Tuesday, September 30, 2014

Keep Your Privacy Online

It seems like not a day goes by where we do not hear about some privacy or security breach.  Whether it is an iCloud hack, a credit card breach, or a new way of gathering data about you, there is someone out there determined to gather your information.  This tracking can come from your internet history, your emails, your social networks, or your purchases.  If you are doing it online, there are companies out there trying to get it so they know more about you.

The major browsers have all created a "Do Not Track" option, but this is not effective because it is currently voluntary on the part of the marketers.  If a marketer wants to ignore this option, you can do nothing about it.

Fortunately, there is a free third-party tool that is effective:  DoNotTrackMe by Abine.  It will block many of the cookies designed to track you, and it will also protect your personal information.  At the bottom of the page is also a link that allows you to install a premium version for $5/month.  DoNotTrackMe is also available for Android and iOS.

While this program is not perfect, it is constantly being improved to protect your data.  We may never be able to have both perfect connection and perfect privacy, but this is one tool to help you in your battle to take back your privacy.

Monday, September 29, 2014

Save Money on Printer Ink

A few weeks ago, I wrote a tip on what to look for in a new printer.  (If you would like to read it again, you can check it out here.)  In that tip, I wrote, "The cost of the printer itself will be extremely small in comparison to the cost of the ink it will use over its lifetime."  Printer ink is the most expensive part of the printing process, but that doesn't mean there is nothing you can do about it.  Here are six tips to save money on printer ink:

1) Use Grayscale or Draft Printing - Your printer may have a variety of settings available that can help save on ink if you don't need a perfect copy.  When you print, look for a Properties button located somewhere near the name of the printer.  Then, look for a "Grayscale" or "Draft" option.  Grayscale will print only in shades of black and white, saving your more expensive color ink, and Draft will reduce ink consumption by reducing the print quality.

2) Ignore Low Cartridge Warnings - Most printers start giving you a low ink warning long before you actually need to change the cartridge.  When you start seeing these warnings, it would be time to make sure you have an extra cartridge around (or go buy one if you don't), but wait until the quality of your prints start to degrade before you actually replace the ink cartridge.

3) Change the Font and Size - If you are printing something for your own use, consider reducing the size as small as you can.  This will save both ink and paper.  You could also switch to a font that does not use as much ink.  Some estimates say that by using Ecofont, you could print as much as twenty percent more.  I would not recommend this for professional printing, but for everyday prints that may get thrown away soon, it may be worth it.

4) Print Your Photos Elsewhere - Yes, there may be instances where you want to print a photo and have it right away, but for all your other photo needs, send it to a store that prints them.  Many of them can have your prints ready in a day or less, and the cost is much less than you will spend in ink.

5) Read the Fine Print - I hesitate to recommend going with generic ink cartridges due to quality issues, but if you are thinking about using them, be sure to check the page yield.  Some of these cartridges may sell for half the price, but they may also only be rated for half the number of pages.  If you are considering these generic ink cartridges, make sure you are actually getting a deal.

6) Return Your Ink Cartridges - Many office stores offer a credit for returning ink cartridges.  I return mine to Staples, which offers me a $2 reward for each cartridge returned.  If you are looking to maximize your return, check around at a variety of places and see which one offers the best deal.

Friday, September 26, 2014

Mac vs. PC, Part 2

After depressing any Apple fans who subscribe yesterday, it is now time to discuss areas where Apple's products excel.

Security, Part 2
PC users have heard it over and over from Mac fans:  Macs don't get viruses.  Macs certainly can get viruses (the first virus was written for Unix, which formed the basis for OS X), but OS X is naturally more secure.

Yes, OS X has some features that make it more difficult to write an effective virus.  However, a Mac's biggest security feature has been its low share of the overall market.  It is much easier and more profitable to attack Windows.

Apple also reviews iOS apps for malware before approving them for the App Store, although there is some dispute over how thorough Apple is with its screening process.  While Google has promised to be more effective at screening Android apps,

Mobile Software
Macs are well behind PCs in the software field, but iOS has a great variety of apps available.  Some of this may be because Apple was the first to get into the consumer smartphone market, and some is because there are a relatively small number of iOS devices.  It is much easier to test an iOS app on Apple's limited number of iPhones than to test an Android app on the large number of Android devices.

The one complaint I have with iOS apps is the fee that Apple charges developers.  While large companies like Facebook and Google won't have a problem paying the fee, small developers might choose to ignore iOS all together or to charge for an app they give to Android users for free.  I know of several free Android apps I use that charge you for the iOS version.

Stability
Because Apple develops its own hardware and software together, OS X and iOS are much more stable than Windows and Android.  Both Windows and Android have to be designed so that it can be run on a large number of hardware platforms.  OS X and iOS are both designed specifically for one hardware profile:  the one developed by Apple.  (It is possible to install OS X on a non-Apple computer, creating something popularly called a "Hackintosh".)  Apple's ability to develop hardware and software together means its products will generally experience fewer crashes and glitches.

Arts
Yesterday, I mentioned that if my life had taken a different course, I would probably be a Mac user. I studied music in college and did a substantial amount of composing and arranging music.  If I were still doing this today, I would almost certainly be a Mac user.  If there is one academic area where Macs excel, it is the fine arts.  If you are considering a career in this field, expect to need a Mac at some point.

Intangibles
A few other reasons to like Apple.  First, Apple makes nice-looking products.  I distinctly remember seeing a Mac as a kid and thinking about how cool it looked compared to the old, boxy computers we owned.

Second, I have heard good things about (although I have not personally experienced) Apple's customer care services.  I know people who have broken their screen and had Apple repair it for free, even though they should have been charged a fee under the Apple Care plans.

Finally, Apple's devices can be counted on to hold their value.  I know one couple that always purchases the newest Apple devices and then sells the previous model.  They usually end up receiving most of the cost of their new devices from the sale of their old ones.

Security Alert: Mac and Linux Vulnerability Found

A vulnerability has been found in Unix-based systems (including OS X and Linux) that could put your computer at risk.  The flaw allows someone to use a bash script to attack your computer and launch programs, enable features, and view files.  According to Lifehacker, if you are using a Mac or Linux machine, you can test your computer by opening a Terminal and entering a code.  See the linked article for more information on how to know if you are vulnerable.

If you are found to be vulnerable, check for updates right away.  Most Linux distributions have an update already available, but Apple has yet to release an update for OS X.  However, there is a link in the article that will allow you to update Bash manually.

Thursday, September 25, 2014

Mac vs. PC, Part 1

Those who have been reading my daily tips for some time probably already know that I am not a big fan of Apple's products, whether it be a Mac computer, an iPhone, or an iPad.  Therefore, I am very careful to give an answer when I am asked whether a Mac or PC--or an iPhone/iPad or Android--are better.  Determining which one is best for you is a matter of deciding what you need and choosing the device that best excels in those areas.  For me, that is my custom-built PC running Windows.  For others, that might be a Mac.  I am certainly not critical of those who choose to buy a Mac.  Had my life taken a different course, I would almost certainly be using a Mac because it would better fit my needs.

Over the next two days, I will attempt to answer this question as fairly as I can.  Today, I will write about the areas where PCs and Androids excel over Apple's devices, and tomorrow, I will cover the areas where Apple's devices excel.

Value
If you compare spec sheets for a PC laptop and a Macbook, you will find that the PC always gives you a better specs for your money.  I have no problem with Apple charging more for its products; if its customers are willing to pay more, I believe they should be able to charge whatever they want.  However, if you are looking to get the fastest and best components on the market, you will get them at a much better price from Dell or HP than from Apple.

The same is true for the iPad and iPhone compared to devices from Samsung or HTC.  Comparable specs tend to put the "i" Devices at a $100-200 premium.  Again, I have no problem with Apple charging as much as the market is willing to pay, but it is a factor you must consider in making your choice.

Variety
There is no doubt that Apple's products are more aesthetically pleasing overall (more on that tomorrow), but the truth is that with all of Apple's products, you are limited to just a few devices.  Because Windows and Android are distributed software, there are a large variety of devices from many manufacturers available to fit your needs.

Apple has further hurt this variety by limiting the number of options and the ability to upgrade a device.  When you buy an Apple device, you will have a difficult time changing any of the items inside it once you get it.  For example, if you want more storage space for your iPhone or iPad, you will have to upgrade to a new device with more storage.  (By contrast, Android allows you to add an SD card to your device.)

Desktop/Laptop Software
We will deal with software again tomorrow, but PCs definitely win in the software category.  Many important programs are not available for Macs, or they are only available at a premium price.  I recently set up a virtual machine inside a Mac for someone who discovered that the Mac versions of the programs she used did not have the features she needed.

While the virtual machine is one option and emulators have gotten better recently, software is still a major reason to choose a PC.  (It is also the reason why I switched back to Windows after being a Linux user for several years.)  Before considering a Mac, make sure that the software you use regularly is available for Mac (or that there is a suitable substitute program available).

Security, Part 1
You might be surprised to see security on a list of areas where PCs and Androids excel over Macs and iOS devices.  Yes, it is true that Apple's products are generally more secure, but PCs do have one security advantage over Macs.  Most PCs have security software on them that protect them from attacks that affect both types of devices.

Most attacks today are not the viruses that spread by installing a device (like a flash drive or external hard drive) on an infected computer and then bringing it back to your own computer.  They are social engineering attacks designed to get you to give up your personal information and passwords.  It doesn't matter if you are using a PC, a Mac, an iPhone, or a Galaxy Tab, if you click that link in the email you received from "your bank" and hand over your online password, your information will be in the wrong hands.

Fortunately, security software is recognizing this change and adapting to protect us.  However, security software does you no good if you do not have it installed on your system.  As a whole, PC users recognize these threats and install security software better than Mac users.  Yes, you may not need an antivirus program for your Mac, but software that helps you recognize shady sites and phishing schemes would be a plus.

Wednesday, September 24, 2014

Use Text Expanders on your Phone

Today's tip comes to you courtesy of Lifehacker, because I honestly had no idea you could do this until I read this article today.

When I try to log in to websites or apps on my phone, it can be a pain to have to enter my email address every time.  Using the "Keyboard Shortcuts" on iOS or "Personal Dictionary" on Android allows you to set up a keyboard shortcut that will enter your email address.

The article recommends using "@@" for your primary email address and adding additional "@" for secondary email addresses, but points out that this did not work on Android.  The truth is that you can use any key combination, so long as you don't plan to actually type that particular combination.  Don't use "email" as your shortcut because you will never be able to actually type the word "email" on your phone again without deleting this shortcut.

To set it up, go to the Settings app in iOS and tap General, followed by Keyboard, and add a new shortcut.  In Android, also go to the Settings app and tap Language and Input, followed by Personal Dictionary.

Tuesday, September 23, 2014

Fix a Broken Internet Connection

While we certainly want our internet connection to work 24 hours a day, 7 days a week, the truth is that outages will sometimes occur.  Sometimes they are the fault of our provider's equipment, but sometimes they are actually due to our own equipment.  If they are our provider's fault, there is little we can do but wait.  However, if the equipment inside our house is malfunctioning, there may be a simple solution to get it working again.

Inside your house, there are usually two boxes.  The first is a modem.  This connects to your service provider's lines and translates the data being transmitted.  If you are old enough to remember dial-up internet (yes, I fall in that category!), the modem would translate all that noise you heard as you attempted to connect into signals that the computer could read.  In fact, if you picked up the phone while you were connected, you would hear more of the same noise, which was actually your web pages coming through the line.

DSL permitted data to be transmitted while using the telephone by transmitting data at multiple frequencies.  A filter would be installed that would send one frequency to the modem and another frequency to the telephone.  Cable also works in a similar manner:  television data is sent to one location while internet data is sent elsewhere.

Regardless of where your internet service comes from, you will have a modem.  However, there is probably a second box located near you modem:  your router.  If you want to connect multiple devices over your internet connection, you will need a router to tell all the incoming traffic where to go.  It would be horrible if you were watching a Netflix movie, and then the movie went to your son's laptop while his research for a term paper was displayed on your television.

Malfunctions can occur in either of these devices.  Sometimes, they are able to correct themselves and you never notice the problem, but other times, you will need to reset both boxes.  The process is simple:  find the power cord, and unplug both of them.  Wait about 30 seconds (devices can hold a charge for a short period after they are unplugged), and then plug your modem in first.  (The modem will have a cable running from the wall into the back of the box.)

Once your modem is running again and the lights have stopped flashing, plug your router back in.  Once again, wait for lights to stop flashing.  Then, check your internet.  If it still does not work, your service provider may be experiencing an outage.  In this case, it is best to call them to confirm the outage.  If they do not see a service outage, they may take you through some troubleshooting steps, including the reset I just described.

It would also be a good idea to perform a reset every so often while your internet is still out.  Most of the time, my computer has worked fine once service has been restored, but I remember one time when we had to do a reset before our service worked again.  Since it takes less than a minute, it might be worth it to recheck every hour or two.

Monday, September 22, 2014

Expand Your Horizons with Free Online Courses

I graduated from college in 2007, and I graduated again in 2010.  After completing seven years of college and two degrees, I have very little interest in actually going back to school again.  However, I also believe that it is important to be constantly learning.

Branching out and learning is how I ended up starting a technology business:  I have always enjoyed tinkering with software, but I thought hardware was too difficult until I set out to build a computer.  Now, with the increasing complexity of software, I would much rather tear a laptop or tablet down to replace a part than fix a software issue.

Thanks to the internet, you no longer have to travel, live in a dorm, and take out thousands in student loans in order to take classes at some of our most prestigious universities.  Many colleges offer classes online for free.  Last year, I took a class on technology from an internationally-known expert who teaches part-time at Harvard.

Very few of these classes offer credit or any type of certificate, but if you are simply looking to expand your horizons and possibly pick up a new skill, then these classes are the perfect option.  To browse the available classes, check out the links below:

Free Online Courses - Open Culture
Red Hoop
Coursera

Friday, September 19, 2014

What is Bitcoin?

I received an email from a customer wanting to know what I know about Bitcoin.  My reply was quite simple:  "I know very little, but I am certainly willing to learn more."  I have done some research on Bitcoin over the past two days, and while I cannot say I understand it fully, I do understand it much better.

Bitcoin was created in 2009 as a way to quickly send money online without using banks or processing companies.  Initially, it was used mainly for transactions between individuals, but it has become more widely accepted recently.  I have received notices from several companies recently saying that they are (or soon will be) accepting Bitcoin.

Because Bitcoin does not require a bank or payment processor, the transaction fees for Bitcoin are much lower.  Furthermore, there are no currency exchange fees for an international transaction since Bitcoin can be used worldwide.  There is also very limited government regulation over Bitcoin, although this may change as their use increases.

Bitcoins are stored in a digital wallet, either on your computer on in the cloud.  The wallet is like a bank account that can be used to make payments, but it is not insured.  The easiest way to get Bitcoins is to offer something in exchange for Bitcoins, but you can also obtain them through an exchange (purchasing them for money).

Additionally, you can "mine" for Bitcoin.  Mining allows you to give some of your computer's resources to help process and verify Bitcoin transactions.  In exchange, miners will occasionally receive a group of newly-generated Bitcoins.  However, like actual mining, you may never receive any Bitcoins for your work.

Every Bitcoin transaction is recorded in a public log available for viewing, but no personal information about the transaction is recorded.  The only information that ties the transaction to you personally is your unique Wallet ID.  This keeps Bitcoin transactions anonymous, and it is the reason why Bitcoin has become the primary currency for those engaged in illegal transactions.

Bitcoin is certainly not without risk.  A wallet kept in the cloud could be hacked, like what happened at Bitcoin exchange Mt. Gox, which lost 650,000 Bitcoins (approximately $300 million).  If you decide to store your wallet on your device, it could accidentally be deleted or become corrupted.  The Bitcoin exchange rate could drop drastically and leave you with less dollars when you sell them.  And finally, governments are beginning to look at ways to regulate Bitcoin in order to make sure that people pay taxes and avoid illegal activity.

The future for Bitcoin is uncertain.  With governments all around the world printing money, Bitcoin's limited supply could lead to great increases.  However, the lack of backing by anything except the community of users could result in a mass exodus from the currency at the first sign of a Bitcoin flaw.  For now, it is best to consider Bitcoin as an investment:  don't put money in that you need, and realize that the value could go up or down.

Thursday, September 18, 2014

Share Large Files Easily

It seems that very few days go by where I don't make use of the email attachment feature.  That was definitely a wonderful idea!  However, there are times when sharing a file might be difficult or impossible because the file is too large.  Both Gmail and Yahoo Mail limit attachments to 25MB.  If you (or the person you are sending the file to) use another email provider, it may have a smaller limit.

However, there is an easy way to share large files using Dropbox or Google Drive.  In Dropbox, place the file inside a folder, and then navigate to the top and click on the Share Folder button.  Type in the email address of the person or people you want to receive the file, and the person will receive an email announcing that there is a shared folder.

In Google Drive, simply select the checkbox beside the file, then click on the More button and select Share.  Type in the email address of the person or people you want to receive the file, and they will also receive a link with the file.

This also makes it easy for the person to edit the file and send it back to you.  Simply load the file back to the Dropbox or Google Drive account, and then both of you will be able to see the shared file with any edits made.

Wednesday, September 17, 2014

Find Free Wi-Fi Hotspots

I honestly could not tell you how much business restaurants and stores in my area have gotten from me because of their free Wi-Fi.  Within the area I regularly travel, I know most of the Wi-Fi hotspots, and they make very convenient places to stop in during an hour or two break.

When travelling, free Wi-Fi can be a lifesaver, especially if you have to send a large file or multiple emails.  Wouldn't it be nice if there was a map of all the Free Wi-Fi hotspots near you?  Well, now there is one!

The Free Wi-Fi Finder app from Ninth Decimal can direct you to hotspots near you.  It can also scan for wireless networks that are within range of your device.

To download the Free WiFi Finder for your phone, follow these links:
Free WiFi Finder - iTunes
WiFi Finder - Google Play

Or you can access the web version at www.wififreespot.com.

Tuesday, September 16, 2014

Use the Google/Bing Calculator

One of the major adjustments I had to make when I switched to Windows 8 (and later, Windows 8.1) was the missing start menu.  While I normally pinned my most-used items to the taskbar, I did use the start menu to access programs I used less often.  One of those programs was the calculator.  I used the calculator just often enough that it appeared on the first portion of the start menu, but not often enough that I wanted to have it cluttering up my taskbar.

When I switched to Windows 8, I no longer had a start menu to quickly access my calculator.  And while I could create an icon for it on the start screen, I would still have to search for it each time.  I mentioned this problem to a friend, and he told me, "Just use the Google calculator."

Initially, I dismissed this idea as not much better than my current situation because I thought I would have to navigate to a specific Google Calculator page.  However, he told me that you can simply enter the equation into the search bar and it will calculate it for you automatically.  If you have a search bar for Google or you have your omnibar in Chrome set for Google, you can enter it there, and the answer appears at the top of your Google results.

Even better, this tip also applies to Bing!  If you enter a math problem in the Bing search box, or in a search bar or omnibox set to Bing, you will also see the results.  Unfortunately, Yahoo has yet to add this feature to its search.

The Google calculator can interpret many types of mathematical equations.  However, some of the symbols might not be what you are used to.  + and - are also the same, but * is the symbol for multiplication, / is the symbol for division, and ^ is the symbol for an exponent.  The calculator can also figure more complex math problems, like trigonometry and logarithms.

For me, this was the solution to my problem.  Since I usually have a browser window open (and when I don't, I have my browser icon on my taskbar), I can quickly access the calculator anytime I need it by opening a new browser tab and typing in the problem.  It may not be the perfect solution for your life, but it is handy to know that you can always have a calculator anytime you're online.

Monday, September 15, 2014

Keep Your Pictures Safe

Did you know that your pictures can be secretly sharing all kinds of information about you?  Besides the actual data that makes up your photo, your digital camera, tablet, or smartphone also records a substantial amount of information, called metadata.

The term metadata became well-known following the Edward Snowden revelations about the NSA.  In this instance, the NSA was storing information about phone calls, including the phone numbers involved and the length of the call.  For your photos, the camera records information about the camera that was used, the date and time that the photo was taken, software programs used to edit the photo, and even the GPS coordinates (if GPS is enabled).

Some of this information can be very useful.  If you want to recreate the scene from a photo you took two years ago, you can look back at this data to remember exactly where this picture was taken and what camera settings you used.  However, if you take a picture inside your home and post it online, you might not want your home's GPS coordinates made public.

You can view the metadata on your photo by right-clicking on it, selecting properties, and then choosing the Details tab.  This will tell you what type of data is stored on your photos.  You can also go to the bottom of the tab and select "Remove Properties and Personal Information".  This will allow you to either remove the information from these files or create a copy with the information removed.  However, this Windows feature is not always successful.

Fortunately, you can use a free program called XnView.  Like the Properties box, this program will show you all the metadata and wipe whatever you want gone.  You can then recheck the file to make sure that the information has been deleted.

XnView Download

Friday, September 12, 2014

Speed Up Your Wi-Fi

Everyone wants the fastest internet speed possible at a price we can afford.  However, if your Wi-Fi is slow, the problem may not be your ISP.  There are many things that you can do to improve your Wi-Fi speeds that don't include contacting your ISP to increase your speed (which will also increase your price, of course!)  Here are four free things you can do that might improve your Wi-Fi speeds:

1) Move the Router - Many people do not know that the maximum speed decreases as you move away from the router.  To make sure you have the best speeds, move the router as close as possible to where people will be using Wi-Fi.  If you want coverage throughout your house, try to move it somewhere in the center.  If most of the Wi-Fi access is done on one side, you might want to move it closer to that end of the house.

Hiding the router away in one corner gives some of your best coverage to your yard and even to the neighbor's house.  Obviously, you will not want an unsightly mess of cables right in the middle of your living room, but moving your router closer may improve your speed.

If you must put the router in a corner or at one end of your house, you can use a curved sheet of aluminum foil or an aluminium can behind the router to reflect the signal back into your house.

2) Change the Channel - Your router can be programmed to work on eleven different channels.  If most of your neighbors are using one particular channel, that channel can slow from all the transmissions.  Access your router's control panel (for exact instructions, check the printed or online documentation for your router) and try changing the channel.  The best channels to use will be 1, 6, and 11.

A word of warning:  I had one customer whose printer required channel 1 for some reason, but his router was programmed to select the clearest channel.  If you suddenly find that a device won't connect after changing the channel, you may be stuck with the channel you are on.

3) Update Firmware - All devices contain small chips with software to operate the device.  This software is called firmware.  Manufacturers will sometimes release firmware updates for your device to protect against security holes, correct errors, and add new features.  Unfortunately, unlike Windows, your devices are rarely programmed to check for firmware updates.

Both your router and your device's Wi-Fi card have firmware that might benefit from an upgrade.  To check for new firmware, go to the manufacturer's website.

4) Check for Thieves - Earlier this week, I wrote a tip about how to check for people that might be using your Wi-Fi network.  If you did not get this tip, you can check it out here.

However, even authorized devices may be using your bandwidth without your knowledge.  Right now, WiFi Guard lists five devices connected to my router, even though I am only using my computer (and at the time I am writing this, I am the only one awake).  Shutting off Wi-Fi on your phone, tablet, or streaming device might free up more bandwidth for your computer.

Thursday, September 11, 2014

Listen to the History of 9/11

It was thirteen years ago today when America experienced its worst attack in its history.  I remember sitting in school on that day and hearing teachers say that 9/11 would be my generation's Kennedy moment:  everyone would remember where they were when they first found out.  While I dismissed it at the time, I have come to realize that was completely accurate.  I was a high school junior, waiting for my first period Algebra class to begin, when our teacher said a plane had flown into the World Trade Center and they thought it might be terrorism.  We had only had the TV on in our classroom for about a minute when the second plane flew into the south tower.

With as vividly as we can recall the events of that day, it seems hard to believe that most of the students entering 8th grade this year were not even born on 9/11/01, and most students in high school will remember very little--if any--about the day.

The 9/11 Memorial and Museum is a place that I would like to visit someday.  However, the museum's website also contains a wealth of information.  One of the most touching sections is the Oral History section, where survivors and family members share their stories.  You can listen to the stories by clicking the link below.  (Note:  The page for the link contains three perspectives, but you can click on the categories on the left side of the page to listen to more.)

9/11 Memorial - Oral Histories

Wednesday, September 10, 2014

Three Things You Should Never Do on Facebook

Facebook is an extremely useful tool for keeping in touch with friends and family and even networking with prospective employers.  However, there are some things that should not be shared.  Yes, we all know a few people who share WAY too much on Facebook, but that is not what I am talking about here.  Here are three things that you should never talk about on Facebook:

1) Post details of your vacation - Unless you want to announce that your home is open for burglars, don't announce to everyone that you are going on vacation next week.  Even if you make the post private, comments and likes can allow other people to see your post.

Furthermore, don't provide a update of your trip through daily photo albums.  These also announce that you are gone.  There is certainly no problem with posting these photos:  just wait until you are back before you post.

2) Complain about your job - In our current economy, taking to Facebook to complain about your boss, company, co-workers, etc. is a quick way to find yourself filing for unemployment.  Even if you don't end up losing your job, these types of posts will not win you any friends in the office.

3) Provide your personal information - Part of the way that people accessed the photos in the recent celebrity photo hack was through answering security questions that were available online.  So much of the information that can be used to answer these questions can be found on our Facebook pages.  The street on which you grew up, the name of your first pet, and your mother's maiden name are all common security questions, so don't write about them on Facebook.

Also, it is amazing what can be accomplished if someone just knows your name and complete birth date.  Fortunately, Facebook allows you to block your birth year from being shown on your profile.  Regardless of how you feel about your current age, keep your birth year off of your profile.

Tuesday, September 9, 2014

Six Things You Can Do with Your Old Smartphone

In just a few hours, we will know the details of the next series of iPhones.  Since the iPhone holds just over 40 percent of the smartphone market share, it is no surprise that the leaked and anticipated details of Apple's next smartphone have been discussed so much.  However, if you are a person who always upgrades to the latest device, or if you have recently purchased a new smartphone, you will have to decide what to do with your old phone.

Here are five things you can do with your old phone:

1) Turn it into cash - I always think it is amazing to see the number of older model phones available on eBay, Amazon, and Craigslist right after the next model has been released.  Once the new iPhones are available, one simple thing you can do with your old phone is to sell it.  While those who know me know that I am not a fan of Apple's products, one of their big benefits is that they hold their value very well.

If you decide to sell your old phone, you should make sure that your new phone is exactly what you want and in working order before you list it.  It would be very frustrating to decide to return your phone or have to send it off for warranty service after you have sold your old phone.

Before you sell your phone, make sure your data is wiped from your device.  I wrote a tip on this subject recently, and you can read it here if you missed it.  Then, check out the value of your old phone on a site like WorthMonkey to determine how much it is actually worth.

If you want a simple way to get quick money quickly, you can try trading your phone for a gift card at a major retailer.  Walmart and Best Buy both offer a trade-in program, but it will not get you the best deal.  To get the most for your phone, you can list it on Craigslist, Amazon Marketplace, and eBay.  You can also try looking at local Facebook groups established for buying and selling products in your region.

2) Let your phone guide you - If your phone has an offline mapping service, like Google Maps, you can turn your old phone into a GPS.  Turn off the Wi-Fi and Mobile Data connections (they will run your battery down) and turn on GPS location services.  With a windshield mount (available for around $10-20), you won't need to buy an actual GPS again.  Plus, if your new phone uses the same charging port as your old phone, you won't need a separate car charger for both devices.

3) Create a digital photo frame - Combine your old phone with the free app Dayframe (only available for Android) and turn your phone into a digital photo frame.  Dayframe will sync with accounts on multiple services, such as Facebook, Twitter, Flickr, Google+, Instagram, etc.  (It does not currently have the ability to take photos directly from your computer.)  If you want to create custom playlists of photos, you can purchase the $3 Dayframe Prime upgrade.

4) Listen to music on the go - If you want to save your phone's battery for calls and texts, you can carry your old phone with you as a media player.  Just remember to turn off all connections (Wi-Fi, Bluetooth, GPS, and Mobile Data) to conserve your battery life.

5) Wake up to your old phone - Many of us now use our phones as mobile alarm clocks.  The only problem is that most of them have to be on for the alarm to sound.  (I do know of a few phones where the alarm can be set to sound even when the phone is off.)  If you find yourself waking up to notification alerts during the night, try shutting your new phone off and using your old phone as an alarm clock.

6) Create your own internet phone - If you are considering ditching your landline, but like the convenience of having an extra phone at the house, your old phone can fill that need.  Simply use an internet voice/text app like Talkatone to make calls and send text messages using your home's Wi-Fi. Unlike Skype and Facetime, Talkatone is free even when calling those who do not have the app installed.

Monday, September 8, 2014

Catch Wi-Fi Thieves

Securing your wireless network is important.  Your network uses your internet connection, which means that any activity will be traced back to you.  If you don't secure your network, someone sitting in their car could implicate you for trafficking drugs or child porn.  (Yes, it has happened.)  If you don't know how to secure your network, you can read the tip I wrote on this back in July here.

However, what do you do if you think that someone is on your network (even if it is secured).  You can try logging into the router's home page, but my router's home page gives me very little information about the devices that are connected.  In order to determine which device is which, I have to disconnect each device and refresh the page to see what disappeared.  Plus, if you forget about a device (like I forgot about the Roku player when I tried doing this), you may think there is an intruder on your network.

Fortunately, there is an easier way.  SoftPerfect's WiFi Guard will scan your network and give you additional information about connected devices.  Looking at my network, I can clearly see my computer, my network printer, my MagicJack phone, and my Roku.  There is one other device that is not recognized, but I believe that it is probably a smartphone or tablet.

WiFi Guard will put a green or red light next to each connected device to show whether or not it recognizes it.  When I scanned the first time, only my computer and the router were listed as green.  If you recognize the device and want it to stop flagging it, simply double-click the device and check "I know this computer or device".

If you want to get even more advanced, you can set the program to email you when an unrecognized device connects to your network.  This is the perfect way to monitor your network when you're not around.

This program is NOT a substitute for a secure network.  Even if you quickly recognize and block an intruder, they still have had time to use your network for whatever nefarious purpose they might have.  However, it is good for keeping track of your connected devices and determining if someone is accessing your network without your permission.

This program is free for Windows and Linux users, but it costs $9.99 for Mac users.  You can download SoftPerfect's WiFi Guard using one of these links:
SoftPerfect WiFi Guard - Windows/Linux
SoftPerfect WiFi Guard - Mac

Friday, September 5, 2014

Hide Files or Folders

Have you ever wished you could make something disappear?  Well, we might not have figured out how to make physical objects disappear yet, but we can make files disappear.  There are many reasons why you might want to do this.  Perhaps you are working with confidential data and want an extra layer of security.  Maybe you are purchasing a gift for a spouse and don't want his or her eyes to come across the information.  Whatever reason you might have for wanting to hide a file or even an entire folder, Windows makes it easy to do it.

To hide the file or folder, simply right-click on it and select properties.  Towards the bottom of the Properties window will be a check-box that says Hidden.  Check the box to mark the file to be hidden.

However, Windows has a setting that will either show or hide all files marked as hidden.  This is also how you will find the hidden file when you need to access it again.  The easiest way to find this setting is to go to the Search box and type in Folder Options.  On the View tab, under Advanced Settings, you will find the option to either show or hide all hidden files and folders.  In Windows 8, this option also appears on the View ribbon of File Explorer.  You also have the option to make files and folders as hidden directly from this ribbon.

Even if you are never planning on hiding files yourself, it is important to know about this feature, especially if you have kids.  It might be wise to check your kids' computers with hidden files shown to see if they have anything they think you can't see.

Thursday, September 4, 2014

Stop Auto-Play on Facebook

A few months ago, Facebook began enabling auto-play of videos as a default for all users.  Then, Facebook announced that it would begin allowing video ads in our news feeds.  Coincidence?

We can't do much about the advertising in our newsfeed.  However, we can stop videos from playing automatically.  Like most new Facebook features, this one can be disabled by going into settings.  From the newsfeed, click on the arrow in the upper-right and select Settings.  On the left hand side, select Videos, and then change the "Auto-Play Videos" option to Off.

Unfortunately, you're not done yet unless you only use Facebook from its web site.  Right there between the "Auto-Play Videos" title and the button where you select Off is a message stating that this setting only applies to the Facebook site.  If you use a mobile app, you need to go through the process in the app.  In the Android app, tap the home key, select Settings, and then change "Video Auto-Play" to off.  In the iOS app, go to the Settings app, select Facebook and then Settings, and then change Auto-Play to off.

Wednesday, September 3, 2014

Protect Your Data When You Sell Your Computer

Someone contacted me last Friday with some questions regarding selling a computer, and it made me realize that a tip on protecting your data before you sell your device would be a great idea.  Identity theft is a major problem, and it is important that you take the steps to completely remove your information before you sell a device, especially if you are selling to someone you do not know.

For a laptop or desktop computer, I recommend a two-step approach.  First, remove the data files from the device by deleting them or by doing a factory reset.  To delete the files, simply move them to the recycle bin or trash can and then empty it.  For a more secure approach, you can do a factory reset to restore your device to its "out-of-the-box" state.  Most computers will have built-in software to perform this operation, but you will have to follow the instructions in the user manual since each computer has a different process for starting a factory reset.  (Some manufacturers may use other terms, such as "System Restore" for this process.)  This process will delete everything on the drive and then reinstall Windows.

However, even a factory reset does not mean that your files are completely gone.  When you delete a file, the computer does not actually remove the data; it just marks that area of the drive as usable.  The files are still there, and they can still be recovered and pieced together.  The reinstall of the operating system will write new data over some of your files, but there will still be areas with leftover data.

To remove this data, I recommend using the free program CCleaner.  Along with many other tools, it contains a drive wiper that can wipe all the free space on the drive.  After installing, click on Tools and then Drive Wiper.  Choose Free Space Only (or if it is installed as a second drive on another computer, you can choose Entire Drive), the number of times you want data written into each area of the drive, and the drive or drives you want to wipe.  Click the wipe button, and let CCleaner go to work.  Depending on the amount of free space on the drive and the number of passes selected, this may take a substantial amount of time, so you may want to let it run overnight.

If you are selling a phone or tablet, you will also want to ensure your data is protected.  Fortunately, both iOS and Android have built-in settings to do this.  iOS devices will do this by either encrypting all data and deleting the encryption key or by overwriting all data on the device.  Simply navigate to Settings, then to General and Reset, and select the Erase All Content and Settings option.

With Android devices, the process is slightly more complicated.  You will need to encrypt your data before performing the reset.  (Avast recently conducted a study by purchasing 20 phones that had been wiped to factory settings and found that it could recover data even after the factory reset.)  First, set up a lock screen PIN or password by going to Settings, Security, and Screen Lock.  Then, go to Settings, Security, and choose Encrypt Phone.  You will be prompted to enter your PIN and respond to a warning message.

Now, you can do the factory reset.  Go to Settings, Privacy, and choose the Factory Data Reset option.  The phone will now delete the encrypted data along with the encryption key.

Tuesday, September 2, 2014

Can Weather Affect Your Computer?

It's been hot here in Northern Kentucky, and I hear it's been hot all across the Midwest.  The heat is probably the reason why I received this email:
You've said that heat is a computer's enemy.  If I leave my phone or laptop in the car, will the heat eventually kill it?
Yes, it is true that heat is the enemy of a computer.  However, computers regularly run at temperatures much greater than we will ever reach outside.  For example, the maximum safe operating temperature of the CPU in my primary computer is listed as 158 degrees.

However, this does not mean that it is completely safe to leave your device in your car all day.  Heat can affect your hard drive and battery, and high humidity can cause condensation build-up inside your device.  In general, you should do your best to keep your computer away from temperatures over 90 degrees.

Cold can also present a problem for your device.  When I was in high school, I actually had a calculator's LCD screen crack after I left it in my car on a cold day.  Cold temperatures can also cause a build-up of condensation when you bring it back into warmth.  Even if you have touch-screen gloves, I would recommend keeping your phone in your pocket as much as possible.

To put it simply, our devices may be excellent at managing large amounts of internal heat, but they are not designed to be operated in excessive temperatures outside.  If you must leave your device in a hot or cold car, give it some time to adjust back to room temperature before you turn it on.