Starting February 15, 2018, Google Chrome has begun some ad-filtering. They won’t be blocking all ads but the ones that do not pass the standards set by the Coalition for Better Ads. They are targeting the most intrusive ads like the full page ads that block you from seeing the page content and flashing animated ads. In other words, they aren’t out to remove all ads but just the most annoying ones. They are also looking at the number of ads on a page.
You can also install ad blockers in your browser or visit YourAdChoices to optout of ads from the Digital Advertising Alliance.
If you are a Prime member or already shop with Amazon, you know your packages will come via UPS, FedEx, or even USPS. Amazon is going to launch their own package delivery service called Shipping with Amazon (SWA) as reported Friday. They will roll out in Los Angeles first over the next few weeks then to other cities across the U.S.
They plan to start with third-party Amazon vendors who are already registered. They may also open up to other businesses eventually to directly compete with the other shippers.
To keep your delivery safe from porch pirates, Amazon already has a program called Amazon Key In-Home Delivery. You have to purchase the Amazon Key In-Home Kit, the necessary equipment for $249.99. It includes an indoor security camera and compatible smart lock. They will come and install these for you if you want. When a delivery is made, you will an alert on your smart phone and you can watch the entire delivery.
You can purchase Office [Year] as a standalone program or purchase a subscription service to Office 365.
Office 2016 (current edition) will run $149.99 and licenses one user on one PC. It includes Word, Excel, PowerPoint, and OneNote.
Office 365 Home or Personal will include Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Access. It also includes 1TB of OneDrive cloud storage space and 60 minutes per month of Skype calls per user. This will run $99.99/year (or $9.99/month) for Home and $69.99/year (or $6.99/month) for Personal. Personal is for 1 user only. Home is for up to 5 users. It also includes apps for devices (including Apple products).
When you have Office 365, you also get the latest Office software. It also has automatic billing so you won’t ever run out. With Office 365, you also get support for any issues.
When Office 2019 is available later this year, it will require you to have Windows 10.
In case you haven’t heard about it yet, Bill Gates bought land in Arizona to build a smart city. He has invested $80 million already in a high-tech planned area near Phoenix of almost 25,000 acres.
Actually called Belmont, it will be designed to have high-speed Internet networks, self-driving vehicles, data centers, and new technologies for manufacturing. Building it from scratch, he is hoping to make it more cost-efficient rather than trying to redo an existing area.
Imagine you are in a rush and need to go to the grocery store. With Amazon Go, you can walk in, get your stuff and walk out. In fact, they call it their Just Walk Out Shopping experience or Just Walk Out Technology.
When you walk in, you use the app to check in (kind of like when boarding a plane) and then do your shopping. Forget your bag? There are plenty of reusable bags for purchase. You will also need an Amazon account.
They offer many ready-to-eat meals and snacks. They want to focus on making healthful meals.
They currently only have one store open to the public in Seattle, WA open 7am-9pm M-F. They do have people in the store to help you, stock shelves, etc. The store was opened last year for its Seattle employees while testing. It just opened to the public recently.
You are browsing the Internet and maybe you look at some items and then it seems every where you go you are seeing the same things or related items that you just looked at. Maybe you abandoned a shopping cart or changed your mind about the purchase. Maybe you started filling out a form and stopped in the middle of it. They can’t possibly know what you typed, right? Or can they?
In an article by Motherboard.com, they cite a study done by Princeton University about boundaries. Or rather “No Boundaries.” How do you think Pinterest or Facebook or other social media sites get the information? There are sites such as FullStory that allow website owners to capture every keystroke a user makes. They use “session replay” scripts to capture what the customers are doing on their sites. You can see some of the major companies who use fullstory.com here.
Now more than ever it is important to read websites’ terms and conditions. They may collect things like medical conditions, personal data, credit card info. Passwords may even be “accidently” included in the data.
So what can you do? Run AdBlock Plus in your browser. According to the Princeton study, AdBlock has been updated to block all these scripts, thanks to the study.
This video shows FullStory capturing a user’s data as it is being entered into a form.
The Consumer Technology Association has an annual exhibit called CES (Consumer Electronic Show) that is taking place right now. Actually, it started yesterday January 7 and continues to until Friday the 12th. It is taking place in Las Vegas, NV.
There are many conferences that cover gaming, home electronics, robotics, cars, and sports technology to name a few. There are many exhibits from big tech to startups. This week we may be hearing of more and more tech that is either in the works or coming soon.
Over 20,000 new products will be exhibited, over 900 startups, 2.75 net sq. ft. of exhibit space, many big name innovators. They expect over 170,000 attendees over the next few days. They are even live-streaming on their website. They even have an app to assist you in navigating this huge event.
Go to CES.tech for more info.
Recently a family member told me about an encrypted messaging app called Signal. It not only encrypts your text messages but also conversations. There are a few nice things about it: it is free, it is open source, and it works on both iPhone and Android phones. You can also send documents and images.
There is also a desktop app for your Windows, Mac, or Linux computer.
By now, you have probably heard of STEM education. This encompasses Science, Technology, Engineering, and Mathematics. You may see many children’s toys with the STEM acronym on them. Schools that teach STEM education, integrate all aspects rather than separate them into their different disciplines. Doing this allows the student to learn computational thinking and problem solving.
Even Amazon.com has a section devoted to STEM educational toys.
Hopefully you were able to purchase some STEM toys for your children or grandchildren. The future of our children’s learning will depend on STEM even for non-STEM courses as they are a way of learning to look at a full problem from all angles.
On the run with his new girlfriend, Malina, they try to figure out what is going on. Not knowing it in the beginning, Sergio finds out Malina’s sister was murdered and blames it directly on Circles. Not knowing who he can trust he works it out with Malina and they continue to find the truth.
The crux of the mystery is that what was found was “socialbots,” bots that parade as people and interact with people and learn using AI algorithms. The bots were going to be used in a bigger plot to sway people to vote for a certain president whose agenda was to bring the US to own over a third of the earth’s rare earth metals. Once in, a Chinese diplomat was going to blackmail him into not doing this as China would lose out a lot of their economy over this.
Microsoft Edge has come a long way. The Victor crew tried something out this past week and it works like a charm. You can connect your phone to your PC through Edge. The practical side is if you are looking at something on your phone (small device) and want to view something larger, you can send the page you are viewing on your phone to your PC. And yes, iPhone users, that means you too!
Install Edge on your mobile device (works with iPad as well). Sign in with your Microsoft password.
Scroll to a site and at the bottom you will see some icons.
The middle icon (mobile device with arrow) is what you touch to send to your PC.
Next when you see the screen below, you would choose which PC to send it to. I only had one connected PC as shown below (name partially obscured.) Press the PC you want to send the page to.
You are done.
Here are a few new things the Victor crew found in iOS 11 for use in emergencies.
You can add Medical ID for emergency contact. Open the Health app and tap the Medical ID tab. Edit then scroll to Emergency Contacts. Press the + and it will take you to your contacts. On this page, you can also add medical conditions, notes, allergies, and medications as well.
There is Emergency SOS where you can call for help quickly. The Emergency SOS slider and Medial ID slider you can bring up to quickly contact emergency services. For iPhone 7, you will need to press the side button five times to get the sliders to show. For iPhone 8 or X, you would press and hold the side button and one of the volume buttons. After the call ends, the iPhone sends your emergency contacts a text message with your current location unless you cancel. If you have your location services turned off, they will turn back on temporarily.
Find out more here.
We’ve talked about passwords before and yet it is such an important thing because of all the breaches we see. Some people say they don’t have anything that important so it doesn’t matter or they say they need to use the same password for everything.
This is a totally bad practice and attitude to have about this. Think about all your accounts where you have purchased items, or your banking or credit card accounts. Do you really want to use the same password for everything? Once they breach one account, say your email, they can look through that to find what other accounts you are subscribed to and have a field day. This is even how identities are stolen.
Here are some things you can do:
Go to HaveIBeenPwned.com and check your email for pwnage.
Also click on their password tab and check to see if your passwords are on any common lists.
Use a password manager like LastPass.
Use 2 step verification. Use an authenticator, too.
Once you download LastPass, set it up with a hard to hack easy to remember password (the first video below gives some suggestions on how to find one.) You can then import all the passwords saved to your browsers. Once you have LastPass you can also run a kind of audit check for recommendations on which passwords to change – it will show you duplicates or not so secure passwords you already have.
Firefox just got faster. Two times faster. This past week, Firefox updated to Firefox Quantum (Version 57.0.) There are two versions – one for regular browsers and one for developers. It is built on a new engine for better and faster page loading. It also will use less memory than previously, and they say it is 30% lighter than Chrome.
It has built in privacy modes. You can block even hidden trackers by turning on tracking protection. When you block the ads and scripts that are bogging you down, the page loads even faster.
If there’s a page you want to see later, you can save it to Pocket to view later. There is a library where it will place these articles as well as your bookmarks. You can search with other search engines with just a click. You can also customize it with themes or placement of icons for your tools and addons. You can take screenshots without adding an extension – it’s built right in.
So various places are adding “Distracted Walking” laws to try to prevent people from texting or just reading their phones while walking.
The latest place to pass this law was Honolulu. They have started passing out tickets to those distracted while walking in a crosswalk. They are the first major city in the U.S. to pass such a law. Minimum fines will be $15 but repeat offenders can look at $75-$99. (Even higher rates of $100 for first, $200 for second, and $500 for third offenses were previously considered.)
The Mayor of Honolulu says that they had more pedestrians hit in crosswalks than almost anywhere else.
Ontario Canada is looking to pass a “Phones Down, Heads Up Act” as well to make it illegal to cross a street while using a phone.
I’m sure everyone has looked up something in Wikipedia at one time or another. Kevan Davis, a developer in London, has developed a Wikipedia game called Wikipedia: the Text Adventure.
You choose where you want to start and it brings up information from Wikipedia. You can choose one of the locations offered or put something in. You can then choose where to go from there from the offerings it gives. You would type “go ” and then the direction choice from the list. Example: go northeast.
To leave and go to another adventure, you would type exit then yes. Check it out: http://kevan.org/wikitext/
It’s a few years old now, but if you haven’t had the chance to see it, The Internship is quite entertaining. It costars Owen Wilson and Vince Vaughn as two washed up salesmen, who lost their jobs to the digital world, trying to figure out a new career path. They decide to try for an internship at Google.
So here are two guys in their mid-forties trying to land an internship against a bunch of 20-somethings. To them it was like having their dads with them. What makes it even more interesting is their lack of tech-savviness against the younger generation but they do bring their life experiences. You will see some Google products in the credits such as Google Drive, Translate, Google+, and more.
We recently came across the term “whaling” so of course, we needed to know more about it. Here is what the Victor crew found out. It is a form of phishing aimed at high-profile business executives, managers, CEOs, etc. They are going after the “big fish.” The emails sent to them are more official looking and target a particular person. A regular phishing attack usually goes out to a lot of people trying to lure anyone. Whaling is also considered “spear phishing” where it is an attempt to target an individual person or company.
As with phishing, whaling is used to get a person to reveal sensitive information, such as login credentials, to an account. They do this by trying to scare the individual into giving this information up.
Whaling goes so far as to make a web page or email that looks like the legitimate one. You may even be enticed into downloading a program in order to view a page or to get your information. It may come in the form of a false subpoena, message from the FBI, or some kind of legal complaint against you.
Be aware of what you are clicking. If you can, hover over the link and see where it is taking you. Try putting the URL in an analyzer, such as VirusTotal or TrendMicro to see if it is safe. If in doubt, don’t click or download anything you are unsure of.
It has recently been found that WPA2 protocol is vulnerable to hacking. They are known as Krack Attacks (Key Reinstallation AttaCKS) and there is a website where you can learn more about it. It is found that Android and Linux are most vulnerable to this exploit. They can be tricked into reinstalling an encryption key with all 0s that will allow them to enter your network and then get to sites you visit and capture your login credentials.
If you watch the video below you will see it is a rather involved process to actually crack into the network but that doesn’t stop someone who is intent on getting into your network.
There isn’t a whole lot you can do because this vulnerability bypasses any security measures. Some of the more simple things you can do is not use unsecure Wi-Fi. Ever. Keep your firmware to your router updated. Do not downgrade to even more insecure protocols like WPA or WEP.
We love tech movies. The Victor crew recently got to see The Circle. The main characters are played by Emma Watson (Mae) and Tom Hanks (Bailey). Mae leaves her hum-drum job join a tech/social media company called the Circle.
At first Mae is reticent about sharing her life but is pushed by co-workers to push the boundaries and become more transparent. As she becomes more transparent, she rises through the ranks from customer service to being part of the “inner circle.” She eventually has people all over the world following her, getting to know her, her friends, her family, and all she does.
As the movie moves along, eventually tragedy happens. Without giving away the full plot, through this tragedy and people she meets, she exposes the top people of the Circle and keeps them from hiding their secrets.
The taglines: Knowing is good. Knowing everything is better.
Some other lines are: Secrets are lies. Sharing is caring. Privacy is theft.
The movie trailers:
Last week, Amazon announced new devices. Among the new devices are the Echo Show, costing $229.99. This is a more triangular device with a screen. It allows you to make video calls as well. They are offering $100 off if you buy 2 devices with code SHOW2PACK. You can actually watch flash news briefings, see lyrics of songs, security cameras, just to name a few.
Other new devices are a shorter new Echo, the Echo Plus and the 4K Fire TV device. Also announced was the Echo Connect, Echo Buttons, and BMW partnership. The Echo Connect is an accessory to link Echo to home phone line. It costs $35 and is coming later in the year.
If you already own an Echo, Echo Dot, or Echo Show, effective immediately you can make phone calls. It is supposed to work with your land line or your mobile phone.
Echo Show at Amazon.com
The Victor crew just updated their new iPad to iOS 11. Here are some first findings and reactions.
After the initial update, if you had fingerprint access enabled, you will still have to use your signin to get in. You will then need to enter your iCloud password.
You can have the dock hidden but pop it up from the bottom at any time.
You swipe the dock up from the bottom and continue the swipe to show the App Switcher. The App Switcher has a new design as well and shows all open apps in a grid pattern rather than having to scroll through to find open apps. You can still swipe an app in this grid pattern to hard close or reset an app.
The dock has a folder that shows recently opened documents. It also allows you to browse documents. You can add your iCloud, and if you have the apps – Google Drive, Dropbox, OneDrive, and any other file managers you may have downloaded within this folder area. Once you enable these drives, you may need to log into them again to access them there. You can also tag files with colors.
The dock has a separator bar. To the right of the bar it shows the recently opened apps and to the left of it, your permanently set apps. If you move an app from the right to the left, it seems to permanently disappear from the home screen.
The App Store has a new design.
Another change is the keyboard. Usually you click on the 123 to access numbers and some symbols. Now you can just pull down on the key that shows the numbers or symbols to access without changing the keyboard.
If you go to settings, you will see you can choose some apps to show up in the control center all the time.
By now you’ve heard about the Equifax breach. Something you may want to do by November 21 is put a security freeze on your account. Until then, they are waiving fees to do this.
A security freeze is supposed to block outsiders from opening an account in your name. This is different from a fraud alert which will only notify you if someone opens an account in your name (even you).
A security freeze has you adding a PIN in order to make any changes. The three major credit monitors are TransUnion, Experian, and Equifax.
Right now you can only put the freeze on Equifax for free. TransUnion and Experian will charge $10 for each. Currently there is legislation pending on making this free. If you are planning to buy a car or house you don’t want to freeze your credit just yet.
Equifax will not be calling you so if you get a call saying it is from them, it is most likely a scam.
If you enroll in their monitoring program, you would waive rights to sue if you are impacted by the breach.
Here are some links:
Equifax blog with explanation of the problem
How to put on and remove a freeze from your account
Form to fill out to get a PIN to freeze account
Sometimes you try to empty a folder or delete a file only to find out you can’t because something else is using it. XKCD pictures it like this:
Sometimes you think you have everything closed yet you still get this message. You may need to restart your PC to make sure all instances that may have been previously connected to it are now disconnected. Another thing you can try is a program called LockHunter. Once it’s installed, you right click on a folder or file and you will see “What is locking this folder?” or “What is locking this file?”
After you click that, you will see what is locking the file or folder. I right clicked on a Pictures folder and clicked “What is locking this folder?” After that, this came up:
I can now find out what is locking the folder and take the actions I need to try to remove it.
Maybe you love, maybe you hate it but social media is here to stay. Many people used it as their lifeline during the past storm in Texas, known as Harvey. Many used Twitter or Facebook or Instagram to let people know they were in stuck and needed to be rescued. Still others used social media to let people know they were able to help.
The U.S. Coast Guard preferred for people to call them or 911 but people had trouble getting through. People even turned to Airbnb to offer their homes as shelters for those in need. The Hurricane Harvey Texas Rescue Facebook group offered ways to help those trapped or in need of rescue.