Recently a family member told me about an encrypted messaging app called Signal. It not only encrypts your text messages but also conversations. There are a few nice things about it: it is free, it is open source, and it works on both iPhone and Android phones. You can also send documents and images.
There is also a desktop app for your Windows, Mac, or Linux computer.
Microsoft Edge has come a long way. The Victor crew tried something out this past week and it works like a charm. You can connect your phone to your PC through Edge. The practical side is if you are looking at something on your phone (small device) and want to view something larger, you can send the page you are viewing on your phone to your PC. And yes, iPhone users, that means you too!
Install Edge on your mobile device (works with iPad as well). Sign in with your Microsoft password.
Scroll to a site and at the bottom you will see some icons.
The middle icon (mobile device with arrow) is what you touch to send to your PC.
Next when you see the screen below, you would choose which PC to send it to. I only had one connected PC as shown below (name partially obscured.) Press the PC you want to send the page to.
Here are a few new things the Victor crew found in iOS 11 for use in emergencies.
You can add Medical ID for emergency contact. Open the Health app and tap the Medical ID tab. Edit then scroll to Emergency Contacts. Press the + and it will take you to your contacts. On this page, you can also add medical conditions, notes, allergies, and medications as well.
There is Emergency SOS where you can call for help quickly. The Emergency SOS slider and Medial ID slider you can bring up to quickly contact emergency services. For iPhone 7, you will need to press the side button five times to get the sliders to show. For iPhone 8 or X, you would press and hold the side button and one of the volume buttons. After the call ends, the iPhone sends your emergency contacts a text message with your current location unless you cancel. If you have your location services turned off, they will turn back on temporarily.
We’ve talked about passwords before and yet it is such an important thing because of all the breaches we see. Some people say they don’t have anything that important so it doesn’t matter or they say they need to use the same password for everything.
This is a totally bad practice and attitude to have about this. Think about all your accounts where you have purchased items, or your banking or credit card accounts. Do you really want to use the same password for everything? Once they breach one account, say your email, they can look through that to find what other accounts you are subscribed to and have a field day. This is even how identities are stolen.
Here are some things you can do:
Go to HaveIBeenPwned.com and check your email for pwnage.
Also click on their password tab and check to see if your passwords are on any common lists.
Use a password manager like LastPass.
Use 2 step verification. Use an authenticator, too.
Once you download LastPass, set it up with a hard to hack easy to remember password (the first video below gives some suggestions on how to find one.) You can then import all the passwords saved to your browsers. Once you have LastPass you can also run a kind of audit check for recommendations on which passwords to change – it will show you duplicates or not so secure passwords you already have.
We recently came across the term “whaling” so of course, we needed to know more about it. Here is what the Victor crew found out. It is a form of phishing aimed at high-profile business executives, managers, CEOs, etc. They are going after the “big fish.” The emails sent to them are more official looking and target a particular person. A regular phishing attack usually goes out to a lot of people trying to lure anyone. Whaling is also considered “spear phishing” where it is an attempt to target an individual person or company.
As with phishing, whaling is used to get a person to reveal sensitive information, such as login credentials, to an account. They do this by trying to scare the individual into giving this information up.
Whaling goes so far as to make a web page or email that looks like the legitimate one. You may even be enticed into downloading a program in order to view a page or to get your information. It may come in the form of a false subpoena, message from the FBI, or some kind of legal complaint against you.
Be aware of what you are clicking. If you can, hover over the link and see where it is taking you. Try putting the URL in an analyzer, such as VirusTotal or TrendMicro to see if it is safe. If in doubt, don’t click or download anything you are unsure of.
By now you’ve heard about the Equifax breach. Something you may want to do by November 21 is put a security freeze on your account. Until then, they are waiving fees to do this.
A security freeze is supposed to block outsiders from opening an account in your name. This is different from a fraud alert which will only notify you if someone opens an account in your name (even you).
A security freeze has you adding a PIN in order to make any changes. The three major credit monitors are TransUnion, Experian, and Equifax.
Right now you can only put the freeze on Equifax for free. TransUnion and Experian will charge $10 for each. Currently there is legislation pending on making this free. If you are planning to buy a car or house you don’t want to freeze your credit just yet.
Equifax will not be calling you so if you get a call saying it is from them, it is most likely a scam.
If you enroll in their monitoring program, you would waive rights to sue if you are impacted by the breach.
Sometimes you try to empty a folder or delete a file only to find out you can’t because something else is using it. XKCD pictures it like this:
Sometimes you think you have everything closed yet you still get this message. You may need to restart your PC to make sure all instances that may have been previously connected to it are now disconnected. Another thing you can try is a program called LockHunter. Once it’s installed, you right click on a folder or file and you will see “What is locking this folder?” or “What is locking this file?”
After you click that, you will see what is locking the file or folder. I right clicked on a Pictures folder and clicked “What is locking this folder?” After that, this came up:
I can now find out what is locking the folder and take the actions I need to try to remove it.
If you are looking for a password, you can check to see if the password you want to use has ever been used. Just go to the Have I Been Pwned website and look at the Passwords link. They now have a list of the passwords that have been breached. You can test your password against it and it will tell you if it’s been breached but it will also tell you it may not be a good password even if it’s not been breached.
Here is what you get if your password has been used before and found on a breach list:
Are there times when you aren’t sure you are getting the speed from your ISP that you pay for? Running a simple test on your computer will tell you. First you need to know that the speed you receive via a computer connected through an ethernet cable may be closer to what your ISP says you have and connections through Wi-Fi will be lower.
Why would you need to do these tests? Well if you are streaming and run into a lot of buffering problems or connection problems, you might want to take a look at your speeds. Are others in your household doing things that require more bandwidth such as streaming or gaming?
Here are a few sites you can test (we are supposed to have 75 mbps up and down with FiOS):
Many ISPs have a speedtest if you want to try them – in some cases you just the need the url of your ISP then add /speedtest/ to the end of it.
You’ve heard the term megapixel many times especially with regards to digital cameras. But what does the term actually mean and is bigger better? That’s what the Victor crew wants to know. Here is what we found out.
Early digital cameras had a poor resolution and didn’t compare to regular film cameras when they first came out. Some were only about one-third to half a megapixel. So a single megapixel is one million pixels. If you are using a one megapixel camera, you will have one million pixels in the image. So what is a good size? It depends on what you are going to do with the photos. If you are only going to view them online, one to three megapixels is fine. If you want 6×4 prints, you will need at least 2 megapixels. For larger 10×8 prints you would need to go to five megapixels and even larger 14×11 prints you will need to bump that up to seven megapixels.
How do you get away with a smaller size on a computer? Most monitors aren’t usually more than 2000×1000 pixels so that is only two megapixels. If you have a 4K monitor, that is eight megapixels. So you can get away with about a 6 megapixel camera in most cases. More pixels, however will give you cropping room. You do not have to turn in your camera for more pixels.
The Victor crew found an article on PCMag.com about some things that you can do with Google Maps mobile app that not everyone may know about. From this app, you can add stops, you can hail a ride (taxi or Uber, for instance), travel through time in Street View, create a private map, remember where you parked. These are just a few of the tips listed along with short videos.
The Victor crew came across an urgent matter. If your browser is Chrome or Firefox, be aware of a new phishing attack. An attacker can send you an email with a link to a malicious website. You could visit a site that will either infect your computer or make you think you are signing in with your credentials as they trick you into thinking you are accessing the correct site.
The people from Wordfence, a security plugin for WordPress found this last Friday, April 14, 2017. They set up a demo site to show what is happening. It is well worth it to check their article and see if you are affected and what to do. They have set up a demo using a medical site, epic.com, so you can test your browser and browser settings. You can visit their demo site here in Chrome or Firefox. To compare the demo site with the real site they faked for comparison, you can click here to visit the real site here.
This does not affect Windows or Safari browsers. Currently there is a fix for Firefox browsers. Here is what you do:
Open your Firefox browser
Type about:config in the address bar
Search for ‘puny’ (without quotes)
You should see network.IDN_show_punycode set for ‘false’
Double click it to make it ‘true’
You’ve had your device for a while and it has all your favorite apps, your information, etc. What do you do? Well, if you haven’t already, you back it up to either iCloud or through iTunes.
To back up to iCloud, go into Settings then click on Backup and turn on iCloud Backup. Tap Back Up Now. You can see the information (how big your back up space is) if you look at Storage. You are only allowed 5GB of free space so if you need more, you will have to purchase it from Apple for about $0.99/month for 50GB.
The other alternative is to back up through iTunes. You will need to have a Mac or PC with iTunes running on it. Connect your device to your computer. You can still back it up this way to your iCloud or to your computer. Most likely you are doing it this way because of lack of iCloud space. Find out more here.
To restore a device from a backup, you must have all content erased from a device. Follow the onscreen setup until you reach Apps & Data screen and tap Restore from iCloud Backup or Restore from iTunes Backup. Sign in with your Apple ID if you are restoring from iCloud. Find out more here.
For almost anything you do, there is a keyboard shortcut. On a PC, you usually hold down the Ctrl key + another key.
Here are some of the more popular ones used while making a document or editing:
If you want some other shortcuts:
Microsoft Flag button – brings up the start menu
Flag+L: locks your PC
ALT+TAB: switch between your open programs
CTRL+F5: refresh the webpage
ALT+F4: closes the current window
CTRL while dragging a file to another folder will copy it to the folder.
We’ve written a few times about password security. But what if your phone number gets hijacked? This is not having your phone stolen but rather having your phone number taken from you. You no longer can use the two-step verification because someone else has the number they have on file for it. So how does a phone number get hijacked in the first place? The Victor crew wanted to learn more.
It can start with a text that looks like it came from your carrier. It may have a number or a login page for you to enter some information. All they need is your call-in pin and they can start the process of porting your number over to their phone. You actually think you are talking to a representative of your carrier. Once they have your number, they can use the “forgot password” function of all your apps and get a code sent to them to reset the passwords. Think of all the apps you have – your bank, your email, your wallet. So what can you do?
Put a passcode on your account with your carrier. Make sure whoever you are talking to uses that passcode with you. If a hacker tries to use it, hopefully the representative is on the ball and asks for the passcode.
Use the mobile carrier specific email address to access the account. Forbes suggests you have an address as your current primary one, one just for a mobile carrier, and one for all your sensitive accounts like banking. This way your primary account can’t be used to steal your phone number.
Disable online access to your wireless account. You will have to go the store to make changes but it won’t get hacked.
Ask your carrier to make changes with photo ID required.
Some other thoughts:
Use a password manager and let it generate passwords.
Don’t have the same security questions on all sites and don’t answer them truthfully.
Do not connect your mobile number to sensitive accounts. Create a new Gmail email address and don’t connect a phone number to it. Use Google Authenticator with one-time passcode generator to use it. They suggest using a Google Voice number.
Use a security key. Yubikey is a physical security key device. There are also devices you use a USB port for.
Use biometric authentication – fingerprint for example.
Cord-cutting refers to abandoning cable TV for streaming services. There are so many different avenues to go with this, the Victor crew thought we’d do some exploring into what was available.
One thing you can get is a Roku that you can stream many different channels from. It handles Netflix, Amazon, Hulu Plus for example. Netflix and Amazon have some crossovers, but Hulu Plus will bring you many current TV shows. Another streaming channel to consider is Sling TV for television shows. You might consider Apple TV instead of Roku. Another streaming device is Amazon Fire TV. There’s also Google’s Chromecast. You may want to find reviews on these devices and make your decision.
Another thing to consider is your Internet connection. How strong is it during peak hours? You can test it at speedtest.net or testmy.net. Do several throughout the day and evening to see how much you can handle. You may need to get an HD antenna to get the major networks in full HD.
So Microsoft has an event scheduled for October 26 at 10 am EDT in NYC. They say to join them to find out what is next for Windows 10. One can only speculate…
While we’re on the subject of Windows 10, did you know you can ‘write’ in the Edge browser and save it as a note to OneNote? If you have a touch enabled device you can use your finger or a stylus. If not, your mouse will work.
First you need to enable your “pen.” This is in the top right corner of the Edge browser.
Next you need to choose the type (pen or highlighter), color, and size. This will show up on the left hand side of the browser after you enable the pen.
Then you can write on your page and save it as a note for later.
You may have watched some crime dramas or other shows where the resident geek goes on the deep web or Tor network. Anyone can access this but you need a special browser. Here’s what the Victor crew found out:
Tor stands for “the onion router”. The web addresses will end in “.onion”. You will need to be careful because some of these sites can be nasty and contain scams. It works by anonymizing your activity so it can’t be detected. People in other countries use this if websites are blocked in their country. For instance, they may need to go to “https://facebookcorewwwi.onion/” to access facebook.com/ or “http://3g2upl4pq6kufc4m.onion/” to access DuckDuckGo search engine. you can search the web for more sites. Here is a directory we found: https://thehiddenwiki.org/ that lists some sites.
The Tor browser is slower than your usual browser but people use it to bypass censorship. The Tor Browser is a modified Firefox version that you can download here. Remember to be careful of the sites you visit.
With all the copyright laws out there, if you need music for videos, here’s a site where you can generate AI music. At Jukedeck, you can choose genre (instruments), moods, and length. They have also have a list of pre-made downloads. Every track is unique and royalty free.
If you set up an account, you can save your downloads for future use. This was originated at Cambridge University by a team of composers, producers, engineers, academics, and machine learning experts.
The downloads are free for small businesses or individuals if you give them credit or $0.99 per download without credit. For businesses with 10 or more employees the cost is $21.99 per download. If you need to buy the copyright, it is $199 and you own it outright.
If you have a PC whether desktop or laptop, do you shut it down or sleep or hibernate? What is the difference?
When you shut down, you need to save your programs before closing them. The next time you need to use it you need to wait for the boot up process.
This mode will preserve your session. You can close your lid on a laptop and it will do this. On a desktop you can choose to sleep. When you come back everything will be the way you left it. Sleep is a low-power mode. The current state will be saved in RAM. The only power drawn is to keep RAM on. It will resume where you left off when you power back on.
Hibernation mode works a little bit differently. It saves your computer’s state to the hard drive and shuts down completely. There will be no additional power drawn like sleep mode. When you power back up, the data it loaded to the disk will load back into RAM and resume where you stopped. It will take longer to resume to where you were but not as long as a regular boot up. Hibernate is the almost the same as shutting down but your work will be preserved without shutting it down.
Most laptops are set up to sleep when you close the lid. You can customize in your settings how long it be before it goes into sleep mode. In settings you can also set up your power button to put your computer into sleep mode. Laptops may be configured already to go into hibernation mode after so many hours in sleep mode.
Have you ever wanted to learn how to code a website from scratch? A good starting point might be to go through a W3Schools.com tutorial. Their homepage starts you with HTML. Currently the latest is HTML5. There are tutorials, references, and examples to get you started. Along with HTML, you should learn CSS (this stands for cascading style sheets) and is what gives webpages their style – color, fonts, and other design features.
This is fine for a simple site but you would need to go a lot further to make a dynamic site that uses a database. You might be better off calling a professional.
Ever wish you could put sticky notes all over your monitor to remember things? Windows 10 has sticky notes you may or may not know about. You can find them by going to All Apps > Windows Accessories > Sticky Notes or just search for it.
Here are some screen shots to help.
This is how you find it:
This is how to make a new note from existing one by clicking the + button:
By right clicking you can change the color of the sticky note:
Just delete the note by clicking the small x on the note.
Sticky notes have actually been around since Windows Vista but few people know or use them it seems. Unfortunately they are just as useful as a real sticky note as they don’t “do” anything but sit there to remind you of something. No little alarm goes off when the time on the note comes.
Well, it’s finally coming this week. After Friday, Windows 10 will cost you a mere $119.99 per machine. What you need to know is that you r should not use the Express settings. By skipping custom settings, you will be agreeing to data collection and tracking.
If you went ahead and did do express settings, you can change it. Go to Settings > Privacy > Speech, inking & typing. Click on the Stop Getting to Know Me button. You can actually go down the list under Privacy and turn off or on what you want.
Google has a way to teach kids how to code. Not with a computer but with blocks. Called Project Bloks, it allows kids to learn some skills they need for programming.
They us a brain board based on Raspberry Pi to provide connection to the program and each individual “puck” can be the instructions that go to the brain board to move it. Toys can take any form. Check out the video: