Do you need help using the Internet?

Leave a comment

coverI have a new book and it may just be the thing you have been looking for!  The name of the book is You’re Never Too Old to Surf:  A Senior’s Guide to Safe Internet Use. 

This book is for you if you have ever wanted to harness the power of the Internet, but haven’t been quite sure what that means or how to do it.  It is intended for the parents, grandparents and great-grandparents who want to use the wide range of tools that are available today on the Internet, from simply surfing the web to buying online, using email, blogs and even social networking sites.  You may have sought guidance from your child or children  only to be annoyed at their exasperated response to your questions.  Or, you may have tried it on your own, and gotten frustrated with the tools, or had some problem result from that use (or know someone who did).  You may be using the Internet, but just not feel very confident in what you are doing.  If you fall into any of those categories, I wrote this book for YOU!  Of course, if you are the child or grandchild and are having trouble explaining things to your elders, this book could help you too.

The book is available from Amazon.com and BarnesandNoble.com.  Your local bookstore can order it too.  It is published through CreateSpace, ISBN 978-1506163857.

Please give it a try and let me know how you like it.

 

Facebook and Email

2 Comments

Last week Facebook decided to replace everyone’s default email address with a Facebook email address for everyone.  For example, they changed my email address to vicki.sauter@facebook.com.  I never saw an explanation for why they made this change, but I heard a lot of the discussion of the problems that it caused.

First, this change impacted how people could search for friends.    We all know you can search by putting a name in the box at the top of the screen labeled “search for people, places, and things.”  However you can also put in an email address there.  Suppose, for example, you were looking for John Smith.  There are a large number of John Smiths from which to choose and maybe your friend doesn’t have a photo, or is using a photo of his children, dog, or an interesting plane as a profile photo.  It may be impossible to know which John Smith is actually your friend.  However, if you search for his email address, let’s say jlsmith1234@yahoo.com, you will find him directly.  Once Facebook changed everyone’s email addresses, they hid real email addresses, so that this kind of search was no longer possible, thereby making searching difficult.

Second, there is no facebook.com email agent.  Yes, you can check messages by clicking on the globe icon on the left top of your facebook screen.  Not all messages sent via email seem to have been put there, however.  You also need to look in your “other messages” file;  I’ll bet you didn’t know there was an “other messages” file!  To get to these messages, click on the word “messages” on the left hand menu when looking at your newsfeed.  This click should show a another file called “other messages.”  I have not yet discovered how Facebook decides to deliver messages between your message folder and your other message folder.  However, you should check both.

Third, many people have smart phones and other smart devices that try to keep all of your contacts from different programs consistent.  If you have one of these, you should check your contacts and their email addresses.  Some devices replaced known email addresses with the facebook.com email address for all contacts.  This meant that you lost the real email address, which might cause problems for you if you need to actually email them.

Other devices decided that the contacts with these new email addresses at facebook.com were new contacts and therefore created a new profile for them in the contact/phone book list.  If you have a lot of connections between the your Facebook and phone book list, this can cause a lot of confusion.

What can you do?  Go to your “home” page (not your newsfeed) and click on “info.”  Scroll down to “contact” information and see if the accounts you want to be active are active. If you still have an email address at facebook.com, you can change it here.  (If you instead have the Timeline, click on “about” and edit your contact information.)

 

Privacy Legislation

4 Comments

There is good news for those of us who use email, smart phones and social networking sites!  Legislation was introduced in both houses of the (U.S.) Congress today that would prohibit employers or prospective employers from forcing employees or prospective employees to divulge passwords.  The good news is that both houses think this is a problem and are acting to do something about it.  The bad news is that the bills differ.  The Senate’s version is called the Password Protection Act and is sponsored by Sen. Richard Blumenthal, D-Conn also includes smart phones, private email accounts, photo sharing sites, and any personal information that resides on computers owned by the workers.  Rep. Ed Perlmutter, D-Colorado introduced similar legislation in the House.  However, last month, Rep. Eliot Engel, D-N. Y. introduced the Social Networking Online Protection Act (SNOPA) that extended the protections to elementary, high school and college students.  The ACLU supports this inclusion of students because they are a target of much of the social media monitoring.

Rep Engel was quoted by ABC News  as saying:

There have been a number of reports about employers requiring new applicants to give their username and password as part of the hiring process. The same has occurred at some schools and universities,” Engel said in a statement. “Passwords are the gateway to many avenues containing personal and sensitive content — including email accounts, bank accounts and other information, he added.

Of course, the legislation also protects employers in that it prevents them from accidentally learning information about a candidate that is not allowed to be considered in a hiring decision.

These are positive steps to protect our civil liberties.

Meanwhile the New York Courts have asked Twitter to release data pertaining to a user involved with the Occupy Wall Street movement.  According to CNN,

Twitter, however, countered that the court would need a search warrant to get that information. It pointed to a recent Supreme Court decision which found that attaching a GPS device is considered a search under the Fourth Amendment, which prevents unreasonable searches and seizures.

“If the Fourth Amendment’s warrant requirement applies merely to surveillance of one’s location in public areas for 28 days, it also applies to the District Attorney’s effort to force Twitter to produce over three months worth of a citizen’s substantive communications, regardless of whether the government alleges those communications are public or private,” wrote Twitter in its motion.

Twitter also suggested that Harris owns his own tweets and could therefore file a motion to quash on his own, despite the prosecution’s assertion of the opposite.

The ACLU is calling Twitter’s move a ‘big deal.’

The fourth amendment should protect us from arbitrary search and seizure of our own information.  Just because it is easy to access (because it is electronic) does not make it right to do so.

Individual Privacy: Is 1984 finally here?

Leave a comment

When I was in high school, everyone was required to read the book entitled 1984 by George Orwell.  According to Amazon’s description of the book, “In 1984, London is a grim city where Big Brother is always watching you and the Thought Police can practically read your mind.”  I recall there being much discussion of how horrible that would be and how it would never happen.

Yesterday I read an article on BBC.com that states, “The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon.”  That sounds to me like 1984 may have arrived.  Of course, those proposing the new law state that it is critical to have access to information about terrorists and their contacts in order to protect the country.  The difference between this proposal and one that failed a few years earlier is that police will not be able to access the data without a warrant.  But, the article goes on to say that the law would “enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited.”

Most law-abiding citizens have no difficulty with the concept that terrorists or criminals would have their information recorded.  However, the law does not limit data collection to known criminals or terrorists, or even those under suspicion — it opens the door to collecting this information about everyone.  Once collected, will the government be able to help itself in doing more with the data than intended?  What is the difference then between the British government and that in China or Iran in modern times, or Nazi Germany and Communist Russia in more distant times?  Will the government not face the risk of taking action because of some communications that when put together look alarming?  How long will it take for the government to try to mine the data to find other “terrorists” or “criminals” who are so identified simply because they have similar surfing or communications patterns?

In addition, how will all of these data be protected from hackers?  We have recently seen hackers breech the security of Scotland Yard meetings, military data, corporate data, and, of course, credit cards.  In that same article, the author notes, “The Sunday Times quoted an industry official who warned it would be “expensive, intrusive [and] a nightmare to run legally.”  Most professionals respond to that quote as “to say the least!”

Police have always wanted this kind of information, but society has said that individual freedom is more important.  Just because it is (relatively) easy to get and keep such data now that it is electronic, does that make it right?   It is almost impossible to get privacy back once it is lost … shouldn’t we ponder this a bit more before we risk the loss of privacy forever?

WiFi Tricks and Threats

Leave a comment

Last week the Huffington Post commented on how to avoid hackers, especially for celebrities.  It was an article full of useful information, but only if you know how to use it.  The fourth of these was to avoid WiFi networks.  Well, that’s nice, but what is it and how does one avoid it?

One can define WiFi as the technology that allows an electronic device, such as your smart phone, laptop or iPad, to connect to the Internet wirelessly (using radio waves).  In order to connect, you must be able to send information to a hotspot (or access point).  Such hotspots are limited inside because walls, furniture and other physical objects can block the signals, but have a greater range outside.  Wi-Fi allows cheaper deployment of local area networks, and  in spaces where cables cannot be run, such as outdoor areas and historical buildings.

You may well have used WiFi at your local Panera (or St. Louis Bread Company as it is known here) while eating.  Bookstores, restaurants and lobbies of hotels also generally provide WiFi coverage to their customers.  Most devices attach easily to WiFi, and may attach automatically (with no obvious signal to the user).  It is a convenient way to access your email, social networking, or web searches from your portable device.

But, it is also an easy way for others to access your email, social networking or web searches.  Most public WiFi networks have no security associated with them (as indicated by the fact that you have no password or other requirements to join the network).  Since there is no security on the network, anyone can attach any device to the network and do on it what they want.  Some people, then,  attach devices that can read any non-encrypted transmission over the network.  That includes your passwords, credit card numbers, confidential corporate information or your surfing history.  This is comparable to the person eavesdropping, except it is with the computer.   They may also be able to masquerade as another device and send requests for information (such as data or pictures) to your computer (which your computer thinks it should honor).  As I have said before, sometimes people do this for fun, or to learn what they can do.  Others engage in such behavior to find information that might be sold to magazines or used to blackmail people.  Still others engage in the behavior to steal confidential information (such as credit card numbers) that they use to steal money.

So, what do you do?  Of course, the normal precautions of having your security software up to date will prevent someone from unleashing a virus or malware on your computer.  But in addition, many security experts suggest you avoid such networks.  Or, if you do use them, set up a virtual private network (or VPN).  You may already be familiar with a VPN because you may use that to login to your company’s computer.   VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.  This software prevents sniffing of the material sent over the network, ensures that communications come from the place they say and that information is not intercepted inappropriately.

A Mobile VPN gives a user the same level of security when using public WiFi networks.  Instead of requiring a stable location on a network like the traditional VPN, a mobile VPN maintains a virtual connection to the application instead.  It allows the computer to move among WiFi networks which changes the “address” of a computer, and handles the changes of the addresses transparently.  This kind of security has been used by police officers as they move among cell towers, and by hospital personnel as devices move with patients.  Both applications require absolute security.  Using a mVPN may involve additional hardware and will involve additional software provided by a third party.

It is, of course, an extra step.  But, if you do not want the world to know the data you process, then perhaps the extra step is necessary.

 

Email Etiquette

Leave a comment

You might  ask if there are any rules of etiquette for email.   Of course, as with any other social group, there are certain accepted practices of which you should be aware, and we shall discuss them shortly.  It is important to remember, however, that there are social conventions among people that go beyond the realm of email.  Clearly, polite society recognizes polite communication whatever the medium, and email users expect the same.  Generally, it is useful to have a well written document as well to make it easier for the recipient to understand your point.  If your email is for a particular club, organization or place of work, remember the code of conduct in that group and follow it as you would in face-to-face settings.

First, think about your email and whether it is appropriate to put your message in that medium.  Emails can easily be forwarded, printed and saved.  If what you want to say is confidential or hurtful, you might not want to use email.  Remember, although you delete the email, not everyone does.  Do not put anything in email that you do not want the world to see.

The second accepted practice among email users is DO NOT USE ALL CAPITALS IN YOUR EMAIL.  Capitalization always adds emphasis to your point.  However, in the world of email, capitalization is considered shouting.  Do not shout in your email any more than you would shout in face-to-face communications.   Some email users I know avoid all use of capital letters in an e.e. cummings approach to prose.  Clearly it avoids the image of shouting, but it can also be difficult for the recipient to read.

Third, respond to email as you would respond to a telephone call.  Some people find it very annoying to send a message and never receive a response.  While this takes time, it is generally accepted practice.  However, if you do not know the sender of the email and it is not a wanted email , then never reply to it.

Most email systems have a way of marking an email as urgent.  When that email appears in a recipient’s inbox, it is marked with a red exclamation point to get his or her attention.  This is a good system to help people identify really important messages.  But, if all of your messages appear this way, the identifier loses any significance.  So, use the urgent marker sparsely.

Many systems also have a way of asking for a return receipt that the email was read.  These popups are annoying to users because it adds and extra step in reading email.  It also clutters the sender’s inbox with those acknowledgments.  When the message is urgent and you need to be sure the recipient has read the message, then use this option.  Otherwise, ignore it.

Many people believe society should be more cautious as to what email we forward to others.  One way to keep in touch with others is to forward meaningful stories, photos and jokes to one’s friends.  But, not everyone has the same sense of humor and not everyone wants to receive these items.  Be cautious and think about your recipient before automatically forwarding something.  In particular, think hard and long before sending chain letters that promise either good or bad luck.

If you do forward email, remove the heading material before you do.  The headings often include a list of people to whom (and from whom) the email has been passed previously.  It may include several people’s signature as well.  Hence, the recipient needs to scroll down (sometimes a long way) before seeing the content you intend.  By removing this material, you shorten the email and protect the privacy of those people who received it previously because their email addresses are not constantly rebroadcast (as discussed below).

Eight, think about whom you include in a carbon copy (cc:) of your email.   There are two reasons to be concerned about this. First, you are sharing the email addresses of all of the recipients with all other recipients.   If they know each other, this is fine.  However, many people do not like sharing their email address with unknown individuals.  Respect their privacy and be cautious about how you do this (you can always use bcc: if you need to copy them).  In addition, you may be sending a statement that you do not intend by copying another individual.  If it is a confidential conversation and you copy someone else, a recipient may be hurt or offended.  Follow your common sense and the practices of the group you are emailing to make this decision.

Nine, if you reply to an email, be aware of how you are replying.  In all email systems, there are two reply options, one labeled “reply” and one labeled “reply all.”   The first (reply) sends your email only to the person who sent the email to you.  The second, however, sends your email to both the person who sent the email and anyone who was copied on the original email.   If you intend your message just for the original sender, you might be terribly embarrassed if the entire group reads your response.  Alternatively, if your goal was to inform the entire group about your answer, you will have missed your opportunity if you simply chose the reply option.

Finally, always make sure it is obvious from whom the email was sent.  This includes signing the email and/or using a signature.

Hacking — Are we Safe?

Leave a comment

Last week there was an article in most English-speaking outlets about the group Anonymous hacking a conference call from the FBI to Scotland Yard on January 17, and releasing the contents to YouTube.  The group  was able to access the call because it allegedly obtained an email from the FBI to law enforcement agencies in various countries giving details of how to dial in to the call.   Of course it is quite embarrassing for two of the world’s foremost law enforcement agencies to be subject to such a breach in security.  It is not known whether the information provides critical details for current investigations and whether those investigations were compromised by the leak.  The FBI, which is investigating the incident provided the following statement:  “The information was intended for law enforcement officers only and was illegally obtained. A criminal investigation is under way to identify and hold accountable those responsible.”

What is more of concern to us today is — if it can happen to Scotland Yard and the FBI, how secure are MY emails?  The answer is, “not at all.”   Emails that are sent unencrypted over an open Internet line (the way most of us send our email) are subject to being intercepted.  People can employ electronic devices on Internet lines to read emails and other transmissions.  That is to say, someone other than the intended individual can intercept an email, without the sender or receiver being aware of that fact.  Or, if either party has inadvertently installed spyware on his or her machine, the spies do not even need to intercept the email if it can be diverted automatically.

So, what does a user do to protect him or herself?  First and foremost, remember that emails are not generally secure, and that they should not contain sensitive information.  Social security numbers, credit card numbers, passwords, and other critical information should never be sent via email.  If it could represent the loss of money, security, privacy or identity, it should not be put in an email because it is too easy for it to be stolen.   That means that you should never do business with a vendor that that wants you to send information about your accounts via email OR that sends your full credit card number back to you in an email as a receipt.

Second, be cautious about using open networks.  Many of us use non-secured networks at coffee shops, hotels, and other places where we want to conduct business.  If you have a wireless network in your home, ensure that it is a password protected network.  Open  networks are particularly easy to breech, and their use increases the likelihood that your email will be intercepted.

Third, use virus and malware protections on your computer to be sure that your email is not being monitored before it is ever sent.

Remember, a massive number of emails are sent each day.  One site estimated that in 2010, there were, on average, 294 billion emails sent per day.  The odds of someone finding your email and acting upon it are quite low.  However, care in what you put in the email will help protect you if someone does intercept your email.

 

Post note:  There is a nice tutorial I recommend:  9 Things You Must Absolutely do to Keep your Online Identity Secure

Older Entries