Tuesday, March 31, 2015

Five Tech Pranks for Tomorrow

I don't usually do too many pranks for April Fools Day, but I have come up with something for the kids on my school bus the last two years.  (Unfortunately, April 1 this year falls over our spring break, so there won't be any jokes this year!)

If you are still looking for something you can do for a family member, friend, or co-worker tomorrow, here are a few tech-related ideas.

1) Spill Milk - Using this recipe, make a fake milk spill that you can put on someone else's device.  Add a glass next to it for an even more realistic image.

2) Switch It Up - Make the screen display everything upside-down.  In Windows, right-click on the desktop and select "Screen Resolution".  Change the orientation option to "Landscape (flipped)".

If you want to produce the same effect on an Android device, you can use the app Set Orientation.

3) Block It - Tape a post-it note or a piece of paper over the sensor on a remote or the sensor on an optical mouse.

4) Screenshot - Take a screenshot of the desktop or home screen of the device, then remove all the icons from that page and set the screenshot as the background.  Watch people go crazy trying to click the "icons".

5) Buy an "iPad" - Tell your kids you bought them an iPad.  Then give them one of these.

One final rule, you may not use any of these ideas to trick me!

Monday, March 30, 2015

Easily Create PDFs

It seems that you find PDF files everywhere you go.  They are a simple and convenient way to share information.  At one time, the only way to produce a PDF was to purchase Adobe's Acrobat program, which can run over $100.  Now, there are many other programs that can produce PDF files for free.

My favorite is doPDF.  It accomplishes the process of creating a PDF in the easiest way:  by adding itself as another printer.  Simply get your file ready in any program, print it, and select the doPDF option as the printer.  A dialog box will open giving you options for quality and location, and then it will save your PDF file at the location you indicated.

If you need additional features, such as watermarks or encrypted PDFs, you can purchase NovaPDF, an upgraded version of doPDF.

To download doPDF, click here

Friday, March 27, 2015

Don't Fall for these Facebook Hoaxes

"You can't put anything on the internet that isn't true," stated a recent commercial.  Unfortunately, false information is abundant on the internet, especially on social sites like Facebook.  There seems to be no end to the fake stories that eventually spread would be too long to maintain (and impossible to keep up-to-date), but here are three hoaxes about Facebook that seem to keep coming around.

1) Pay for Facebook - This one has reared its head a few times.  According to Facebook's Help Center, "Facebook is a free site and will never require that you pay to continue using the site."  Is it possible that Facebook may one day charge to use it?  I suppose, but the backlash from these hoaxes makes it unlikely that Facebook would ever consider it.

2) See Your Views - This one usually asks you to install an app and give it permissions.  Some of these just post to your wall and try to suck your friends into downloading it, but others are designed to steal your personal information.  Once again, Facebook's Help Center states, "Facebook doesn't let people track who views their profile. Third-party apps also can't provide this functionality."

3) Content Notice - Something like this starts being passed around every time Facebook changes its terms of use.  This post does absolutely nothing.  Even if Facebook's terms of service did allow for use of your posts, no legal notice like this could change the terms of service you agreed to when you signed up.

Thursday, March 26, 2015

Three Checks to Keep Your Computer Safe

We are only three months into 2015, and we have already had several major online security issues come up.  While the majority of the issues that make the news occur at large companies, securing your home computer and network is just as important.  Here are four ways to check your online security.  (Links for programs and sites mentioned are included at the end of the article.)

1) Windows Settings - If you have Windows, use the Microsoft Baseline Security Analyzer (MBSA) to check your settings.  The MBSA checks a variety of Windows settings, including password strength, updates, administrator accounts, and file/folder sharing.  It will provide recommendations on how you can improve the security on your own computer.  Do not simply click through each recommendation!  Sometimes, there are reasons why your computer is configured the way it is, so make sure you thoroughly understand each suggestion before implementing it.

When you click the download link, you will be given several different downloads to choose from.  The key is to know whether you have a 32-bit or 64-bit operating system.  If you are unsure, use Windows + Pause to open the System window, then look at System Type.  If you have a 64-bit system, you will want to use the version that says "x64".  If you have a 32-bit system, use the one that says "x86".  Also, make sure you get the one that ends with EN, standing for English, unless you want it in another language!

2) Browser Add-Ons - Using an up-to-date browser is important for your security, but any add-ons installed in your browser also need to be kept up-to-date.  Mozilla, the maker of Firefox, has a free plugin checker to determine if you need to update any of your add-ons.  Even though it is made by the company that makes Firefox, this works with all major browsers.  Simply head over to the site and see your results (no installation is necessary).

3) Facebook - I don't recommend that you post any information about your schedule or vacation until after it is over.  (For example, "Taking the kids to the park at 2:00 today.  Anyone want to join us?" isn't just an invitation for your friends to join you at the park; it is also an invitation for potential criminals to pay your empty home a visit a little after 2:00.)  How well do you know every person on your friends list?  If you are like me, your list probably includes acquaintances from high school, college, and old jobs that you barely know anymore.

However, if your post is public, then your problem could be even worse.  Any comment or like broadcasts your post to people you don't know.  Some simple searching could expose your address and make your home a target for thieves.

If you want to check what the public (or any friend) can see on your profile, Facebook has a tool for you.  Go to your profile page (not your timeline), click on the three dots next to "View Activity Log", and select "View as ...".  You will then see how your profile appears to the public.  Change the link at the top of the page to see how it appears to specific people or groups of people.


Links:

Download the Microsoft Baseline Security Analyzer

Mozilla's Plugin Checker

Wednesday, March 25, 2015

Be Anonymous Online

Wouldn't it be great if you could just go about your business online without worrying about companies and governments that want to track everything you do?  Yes, you could sell your computer, phone, and tablet and disconnect from everything, but that's not practical for most people today.  Fortunately, there are a few ways to keep your privacy when you go online.

1)  Blur - If you want a simple program that will keep companies from monitoring you, I recommend Blur.  It is a simple program that installs in your internet browser and blocks the cookies that companies use to track you.  (If you want an idea of what is out there, I installed this add-on six months ago, and I have already blocked over 2300 trackers.  Yes, there's that much out there!)

Blur also has other features that can help you stop spam and even protect your credit card number.  While the basic version is free (including blocking trackers), some features must be activated with a monthly subscription.  Blur is available for a variety of devices and browsers.  If you want to try it out, visit the download link at the end of this article.

2) Tor - If you are wanting to take a step up in your privacy, then Tor might be the right option for you.  The Tor network passes your internet traffic through relays around the world before it reaches its destination, and responses are routed back through the same system of relays before they come back to you.  This makes it virtually impossible for anyone to know where Tor traffic originated without very advanced tools and a substantial amount of power.

Tor is used for a variety of reasons.  It is a great way to keep yourself anonymous and avoid tracking.  However, many people around the world use it to defeat censorship or make political revelations.  Do not think you can use Tor for illegal activity.  It is possible to track Tor traffic through the various relays and back to your computer; however, in practice, the FBI and other law enforcement agencies have used other tools to trick you into exposing your identity without tracing everything.  Regardless of the method used, Tor traffic can be tracked if law enforcement wants to devote enough resources.

I have experimented with Tor for the past several years (although I do not use it as my primary browser).  I have found that the latest version has implemented many settings that have made it much more user-friendly.  If you have reasons for using Tor beyond basic privacy, you will want to make sure to read the list of browsing habits to avoid to make sure you don't accidentally expose yourself online.

3) Tails - Tails takes the Tor network to the next level.  Instead of installing the Tor browser inside Windows, OS X, or Linux, Tails gives you a complete operating system on a flash drive that fights to maintain privacy.  Download the Tails ISO, install it to a flash drive or DVD, and then tell your computer to boot to that drive.  Once Tails loads, all your online traffic will be automatically routed through the Tor network, advanced encryption tools will help keep your traffic safe, and your computer will have no trace of your activities.

Preparing to use Tails is not nearly as simple as installing Blur or Tor, so I would recommend it only for advanced users who have a need for extreme privacy.  If you do want to try Tails, be sure to read the documentation first!


Links:

Download Blur

Download Tor

Download Tails

Tuesday, March 24, 2015

Find the Lowest Price on Amazon

It is no secret that Amazon's prices fluctuate on a regular basis.  If you are not paying attention to the current price, you will have no idea if the price is at the low or high end of Amazon's spectrum.  If you don't want to have to check Amazon on a regular basis to monitor price changes, then what you need is a site that will do it for you!

Fortunately, there's CamelCamelCamel.  It monitors the price on a wide variety of items on Amazon and displays a chart showing price trends.  If you don't want to buy right now, you can sign up for free alert when the price drops.  If you are ready to buy, a link on the page takes you straight to Amazon's site.

Click here to visit CamelCamelCamel.com.

Monday, March 23, 2015

Who Can Access Your Wi-Fi?

Anything that goes through your home's router will be automatically tied to your internet account.  It stands to reason, then, that you would want to make sure no unauthorized person can access your network.  If someone unauthorized uses your network for illegal activities, it will be traced back to you.  While you may eventually be able to clear your name with the authorities, you will have a lot of headaches before that happens.   Because it can often be accessed from outside your house, Wi-Fi is an easy point of attack for unauthorized users.  Therefore, it is important that you properly secure your Wi-Fi.  Here are six things you can do to keep your Wi-Fi safe from intruders:

1) Do You Even Need It? - If all of your devices have a wired connection, you don't even need Wi-Fi.  Even if your router is Wi-Fi capable, it would be best just to turn it off in the router's control panel.  If it is something you only use occasionally (maybe when you have visitors), you can disable it for now and enable it around the time your visitors arrive.

2) Location - Your Wi-Fi access point will broadcast evenly in all directions (excluding interference by walls, cabinets, other devices, etc.).  If you place the access point near an exterior wall, half of your signal is being broadcast outside the house.  Not only is this a waste of your signal strength, but it also gives someone the ability to sit outside your house and still use your Wi-Fi.  The ideal position is to place your access point centrally on the highest floor of your house.  If you must place it along the edge, consider using aluminum to reflect the signal away from the outside and back into your house.

3) Set a Password - Setting a password should be a basic security measure, but the number of unsecured access points is shocking.  A password provides two types of protection.  First, it keeps unauthorized users off of your network.  Second, it keeps someone from being able to see everything being sent in and out of your router.  If you don't have a password, anyone can read the data you are sending over your Wi-Fi, including passwords and credit cards.

4) Guard Your Password - Since your Wi-Fi only has one password (unless you are using the enterprise version), everyone must share it.  However, loose lips can sink your Wi-Fi ship!  Not everyone who enters your house needs your Wi-Fi password.  Do not give out your password to those you don't know, even if they are in your home (such as an appliance repairman).  Even with friends, be careful how many people have your password.  The more people that know your password, the more vulnerable your network.

5) Change the Administrator Password - The administrator password is a password that is used to access your router's control panel and make changes to its configuration.  (This is separate from the password that is used to access the network.)  If someone manages to connect to your network, they can look up the default password for your router online and then make changes that weaken your security.

6) Location, Part 2 - Location can send your Wi-Fi signal where you don't want it to go, but it can also make your Wi-Fi access more vulnerable for another reason.  If you put your access point in an easy to reach location, someone could push the reset button and then begin using it for their own purposes.  Obviously, there are not too many places that would make it this vulnerable, but one obvious place would be the garage.  If your garage door is open and unoccupied, an access point in your garage would be an easy target.

7) Disable Wireless Administration - If a person gains access to your network, they can then go into your router's settings and make all types of security changes.  However, almost all routers come with the ability to disable administration of the network over wireless.  This requires that someone have physical access to the router using a wired connection in order to make changes.  The only reason to keep this enabled is if you do not have any way to connect with a wired connection.  (For example, you only have an iPad and two smartphones.)  In this case, you will want to keep wireless administration enabled so you can make changes.

8) Update the Firmware - The firmware is a small amount of software that is stored on a device to manage its operation.  If a security hole is found in your device's firmware (such as the "Heartbleed" bug that was discovered in 2014), device manufacturers will issue firmware updates.  However, most devices do not update firmware automatically, so you will need to download the latest firmware and install it yourself.  Fortunately, most manufacturers have made this an easy process.  Usually, it is as simple as accessing the router's control panel and pointing it to the location of the update that you downloaded to your computer.

Friday, March 20, 2015

Don't Sell Yourself When You Sell Your Devices

Selling unused devices on eBay or Craigslist is a great way to make a little extra money, especially if your device is still fairly new.  Unfortunately, if you are not careful, it is also a way to sell your identity.

Recently, security company Avast purchased 20 used Android phones off of eBay and used software to recover deleted data from the phone.  This study found over 40,000 photos still left on the phones, including over 1,500 photos of children and over 1,000 nude or revealing photos.  Google search history, emails, text messages, contact information, and even a completed loan application were also recovered from these devices.

On iOS, much of this is already handled for you.  Since your data is already encrypted, a secure wipe is enough to clean the device.  Someone might be able to find your files on the device, but without your encryption key, they will not be able to decrypt them.  On Android, you can set up encryption of your data using the Security option in the Settings app.  Encrypt your files, and then perform a factory reset.

In Mac OS X, you can use the Erase Free Space option in Disk Utility to write junk data over your deleted data.  For Windows devices, you can use a utility like CCleaner or Eraser to do the same.  Then, reinstall the operating system using a recovery partition or disc.

Besides protecting your data, you will also want to make sure you have backed up all your data and log out or deactivate any accounts (once your device has been wiped, this will be much harder).  If your product has a limited number of devices it can be used on, you don't want one of your activations to be for a device you no longer use.

Thursday, March 19, 2015

Catch All The Tournament Action

Today marks the start of the full 64-team NCAA tournament field.  (The tournament actually started with four play-in games Tuesday and Wednesday.)  It's called March Madness for a reason:  you never know what is going to happen (except a 16-seed beating a 1-seed; that has never happened!)  Not long ago, all NCAA tournament games were on broadcast TV, and your local network chose which games you would be able to see.  Now, under its most recent deal, games are shown across four networks, and if you get all four networks, then you can watch any game you want.  Unfortunately, it stinks if the team you want to watch is on a channel you don't get, but don't give up just yet!  You still have some options:

1) Over the Air - CBS has broadcast rights to much of the tournament, including the championship. If you are within range of a CBS station, connecting an antenna will allow you to watch some of the games. Unfortunately, TNT, TBS, and TruTV share the rest of the tournament games, so you will need a cable subscription to see action on those networks.

2) Online - For the past several years, the NCAA has streamed all tournament action through its March Madness Live site.  While this is free, it is not a better option than catching the CBS games over the air because only the CBS games can be seen without a cable subscription that includes the other three channels.  You can watch a complimentary preview of any game, but you will eventually be prompted to enter your log-in information.

There are also March Madness apps available for iOS, Android, and Windows devices, but they come with the same viewing restrictions.  While these apps are not a solution for a cord cutter, they are a convenient way to watch the tournament on the go.

3) Sling TV - Using Dish TV's new streaming service, Sling TV, you can also watch games available on TBS and TNT.  Combined with CBS, this gives you access to three of the four stations broadcasting the tournament.  Sling TV costs $20/month, but it does offer a seven day free trial.  You can even use Sling TV's apps for Roku and Amazon to watch it on your TV.  (Dish was offering a free Roku or Amazon stick with the purchase of a three-month subscription, but I cannot find it on their site anymore, so I think the offer may be gone.)

4) Catch the Highlights - If you aren't willing to spend the money on a subscription to see all the games or you just want to keep up with the latest action so you can communicate with your co-workers over the next three weeks, you can catch the highlights on the March Madness YouTube channel.

5) The Ladies Have a Tournament, Too - ESPN has full broadcasting rights to the Women's basketball tournament, which begins on Friday and will end the day after the men's championship.  During the opening rounds, games of interest will be available on the ESPN networks, but you can watch all the games through the WatchESPN site or app.  (Your internet provider must support it, and games on ESPN networks require a subscription that includes that channel.)

Wednesday, March 18, 2015

The Characteristics of an IRS Tax Scam

It is now less than 30 days until Tax Day, which means that IRS scams are also in full swing.  Many of these calls can be convincing:  they spoof the IRS name on your Caller ID, they may even be able to tell you the last four digits of your social security number, and they may even follow up with an email even if you never gave them your email address.

The IRS's website lists five things that the IRS will never do.  In summary:
1) Call to demand immediate payment, nor will we call about taxes owed without first having mailed you a bill.
2) Demand that you pay taxes without giving you the opportunity to question or appeal the amount they say you owe.
3) Require you to use a specific payment method for your taxes, such as a prepaid debit card.
4) Ask for credit or debit card numbers over the phone.
5) Threaten to bring in local police or other law-enforcement groups to have you arrested for not paying.
As a follow up, The IRS does not accept credit or debit cards directly (they only accept them through a third-party processor), so someone calling from the IRS would never ask for a card number. They will also never ask you to pay with a pre-paid debit card or a wire transfer.  The IRS will also never contact you through an unsolicited email, text message, or social media message.

If you are concerned that you may owe taxes, you can call the IRS at 1-800-829-1040.  If you have been contacted by an IRS scam (even if you did not fall for it), you can contact the Treasury Inspector General for Tax Administration at 1-800-366-4484.

Tuesday, March 17, 2015

Keep Your Credit Card Safe

Credit Card numbers are hot items.  In the past year, we have seen at least 60 million card numbers stolen, and that is just from the major hacks that we know about.  Certainly, there are small companies whose credit card thefts don't make the news, and there are also hacks that have yet to be discovered.  While entering your credit card for online purchases might seem threatening enough, the threats do not stop there!  Your card is vulnerable even if you swipe it in the store, since many companies store your credit card number in a computer database for easy retrieval.

While you cannot completely eliminate the threat that your credit card will be stolen, you can take steps to reduce the chances of it happening.  While it only takes one hack at the right place to compromise your card, it also stands to reason that if fewer companies have your card, the chance of it being stolen is reduce.  Here are two ways you can keep companies from knowing your credit card:

1) Use PayPal - When you pay with PayPal, money is transferred from your account (or your credit card) to the merchant's account.  Since the merchant receives the PayPal payment, there is no need for the merchant to also receive your credit card.  Yes, your card still has to be entered on PayPal's site, but if you use it to pay at five different places, that means your card is only stored in one place instead of five.

If you don't want to use PayPal, you can consider some alternatives.  Google Wallet is a similar service offered by Google, and Visa is currently working on a similar solution for Visa cardholders.

2) Use Your Phone - Both iOS and Android have options that allow you to pay for transactions using a chip on your phone, Apple Pay and Google Pay.  Samsung is also coming out with Samsung Pay for use on its phones.  Using this payment method, the chip on your phone communicates with the chip on the card reader.  Your card is charged directly from the app, and payment is then made to the merchant.  Many stores have adopted these payment methods, and more stores will adopt them as they grow in popularity.

3) Use a Masked Card Number - A masked card number provides a one-time number for you to use.  The company providing the masked number will approve one charge, which will be forwarded to your account.  If anyone gets that number, the number will be declined if it is used again, and your actual card number will remain safe.  However, do not use a masked card number with a recurring purchase, like a website subscription:  your second month's subscription fee will be declined.

Many banks offer masked card numbers to their customers, and the practice will likely increase as theft of credit card numbers rise.  Also, if you use Blur to block online tracking (a browser add-on that I recommend), purchasing a premium subscription allows you to use masked cards.

Monday, March 16, 2015

Keep Your Email Private

If you've had your email account for any length of time, it probably receives tens (perhaps hundreds) of emails each day. However, since your email provider filters most of these into a spam folder, you never see most of them.  Most of the time, you never really pay much attention to your spam box, but wouldn't it be nice if you could keep your email address private so that spammers never find it in the first place?  Here are a few tips.

One simple solution is to set up a second account for all your online activities.  Any time you need to create an account at a site, enter your second address instead of your primary one, and all spam goes to that account.  If you need something that would be sent to that account (such as a receipt for a purchase), you can always go find it there and forward it to your primary account for safekeeping.  The one downside of this method is that you occasionally must log in and clear out the account.  If you do not log in occasionally, it will either become too full to accept any more emails or be deactivated due to inactivity.

A better solution is to use something you might already have installed.  I have recommended Blur as a great way to stop websites from tracking you.  However, Blur has many other useful features.  One is an email mask.  Instead of entering your email, you can have Blur create an email address for you.  Enter that email address instead of your primary email, and Blur will forward emails to you (which is excellent for clicking on that confirm link or getting a receipt for a purchase.)  Once you have received the emails you want, you can configure Blur to block any further communications from those sites.  Since this can be done on a site-by-site basis, you can still receive emails from a one site while blocking emails from another, even when using the same address.  Masked emails are available in both the free and paid versions of Blur.

Another option with similar features is Melt Mail.  With Melt Mail, you create a temporary address that forwards to your permanent address for a specific length of time (3, 6, 12, or 24 hours).  This gives you time to receive any communication you might want, and then the email address disappears and any further communication is returned.  Melt Mail also has an Android and iOS app available to create temporary addresses on the go.  However, the biggest problem with Melt Mail is that your email address will disappear forever at the time you specify.  If you use it to set up an account while making a purchase and later need to reset your password to log back in to see your order status or receipt, you will not be able to receive the email to reset your password.

To check out these two sites for temporary email, use the links below:
Blur by Abine
Melt Mail

Friday, March 13, 2015

Seven Fun Ways to Use Google

Yesterday, we talked about some useful ways to use Google's search.  Today's tip will not be nearly as useful, but it will be a lot more fun!

Before we begin, it is important to note that Google adds and removes features regularly, so some of these may not work if you reread this in a few months.  (Unless otherwise noted, they do work right now.)  I was very disappointed to see that one of my favorites, the "Kayak across the Pacific Ocean" instruction on Google Maps, had been removed.  You can read about it here if you didn't see it before.

Now, here are seven ways to have fun on Google's search pages:

1) Give Google Commands - Type "do a barrel roll" into a search box and watch the page...do a barrel roll.  Type "tilt" or "askew" and watch the page go slightly off.  Around Christmas last year, you could type "Let It Snow" and the page would snow and frost over, allowing you to draw on the window.  (But as I tell the kids on my school bus, "Keep it school appropriate!")

2) Calculate More Than Numbers -  The Google Calculator is also programmed to handle other questions, such as "what is the loneliest number" (a reference to a song from the 60's) or "what is the answer to life, the universe, and everything" (a reference from the movie, The Hitchhikers Guide to the Galaxy.)  Type anything with a numerical response in and see if Google knows it.  Then, amaze your friends who don't know the references (that's what happened to me with both of those examples!)

3) Calculate a Bacon Number - No, this isn't how much bacon you should eat each day, this is a play on the "Six Degrees of Separation" game using Kevin Bacon.  Pick any actor or actress and see how many connections must be made in order for Google to connect that person to Kevin Bacon.

4) Fight Off a Zerg Rush - I had never heard of a Zerg Rush before reading this online, but apparently, this is an alien race that attack in swarms in the video game Starcraft.  Search for "zerg rush" and a whole bunch of little O's will invade your screen and eat your search results.  Keep them from destroying your screen by clicking on them to destroy them.

5) Get a Random Result - Hover your mouse over the "I'm Feeling Lucky" button with nothing in the search box, and the button will change to another random "I'm Feeling ..." statement.  Click on the changed button to get a search result related (at least loosely) to the revised statement.  For example, I just got "I'm Feeling Stellar", and my random page was pictures of nebulae.  Another time, I got "I'm Feeling Trendy", which brought up a list of the top searches.

6) Fly Yourself Anywhere - If you use Google Earth, you can use the flight simulator option to fly anywhere in the world.  In Google Earth, click on Tools and select Enter Flight Simulator or press Ctrl+Alt+A.

7) Browse the Google Doodles - Okay, this one is fun and somewhat useful!  You have probably noticed that the Google logo often changes based on current or historical events.  These are called "Google Doodles".  Google actually produces many different doodles for events around the world.  If you go to google.com/doodles, you can browse the many recent doodles published around the world.  Not only can you have fun looking at the various doodles, but you can learn some history at the same time.

Bonus:  Google has released some doodles that are actually games.  You can play goalie in this soccer game, race a canoe in this slalom canoe game, jump the hurdles in this race, or play Pacman in this doodle celebrating the game's 30th anniversary.

Thursday, March 12, 2015

Eight Useful Ways to Use Google

When most people think of Google, they usually think of the search engine first.  Most of Google's other online products are usually referred to by a different name (such as Gmail) or by something added after Google (Google+, Google Apps, etc.)  However, Google's search page has a lot of useful (and some fun but not so useful) features.  Tomorrow, I will talk about some of those fun ways to use Google, but today, I will cover some of the more useful ways to use Google's search.

As a side note, most of these work in the search boxes or address bars on Internet Explorer, Firefox, and Chrome if they are programmed to use Google.  All of these features are available on various sites, but Google simply makes them all available with just the search box.

Here are ten things that might make your search experience more useful:

1) Weather - You can get the weather without having to leave Google.  Simply type a city or zip code followed by "forecast", and Google will display a detailed forecast for today along with simplified forecasts for the week ahead.  Type your city or zip code followed by "weather" to get the current weather along with the week's forecast.

2) Translate Words - Typing "translate <word/phrase> to <language>" will quickly access the Google translator and display the result.  Just be careful, because while Google Translate is usually pretty good with words, it can be less accurate with longer phrases.  People have made blog posts and videos of what happens when you take a poem or song and translate it through several languages before taking it back to English.

3) Check the Time - Can't remember if London is four or five hours ahead of us (it can be either due to the differences in the daylight savings time dates)?  Type "time in <location>" and Google will give you the current time and date.

4) Do Math - Instead of taking the time to locate a calculator on the internet or find the one installed on your computer, just type your math problem into a search box.  Google will do the math and display the result.

5) Conversions - Need to convert from one unit of measurement to another?  Google can handle it. Simply type "<amount> <unit1> in <unit2>"  (for example, "100 dollars in pounds") and Google will handle the conversion for you.

6) Check Flight Status - Now you don't need to go to the airport and look through many television monitors to see the status of a flight.  Simply type the airline and flight number into a search box to see the status of the flight.

7) Search Public Data - Want to see the latest population estimates or unemployment rate for a particular location?  Simply type what you are looking for and the location into the search box and watch Google give you the data.  Want historical data?  Google gives you a 10-year lookback, and by clicking on "Explore More" underneath the graph, you can view older data.

8) Define Words - If you want a dictionary definition of a word, simply type "define:<word>" to have Google give you its definition.

Tomorrow, we'll look at the fun side of Google by examining some of the little built-in tricks.

Wednesday, March 11, 2015

How to Clean Your Devices, Part 2

Yesterday, we covered how to clean a desktop computer.  Today, we will look at how to clean our mobile devices.

Laptop - Obviously, you will want to unplug the laptop and remove the battery before any cleaning.  To clean the monitor, use the same procedure for cleaning a desktop monitor.  (Monitor wipes or soap and water.)

To clean underneath a laptop's keyboard, compressed air is your best option.  If you are comfortable removing the keyboard, you may want to remove it for easier cleaning.  Next, use isopropyl alcohol to clean the keys.  (You can use a soap and water mixture, but be sure to squeeze any excess water off the towel before wiping and give your computer plenty of time to dry before starting it.)

Space has to be sacrificed in order to create a portable computer, so the ability to thoroughly clean a laptop is limited unless you are comfortable completely disassembling your computer.  Your only remaining option is to try and remove dust from any place you can.  Use compressed air to clean the vents.  Remove any panels on the bottom and blow dust out of those areas.  If you removed the keyboard earlier, blow dust out before putting it back in place.

Phone/Tablet - Smartphones and tablets are generally not made to be disassembled, so cleaning dust out of them will be difficult.  Fortunately, these devices do not attract as much dust since they have limited ventilation.  If there are any vents, try using compressed air inside of them.  I also found that my mother's smartphone had trouble charging due to dirt and dust inside the charging port.  A couple shots of compressed air in the charging port solved the problem.

If your phone has a battery that can be easily removed, take the cover off and remove it.  Then use compressed air to clean any exposed areas.  You can also clean these areas with a cotton swab using a soap and water mixture.  Use a damp microfiber cloth to clean your screen.  If the screen is cracked, use a dry cloth to prevent moisture from entering your device.  When cleaning the screen, do not use a circular motion, as this can scratch the screen.

Tuesday, March 10, 2015

How to Clean Your Devices, Part 1

One of the most common questions I am asked is how to clean a particular device.  Most people know that they should not use a wet rag with soap, but they are unsure exactly what is appropriate.  Obviously, you will want to shut down your computer and remove the battery (if possible) prior to cleaning it.

Desktop Computer Case (Exterior) – Cleaning a desktop case is the one instance where it is appropriate to use soap and water.  Use a moist (not wet) rag with a light amount of soap, and stay away or use caution around any ports or vents.

Desktop Computer Case (Interior) – Once the side panel of the case has been removed, use of water must stop!  However, isopropyl alcohol is a great substitute for water, and it is safe to use around most computer components because it dries quickly and will not conduct electricity.  Some people say that you can even take out most components and dip them in an alcohol bath, but I do not recommend this unless you are working with a computer that you can spare.

For a quick clean, I recommend taking the computer outside and using compressed air to blow the dust out of the case.  This is a cheap and quick way to get most of the dust out.  A can of compressed air usually costs between three and five dollars, and you can find them at any electronics store or Walmart/Meijer.  Use short bursts of air; don’t just push the trigger and keep spraying!  If you want to give specific components a more thorough cleaning, read on:

Case Fans – Case fans are fans that are actually attached to the metal case itself.  If compressed air isn’t getting the job done, use a Q-tip with isopropyl alcohol.  You may want to remove the fan to be able to get both sides of it, but make sure that you make note of the arrows that point the direction of airflow and replace the fan in the same direction.

CPU/GPU Fans and Heat Sinks – Your processor is covered by a large series of metal fins, called a heat sink.  In most cases, a fan then sits on top of the heat sink.  If you have a separate graphics card, this it may have a heat sink and fan.  Again, compressed air is best, but for a more thorough clean, use isopropyl alcohol.  Be careful if you choose to remove the heat sink from the processor.  If you do remove it, be sure to clean the heat sink surface and the top of the processor with isopropyl alcohol, and then reapply thermal compound (available at most electronics stores) once it is dry.

Motherboard and Expansion Cards – If compressed air is not cleaning your motherboard or expansion card, then your best option will again be a Q-tip with isopropyl alcohol.  Be sure to leave enough time for the alcohol to dry before restarting your computer.

Hard Drives / Optical Drives – Due to the sensitive nature of these components, do not use ANY liquid on a hard drive or optical drive.  If compressed air is not cleaning an area, try using a dry rag.  Otherwise, the dirt or dust is something you will have to live with.

Power Supply – The power supply is the unit that receives the cord from the wall and then distributes power through a variety of wires.  Like your hard drive, do not use any liquid with the power supply.  Use compressed air and a dry cloth.

Desktop Keyboard – Use compressed air to blow out any dust or debris under the keyboard.  (Flip the keyboard over or remove the keys to allow it to escape easily.)  If you remove the keys, you can use isopropyl alcohol on the contacts underneath.

Mouse – For an optical mouse (with a laser), use a Q-tip with isopropyl alcohol in the area of the LED.  For a ball mouse, remove the ball and wipe with alcohol.  If the buttons on the mouse come off, then remove them and clean underneath with alcohol.

Monitor - The easiest way to clean a monitor is to buy a package of monitor wipes and keep them on hand.  Carefully wipe the screen without pressing too hard (this can damage the pixels).  If you want to do it by yourself, you can use water with a light amount of soap, but be careful not to let the water run into the bottom and sides of the screen.

Monday, March 9, 2015

The Biggest Threat to Your Online Security

It's scary being online these days.  We're afraid to swipe a credit or debit card out of fear it might be compromised, and we're also afraid that our password and photos might be stolen and shown to the world.  There are many threats to our online security:  hackers from Russia and China, poor security practices by companies we purchase from, and card skimmers installed on an ATM or a gas pump, to name a few.  Plus, this does not even touch the low-tech methods that have been around for years, such as a waiter or waitress copying down your card information while they are processing your payment.

However, the biggest threat to our online security does not come from other people, other companies, or even other nations.  This threat has unlimited and complete access to every part of each device you own.  It is present on your network at all times of the day or night.  It knows all your secret passwords, security questions and answers, and PIN numbers.  The biggest threat to your online security is you!

Most security breaches on your personal computers and other devices will occur with your permission.  You will choose to install the game or program that secretly comes with a keylogger to steal your personal information.  You will click on the link in an email to "update your information" and hand over your online banking password to criminals.  You will fail to completely secure your computer or router and leave a way for someone to access your network.  You will choose to visit a shady website that will download malicious code to your computer.

Do not mistake this warning for criticism.  I have come close to falling for some of these scams, myself.  If the "computer guy" can be tricked into clicking on a link, I know that my readers and customers will be even more likely to click that link.  I broach this subject not to criticize anyone who has ever fallen for these scams, but to make you aware of three important points regarding online security.

First, attacking humans online is the most successful form of attack.  We hear about the millions of credit cards hacked from Target or Home Depot, but we do not hear about the people who are tricked into giving up their banking passwords or wiring money to some foreign entity.  There's a reason why you still get the "Nigerian prince" scam emails:  even after all these years, they still work!

Second, online attacks are growing because the cost of data is so cheap.  I remember when hard drive sizes were measured in megabytes.  Now, they are usually measured in gigabytes (over one thousand megabytes) but soon, we will be measuring them exclusively in terabytes (over one million megabytes).  It takes very little time and money to craft a nice looking email, link that email to your own database, and then send it to thousands of people at a time.  If one person hands over their credit card number, you can probably just about cover your costs.  If two (or more) people do it, you will be making big money.

Finally, we must take responsibility for our own security.  Antivirus software used to only protect against threats it could find in its database; now, these programs are becoming better at protecting us against other threats.  However, no amount of security software or hardware will ever keep us 100% safe.  I am thankful for the many times my antivirus software has kicked in and protected me, but I never assume that it will keep me safe from the next attack.  Each time I am notified that it is protecting me, I review my personal habits to see what clues I should have caught, and I try to be more vigilant the next time.

Friday, March 6, 2015

Where I Stand on Net Neutrality

Several people have been asking me for my opinion on net neutrality.  I must start out by saying that I cannot comment on the specifics of what the FCC approved last week until the specifics are published as part of the Federal Register.  However, based on comments made by the FCC commissioners, I can come to a reasonable conclusion on where I stand.  Only the publication of the final rules will determine where I stand on the rules.  To sum it up:  net neutrality (the way the FCC commissioners said it would be implemented last year) is more corporate protectionism than neutral internet.

The idea of net neutrality is not a bad idea; in fact, it is one that I could probably support if implemented well.  A pure "net neutrality" system would see each packet on the internet handled with a first-in, first-out method.  Your packet would enter the internet backbone, and at each hop along the way, it would be treated fairly compared to all other packets.  It sounds like a wonderful idea.

Unfortunately, net neutrality cannot exist if the FCC does not address two parts of our modern internet:  peered connections and content delivery networks.  When you send a packet to a large corporation's network, such as Facebook, most of those packets never actually enter the internet backbone.  Instead, they are redirected to a dedicated line that Facebook has run directly from its servers to the servers of your internet service provider (ISP).  This dedicated connection (called a "peered connection") allows Facebook to transmit data back to your computer faster than it could if all of its packets went through the internet backbone.  You get faster service, which makes both you and Facebook happy, and the ISP reduces the demand on its equipment, which means faster service for all the other sites people want.  The "fast lanes" that net neutrality said it would prevent already exist.

Content delivery networks (CDNs) work on the same principle, but provide even faster access to data.  Instead of sending data from your ISP down a dedicated line to a server farm somewhere, a site sets up server infrastructure at the ISP's location.  While this is impractical to host all the data the site contains, it can be used to provide even quicker access to popular data.  For example, when Netflix releases a new season of House of Cards or when it makes the next installment of The Hunger Games available, your requests are never going farther than your ISP's site.  Your ISP sends the request to Netflix's CDN, and the CDN serves up your show or movie without the need to contact Netflix's main servers.

Lost in all the talk of net neutrality is the fact that several of the FCC's commissioners stated last year that the new net neutrality rules would not address these types of connections.  Basically, the existing infrastructure will continue to exist, providing a fast lane for mega-corporations, but smaller companies will have a competitive disadvantage due to the massive cost of setting up a peered connection or CDN.  If a Netflix competitor is unable to stop its videos from buffering while Neflix runs smoothly, the competitor will be in court requesting bankruptcy protection in just a few months.  If the competitor had the option to purchase priority service at the ISP, it could obtain service speeds that allow it to compete with Netflix, and you would never notice that your request to another site took two milliseconds longer.  Without that option, only the large corporations that can pay the bill for dedicated lines to each ISP and

Obviously, this conclusion is based on statements made over three months ago.  The FCC could have decided to change course, and we could be pleasantly surprised when the rules are released.  However, the silence of the large online companies makes me believe that they recognize net neutrality will help them more than it will hurt them.  They will continue to invest in infrastructure that permits them to offer high-quality service more quickly, while their competitors will be forced to fight for space on the backbone of the internet.  Net neutrality may be better than no net neutrality, but a fake neutrality that protects the rich corporations is an even worse option.

What Is "Open Source" Software?

A reader contacted me this week to ask what the term "Open Source" means.  By definition, open source software refers to software programs that have their code freely available.  Under the open source license, you have the right to download the code and edit it to add new features or fix bugs.

Companies that choose to make their software open source usually make money off of selling support plans targeted to business users.  A business can request assistance from the technical staff and even request custom features designed for their specific business that would not be included in a product.

However, the fact that you are not a programmer does not mean you can't use open source software.  The software is available to download and install for free.  In many cases, you can find open source versions of software available that rival the features and stability of expensive paid software.  I used to use the open source LibreOffice instead of Microsoft Office.  I found that LibreOffice's word processor, spreadsheet, and presentation programs worked just as well as Word, Excel, and PowerPoint.  (I stopped using it because its database program lacked much of the functionality that I needed, but it may have improved in the past two years.)

Because the code is freely available, you will find that security holes and bugs are able to be fixed much more quickly.  Most software has a database for bug reporting available online, and anyone with programming knowledge can then locate the problem code and write a patch to fix it.  There is a trade-off, though, since the code can be scoured by attackers looking for holes to exploit.

Before you spend money on software, I highly recommend looking for an open source alternative.  In most cases, I have found that open source software features rival paid software features.  As I discovered in my search for an alternative for Access, there will be times when you have to spend the money for the features you need, but open source software will limit the number of times you have to spend money for software.

Thursday, March 5, 2015

Monitor Your Children's Activity

The internet has many wonderful resources for kids, but it can be a scary place for parents.  Parents used to be able to control their child's internet access by placing the computer in a public place, but with smartphones and tablets, controlling and monitoring what your child is doing online is even more difficult.

Fortunately, there are plenty of options for you to use to monitor what your children are doing online.

KidLogger is a free, simple, and easy-to-use program that lets you monitor computer activity.  It can be customized to only monitor certain accounts, and it tracks web history, time used, files opened, and emails sent.  It can even take periodic screenshots and email them to you.  KidLogger also has mobile apps that can monitor activity on a mobile device.  However, it does not make any attempt to hide itself, and it can be uninstalled using the Windows uninstaller without any password required.  If you have younger children, this is probably the best option.

ActivTrak is another free program.  It is designed to monitor computer use at work, but it can be also be used for home use.  It has many of the same features as KidLogger, but the interface is a little more complex.

If you are willing to spend some money, SentryPC is a great option.  It can run undetected and can be used to block specific sites and schedule times when computer use is blocked.  SentryPC costs $60 for the first license, with additional licenses available for an additional $20 each.

Download KidLogger

Download ActivTrak

Purchase/Download SentryPC

Wednesday, March 4, 2015

Make Copying and Pasting Easier

By now, you are probably aware of the Cut-Copy-Paste features available on any operating system.  "Cut" removes selected text from the document and places it on the clipboard.  "Copy" keeps the text present but also places it on the clipboard.  "Paste" takes the last item you cut or copied and places it in the new document.

However, there are keyboard shortcuts for each of these features that will make your life much easier.  In fact, I do not remember the last time I selected one of these options from a menu.  If you are having trouble remembering the keys, remember that Copy uses the "C" key and cut and paste are on either side of copy on your keyboard.

Cut - Ctrl + X
Copy - Ctrl + C
Paste - Ctrl + V

However, there are some extra options available.  If you want to paste the text without any formatting, you can use Ctrl + Shift + V instead.  (Note that some programs do not follow this convention, but most do.)  You can also use Ctrl + Alt + V to bring up a "Paste Special" window that will give you more options.  Finally, if you have already pasted text and want to eliminate the formatting (this works even when you are not pasting text), use Ctrl + Space.

Finally, if you want to improve the functionality of your clipboard, consider using a clipboard manager like ArsClip (my favorite).  It will keep track of multiple cut/copy snippets and give you an option to paste any of them into a document.  It can also store text that you commonly use for recall weeks or months later.  Finally, you can also group collections of text and categorize them, allowing you to only use certain snippets at certain times.  For example, if there is text that you only paste when you are working in Word, you can set those saved items to only appear in Word.

Click here to download ArsClip

Tuesday, March 3, 2015

Two Programs You Might Not Need

At one time, Oracle's Java and Adobe's Flash Player were two programs necessary for a complete web browsing experience.  However, the large number of vulnerabilities found in these two programs recently might make you question if they are actually necessary.  Many people now say that you should consider removing these programs from your computer to make sure they stay secure.

Some programs and websites still require these programs to function.  However, the majority of modern websites will function just fine without Java or Flash.  YouTube has offered video playback in both Flash and HTML5 formats for a while, but it recently switched the default option from Flash to HTML5.  On your mobile devices, Flash has gone in and out of support for both iOS and Android.

If you disable these two programs, it is very possible that you will not notice any changes.  (In fact, some people have noticed that disabling Flash eliminates many of the annoying advertisements on the web.)  It is true that some websites still require Java or Flash in order to work properly, but the number of sites relying only on these two programs are decreasing.

I do not recommend removing either of these programs immediately.  Instead, I recommend that you first disable them and see what content might still require these programs.  This makes it easy to quickly reactivate the programs if you find that you do need them.  After a month or two, if you have not found any sites you use that require Java or Flash, then you can go to the Add or Remove Programs utility to uninstall Java and/or Flash completely.  Below, I have listed the instructions to disable both programs:

To Disable Java:
Go to the Java Control Panel by searching for it in the search box (on the Start Menu in Windows Vista/7 and on the Charms Bar in Windows 8).  Click on the "Security" tab and uncheck the box at the top that says "Enable Java content in the browser".  If you find that a site you use requires Java, you can follow the same process to enable it again.

To Disable Flash:
In Chrome - Type "chrome:plugins" in the address bar and find the "Flash" listing in the resulting window.  Then, click the "Disable" link to disable it.

In Internet Explorer - Click on the Tools Icon and select "Manage Add-Ons".  Under "Show", select "All Add-Ons".  Select the Adobe Flash add-on, and click on Disable.

In Firefox - Unfortunately, Firefox doesn't make it easy for us.  The best option is to install an add-on named FlashDisable.  This will make it easy to turn Flash off and back on if you need it.

Monday, March 2, 2015

Move Data Between Your Phone and Computer

Have you ever had something up on your computer and then wanted to see it on your phone?  Or maybe you saw a link on your phone and wanted to view the full site on your computer?  Or maybe you forgot your phone at home and need to send a text message.  Pushbullet can help you will all of these.

After registering your phone and computer with a Pushbullet account, you can then send links back and forth between your devices.  You can also see if your phone has any notifications and even send text messages from your computer, even if your phone is elsewhere.  (Your phone must be powered on and have a data connection for these to work.)

I became aware of Pushbullet months ago, but I have only recently started to use it.  The more I explore its features, the more useful I find it to be.

Pushbullet apps are available for both Android and iOS devices.  Browser add-ons are available for Chrome, Firefox, Opera, and Safari.  A Windows application for your computer is also in its beta version.

Click here to download Pushbullet