Facebook offers users more control over their privacy

fb1

When using social networks such as MySpace or Facebook, privacy is of paramount concern, with the details of your private life sensitive enough that you might want to restrict the availability of that information to those people you trust.

Today, Facebook unveiled a revamped privacy interface, affording its users even more control over how their information is filtered to those viewing their pages. With over 350 million users, making it the world?s largest social network, Facebook is hoping this gives its users more flexibility over how they?re able to manage what they share amongst the community.

Per Facebook, the new changes include:

  • They?ve removed regional networks, finding that the various communities have become so large as to make its initial purpose inapplicable. Instead, users will be able to share information to friends, family, or publically.
  • Users will have a tool that assists in setting up their privacy, though the default settings will automatically block that information which is particularly sensitive.
  • No matter what the item you?re sharing, you will now be able to control who sees it, whether it?s loved ones or the public.

If you?re curious about what this means for your account, Facebook explains the changes in more detail here.

Protecting yourself from email scams

Most of us are already well familiar with the frustrations of spam: unsolicited email advertisements. In recent years, unwanted emails have evolved in an attempt to avoid increasingly advanced filters and wary consumers. The contents and goals of unsolicited emails are not always the same, however, and some emails are more dangerous than others. We’ve put together a list of red flags to help you quickly identify emails that may be harmful to your computer and your wallet.

Suspicious attachments

Attaching files to an email is a quick and easy way to share files with your contacts. The downside is that unscrupulous spammers can attach files like viruses and trojan horses in the hopes that an unwary recipient might download the file and infect their computer. Any time you see an email with an attachment that you weren’t expecting, be very cautious about downloading the attachment or even opening the email.

Links that don’t make sense

In an email supposedly from Yahoo, a link to a specific page on Yahoo’s site appears. So why does the text of the link not begin with “http://yahoo.com”? Because it’s a scam. Many scam artists attempt to gain account information or even credit card numbers by posing as respectable web companies looking for information about your account. These emails typically contain a link where you can reset your password, confirm your credit card information, or log in to access some special new feature. To spot these bad links, you need to look at the url: the address of the page that is being linked to. All urls begin with “http://” or “htpps://” and from there vary from website to website. If the url is not visible in the link, you can hover your mouse over the link and see the url in the lower left corner of your web browser.

email containing links that don't match up and suspicious sender information

email containing links that don't match up and suspicious sender information

Notices about accounts you don’t have

Virus spreading emails that mask themselves as emails from major websites are banking on their recipients actually having accounts with that website in the first place. If you get an email about your facebook account when you never signed up for facebook in the first place, the odds are very good that this is a phishing or virus email.

Password reset requests you didn’t send

One of the most common phishing emails currently is the fake password reset. These emails claim that you recently requested a new password, and direct you to a webpage where you can enter your “old” account name and password. You may be able to identify these emails by the link urls or because you don’t have the account that you would supposedly be resetting a password for in the first place. Even if you don’t see anything wrong with the link or the account information, never respond to a password reset email that you didn’t specifically request.

Sender addresses that don’t add up

An email from YouTube.com will be sent from an account that ends with @youtube.com. If “joey5683426$$@ytmail.com” is sending you important updates about your YouTube account, it’s a safe bet this is also a malicious email. If your email system hides sender information, you can change your settings to show full headers or usually click a link right in the email to show all of the sender information.

Money transfer requests

Typically from Nigeria, these emails claim that there is some obscene amount of money sitting in an account somewhere that the sender wants moved to the United States before something terrible happens to it. It’s not uncommon for these emails to be completely in upper case and poor English, although there are exceptions. These emails are scam attempts, trying to get your bank account information so that the sender can access your funds. No matter the pretense for the email, you should never share bank account information with anyone you don’t know. Recent versions of these emails claim to be from “a member of your church.”

Weird emails from friends

The most dangerous and difficult to spot malicious emails are the ones sent by your friends and other contacts. Usually if you receive a suspicious email from a friend or co-worker, it’s either because their system has been infected or because their account has been compromised. If you see an email from one of your contacts that contains strange characters in the subject, has attachments that you weren’t expecting, links to a file sharing site, or otherwise looks unlike the correspondence you’re used to from that person, take the time to check with them before clicking on any links or downloading any attachments. If you do find a strange email from a contact that later turns out to be a virus or online scam, it’s important to remember that your friend most likely was not the one that sent the email to you. These are almost always sent either by a virus or by someone who gained unauthorized access to your friend’s email account.

Email from the user's account containing a suspicious link and subject

Email from the user's account containing a suspicious link and subject

Emails from yourself (that you didn’t send)
These emails can be disturbing when you find them. If you find an email from your own account sitting in your inbox that you know you didn’t send (and you have not allowed anyone else access to your account) immediately change your password and security question for your account. Next, check your “sent mail” folder to see if any other emails went out that you were unaware of. Let everyone who received one of these suspicious emails know that you did not send the emails, that they should not open them or click any links or attachments and that you suspect your account was compromised. You can also let your email provider know about your concerns. If this problem recurs, your system may be infected and need virus cleanup service performed.

As users and spam filters become more aware of these malicious emails, scammers will develop new schemes to get at your computer, bank account, and other information. The best weapon against these attacks is a healthy dose of skepticism, though even vigilant users can fall victim to scams and viruses. If you believe you may have a compromised email account or infected machine, or if you just want more information about how to prevent these problems, give our office a call at 1-800-GEEK-HELP (433-5435).

Want to know what Google has been keeping track of?

For all the praise it receives for its ground-breaking services and the advances they?ve introduced to our use of the internet, Google has also been viewed as a pioneer of dubious intentions, an increasingly vocal chorus of criticism rallying around what some denounce as the company?s tendency to overstep its bounds where privacy is concerned.

While there?s no denying that Google?s products have ushered in a considerable shift in how we take advantage of the ever-evolving internet, concerns have been raised about what many perceive to be intrusions on their privacy. No matter which Google service you?re using ? search engine, email, blogs, news, videos, shopping ? the company logs your activity, collecting data about every action you take.

For many of these, Google requires your permission to exact that information, but the sheer number of services makes it difficult for the average user to keep track of what?s being collected.

To assist in that effort, Google has unveiled the Google Dashboard, a helpful tracker that sums up every bit of information Google has collected about your profile from the moment of use. This includes everything from the latest blog you?ve read to the number of emails contained within your Gmail account, giving you a compilation of your ongoing activity while using Google?s services.

google1

For those concerned about security, this is not contained on a server, restricting this information to just your web browser.

This tool can be used only for those Google products which require your login information.

The information Google Dashboard will sum up for you includes:

  • Web history
  • email
  • Calendar
  • Youtube
  • iGoogle
  • Latitude
  • Reader
  • Shopping
  • Voice
  • Contacts
  • Finance
  • Friend Connect
  • Tasks
  • Picasa
  • Mobile sync
  • Orkut
  • Blogs
  • Docs
  • Account and profile
  • Alerts
  • Search engine

At this time, despite the persistent questions about how Google uses the information they collect, we feel that you should not be overly concerned with your use of their products. If you have any questions about your use of a Google service, give one of our technicians a call.

Sometimes, history is best forgotten — on Firefox

We?re all guilty of happening upon a website from which we?d like to quickly exit. Even if just the result of an inadvertently clicked link, our travels on the web will always consist of visits to sites which are best tucked in the remote corners of our memory.

If your internet adventures are taken with Firefox, here is a quick way to expunge from your browsing history those websites which you?d no sooner forget.

Two methods effectively address this need:

FIRST SOLUTION:

In the address bar, begin typing the name of the website. In the example below, we?re ridding ourselves of the ?CNN? url.

Even before the full address is typed out, you?ll notice that the website ? or several selections ? will drop immediately beneath the address bar. Highlight those selections you?d like deleted.

Once highlighted, press the ?delete? button on your keyboard. Doing so renders that site obsolete, as far as your browser is concerned, which becomes evident when attempting to type ?CNN? in the address bar again.

SECOND SOLUTION:

Slightly more involved than the first method, this process sees you open your ?history? window and review the entire history of your browser?s romps about the internet. To open it up, look at the menu bar, where you will select the ?History? option.

From that drop down, click on ?Show All History,? which opens the History Library Window.

As you?ll see, once opened, you can review your history in its entirety.

Looking at the history, you can select the website you?re seeking the removal of. Right clicking on the website will bring up a window that affords you the option to ?Forget About This Site.? Like before, we’ll use the “CNN” example.

After its removal, the only way that site will return to your browser?s history is if you return to the website.

While these two methods will successfully clear your history of any sites worth forgetting, it?s best to be mindful of where you?re visiting, should you ever find that you need to delete a?? website from your history.

Setting up a firewall can put your mind at ease

Setting up a firewall can put your mind at ease

Within the private confines of their home, away from the prying eyes of co-workers lurking nearby, the average user of a home PC figures they can surf? the internet without worrying about intruders. Spyware and Viruses are all that concern them, the installation of malware protection enough to ward off any stress about their computer’s vulnerability.

Yet, no matter how much we caution users against leaving their computers unprotected from malware, those pests are not the only threat to which your attention should be turned.? Many home networks remain susceptible to the ill intentions of unwanted visitors.

Piggybacking ranks as one of the most common offenses, the term referring to the unauthorized use of bandwidth by an outside party.? With a wireless connection, piggybackers access an unsecured network, using it as if it were their own. While piggybacking is a relatively mild transgression, usually committed by a struggling college undergrad who can’t afford internet service, it can impact the availability of bandwidth on your network — resulting in a slow response time when using the internet.

The more serious violations of network security occur when an intruder invades your network for the express purpose of retrieving private information.? Housed on your network are files of all sorts, personal data that you wish to secure against snoops and thieves. Without ample safeguards in place, unauthorized users can ferret sensitive information from your network and use it for their own design.

Many people unwittingly leave their networks open, unaware that they’re leaving themselves subject to the unwelcome motives of the internet’s less scrupulous population. Protecting yourself against these incursions is paramount, and one of the most effective ways to do so is the establishment of a? firewall.

Firewalls do exactly what the term suggests, erecting a wall of protection that shields your network from outsiders, blocking entry to those who haven’t been granted authorization. They can be implemented through software or hardware, to varying degrees, depending on just how secure you want to be.

For those looking to set up a firewall on their network, here are a couple free solutions that I like:

http://www.comodo.com/home/internet-security/firewall.php

http://www.zonealarm.com/security/en-us/free-upgrade-security-suite-zonealarm-firewall.htm

Creating a firewall can be an involving process. If not properly configured, your firewall will leave you no more protected than you were? before its installation.? Should you have any questions on how to build one, feel free to give our office a call. We are here to help you.

Computer Geeks Now Offers No-Contact Service
We offer two types of service: 1) Online remote 2) No-Contact at your Curb Service
X