Category: Internet Security

  • Should You Use Your Facebook Login To Create New Accounts?

    I’ve been helping an artist friend of mine get her art uploaded to internet sites marketing.

    She asked me what it means when she is invited to create and account for a website using her Facebook login.

    I have run into this also, and have been meaning to look into it.  (When in doubt, I don’t do it.)

    Here is the info I found on logging in using our Facebook login.  I’m glad I finally looked into it.
    I appears that in some cases, an app company is just trying to streamline the account set up process for us so we don’t have to fill out another form and they don’t have to create a form to fill out.
    In other cases, the company may be harvesting information about you and posting commercials to your wall.
    The bottom line is that you need to take the time to read the agreements and choose carefully.
    Below are two articles that explain the options.

    http://www.sctimes.com/interactive/article/99999999/CUST/120213001/Why-Sign-Facebook?nclick_check=1

    http://thepcspy.com/read/never-login-with-facebook/

    I clicked on the Facebook’s Application Settings screen link in the second article to check my settings.
    Here is how it looks.  They are all sites that I trust.

    App Settings

    You have authorized these apps to interact with your Facebook account:
    • Yelp

      August 23

      Edit

    • TripAdvisor

      August 23

      Edit

    • Meetup

      August 22

      Edit

    • bitly

      August 9

      Edit

    • MyCalendar – Birthdays

      April 26

      Edit

    • Bing

      More than 6 months ago

      Edit

    • Pandora

      July 29

      Edit

    • Blue Mountain eCards

      July 12

      Edit

    • WordPress.com

      June 1

      Edit

    • AWeber Email Marketing

      July 8

      Edit

    • Facebook Platform Opt In

      More than 6 months ago
      I probably will not be using my facebook login to create new accounts in the future, but if I do, I will read the fine print first.
      I always appreciate your questions.  I love doing research and keeping “up to speed.”
  • The Longest Password

    The blondes win!
    The Longest Password
    We laugh — but her I.D. is safe. —- and oddly logical!

    During a recent password audit by Google,
    it was found that a blonde was using the following password:”MickeyMinniePlutoHueyLouieDeweyDonaldGoofySacramento”When asked why she had such a long password, she rolled her eyes and said:
    “Hello! It has to be at least 8 characters
    long and include at least one capital.”

  • Q and A: How to Get Rid of Spam Emails

    Mardi–Is there any way to block all the junk E-Mails we get?    Thanks–Jerry

    Thanks for the question Jerry.  I get this one often.

    We can’t really block them, but they can be filtered and redirected to your trash folder.

    Just mark them as spam instead of deleting them.  Next time, you get one from the same sender, it will go directly to your trash folder instead of to your inbox.

    You can also set up filters for certain subject lines, or words in the subject line.  For example, in gmail you can

    1. Select the message in your message list.
    2. Click the More button, then Filter messages like these.
    3. Enter your filter criteria in the appropriate field(s).
    Most email programs have this feature,  just poke around until you find filters or we can set up a time for me to show you how.

    On a related note:  Never reply to spam emails or unsubscribe, that just lets the spammers know that they have reached a real email address.

    In Joy,

    Mardi

  • What in “the bleep” is “The Cloud” anyway?

    “The cloud” is just a fancy term for the Internet. “Cloud computing takes place on the Internet. It doesn’t take place on your computer. Your computer is just used to view the result.  Most of you have used web mail like yahoo, hotmail, gmail, roadrunner, etc; so you have already been doing “cloud computing.”   See you are so leading-edge-techie and didn’t even know it!

    This actually isn’t a new concept. Back in the old days it was called a client-server system. And many businesses still use this model today.  One powerful computer is the server. Servers can also be a collection of computers hooked together. The server runs all the company’s programs and stores all its data.

    Connected to the server are client computers called terminals. These terminals let people access the server. Terminals are inexpensive, basic computers. All they do is access information on the server. They don’t have to process or store much.

    The benefit to business is that terminals are inexpensive. You can add as many as you need at little cost. Plus, they don’t store any information. A terminal can die and you don’t lose any data.

    Now with broadband Internet home computers can operate the same as businesses. The Internet acts as the server. And a home computer acts as the terminal.  Actually your electronic gadgets like smart phones, iPads, tablets and netbooks act as terminals too.

    The benefits are that processing and storage are done on the Internet. That means you don’t need an expensive stand-alone computer. You just need an inexpensive gadget with a fast Internet connection.

    Everything is accomplished online. When the gadget breaks, it is inexpensive to replace…well inexpensive is a relative term.   Anyway, you don’t lose any of your data and you can access your data from multiple gadgets.

    So what are some examples of cloud computing? There are hundreds available. Here are a few common ones.

    Besides web-based email, there are many other exciting uses.  There office programs like Google Docs and Office Web Apps that let you create, store and share documents online and you can access the documents from anywhere.

    There are full graphics suites and places to upload, store and share photos.  You may have heard of iPhoto and Picasa, flicker and Snapfish.  There are video editors, audio programs and presentation creators popping up.

    There are also back-up programs like Carbonite, Mozy, and idrive where you can have backups off-site and  access your data from anywhere.

    Now there are gadgets like Apple TV and Google TV which both stream content from the Internet directly to your TV.

    The possibilities are endless and this  is the direction most of the computer industry is headed.

    Of course, there are potential drawbacks.  The first one is privacy and security. You are  entrusting your information to another party. How do you know the company isn’t going to  abuse it? Or how do you know their security procedures are adequate?  At this point, there is no easy answer. Even Facebook, with 500 million users, has security and privacy issues.

    What happens when you can’t connect?  What if your Internet goes down? What if the service’s server is temporarily unavailable? How do you access your data? Unless you have a local file backed up, you’re out of luck.

    These issues are being addressed and things are certainly better than they were a few years ago.  Web services used to go out of business overnight. And security procedures were really poor.

    These days Web services tend to be much more stable. And most are implementing proper security.

    I recommend giving cloud services a try. They can be incredibly useful for storing your data safely and sharing with friends and family. Just take into account the potential drawbacks and plan accordingly.  And if you have any questions or concerns, just let me know.

    On cloud 9 with the joy of techie tools and toys,

    Mardi

  • Web Browser Hijacked

    This week I’ve worked with two clients who have had their Internet Explorer web browser hijacked.  That means that a web page has been installed as their home page and they couldn’t get rid of it.  It was very confusing and frustrating for them.

    The solution is to download and use either Mozilla Firefox or Google Chrome instead.  If you are not good at downloading and installing updates, I suggest you use Chrome, because it will install the updates in the background and you won’t have to do anything.  It also gives you convenient access to gmail, contacts, calendar and docs.  (Did you know you can use Google Docs for free and you won’t need Microsoft Office Suite?)

    If you have any questions or need help, just let me know.

     

  • Protect Yourself from Facebook Advertising

    I love using the “Like” button but I’ve noticed that I start getting ads from places I liked and I’m not so sure I like that.  I see now that when we like and un-like various pages and products, we are giving Facebook more and more information about us that it shares with advertisers.  Also, I’ve noticed that Facebook shows other people who have liked sites.

    If you want to opt out, here is the procedure. Log into Facebook and click the upside down triangle in the upper right corner. Go to Privacy settings>>Ads, Apps and Websites>>Ads.  Click Edit Social Ads Settings and choose No One in the drop down menu. Your name won’t be linked to any ads, even for pages you’ve liked.

    Go back to the Ads, Apps and Websites menu and select “How people bring your info to apps they use.” You’ll see a list of check boxes. Any box that is checked is something that could appear on a third-party site.

    You’ll see everything from your current city, photos and the things you like. Deselect each box. That way, Facebook and advertisers won’t be able to use your information for marketing.

    I haven’t done this yet, because I’m not that worried about it, and I like to watch how it plays out.  But I know some of you are concerned and would want to know how to take control of the situation.  I might do it later.

    In Joy,

    Mardi

    Restoring peace and joy to your life through computer tutoring.

  • Malware Installed On Travelers’ Laptops Through Software Updates On Hotel Internet Connections

    My daughter sent me a notice from the Internet Crime Complaint Center (IC3) that there have been instances of travelers’ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to setup the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely-used software product. If the user clicked to accept and install the update, malicious software was installed on the laptop. The pop-up window appeared to be offering a routine update to a legitimate software product for which updates are frequently available.

    The FBI recommends that when you travel abroad take extra caution before updating software products on your hotel Internet connection.  You can check the author or digital certificate of any prompted update to see if it corresponds to the software vendor, but it might be easier for you to just perform software updates on laptops immediately before traveling.  If updates are necessary while you are abroad, download software updates directly from the software vendor’s Web site.

    Anyone who believes they have been a target of this type of attack should immediately contact their local FBI office, and promptly report it to the IC3’s website at www.IC3.gov. The IC3’s complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration. The complaint information is also used to identify emerging trends and patterns.