GeeDee for Windows

2015 Dec Newsletter

2015 Dec Newsletter

Previous topic Next topic No directory for this topic Expand/collapse all hidden text  

2015 Dec Newsletter

Previous topic Next topic Topic directory requires JavaScript JavaScript is required for expanding text JavaScript is required for the print function Mail us feedback on this topic!  

      tipbulb This newsletter contains important information about the GeeDee software program. It is important that all users of the system receive and read a copy.  Please forward this email on to all users in your office.  To subscribe to this newsletter please click here.


GeeDee News Update



Title - Remember Web Updates

Click me to expand / collapse information. Web Update Build 268

Please be advised that the latest Build Version for GeeDee is Build 268

After running your WebUpdate you will be prompted to run a GeeDee Index. See Index steps below.


 How to run a GeeDee Index

 Step 1. Launch GeeDee Backup Index.

  Step 2. Enter initials and login.


  Step 3. Select Index and click OK to the 2 “OK” prompts to complete Index process. Close when completed



Click me to expand / collapse information. NEW CHANGES within GeeDee Realty Systems Build 268


Note  Tenant card emailing tick box added to detail screen

Note   New report advising changes to Lessor & Creditor bank accounts

Note   Changes made to set Address Font to auto match body text

Note   Changes made to emailing from Alerts in the subject line

Note   Changes made to subject line when emailing Strata Letters & Invoices

Note   Option available to include CSV of EOP Lessor Statements

Note   Changes to Tenant Notes when modified rent is selected

Note   Maintenance Manager Export files now excludes Strata type properties from export file

Note   New GeeDee Launcher V19 released with link to Win10 Registry Update. Location \Proman\, (click Ph/Fax on screen to take you to \Proman\ folder)

Note   Changes to entering New Property where State & Post Code must now be entered

Note   Added 2 Detail fields to Bar Code Scanner Screen

Note   Tenant Breach's, Terminations and Docs save into GDMS under Letters


Click me to expand / collapse information.Tenant Card Contact Box

Can contact by Email is a tick box Option on the Tenant Detail Screen



Click me to expand / collapse information.Account Changed Report

New Account Change Report is Available

When the Lessor or Creditor Account details have been changed it now is available to print a report showing the details of this change.


Select Banking drop down / Account Changed Report and select a date range then print or preview this report.



Click me to expand / collapse information.Font Address in Edit letters

In Edit letters the Set Address Font will now automatically change to match the highlighted text selected


Highlight a word in the body and then select "Set Address Font" this now will change the font to match.


Click me to expand / collapse information.Emailing from Alerts

When emailing from Alerts it states the item and not the wording Alerts in the subject line





Click me to expand / collapse information.Emailing Letters & Invoices to Strata Tenants

When a letter or invoice is sent to a Tenant set up as Strata it now states Letter email: Strata



To enable the function of CSV of Lessor Statements go to System Setup / Misc and select EOP Transaction csv




When Modify Rent Cycle is selected it is registered under tenant notes with date, time & who processed the transaction






Changes have been made when entering a new property that the State and Post Code must now be entered.



When generating & printing Terminations, Breaches & Documents they now appear under Tenant/ Letters in GDMS system





2 new Detail fields have been added to allow extra descriptions when inputting

Click into area then over-type to your requirements




Please Remember:

1.December may be the end of the Real Estate year but it is no different to any other Period End.
2.On the first working day of the new calendar year, you are required to print your Audit Reports for the calendar year close of business.
3.These reports MUST be printed before entering any data for the New Year.
4.Make a BACKUP of your system onto your chosen media device and retain separately in case of any further enquiries from your auditor.

Bank Statements:

1.Arrange with your bank prior to 31 December to pick up a statement on your FIRST trading day of the new commencing year.
2.Or if you have access to ONLINE BANKING - Print a statement from the closing date of your last bank reconciliation to end of trading on 31 December.
3.This statement must contain all transactions from the last statement you have received to end of trading on 31 December.
4.Referring to your bank statement; receipt all monies paid into the trust account up to and including the 31/12.
5.DO NOT Receipt monies that have been paid at the office or received in the mail.(as these items are not on the bank statement).
6.You should then complete a Bank Reconciliation up to 31/12.
7.Complete and roll over the bank reconciliation.
8.Print another Trust Account Trial Balance, Lessor Trial Balance and a Bond Listing which will include any transactions you entered from your 31/12 bank statement.

  These reports should be kept with the Bank Reconciliation for your Auditor.





Click me to expand / collapse information. Windows 10 - Important Information on the Upgrade

prod_tip     Think twice Before Upgrading to Windows 10   prod_tip

Everyone loves a good upgrade... except when you lose your privacy, your internet download bandwidth as well as some of your much loved traditional Windows applications.
Do not get me wrong, I am loving the new Windows 10 but there is a lot to consider for a business user and even more to change to secure YOUR privacy and data download bandwidth from your ISP.
Please read and review below weblinks and their containing information carefully. Then make the necessary changes to protect yourself and your privacy.
Windows 10 is stealing your network bandwidth
Windows 10: Here are the privacy issues you should know about
Windows 10 Is Spying On You: Here’s How To Stop It
flag_greenMicrosoft can disclose your data when it feels like it
This is the part you should be most concerned about: Microsoft’s new privacy policy assigns is very loose when it comes to when it will or won’t access and disclose your personal data:

We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to protect our customers or enforce the terms governing the use of the services.

Privacy Statement | Services Agreement [Microsoft] h/t to EDRI for flagging up a number of these issues.

Click me to expand / collapse information.CryptoLocker Ransomware


CryptoLocker Ransomware Information

Before digging into to much information and trying to figure out how to protect yourself, simply cover yourselves. Please check and confirm your backups are operating, tested and working.

Please note the email of issue seems to be coming from Australia Post as a zip file. PLEASE do not open. It is the zip file attachment that is causing the problem.


If you have any questions regarding your mandatory End of Day Backups that are required to be run each transacting day, please contact one of the GeeDee Software Support Team today.
Remember, End of Day Backups are an Auditory Requirement and must be performed each day to print your Daily Transactions Report.


Click me to expand / collapse information.Windows Previous Versions will save files from Ransonware...


tipbulbUse Windows Previous Versions to Go Back in Time and Save Your Files from Ransomware

Previous Versions is an incredibly useful feature built into Windows 7 & 10, which allows the OS to record and view earlier versions of files. Here’s a detailed guide to using this excellent feature.

This feature goes beyond the functionality of the Recycle Bin as it allows you to:

   - Recover files you may have permanently deleted.

   - View or restore a version of a file which you have saved over.

   - Allow you to compare current and/or previous versions of a file side by side.

With a little bit of dedicated hard drive space, an automation script and scheduled task, you can leverage this feature to guard against inadvertent file deletions and overwrites which traditional backups may not adequately cover.
Previous versions of files are recorded as part of a System Restore Point. So whenever a restore point is created, if you have the option set to capture previous versions of files, this data will be recorded at that time. It is important to note that this function is smart enough to know that only changes to documents should be recorded. For example, if you have not updated a document in 3 months, a new snapshot is not captured each time a restore point is created.

Setting Up and Configuring Previous Versions Windows 7

To view or change your current settings, open the System item in the Control Panel and click the System Protection item. If you get a UAC prompt, select the option to continue.


Under the System Protection tab, select the drive containing the files you want to monitor for previous changes and click the Configure button.


Under the Restore Settings section, make sure you have one of the options which includes previous files selected.

Under the Disk Space Usage, set the amount of space you want to allow for storing previous versions of files. The more space you allow here, the farther you can “go back” to a previous copy of a file. However, by dedicating space for this feature, you lose the respective amount of storage for new files so be sure to take this into consideration when making this setting.


Apply your settings and System Restore will start using them immediately.


Click me to expand / collapse information.Windows 8.x

How to Use Windows 8's New File History Backup (aka Time Machine for Windows)

It wasn't one of the more publicized features, but Windows 8 actually comes with a brand-new backup feature called File History, that works similar to Apple's Time Machine: It automatically backs up files in the background and lets you restore them from a simple, time-based interface.
The Difference Between File History and Windows Backup
Windows Backup still exists in Windows 8, it's just been renamed to "Windows 7 File Recovery." So, if you want to back up your files, you have the choice of which system you want to use.
So, a little more effort in choice and setting up but you can be selective on what is backed up and where to...


Click me to expand / collapse information.Windows 10

Previous Versions (File History), again has its own Tab in Properties


See above information "Setting Up and Configuring Previous Versions Windows 7" for setting up.

Note, all of these features are a great safety net in case of Ransonware issues, with the trade off only being a little extra Hard Disk (HDD) space being consumed. Not that bad of a deal considering how large HDD's are getting today!


Click me to expand / collapse information.Cryptolocker

Cryptolocker Ransomware: What You Need To Know

Just be vigilant of any suspicious emails or better yet, have your IT computer person block and prevent any .ZIP or .EXE files being received via email. (This can usually be done using an anti-spam system).  Ransonware is not a virus and is malware in the form of a script that is accidentally launched by a user.
Repeat, do not attempt to view, download or click on any .EXE or .ZIP files from email. Also remember to inspect the Sender's email address(2) and to hover over any web hyperlinks(1) in an email to inspect before actually clicking on the link.
Ensure your staff are educated in good computing practices and how to spot threats.
Spread through email attachments and weblinks, ransomware has been seen targeting companies through phishing attacks. Cryptolocker will encrypt users’ files using asymmetric encryption, which requires both a public and private key.  The public key is used to encrypt and verify data, while private key is used for decryption, each the inverse of the other.
Below is an image from Microsoft depicting the process of asymmetric encryption.

The bad news is decryption is impossible. Infected users also have a time limit to send the payment. If this time elapses, the private key is destroyed, and your files may be lost forever.
Files targeted are those commonly found on most PC's today; a list of file extensions for targeted files include: 3fr, accdb, ai, arw, bay, cdr, cer, cr2, crt, crw, dbf, dcr, der, dng, doc, docm, docx, dwg, dxf, dxg, eps, erf, indd, jpe, jpg, kdc, mdb, mdf, mef, mrw, nef, nrw, odb, odm, odp, ods, odt, orf, p12, p7b, p7c, pdd, pef, pem, pfx, ppt, pptm, pptx, psd, pst, ptx, r3d, raf, raw, rtf, rw2, rwl, srf, srw, wb2, wpd, wps, xlk, xls, xlsb, xlsm, xlsx

In typical senarios, it is possible to recover previous versions of the encrypted files using System Restore or other recovery software used to obtain “shadow copies” of files.


Click me to expand!



- Title - GDMS

Click me to expand / collapse information. GeeDee Document Management System - Special Offer

Click below image to download...
Click me to download...FLYER_GEEDEE_GDMS



Title - GeeDee Training

Click me to expand / collapse information.GeeDee Training Order Form

Click below image to download...
Click me to download...Training Order Form


GeeDee Company Logo_Horizontal_MEDIUM
Phone: (08) 9364 6677  | Fax: (08) 9364 7433   | eMail:  | Web:

© GeeDee for Windows Pty Ltd  1984 - 2018             All rights reserved.      Real Estate Software by Real Estate Professionals.

Trust Accounting & Property Management Software with Enterprise Electronic Document Management. .