Seniors and Computers

Seniors and Computers

How Far Have Seniors and Computers Come

We are in a new era. At the turn of the 19th century the world was facing an industrial revolution. When the 20th century the world had already experienced the technological revolution. Now we are needing to deal with Seniors and Computers.

The technological age has brought with it so much more to learn and understand. The information is 100 times more than the industrial revolution. It has produced so much more mental understanding than ever before.

People have had a concern with a generation gap. This made it hard for young people to communicate with older people. The technological gap has not only made it difficult to communicate between generations. It has made communication difficult between people within the same generation. Also we have a gap with Seniors and Computers.

We have people today that got along well for years by doing. Being able to read or not read was not the question of concern. Now with so much to read to be able to stay up to date with technology at times it has become an issue for some people.

The good thing with technological advancement there are now electronic readers. These help many people. This is a great thing now. It has not always been that great though.

Personal Experiences With Seniors

I finished helping a couple in their late sixties early seventies. They had two computers. On was very old and was at the point that upgrading was out of the question. The two computers were Microsoft based O/S.

They decided to go and a new computer. The new computer of choice was a MacBook Air laptop. The lady of the family already had an iPad.

They brought the new computer to me to set it up. They also wanted her data moved over to the new computer from her Acer laptop. He wanted his data moved over from his old laptop to her Acer laptop. This process of setting up the new MacBook air laptop and moving the two sets of data over was not a big deal. I completed this project without a hitch.

When the couple came to get the new computer all was well. What I can say is the wife is quite good with computers while the husband is not. Technology for him is quite challenging at times. This is OK.

I went ahead and help answer the wife’s questions that she had before they left. The husband on the hand was more reluctant to get any questions answered. Thus the gap with Seniors and Computers.

They have called since then with more question that needed answers. I am always glad to help answer any questions that anyone has.

Personal Experiences With Family

Then there are my in-laws. My mother-in-law is quite adapt in using a computer. Mind you she is of an age that if something changes then my mother-in-law has a learning curve to deal with for a while. It takes her some time to understand new things on the computer these days. But, my father-in-law comes at the computer as if he is coming towards and angry bull. He has no patience and wants to get the job done without any issues. Well, you almost can guess the outcome with my father-in-law. There is very little progress at the best of times.

By the way my in-laws have had their computer for more years than you want to know about. It is a good computer and is still accomplishing the tasks that they need it to do. This is good as it aids to the learning curve that seems to be always there for them when using the computer.

Seniors and Handheld Devices

Oh, yes, then there is the new item on the block called cell phones. I am finding that cell phones are very confusing for people 55 to 60 and up. With the computer it was only emails. Now with cell phones it is email, messaging, texting and of course the apps. More things to learn. A smaller screen to use them on. This contributes to more mistakes and issues. All due to the fact that eye sight is not so good in the older generations. Then there is the issue of the adult fingers trying to make those tiny keys on the cell phone keyboard work. Also spelling words as they should with correctness is also difficult.

Reasons For The Stories

Why do I tell you all this. Because technology is difficult for some people. It does not matter their age. Some people can not grasp how to use the computer, cell phone. tablets etc. That is OK. Not everyone was and is able to grasp science, mechanics and those types of things either.

What can happen is the following. We as people who know how these things work can help them. That is walk them through the technological challenges. We can answer their questions. Also we can show for them how things work on their computers, laptops, tablets and cell phones.

I have been sure glad for people to help me out with the spelling of different words. This is my weakness. I do use the many bells and whistles to help me with my grammar and spelling. I also still ask others around me how to spell different words. I also have them read what I have typed to see how it sounds to them.

Understanding Technology in Time

In time that people’s misunderstanding of the technological age will lessen. There will still be people who are not technical minded and will always need help. The Internet of Things will change the view of technology. As more people use these different items and work on them the better people will become.

The technical age is teaching people how to use computer, laptop, tablets and cell phones. Many times this is like the building of homes are. One will be good with this app or set of apps for work. Another person will have a different app or set of apps they are good with. This is like having framer, plumbers, roofers, finish carpenters etc.

Why will this always be you might ask. It is because the computer world is so diverse. You are able to do so many different things through a computer system now. Computers are for much more than crunching data and data type information. You can use them for arts, science, gaming, school, work, and research.

Computers and The Handicapped

The computer can now help the handicapped. This group includes people with visual challenges, people with physical challenges. Also people with hearing challenges and more. These people have voice and movement activated aids that can do more than ever before for them. They are able to go to school, work and take in many extra functions because of the computer world we live in now. Yes, technology is not perfect. Handicapped peoples still have challenges to overcome. It is much better for them today than it was even 10 or 15 years ago.

It comes down to the make and model of computer that will fit your needs. Some like the PC. Then there are those who like the Apple. Here again there are those that like the Chomebook. What will be your device of choice.

Microsoft Technology

While the Microsoft PC, desktop or laptop, has the most going for it being the dominate system. You are able to get the most applications for it. It is the most used thus the most accepted for of file format. Sharing files is easy. The drawback is that these systems can be the most attacked by viruses, malware and spyware.

Apple Technology

Then there is the Apple. Many have stated for many years the Apple O/S is the safest system to be using. They come in both desktop and the laptop. After the hacking of the iCloud there have been many questions about the safety of an Apple product. The use of Apple laptops is large in the graphic arts fields. They have the best graphics for such application work. The big drawback with the Apple is they do not have the greater system use base. Thus, conversion of communications to the PC is a reality. This is so their documents are readable. With the new application versions this is a thing of the past.

Chromebook Technology

Then there is the Chromebook. These laptops are new on the computer scene. Here again they have an O/S that is separate from the other two major O/S systems. The thing that makes the Chromebook system popular is the following. They work well with the social network and cloud base computing. Everything is through the Internet these days. You work, do schooling, communicate and send messages all over the Internet. How things have changed. The big thing that is catching peoples attention is that they are not gaming computers. Because of this they fit in well for school and work projects.

No you are not able to do heavy computer work on them. This includes heavy application coding and CAD work projects. The handling of regular school and work projects you will find works with ease. The Chromebooks are also light and very portable. These attributes make it simple to take them from one point to another point easy. They are virus free environments. Thus making connectivity with other networks a much safer process.

Yes the Chromebook has some drawbacks. They need a network connect for full functionality. They have very small on-board hard drives, usually 16 to 32 GBs in size. You need to store your data and documents either in a cloud storage or on a thumb drive. They are no good for gaming. Accessibility of everything is though the Internet. This means apps and stored files. They are available at a fraction of the price of most other laptops.

I am able to access both my Google account and my Microsoft account without any issues. I have read from some people. Their model of Chromebooks has difficulty accessing a Microsoft account.

Users’ Reviews

From what I have read in other people’s reviews. The Chromebook is very good for people who are technology challenged. There have been many people who have purchased a Chromebook. These Chromebooks have been for their ageing relatives. Each of the ageing relatives seemed to be able to access their email and social accounts with ease. They do not have much of a learning curve. They were also able to do the other tasks they needed to do with a computer without much trouble at all.

Conclusion, Know Your Computer Needs

It is important that you know what you need in a computer. A large majority of people are now purchasing laptops. This is because of the great informational Internet highway. Not all laptops are for everyone. Like the couple I setup their new Apple MacBook air they choose an Apple laptop. As my in-laws still use their ageing desktop. I have purchased an Acer Chromebook laptop. There are people who need to buy Microsoft PC laptops. We each have chosen our product. Also we continue to use our exist product. This is because our current system meets our current computing needs.

Thus, I would like to say that purchasing a Chromebook is for you. I am unable to make that statement. I enjoy my Chromebook. It meets my existing computing needs. The Chromebook laptop might not meet all your needs. You need to understand your computing needs. When you do then you will be able to choose the correct laptop system for you. Remember knowledge is power. With that knowledge you will be able to buy within your budget.

Thank you for reading this post. Please leave your comments. On how well your needs of a computer matched up with your final computer/laptop sale.

The Future of Net Neutrality

net neutrality

Net Neutrality Today

Net neutrality is big in the news these days. I have read a fair amount about it and it seems that it is a bigger deal in United States than Canada. What is it? How will the Internet respond if net neutrality is not in place? These are two big questions. The people and government in the United States are doing their best to answer right now.

People, organisations and the government are up in the air about it. Net neutrality has a lot to do with free speech. The belief of more that some that if net neutrality disappears. Then the freedom of the Internet will be gone. Others believe that it is impeding in the forwardness of business. This includes corporate growth. Then there are those who want to regulate the freedom on the Internet. This will give them access to information at anytime from anyone.

People’s Belief of Net Neutrality

People believe the following. If net neutrality disappears then the ability to surf the Internet will disappear. without paying high prices to do so. The belief is with the lost of speed to surf the Internet there will come a higher payment price.

I can not speak for the United States population. But here in Canada even though they say we have net neutrality there is a Internet access tiered system. It is already in place by the big cable and Internet providers. People and organisations in the United States do not want the tiered system. The fear is this will bring higher costs to the internet service.

Net Neutrality Abroad

There are some countries around the world that already regulate the Internet. Both coming into and through their country’s boarders. From what I have seen and read. There are organisations in the United States that fear this would happen. That is to say if net neutrality disappeared.

Freedom of speech, freedom of the people. Having the Internet now a day is like having electricity. If people were to loose the Internet, they would not know what to do with themselves. It would be like someone turning off the electricity, people do not know what to do with themselves. All this freedom is in the hands of the person with electrical switch.

Like a couple of weeks ago we had a horrible storm go though our city. It shut down our electricity because a transformer station went down. We had no TV,radio, Internet,and at one point the storm was so bad we had no cell service. We had to find new ways to communicate, entertain and busy ourselves for the rest of the night. For most people this was an inconvenience. What is be portrayed is a much more painful situation that would last longer than one night.

The Painful Loss of Net Neutrality

The belief is that the lost of net neutrality will make everything painful on the Internet. This is hard to say. What I do know is that the corporations in the United States are larger than the corporations in Canada. I am sure they have much to gain without net neutrality in place.

I know from reading. At times the main cable and Internet providers have stepped in. They have prevented information from reaching the public eye through the Internet. That is here in Canada. Is this wrong? Well I guess that the individual user has to decide. The Internet is not regulated. Also the belief is that Internet should be self regulated. This means the each user much set up their own guards and fences while on the Internet.

Corporate Use of the Internet

There are many sites. The Internet has many users. You can find many abusers on the Internet. Each person who enters onto the Internet has to position themselves as a user or an abuser. It has been the abusers that have caused so much concern by government. With the mass amount of information travelling through the Internet. People and organisations now have more concern. This has made the corporations want to create freedom restrictions laws.

I am sure that corporations and Internet providers are receiving enough revenues. They are able to cover the costs of serving the Internet to the public. If they did not then they would not be in business today. These corporations want more money. They also want new ways to get revenues from information sources.

Personal Use of the Internet

I remember the time when I went from snail mail to paperless to cut down on the garbage mail. I am sure that this one is for sure. The general public will see an increase of junk email if net neutrality disappears. These businesses and corporations will have more access to people’s information. This will allowing for more junk email.

I am not sure if it will be the junk mail that people will mind so much. It could be the extra minimal costs for this web service or that web service. There are so many web sites now that charge an extra charge to use their web site services. To have your own Internet provider to do the same. Many users would be up in arms about that. If this becomes the end result with the lost of net neutrality then the general public will have a lot to say.

Government and the Internet

Everything in time will have some government ruling attached to it. The government what to have a piece of every pie. Will this be true of the Internet as we see it today. I do not know. There will be always change. Many times not for the better of the common person or small to medium business.

All we can do is voice of views and options. In doing so we can then hope that the right people grows hear what we are saying. Then we can hope that they will take our concerns to the correct government officials. From there we can only hope they hear and do the best thing for all who concerned.

Final Words on Net Neutrality

In conclusion, we have enjoyed the benefits of net neutrality for a great season. There have been a lot of good and a lot of not so good because of net neutrality. It would be our desire as it is for others to be able to enjoy the benefits of net neutrality moving forward. There has been a lot of concern put forward about the loss of net neutrality. Also, the negative effects of the remove of net neutrality.

I hope that the consequences of the removal of net neutrality is not that great. Keep expressing the importance of net neutrality. To your congress person and your world so that everyone who will hear. And as always, remember, If we have net neutrality or not, Internet security begins with you. continue to do all in your power to make and keep the Internet a safe place to be. Especially for our young people and children.

Have you checked your computer and cyber security lately

Computer Internet Cyber Security

Where is Computer Internet Cyber Security Now

It is the mid of the year now. Have you thought of how well your Computer Internet Cyber Security is right now. Compared to your Computer Internet Cyber Security at the beginning of the year? Have you seen anything unusual in your emails, website directs? Have you experienced any website page redirects while you have been on the Internet?

This year so far has been a year of more cyber crime activity that in previous years. We have been witness to the largest radsomware experience the world has seen. Not to mention all the viruses, spyware, and malware which is out there.

Recent Experiences

I have had a couple of experience with a couple of my clients recently. You know it does not matter your age or your gender. When you are on the Internet you are vulnerable to every cyber crime that is out there. You might even end up with a situation which looks like a cyber attack but isn’t.

First Client’s Experience

Now getting back to my clients. I had a client who received a false cyber attack. The web page screen wanted them to call Microsoft. Thus, to have their computer scanned for viruses and computer issues. First of all, Microsoft contacts no one on their computer or viruses issues. This has never been the way of doing things. Microsoft, Apple, and any other big corporation has never contact people. These companies are not concerned about their computer issues.

I was able to correct this attack of false computer issues. One thing that people can do for themselves. On a regular time frame clean out their browsers history, cache and cookies. What this does is delete any connective web Internet information. Thus cyber criminal app links are not attracted. People do not realise that there are links roaming the Internet all the time looking for open ports. It is through these cookies that bigger viruses can come in. For this client they were aware enough to stop what they were doing and get off the Internet. They were also wise to have an trained computer person look at their system. Thus, to make sure there was no lasting cyber attack issues on their system.

Second Client’s Experience

The second client that I want to talk about I have not seen for a very long time. This client receives a lot of communication through email. Over time they build up. For this client they had built up until their email deleted folder was very large. Also over time your temp, computer deleted folder and Internet history and cache build up. Well this client was in a panic. They could not delete anything, move anything or install anything. Panic was what turned them to me. I came over to their place of business, looked their computer system. I realised what the situation was. I then processed to complete the needed task at hand.

Their computer system needed a real good cleaning. I had to start cleaning the system out without any added software. That was because I could not install any of my cleaning applications. Once I have the browsing history and cache removed I was then able to install my cleaning software. I was then able to do a thorough clean of my client’s computer. The end result amazed me. I cleaned out of the computer system 101 Gbs of temp, deleted, history and cache files. On top of that there were close to 2000 deleted emails removed. My Client’s computer is back to working as it should.

What to Pick up From These Experiences

This last experience shows that it is important to maintain your computer systems. That is on a regular time frame. This scenario could have ended in disaster. The client could have lost all their important apps, data and files. This could have been disastrous for their business and clientele base.

This also brings up a great point. When you are dealing with personal and business data and information. Please be very careful. Before I helped these clients with their computer and Internet issues. I read an article on data and information security.

What We Can Learn From Other Experience Situations

One of the largest security companies in North America did some hardware upgrades. That is on they system. The article stated that their SSD drives were not as well data cleaned as they should have been. Client information got out. Oh my, this was not good for the security company. The security situation reveals the importance of making sure. Thus, that all data and information both personal and business is secure.

There is no use to touch wood these days. In an era when everything is at our fingertips we need to continue to educate ourselves. It is important to know how to keep your data and information safe and secure. There is so much on the Internet now. So many people are storing their data online. Also, companies and organisations are now storing their business online. People are even storing their security passwords online. It is important to have knowledge of the cloud companies. Read and have knowledge of their security history record.

Experts Also Need to be Safe

Even I store data online. It is important to have the correct knowledge about all you do online. I use a program called LastPass for password security. With a system like this you only need to remember one password to be able to access all your other passwords. There are other companies with password apps out there. All you need to do is your research on each security company. Then you will understand if they have a great, good or average track record. That is for keeping their clients’ data safe and secure.

Conclusion of The Matter

I can not stress enough the importance of personal knowledge. This is on data, information and Internet security. The more we use the Internet and exchange information with others the more we need to understand. There are important boundaries of data exchange. Do not give out more that you need too! Do not go to places on the Internet that appear or have a reputation of being insecure. Be knowledgeable of your family’s Internet use. This way you can instruct and teach about the importance of safety and security on the Internet. Set times for the Internet to be available and when it is not available for use in your home. Understanding Internet usage and safety is important. The security of all who use the Internet is also important. This is important for both home and business.

Because you are able to go about anywhere on the Internet, everyone needs to remember. Security and Safety of you data and information begins with you. Thus, it is important to remember. Stop, Think, and Connect should always be everyone’s thought pattern. When going on a computer and connecting to the Internet today you should be always careful. This is important because so much is now done through the Internet. Thank you for reading this post. Remember that security both computer and Cyber Internet begins with each person. This is for whoever uses a computer and accesses the Internet.

Two Way Street for Network Security

Security on a network is a two way street

Menu

Security on a network is a two way street

Security on a network is a two way street. It does not matter if it is your personal or business network. There needs to be as much thought about things coming into the system and things going out of the system.

When was the last time you considered what was going out on your network. Things going out can compromise your network? You receive emails and then send them onto others. You access websites and interact with these websites. As well you might be one that does online gaming.

Even if there is a firewall in place. Once you access the internet you are vulnerable to what is roaming out there on the internet.

I remember reading an article. It stated that stated that religious and regular sites are more vulnerable. That is to have viruses and malware on them than paid XXX sites.

I remember a few years ago my brother-in-law came to me with a question. The question pertained to the fact that he wanted more control over certain computer. He wanted to be able to control the web sites on that computer. It had nothing to do with accessibility to unwanted sites. This had to do with the ability to prohibit access to websites at certain times during the day.

Menu

How to Restrict Internet Access

Now there are two ways to prohibit access to websites through one’s network. One is through the home router. The other is through each individual computer on one’s network. Now this needs understanding through the technology. That is how devices able to access the internet. This could be a smartphone, iPad, tablet, laptop, or computer.

You are also limited the access times of day to the internet. The times of day will depend on who it is. You might have young children, school age children or even high school. There might also be college age young people in your home.

How much control that you what to have will depend on the above mentioned situations.

Menu

Why You would Restrict Internet Access

Getting back to my brother-in-law. They had a daughter that was home schooling at home. When she would use the internet for school work it was too easy to access other sites. These sites included sites like Facebook, twitter and YouTube. What was happening was that she was getting lost in these sites and not completing her school work.

They did not want these sites band from everyone else their daughter. They needed her to access the internet for school purposes but not to waste time on.

Here is an example that one computer needed restricted accessibility in the home. The rest of the computers and Internet of Things (IoT) did not need this control.

Now I have had an issue in the past that is different. In our home we needed to prohibit all xRated sites so that our son would not access them. Thus we needed to band such sites from the whole network.

Menu

How to Restrict Internet Access

Whether you need to restrict one computer or need to restrict a whole network you are able to do that. You are able to restrict one computer with the file called hosts. You can access this file in c:\Windows\System32\Drivers\etc\hosts. If you need to restrict a network you can do it through the parental controls of your router.

This information might seem very technical to you the reader. I have to agree. You do need to know some information on how to get around your computer. Also you need to know how to get around your router. Once you understand. Then this information and knowledge will help you control any computer and router. Then you should be fine.

Menu

Steps to Restrict one Computer to The Internet

To restrict one computer you need to do the following steps:

  1. Press the Windows key.
  2. Type Notepad in the search field.
  3. In the search results, right-click Notepad and select Run as administrator.
  4. From Notepad, open the following file: c:\Windows\System32\Drivers\etc\hosts.
  5. Make the necessary changes to the file.
  6. Go to the bottom of the file.
  7. At the bottom you will find 127.0.0.1.
  8. Add the next line – 127.0.0.1 www.yoursite.com .
  9. Click File > Save to save your changes.

These steps will restrict this computer or any computer to accessing the website. All other computer and IoT will still be able to this website or any number of websites in the list in the hosts file.

Menu

Steps to Restrict a Whole Network to The Internet

To restrict a whole network you need to do the following step:

  1. Open your favorite browser.
  2. Type in your router’s ip address.
  3. It is usually 192.168.0.1.
  4. Type in the username and password to access your router’s web interface.
  5. Access the parental controls.
  6. You can filter a device, a keyword, a day and or time of day.
  7. Save your changes in the router’s web interface.
  8. Log out of your router’s web interface.

The above steps will aid you in restricting your network for any reason. This includes restricts for any device with keywords and day and time for one or all devices on the network.

Menu

Reason Why Security is Important

Now you can see that security is as important from the personal side as it is from the internet side. There are many web sites that will threaten your personal security.

These sites can mine your personal and business information without you knowing it. These sites can release malware and spyware to do this without you know that the mining is going on. Being aware of how much personal and business information you give out is important. When asked you need to know that there are websites out there that will do the same.

These websites are very well engineered. They will take you to another website without you know it. The website will look the same but are different.

You need to know about these websites. They are phishing websites. You need to be aware of how these websites work. They are subtle. Clicking on a link and then going to a similar website is all it takes. Many malicious websites will do the above mentioned action. So as a reader of this post you can now be aware of this situation.

Along with phishing now users of devices have to deal with ransomware viruses. If you do not already know from the name and news reports. Ransomware holds the computer or IoT device from ransom. There is always a dollar figure attached to the ransom. Because the thief that is able to ransom more thank one device at a time the ransom amount is or can be low.

Menu

Security Breaches Have Already Happened

Many organizations and companies already have had this experience. Ransomware threats are real. They are happening more and more all the time. This is one more way that cyberspace thieves are able to access people’s funds. The locked device becomes inaccessible until the thief receives the ransomed amount. These devices can be anything from your computer to your car.

It is true that ransomware is different from phishing or any other type of malware or virus. Controlling your network activity will definitely lessen unwanted issues. This is true for any of the above scenarios. This is as important as controlling access to personal or business data information. How important your data is will determine if it will be a target of any theft by any thief. Protecting your data should be a priority at all times.

Closing Thoughts

It is so important to remember data security is the priority of the owner of the data. Therefore, stop, think, and then connect. It is through this process that the security of your data and information will be at the highest level. Do your part to control and protect your data and information at all times.

Menu

Plans of Mice and Us

Plans of Mice and Men

Plans of Mice and Men

Have you ever had one of those days. A day when Plans of Mice and Men do not add up. You get up with plans in your head that you have been planning from early morning. Then you have trouble getting the first plan off the floor or in this case started on the computer. Then you have to go and shovel snow after eating breakfast. That is how my day started.

Well I am not complaining. I am just stating a fact.

I have been reading a book by Matthew Turner. The title of the book is ‘The Successful Mistake’. It has been a good read thus far. But what can I say I have not finished the book. The title itself give you a strange mental concept just reading it. Thus far the read has been about the downside of any mistake. You might be saying how can that be a good book. Well the book was written on the experiences of 163 different individuals. Matthew Turner interviewed them all. It shows that other people have to move and work through many different obstacles too. The book lets you know that you are not alone when it comes to issues that need solving or corrected.

Life Creates Changes

There are lots of people out there who have needed to change their way of life because of work or economy. Many have lost their jobs because of economic change. Many have quit their jobs because they see something better for them. If you are one of those people I want you to know that you are not alone.

I am one who lost their job. So here I am finding a different direction to go. Here I am expanding my skills in writing. I have skills in the computer field so I have been putting them to use. Therefore I am creating websites through WordPress. Also I am fixing computers for people. Also I have started to blog about different computer network aspects. I am also helping a client with their CEO google position.

You might be saying so. Well what I am showing here is that I am using the skills I have to continue to keep moving forward. What skills do you process? What skills have you acquired? See what you can do and move forward.

New Insights into The World of Computing

I have read a couple of newsletters lately. It is amazing how the computer world is changing these days. It is amazing what I thought was necessary to do computer work then and now. I read about the editor of WServer Newsletter. He was addressing a group of young people on the aspects of computing. Then he wanted share some information with them. He asked for their email so that he could send the information to them. More that the majority did not have an email. Also the majority of these young people did not even have a computer. They all used their smartphone to communicate and share information.

Here I am still using a computer. I have In-Laws who think that I have advanced technology. The reality is that I am out of date and my technology is out of date. I started my computer career thinking that I needed to know how to fix computers, and networks. I am realizing today that I need to know how to fix smartphone and their apps.

My question is in today’s day and age of throw away how much fixing is there going to be? Should I worry about it? I do not know.

What Has Made The Difference

The thing that has made so much difference is social media. Social media has promoted the idea for everything available at your fingertips. Even as I write this blog I am writing in Google Docs and saving it to Google Drive. It does not seem that long ago that this concept was foreign to us. Now I can access this document from anywhere including my smartphone. So the creation of instant access.

So as you can see things change fast. It is hard to keep up with everything. What was the usable norm today will not be the usable norm for tomorrow.

With all this change one wonders how safe is our data.

More Changes in Networking

Today I read two articles which are sure to change the way we do things over the Internet. One was about serverless cloud computing and the other was about software-defined networking.

The article on serverless cloud computing was about not having to manage the server. The way that it is set up is for the convenience of developers so they can spend more time developing.

The article on software-defined networking was also about convenience. This concept is about the ability of IT Techs being able to manage and maintain the system. The system would include all gateways, routers and switches from a central point. In other words being able to work on these items and change these items without being their location.

What a change today. Even working on devices that just a few years ago required you to be there physically. You can now do the same task  remotely. Yes remote access has been around for awhile now. You are just able to do more remotely than ever before.

I can not say for sure but I am sure that every step will create less security on each system.

Getting back to ‘The Successful Mistake’. I am sure that there will be more mistakes because of the above mention new concepts.

Increased use of The Cloud

Here we are using more cloud based platforms. We are in need of accessing our data more often. We need to access our data from anywhere today. Social media and the workplace has made sure of that. We live in a global market and a global based economy. There are Amazon, eBay, music and movies. We have to separate work from personal. Doing this all at once it seems over the Internet. If we do not then either work or personal life will suffer.

Always in The Public Eye Now

No longer is just the people who are in the public eye who need to be careful. We are all in the public eye. Everything that we do goes through the Internet at one time. Our lives are recorded all the time and stored on the cloud somewhere. It is impossible to hide the lives we live anymore.

All we are able to do now is control what is out there seen by the public. We need to change how we think about private information. At one time we stored private information away in a box called a filing cabinet. Then the filing cabinet moved to our computers. From there the filing cabinet moved to the local network in our home or company. Now that filing cabinet can be somewhere in the cloud that we access on the Internet.

Technology Change in a Short Time

What a change a few years has made on the security of personal and company data. It does not take much anymore to have a mistake release private information into the public for all to see. See what happened to 1 Billion users on Yahoo. One moment their data was secure. The next moment their data became stolen.

From what I read this hack of Yahoo happened because they made the mistake. The mistake was not keeping their data security system up to date. What I mean is their security was not current security. Yahoo was using a security protocol that was old technology. Because it was an old technology it was easier for the hacker.

If you are going to store your important data on the cloud. You need to make sure that the cloud system you are using has current security. Also make sure that cloud system is up to date. This means both the cloud software and the security software.

Also the security of your stuff does not pertain to your data. It also pertains to your security access to any website that required a login. Banks, Facebook, Twitter, LinkedIn etc. are all included in the list.

Login Security

If you have many logins, then you should think about an application like LastPass. With such an application you can store all your different passwords in one place. You then access these websites and logins with just one password. It is much easier for you to remember. It is also more secure as this site is a secure site.

You do not have to use LastPass. There are others out there. This one is has a great reputation. Having a great reputation in the cyberspace security world is important. Especially in today’s Internet market.

Closing Thoughts

In closing I can not emphasize enough that the security of your data has to start with you. Be careful where your data goes. Never give out more personal or company data than needed. Be as sure as you can about the authenticity of those receiving your data. Have your passwords secure. Make sure your passwords are strong enough. That means make sure your passwords are long enough. Make sure that you use numbers, upper and lower case letters, and when allowed symbols. Finally use a system like LastPass to keep your passwords all in one spot. This way you only have to remember one password to login. Their system remembers all the other passwords for you.

Also remember it is up to you to Stop, Think, and Then Connect when using the Internet or Cloud. This is because once on the Internet you are no longer alone. Others are now watching your every move.

Your Life Your Cyber Live Your Security

How secure is your cyber life

How Secure is Your Cyber Life

 

Does all this connectivity give us more communication? Are you happy with the results of your own cyber security functionality? How secure is your cyber life? I would like to talk some on how security is today.

 

Email has been around for a long time now. It has been a threat to regular mail for years now. It is quick compared to physical mail. Can anyone remember far enough back to remember any troubles with physical mail? I mean have you ever lost physical mail or had your mail tampered with.

 

Yes there have been mail strikes, and even some mail bombs. There have been other tampering with the mail such as biochemical threats.

 

It seems today that a person has to concern themselves with the security of your email all the time. Just look at Yahoo. Two big server breaches in the last for years. Should this be normal today? I think not.

 

There is so much stuff or data that one has out there today. There are documents, pictures, videos, and email. Some people even have a lot more out there because of the career they are in.

 

Recent Cyber Breaches Revealed

 

Looking at what happened to Yahoo I think that this is a shame that this even happened. They are one of the oldest cyber companies out there. From what I have read they have been lax in maintaining an efficient cyber security for their servers.

 

It does not matter if you and new to the game or seasoned in the game. Maintaining proper and up-to-date cyber security is vital. Not only do your clients depend on that so does your reputation.

 

Yes I understand that Yahoo has been going through some growing pains. This does not matter. I have had a yahoo email for years. As a result I thought that because they were still around that they must be doing something right.

 

I also have used their Flickr account for some time now. Thus, I wonder how credible is Yahoo’s security on protecting my pictures for me. As a result I can say today that right now it is low.

 

The Use of The Cloud

 

I use many cyber iClouds. It is becoming more clear to me that nothing on any iCloud is safe. There are so many ways to lose your data today. Yes, more than a good old fire that our ancestors had to worry about.

 

It seems that you need a lot of security these days. Everywhere you turn you are told of the need for two-step security in cyberspace. People keep asking when will this be enough.

 

Peoples Cyber Security Responsibility

 

I find that people do not understand their responsibility for the security of their own data. Especially the older generation. Many of them think that no one can get it.

 

This is the way it is with my in-laws. They have lived on a farm for more years that most people reading this have been alive. Locking things up was never an issue with them. They seemed to live in a safe area with little to no theft.

 

It is hard to get them to understand that what they do on the computer now is not secure. They think that because it is in their home that everything is safe. No matter how much time is spent on telling them of Internet security issues. That is once they access the Internet they can have security situations that they do not want. They do not understand because they do not see the Internet.

 

Is that the way it is with you. What you can not see you are not worried about. If you are a Yahoo user you know that what you can not see can affect you. This could mean such things as Identity Theft for some. It could mean monetary loss for others. Do you want to take that risk today.

 

In The End Who is More Responsible

 

In the end it does not matter who is your server. They have a responsibility to keep your data secure. You have a responsibility to keep your data secure. That means using all security available. Two-step security is an added benefit. Especially now that we have cell phones.

 

Two-step security is most effective when you use it by having the system send you a text. Not only is it more secure for you. If someone accesses any system with two-step turned on then you get a notation. How you say! Well the system sends your cell phone a notification. If you did not access that account then you know someone is trying to tamper with that account.

 

I will leave you with this thought. With Yahoo’s new hack revealed don’t you think it is time to be more conscious of your cyber security? With every account that offers you two-step security access you should use it. Is not your life online your life? Why let someone else take it over on you?

Lawyer Gerald Chipeur Provides Understanding With E-mail Fraud

Lawyer Gerald Chipeur Provides Understanding

Lawyer Gerald Chipeur Provides Understanding With E-mail Fraud

Security today plays a big part in everything that we do. The Calgary News article “Former Alberta justice minister’s ex-wife denies retracting allegations of wrongdoing” testifies to this. As a result Lawyer Gerald Chipeur Provides Understanding in this case.

A person claiming to be the ex-wife ‘Breanne Palmer’ denies that she withdrew any allegations. The allegations stated that Denis was aggressive and verbally abusive. But in emails the information is that she did.

Lawyer Gerald Chipeur Stated the following. “Sworn court documents indicate the e-mail address used to send the messages withdrawing the allegations belongs to Palmer”. Gerald Chipeur was a lawyer for Denis. Also the article stated that the court did not deal with the authentication of the emails. But postmedia did receive a response stating that the emails in this case were not authentic.

What Could Have Happen

There are a couple of things to look at. Dropping of the charges towards Denis happened. This is because the proceedings did not go any farther with the emails authentication. At least from the article in the Calgary Sun it looks this way. The other thing is bouncing the email through the email IP of Palmer could have taken place. This is how spam travels to different people and organizations. The original sender is not seen. Also someone could have hacked into Palmer’s email without her knowing it. Thus the hacker would have used Palmer’s email address to send the messages.

I had to read the article more than once to understand what took place. It sure looks like a case of email fraud that changed the outcome in the favor of Denis. The case revolved around a publication ban on the dispute between Denis and Palmer. A judge lifted this publication ban.

The whole electronic situation could be talked about more. But I think that it would be best to leave it alone at the present time. The case was not about electronic misgivings. It was about their dispute and the publication ban on it.

This proves the importance of cyber security on the web. Remembering your password is not always the best. Using a application like LastPass is the better way to keep your password safe. Do not rely on your web browser to save your password(s).

Getting back your cyber accounts is time consuming. Sometimes you never get your cyber accounts back.

Cyber Security Close to Home

It is interesting that just I was writing this post a friend of mine called me to look at his site. The site looked OK. When I went to go into his back office for the site a warning that a phishing attack most likely has occurred. This was according to google. This was not a good result especially because this was a business site. Situations like my friend’s could end up with serious negative results.

Final Thoughts

Thus if you are dealing with email or websites remember to Stop, think, and then connect. Remember to use both website and password security measures all the time. Finally know where you are going on the web and who the emails are from you are opening. Even then you are vulnerable to outside attacks. It is because you have connected to the internet. Cyber security is everyone’s business.

Thankful Internet Security Thanksgiving 2016

Internet Security

Giving Thanks for Internet Security

This is Thanksgiving weekend for the United States. Everyone is talking about things to be thankful about. Giving thanks for Internet security is one. I just finished reading two articles from Wired magazine. One was on security and how it pertains to national security. The other was on Margaret Hamilton and what she did to promote the computer age.

It is interesting how the Snowden issue has put on edge the whole nation of United Stated. This includes many other countries too. As I have mentioned before the security of your information is your responsibility. Security does start at home. Just like we need to be aware of the physical security we also need to be aware of Internet Security. we can be thankful that there are many things that we can do as individuals.

Personal Security is Everyone’s Concern

We can be careful what data we give our on the Internet. The use of proper security software like antivirus programs and malware programs. The two that I use all the time are Superantivirus and Malwarebytes. I find them both reliable and they are both free for home use. Another thing to be thankful for.

Also,using double access security when available is the best practice. This will make it more difficult to get into your important secure data. Everything from google accounts to bank accounts offer this double security feature for better Internet Security.

We can also limit the use of the cloud and cloud like options. Also the vulnerability of even the Apple’s iCloud which came under threat by hackers. If you need to be portable then buy an external drive and carry it with you. It will be more secure. You are able to get a 1 TB at a reasonable price now a day. Yes you need to be aware of its presence all the time. I guess if you have a tendency of misplacing items then you need to way while would be more secure in your situation. Either way you will have a certain level of security.

The Birth of the Computer Age

The other thing that I am thankful for today is the research and work done by people like Margaret Hamilton. When equality is such an important concept today. It is great to see how women have added to software engineering. Margaret Hamilton helped put the Apollo space mission in the air. She contributed with enormous knowledge to computer systems. Those that controlled both the eagle and the lunar module of Apollo 11. It was her knowledge and understanding allowed the mission control to give the Go/Go. The lunar module then landed on the moon. There was concern because of the computer errors from the lunar module. The mission was a success due to the knowledge of the computer system by Margaret Hamilton.

She helped started the space age long before computers were much of a word in the business world. Definitely long before computers were a word for household use.

Early Computer Age

Computers during the beginning were punch card and hard wired entities. Margaret Hamilton started the use of the term software engineering. Back then it would sometimes take all night to compile and execute a program. We can be thankful for the ability to compile and execute new programs today in a fraction of that time. Enormous coders today spend a lot of time coding, compiling and executing programs. This is true for new and revised programs every day.

Being Thankful for What We Have

When a web page goes down in a major website like Amazon people get uptight. When this happens we need to be thankful. With unlimited amount of equipment and software that is available fixing issues is quick. It might seem like it takes a lot of time to repair such errors. If we were still in the infancy of the computer era we would not be able to access the downed website for much longer.

Security Reflections

So in this time of thankful reflection let us remember the following. We can be thankful for the security that we have. Especially for the Internet security that we can access. We need to be thankful for the skills that we can learn. You should then use them to make your data and personal information more secure. Also be sure to limit your personal data entries through the Internet. Creating the strongest passwords that you are able to do.

If you are having difficulty with doing this I suggest an application like LastPass. You only need to remember one password with LastPass. This application is web based. You are able to access it from anywhere on the web. The great thing about such an application is that it will create encrypted passwords for you. Also, the application will remember both username and password. This is for each entry that you provide it to keep safe for better Internet Security.

Final Thoughts

Finally be aware of where you are going on the Internet. If you have strange pop-ups happening get out of that site. If you have a redirect (where you think you are going and then another website pop-up in its place) get out of there to. Be aware of where your children are going on the Internet. They need your protection in cyberspace just like the do in the physical world. Often cyberspace can be a child’s real world in today’s society.

You will be thankful in the because you have taken this effort for cyber security today.

With this being one of the busiest shopping weekends. Taking these security measures are important. Especially if you are one who does a lot of online shopping.

Here is to having a cyber safe and happy long Thanksgiving weekend.

Children Need a Cyber Secure Environment

Cyber Security

Cyber Security for Your Children on The Web

Security on the web is every parents’ responsibility. Do you remember when your children were young. They might even have become just teenagers. Oh the thoughts that might have gone through your head. What about their safety on the Internet? Would they get onto a site that would give trouble to your system? What about sites that you would not approve of? Would they end up stocked some bad person? Remember cyber security begins with you.

A personal Experience

I remember those days when my children were at that age. It was difficult to get them to do any homework. They just wanted to surf the web and talk to their friends. I remember having to finally put on some strong blocks on our home network. This helped to get the homework completed. Oh my teenage children did not like that at all. They pleaded for removal of these blocks. I just could not because it was important to have them complete their school assignments.

A few years ago my sister and brother-in-law faced similar situation. They had decided to home-school on of their children. Everything was going good until it came time for assignment research completed. When their daughter started to do her research she found things like Facebook. Because these website were so easy to access the homework research was set aside and then not done at all. There was a lot of discussion about this issue. There were a lot of promises made. The trouble was that every time she went on the Internet there were the distractions. Again the school work and research was set aside for these much more fun activities. Finally they came to me for some suggestions.

Security Suggestions for Internet Control

What I suggested was to use their router and block these sites through their router. This would have been good if the sites were unacceptable. But to block the whole family was not acceptable. Other family members wanted to get on Facebook, YouTube and other OK sites. What could they do then.

Well there is an other alternative to blocking websites. You can use the hosts file found in the System32 file folder. All you do is go into the following path. You will find the file; c:\windows\system32\drivers\etc\ . It is in this folder that you will find the hosts file. You need to open it up in notepad on your computer. Right click on the file and choose ‘open with’. This will give you a menu option to choose from. Find notepad which you select and then click the OK button. Once you have it opened up you then go to the bottom of the file. The file is not long. At the bottom you will find the following. 127.0.0.1 localhost. What you do is the same. 127.0.0.1 www.yourwebsite.com . What this does is sends the website you do not wanted accessed to 127.0.0.1 instead of the URL of the website.

This method works great and only affects the machine that you are working on.

Those Unforeseen Family Circumstances

Well, you might say, I have smart children who will figure that something has changed. They will then go and change it back. There are other measures to take. For instance, you prevent children accessibility your network until the tasks have been completed. You can do this through a verbal agreement which is much better.

If that does not work. Then you can block the computer or device between certain hours of the day through your home router. Complete this task through the parental controls in the router. You would have to access your router through 192.168.0.1. This is usually the standard URL for a personal router. Then you would log on with your admin username and password. In the parental control section you would be able to block certain websites. You would just enter their web URL address. You should be able to do the same type of blocking though a keyword section. I have a cable modem/router from my cable provider and I am able to do what I have described above.

Conclusion of The Matter

This does seem like a lot of work. It also might seem daunting to someone who is not so technical in minded. But for the security of your family it is important to be able to do if needed. Once the security has been set it will stay the way you set it until you change it. Go ahead and check out some of the security measures mentioned here. This way you will be a bit more familiar with where they are and how they work if you ever need to put such measures in place. Remember stop, think and then connect. Teach this to your family for more improved website and Internet cyber security at home.

Safe Browsing With a Safe Browser

Secure browsers

More to Surfing the Web than Secure Browsers

Well, when you are on the internet what should you be looking for in a browser? This is a good question. So, I did some looking to find up to date information for today. What I found was both interesting and eye opening. Secure browsers are not all the same.

First, you should always remember that no browser is totally safe. Also, no matter how safe the browser claims to be it is up to the user to also use discretion. Going to web sites that are not safe will not be a good idea.

If you search with a search engine like google it is great that it will tell you what sites it considers to be safe with a green check mark beside the link. This is helpful but you in the end still make the choice.

Today’s Browsers

The information that I found are quite interesting I think. Chrome came out as the most secure. Firefox has the best privacy.   Opera was very good in the security area and good in the privacy area. Edge was good in the security area and okay in the privacy areas. Safari was good in the security area and okay in the privacy area. Apple was considered a very secure environment at this time. IE was the worst in security and okay in the privacy area. The information that was read stated that it was a good idea not to use IE at all.

Other Secure Browsers

These browsers are the most familiar to the general users. There are others that have been considered secure browsers for some time now. They include Epic Privacy Browser, Comodo Dragon/Ice Dragon, Tor, Dooble, Maxthon Cloud Browser, HTTPS Everywhere, Cocoon Browsing, iceBrowser (Cocoon), and Avira Scout. I have used Comodo Dragon and Avira Scout. The other browsers I am unfamiliar with. I found that Comodo Dragon was a great browser. Using the browser was simple and straight forward. Avira Scout did not perform well for me. I have an older computer running Windows 10. I do not know if that was the issue but Avira Scout continued to freeze up on me. It froze to the point that I would have to close it through the task manager or even completely shut down my computer.

Conclusion

There you have it. There is good amount of information here. You can always go to the links to get more information on web browsing.

What is a good rule of thumb is to Stop, Think, and then Connect when you are planning to go on the internet? Cyber security begins with you. By Stop, Think, Connect response you create your own level of cyber security. Also, this response adds to the rest of people who are on the internet. One creates a little cyber security and each people who responds in this way adds to the cyber security. Before you know it, there is a lot of cyber security. Let us all do our part in making the internet safe for all.