8-digit backup code? Why should I retrieve this 8 digit security code?

If you or someone you know has a Google GMAIL account you may want to give this a quick read. “How do I get my Google gmail 8 Digit Backup Code?”

Recently, I’ve had a few people contact me who have had their mobile device/phone lost or stolen.

The finder or perpetrator accesses the device due to a weak or no password. This now bad actor has access to the device and begins changing the rightful owner’s Gmail account password, so the rightful account holder no longer has Gmail access. They then begin fraudulently charging on credit cards or withdrawing funds from the owner’s bank accounts.From this point, the rightful owner is not able to gain access to their device or sensitive accounts from even another device or PC.

Even with “Two Factor” authentication, which should always be enabled when possible, the perpetrator was able to access sensitive important accounts, as the “Two Factor” authenticator app is on the phone itself, thus sending the “keys” to unlock the door to the “Multi-Factor” authentication accounts.

To make things even more troublesome, some users had screenshots of photos and/or lists of passwords, bank accounts, credit cards, driver’s license and other important information on the phone itself unprotected by further security methods.This is not uncommon, as most of the people I’ve surveyed do not have these codes or even know they exist.

So, What is a Gmail 8-digit backup code? Why should I retrieve this Google eight-digit code immediately?

A Gmail  8-digit backup code is a unique string of numbers to recover a g-mail account.

You should retrieve the Google eight-digit code immediately before your account is compromised, you lose your mobile device or password.

*These steps are subject to change as cloud providers often change the User Interface Portal frequently.

Android – Create & find a set of backup codes

Create & find a set of backup codes

To store your backup codes somewhere safe, you can print a copy of your backup codes.

On your Android phone or tablet, open the Settings app.

  • Tap Google and then Manage your Google Account.
  • At the top, tap Security.
  • Under “Signing in to Google,” tap 2-Step Verification. You may need to sign in.
  • Under “Backup codes,” tap Continue .

From here, you can:

  • Get backup codes: To add backup codes, tap Get backup codes.
  • Create a new set of backup codes and inactivate old ones: To create new codes, tap Refresh .
  • Delete your backup codes: To delete and automatically inactivate your backup codes, tap Delete Delete.
  • Download your backup codes: Tap Download Codes .
  • Print your backup codes: Tap Print .

Tips:    If you think your backup codes were stolen or you run out of codes, create a new set. To create a new set of codes, tap Refresh .

When you create new codes, your old set automatically becomes inactive.

Obviously DO NOT STORE THEM ON YOUR MOBILE PHONE as an image or other file.
If you use the cloud to store files be sure it has two-factor authentication and a Vault / Private key
From <https://www.google.com/search?q=how+to+get+gmail+8+digit+backup+code&oq=get+gmail+8+digit+code&aqs=chrome.1.69i57j0i22i30j0i390l3j69i64.16506j0j15&sourceid=chrome&ie=UTF-8>

Computer – Create & find a set of backup codes

Create & find a set of backup codes

To store your backup codes somewhere safe, you can print a copy of your backup codes.

  • Go to your Google Account.
  • On the left, click Security.
  • Under “Signing in to Google,” click 2-Step Verification. You may need to sign in.
  • Under “Backup codes,” click Continue,

From here you can:

  • Get backup codes: To add backup codes, click Get backup codes.
  • Create a new set of backup codes and inactivate old ones: To create new codes, click Refresh.
  • Delete your backup codes: To delete and automatically inactivate your backup codes, click Delete .
  • Download your backup codes: Click Download Codes.
  • Print your backup codes: Click Print.

Tips:

If you think your backup codes were stolen or you run out of codes, create a new set. To create a new set of codes, click Refresh.

When you create new codes, your old set automatically becomes inactive.
Find your lost backup code.

Search your computer for: “backup-codes-username.txt with your username. For example, if your username is google123, search for: Backup-codes-google123.txt. You’ll need the codes downloaded to your computer for this to work.

Sign in with a backup code

    • Find your backup codes.
    • Sign in to your Google Account.
    • Click Try another way.
    • Click Enter one of your 8-digit backup codes.
    • Enter one of your unused backup codes.

Tip: As each code can be used only once, you might want to mark the code as used.

From <https://support.google.com/accounts/answer/1187538?hl=en&co=GENIE.Platform%3DDesktop&oco=0>

iPhone & iPad – Create & find a set of backup codes

Create & find a set of backup codes

To store your backup codes somewhere safe, you can print a copy of your backup codes.

On your iPhone or iPad, open the Gmail app -> Tap Menu

Settings -> your account name

Manage your Google Account. If you don’t use Gmail, go to myaccount.google.com.

    • At the top, tap Security.
    • Under “Signing in to Google,” tap 2-Step Verification. You may need to sign in.
    • Under “Backup codes,” tap Continue.

From here you can:

    • Get backup codes: To add backup codes, tap Get backup codes.

Create a new set of backup codes and inactivate old ones: To create new codes, tap Refresh.

  • Delete your backup codes: To delete and automatically inactivate your backup codes, tap Delete
  • Download your backup codes: Tap Download Codes.
  • Print your backup codes: Tap Print

 

Tips:

If you think your backup codes were stolen or you run out of codes, create a new set. To create a new set of codes, tap Refresh.
When you create new codes, your old set automatically becomes inactive.
Find your lost backup code

Search your iOS device for: Backup-codes-username.txt with your username. For example, if your username is google123, search for: Backup-codes-google123.txt. You’ll need the codes downloaded to the device for this to work.

Sign in with a backup code

    • Find your backup codes.

    • Sign in to your Google Account.
    • Tap Try another way.
    • Tap Enter one of your 8-digit backup codes.
    • Enter one of your unused backup codes.

Tip: As each code can be used only once, you might want to mark the code as used.

From <https://support.google.com/accounts/answer/1187538?hl=en&co=GENIE.Platform%3DiOS&oco=0>

I hope you find this What is a Gmail 8-digit backup code article helpful? Why should I retrieve this Google eight digit code immediately?

If  you need computer, website or technology support contact us at 424-532-1633 to get support.

Dark Mode – Improve Your Vision

Dark Mode – Improve Your Vision

OneDrive 4Dark Mode is a feature which inverses your device display so the bright white background becomes dark and the text light. Changing the contrast to be easier on the eyes by reducing the amount of harmful blue light. Studies have shown blue light is attributed to keeping one awake contributing to higher rates of insomnia among computer and mobile users.

There are a few ways to achieve this : In the OS like MacOS, Windows10 or Chrome, an App like YouTube, Microsoft Office, etc or as an Add-On like in the Chrome or Firefox browsers.

OneDrive 5

In the App eg. Microsoft Office has a “Dark Mode” in the “Options” section, under “Personalize your copy of Microsoft Office” ; Office Theme: “DARK GRAY”. There is also Black and whit, etc.
Windows 10 has this capability under the “Display Options” setting, and just release MacOS.
The Chrome browser achieves this with an ADD-ON.

DarkMode is a great way to relax your eyes and is particularly useful in bright sunlight or night time. Check it Out you might prefer these mode vs the brigh white background,
.OneDrive 6

OneDrive 6

How Can You Protect Your Business and Personal Devices Against Phishing Attacks

How Can You Protect Your Business and Personal Devices Against Phishing Attacks

Phishing attacks are on the rise for businesses, as threat actors focus their efforts on more profitable targets. What can your business do to stop them?  Implement an anti-phishing plan that increases awareness of phishing techniques for you and employees.

10 TIPS TO HELP  SPOT PHISHING ATTEMPTS

In 2018, businesses saw a 132% increase in information-stealers, such as TrickBots which use phishing emails to infiltrate organizations and drop their payloads.

1)  Look for poor spelling

Errors in formatting, and email addresses in the “From” field that look suspicious. Perhaps the formatting and design are different from what you usually receive from the organization. Maybe the content sounds strangely formal. The possibilities are endless.

2)  Attachments are always a sign of malware

Attachments should be treated with kid gloves. When in doubt, do not open the attachment. Instead, try to contact someone you know from the organization listed in the email to confirm or delete the email without opening (RGHT-CLK – Delete) in Outlook.

 

3)  Do the URLs match?

Hover over the link displayed in the email to see the actual URL. If they are different from one another, do not click.

 

4)  Phishing emails often impersonate

Attachments should be treated with kid gloves. When in doubt, do not open the attachment. Instead, try to contact someone you know from the organization listed in the email to confirm or delete the email without opening (RGHT-CLK – Delete) in Outlook.

 

5)  Just because a URL has a green padlock

Doesn’t mean it’s safe. With a public push for websites to adopt HTTPS protocols, cybercriminals have jumped on the bandwagon, easily purchasing SSL certificates for their phishing pages.

 

6)  Mobile device users are at risk

Of being scammed by lengthy faux URLs that cannot be fully viewed on screen. The visible portion may be tailored to appear legitimate, but the rest of it—which would give the game away—is hidden off-screen. Employees checking email on their phones or browsing the Internet should always review the entire URL before clicking.

 

7)  Dubious apps are a potential problem

As carefully-worded pop-ups asking for permission to access sensitive data have duped many. When installing desktop or mobile apps, it’s best to review the app’s online reviews, and make sure you’ve selected the legitimate version. Are the logos the same? Does the user experience match what you’d expect?

 

8)  Promoted social media content can lead to phishing

Especially as ads tend to be targeted to individual interests. We recommend users not engage on social media from their work devices, or if they must, limit their engagements
to work-specific tasks. Also, never go to social sites on critical systems like CAD/CAM workstations,Servers or mission critalce systems.

 

6)  That Green Padlock in the URL bar ?

So, where does the green padlock come into play? The green padlock simply means that traffic to and from the website is encrypted. A certificate, provided by a certificate provider (Certificate Authority or CA), is used to set up this encryption. Sounds good, right? But the only thing you can actually be sure of when you see such a padlock is that your computer is connected to the site that you see in the address bar.

 

10) Desperation is a surefire sign

Kinda like dating, desperation is a sure sign  something of trouble. It’s panic buying, but not as we know it. E-mails claiming a tight time limit to log in and perform an action, alongside the threat of losing X or Y forever, should be deleted or forwarded to he company’s security and/or fraud departments.

OneDrive 9
OneDrive 10
OneDrive 11

“Phishing is a method of tricking you into sharing passwords, credit card numbers, and othersensitive information by posing as a trusted institution in an email or phone call.

 

 

 

 

All about phishing

What is phishing?

  Phishing is the crime of intending to deceive people into sharing sensitive information like passwords and credit card numbers. As with real fishing, there’s more than one way to reel in a victim, but one phishing tactic is the most common. Victims receive an email or a text message that imitates (or “spoofs”) a person or organization they trust, like a coworker, a bank, or a Government office. When the victim opens the email or text, they find a scary message meant to overcome their better judgement by filling them with fear. The message demands that the victim go to a website and take immediate action or risk some sort of consequence. 

If users take the bait and click the link, they’re sent to an imitation of a legitimate website. From here, they’re asked to log in with their username and password credentials. If they are gullible enough to comply, the sign-on information goes to the attacker, who uses it to steal identities, pilfer bank accounts, and sell personal information on the black market.

Get Malwarebytes Free:

Related Articles

Navigating Change: iDrive’s Recent Pricing Adjustment

Navigating Change: iDrive’s Recent Pricing Adjustment

    There are some important changes in the world of data backup, specifically regarding the exceptional product that many of you have come to rely on – iDrive. As your dedicated IT professional consultant, it is my responsibility to keep you informed about...

Upcoming Google Search changes “Helpful Content Update”

Google has announced a major change for website ranking on Google. "Helpful Content Update" should start rolling out this week. It could be as big a shakeup as the Penguin update launched 10 years ago The Google ranking update is reportedly to target content "written...

The Windows 10 Fall Creators Update steps up on mixed reality

Microsoft’s next major Windows 10 release for 2017, the Fall Creators Update, doesn’t make any great noticable change. But you might have gathered that from its name alone. In many ways, it’s a continuation of what the company started with this spring’s Creators Update, which added Paint 3D, game mode and a slew of improvements focused on making things, be it art or a simple spreadsheet. (I’ve heard the word “creation” so many times this year from Microsoft reps, it’s beginning to sound like a cultish chant.)

With its latest OS, available today, Microsoft is preparing for the arrival of virtual-reality headsets. At the same time, it’s delivering some genuinely useful quality-of-life improvements for Windows 10 users.

Here are some of the new features:

  • The Windows 10 Fall Creators Update includes new features for developers and security upgrades.
  • Support for Microsoft-certified virtual-reality headsets.
  • Windows 10 can now relay Android phone notifications to your PC.
  • The Fall Creators Update utilizes Microsoft’s first use of its new design theme.
  • Windows 10 works better — and has new features for — stylus users.
  • Windows 10 is following in Snapchat’s and Facebook’s footsteps, adding augmented-reality stickers.
  • You can now pin contact information for your favorite people to the task bar.
  • A new feature frees up space by allowing you to store seldom-used files in Microsoft’s cloud.
  • Remix the new Photos app can now automatically create video slideshows from photo albums.
  • The update adds some handy browser updates, including the ability to pin websites to the task bar.
  •  OneDrive on-demand

Setting up OneDrive syncing on Windows has always been a hassle and somewhat confusing. With the new Files On-demand feature, though, those worries are may be a thing of the past. OneDrive now lets you see all of the files and folders in your OneDrive without having to manually synchronize them. They simply show up in Windows Explorer. When you need a file, you just have to double-click to download it. Sure, it could lead to some confusion if you work offline a lot, but for many always-connected users, it could end up saving some valuable hard-drive space. Just be sure to still perform regular backups. OneDrive is not a substitute for data backups.

The Windows 10 Fall Creators Update steps up on mixed reality

Microsoft’s next major Windows 10 release for 2017, the Fall Creators Update, doesn’t make any great noticable change. But you might have gathered that from its name alone. In many ways, it’s a continuation of what the company started with this spring’s Creators Update, which added Paint 3D, game mode and a slew of improvements focused on making things, be it art or a simple spreadsheet. (I’ve heard the word “creation” so many times this year from Microsoft reps, it’s beginning to sound like a cultish chant.)

With its latest OS, available today, Microsoft is preparing for the arrival of virtual-reality headsets. At the same time, it’s delivering some genuinely useful quality-of-life improvements for Windows 10 users.

Here are some of the new features:

  • The Windows 10 Fall Creators Update includes new features for developers and security upgrades.
  • Support for Microsoft-certified virtual-reality headsets.
  • Windows 10 can now relay Android phone notifications to your PC.
  • The Fall Creators Update utilizes Microsoft’s first use of its new design theme.
  • Windows 10 works better — and has new features for — stylus users.
  • Windows 10 is following in Snapchat’s and Facebook’s footsteps, adding augmented-reality stickers.
  • You can now pin contact information for your favorite people to the task bar.
  • A new feature frees up space by allowing you to store seldom-used files in Microsoft’s cloud.
  • Remix the new Photos app can now automatically create video slideshows from photo albums.
  • The update adds some handy browser updates, including the ability to pin websites to the task bar.
  •  OneDrive on-demand

Setting up OneDrive syncing on Windows has always been a hassle and somewhat confusing. With the new Files On-demand feature, though, those worries are may be a thing of the past. OneDrive now lets you see all of the files and folders in your OneDrive without having to manually synchronize them. They simply show up in Windows Explorer. When you need a file, you just have to double-click to download it. Sure, it could lead to some confusion if you work offline a lot, but for many always-connected users, it could end up saving some valuable hard-drive space. Just be sure to still perform regular backups. OneDrive is not a substitute for data backups.