Thursday, January 31, 2013

New Router Vulnerability Surfaces

Router Vulnerability Leaves Many Unprotected


Yesterday the US Department of Homeland Security’s “Computer Emergency Readiness Team” issued a statement stating that a feature available on almost every router had been discovered to have a security vulnerability. But don’t worry just yet. While the vulnerability is widespread, it is not particularly serious, and this particular feature has been known to be problematic for a while.


In order to turn it off, the easiest way is to consult your router’s manual. If you don’t have this, log into your router’s admin page first. To find out where this is, hold the Windows key between the Alt and Ctrl keys, then tap the r key. Type “cmd” and hit enter. Type “ipconfig” and hit enter. After the text “Default Gateway” there will be a string of numbers and periods. Type these into your browser’s address bar and hit enter. Use the username and password provided by your internet service provider to login. Every router is different, but when you find a toggle for “UPnP” or “Universal Plug & Play,” turn it off.

So what does this service actually do? Does disabling it hurt anything? The answer is almost assuredly no. UPnP is actually concerned with controlling devices over the internet, so unless you regularly use your physical devices like printers or scanners from over the internet, there’s no way turning this off will hurt. In fact, it might already be disabled simply because it’s had problems in the past. Disabling UPnP can’t hurt anything.

Vulnerabilities like this have existed for a while, and many more certainly exist that people are not aware of. That’s one of the reasons why becoming aware of a virus does not necessarily mean that it has recently entered the world. Many people may have had viruses that entered through a vulnerability and even had computer repair to have them removed before the actual vulnerability is found. So don’t worry when you see alarmist warnings about new viruses – mostly they just want to catch your attention.

To make sure you stay protected from these threats in the future, just remember the basic rule of internet surfing (as well as real surfing) be careful! Most of these vulnerabilities will only cause problems if you let something in in the first place. Make sure to stay updated with your current virus protection software like Microsoft Security Essentials and to call computer repair before things escalate!

Wednesday, January 30, 2013

Nerds On Call Reviews Blackberry 10

Nerds On Call Reviews BlackBerry 10: Back from the brink?


The BlackBerry used to be the undisputed queen of mobile computing. In the days when "smartphone" wasn't even in the culture's lexicon, a little company named Research in Motion developed the BlackBerry, a device which could manage your email on a phone, unheard of in 2003. The company has gone through many iterations of their software and their edge has been lost in recent years with the arrival of the iPhone and Android options. The company, however, has refused to sink. In a highly-anticipated press conference, they announced their new line of phones and new BlackBerry OS, which promises to be redesigned from the ground up. They also announced their name change from Research in Motion to simply "BlackBerry." So is it enough to bring the floundering company back from the brink? Possibly.


Possibly the best and certainly the most innovative feature in BlackBerry 10 is the keyboard. It scans through your emails and messages and generates a list of most-commonly used words and sentence structures. That way when you type, the word that you are most likely to type next appears above the next letter you'd have to type to spell the word. It's a good replacement for touch-typing, as the majority of smartphone users have had to resort to hunting and pecking on virtual keyboards.

The new Operating System also includes many other features: an iPhone-like voice recognition package, a camera that lets you choose pictures from before you took them, an improved app and content store, and built-in Flash support. Add to this the usual host of phone improvements and you get a pretty solid phone. Only time and software updates will tell if the new phones will be able to reclaim some of BlackBerry's territory in the smartphone market, but it looks to be a promising challenger. For the tech enthusiast or the businessperson who's looking to use a more "serious" phone than some of the options offered by iPhone or Android, it's a great choice.

Friday, January 25, 2013

Claim Parental Tablet Control Before It's Too Late

Parental Tablet Control: What you need to know


If the family computer has been getting a lot of miles on it lately - perhaps you have one or more youngster in the house clamoring for screen time - you may be in the market for a second PC to share the load.  Some parents may consider a tablet PC because of its cheaper price tag, but handing an un-monitored internet-connected device to your child has risks.  Luckily, there are parental controls you can easily activate to protect your child from the wild west of the internet.

Restrict the YouTube App: Even watching their favorite Muppets song on YouTube can be dangerous.  From the "suggestions" of additional content to explore, to the profanity that pops up in user comments, there's stuff there that you just don't want young ones to see.  Also, you obviously don't want your kids to simply search YouTube and watch whatever results from their search.  That's where Safety Mode comes in.  Activate it by toggling "Safety: On" at the bottom of the YouTube screen – log in to lock it in this mode.  Not only is content restricted, but comments under videos are screened and restricted for profanity, allowing for a safer YouTube surfing experience for your kids.


Note: if you disable Safari but don’t disable the ability to install apps, your child can simply install an alternate browser such as Chrome to gain unhindered access to the internet.

The bad news is that there's no option to establish specific user profiles, so if you put restrictions in place for your toddler, then want to use the device for yourself, you'll need to remove the limitations every time.  This means you have to remember to turn them back on before you set the iPad down.  As any busy parent can attest, this is a sure path to failed parental control.

Also, I've found that if you restrict applications to 4+ (for example), some applications are completely unavailable, like Netflix, which you may want to allow.

Kindle Fire users with small children should consider FreeTime Unlimited, a subscription service available for $5/month ($3 for Amazon Prime members).  Kids have unlimited access to age-appropriate content such as books, games, movies and TV shows from Disney, Sesame Street, PBS Kids and Nickelodeon.  You can establish screen time limits, even for specific activities.  For example, you can allow unlimited reading time, but limit game play to 30 minutes a day.

Individual profiles for each user allow you to personalize access by who is logged in. This is a definite advantage if you’re planning to share the tablet between family members.  Not only will it mean that your 3-year-old's games aren't clogging up your screen when you log into your profile, it lets adults access age restricted functions without having to disable parental controls.

Barnes and Noble's Nook has integrated parental controls right out of the box.  It supports up to six user profiles and each can be customized for web access limitations and in-app purchasing with separate viewing libraries for each user.  When you set up a profile for a child (enter their age in their profile), by default the store is open but is limited to kid-friendly apps and requires a password before purchase.  You can change this in the settings if you want stricter controls.

Set your own surfing standards with K9 Web Protection (www.k9webprotection.com, free, available for iOS and Android).  It’s a child friendly browser that categorizes webpage content, allowing parents to block specific inappropriate material such as pornography, violence, drugs and gambling while protecting against phishing and malware.  It has enhanced anti-tampering guards and reports to monitor web activities.  You can even set time restrictions, so you can block web access when homework is supposed to be done.

The great thing about a tablet is that you can easily put it away when it’s time to disconnect.  Your best parental control is you!

 

 

Thursday, January 24, 2013

Facebook Graph Search Begins Testing

Facebook Graph Search: A new era of search?


Facebook has its sleeves rolled up and it’s off to work on something new. Don’t worry though; this change won’t come in the form of yet another visual redesign of the site. It’s something much more subtle, and with luck much more significant. Mark Zuckerberg, the founder of Facebook, hopes that this new project will one day even compete with Google.

The new project is called graph search. It “is designed to take a precise query and return to you the answer, not links to other places where you might get the answer,” according to Zuckerberg. Facebook hopes that graph search will be able to aggregate all the information that the community compiles on local results, such as restaurants, and do recommend a location based on user content.


The tool will be rolling out to a limited number of people at first before becoming more widely available, a strategy which Facebook has implemented consistently. Once the focus testing has completed, it will become available for all users. It’s already been an internal project for more than a year.

So what does this mean for you? Well for one, it doesn’t mean that you need to review your security settings. Almost everything will be staying the same…for now. No new information will be available to anyone else. The only real change here is that your photos are a little less private. However, it’s only if someone uploads a picture of you that you don’t want up. It’s a little harder to get rid of it with graph search, but you still have the option to untag yourself or ask the uploader to remove it. Facebook is really trying to stay on their users’ good side following their numerous security scandals.

As for the future though, it means that we could see Facebook start to branch out into more unique services. Facebook and Google have always had a certain level of rivalry, but as time goes on that rivalry could get more intense as they start to impose on the same market. While it’s speculation at the moment, Facebook will probably sell your data to advertisers as time goes on. It’s simply how they make money. None of it will be connected specifically to you as a person, but it will be out there. Remember the maxim: if you’re not paying for it; you’re the product.

Tuesday, January 22, 2013

CES 2013 Part 2

NERDS ON CALL: CES 2013 Part II




There were many exciting product announcements and prototypes demoed at this year’s Consumer Electronics Show, but few so plentiful as next generation gaming innovations.  Whether you dedicate a large part of your free time video game playing or are simply intrigued by the potential uses of virtual reality in the future of computing, CES 2013 didn’t disappoint.

Nvidia, known primarily as a manufacturer of graphics cards and chipsets, announced that they’re joining the likes of Nintendo DS and Playstation PSP with the Nvidia Shield.  “Project Shield” is a handheld gaming device that resembles an Xbox controller with a flip-up screen.  The quad-core portable gaming system runs an Android open platform OS that Nvidia hopes will encourage game developers to create new content inspired to take advantage of the device’s advanced graphics capabilities.

You’ll be able to play Android games or if you have a compatible Nvidia GTX graphics card in your PC, you can stream games over WiFi.  This enables users to continue a game on the couch or in bed that you normally would have been tied to your computer to play.

The ability to play full fledged PC games on a handheld unit is exciting, but you’re still limited by the fact that you must be within WiFi range of the computer running the game.  Not so with the Razer Edge Gaming Tablet.  Available this February, this Windows 8 tablet has a processor and graphics chip capable of rendering current generation PC game graphics never before accessible on a tablet.  This means that you can play full-graphic PC games on the device, even when you’re offline.

An optional snap-on Game Pad Controller case adds side controllers to access controls with your thumbs while holding the tablet like a steering wheel.  For more traditional functionality, a mouse and keyboard are available.  The main drawback is price: the basic version will start at $999, significantly more than your average tablet.

For those who already own a tablet but lament the lack of on-board graphics processing, Nvidia had another exciting announcement.  Its cloud gaming project, Nvidia Grid, will be made available to gaming manufactures to license and will allow supported games to be played on Nvidia’s server, not the user’s device.  This means that gamers will be able to play high resolution games on a multitude of devices by streaming over the internet, even devices that don’t have a graphics chip capable of playing the game otherwise.

Nvidia Grid will render graphics in the cloud.  Imagine playing World of Warcraft on a tablet, for example, even one with a slower processor and/or weak graphics processing ability.  Your gaming will be limited only by the stability of your internet connection and the resolution of your screen.

Finally, the Oculus Rift virtual reality headset lets you feel as though you are stepping inside your video game.  It straps to your head like a black box over your eyes and then uses a multitude of sensors to measure how your head is moving in three dimensions.  That motion is translated to how your character moves in 3D space, allowing you to feel like you’re in the game.

While only a prototype was available at CES, it will ship to software developers in March so that they can create content for it.  No hint as to when will it hit shelves or how much it will cost, but truly effective virtual reality carries a wealth of other technological possibilities.  From improving the computing abilities of the mobility impaired, to allowing for mechanics, surgeons, or a multitude of professionals to work remotely, virtual reality is sure to change how we interact with our gadgets in the years to come.

[nerdsbio]

Saturday, January 19, 2013

Bits Vs Bytes Explained

Bits vs Bytes: What's the Difference?




If you’ve ever shopped for internet packages or tried to buy storage, you’ve run into the bit/byte issue before – and you may not even have known it. It’s a concept that everyone who uses computer should at least familiarize themselves with. After all, it’s like not knowing the difference between kilometers and miles!

When computer speed or storage is measured, it’s done using two units and their derivatives. The first unit is the bit, and the second is the byte.


This means that when you see an advertisement for internet service at a rate of 1 Mb/s down, it’s not quite what it seems. The K, M, G, or T before indicates kilo, mega, giga, or terra. Those are Latin prefixes for thousand, million, billion, or trillion, respectively. So here’s the math for a megabit: a megabit is actually 1,048,576 bits, which is 2 to the power of 20. Bit notation uses SI, which is based on factors of 2, instead of 10, like our normal system of counting does. What this ends up meaning is that the internet service can only provide a paltry 0.125 megabytes per second, which is an eighth of what it looks like it’s advertising.

You may have noticed that your hard drive, which you bought because it advertised 500GB of storage, is reading a different number under system properties. Because of the way storage is calculated, a 500GB hard drive actually has 536,870,912,000 Bytes, or 512,000 megabytes. Then some of that storage is taken for the drive’s internal functions.

Anyway, to cut a nerdy rant short, companies will sometimes try and rely on the fact that you don’t know these differences in order to sell you a sub-par service. To be fair, it’s not an easy subject to wrap your head around but if you keep in mind that a small b means 1/8th speed, you can navigate your way around some of the issues that will come up.

Friday, January 18, 2013

Curtail Teen Computer Use

Teen Computer Use: Understanding and Managing




Clearly, many teens and tweens spend a lot of time in front of their computers and texting on cell phones -- and much of that time is spent social networking. But is it that all bad? Surveys show the answer to that question is… no.

Common Sense Media in a recent study found that in over 1000 teens, 13 to 17 had a pretty healthy perspective on social media.  “Teens are aware of the dangers of excessive usage and the online potential of cruelty. However, most young adults say social media and technology positively affects their social and mental well-being. Social media helps teens communicate easily with friends. Surveyed teens also believe social networks help them to be more outgoing, confident and less depressed."


Set limits on Overall Screen time:  I think that it’s important to set family limits on overall screen and electronics time. I have found that many parents forget about the handheld gadgets when thinking of “screen time,” limiting TV or computer time but not cell or iPad use, for example. As parents it’s our job to help our kids set healthy habits for electronics use and that starts by establishing when it’s acceptable to use electronics, regardless of how many email accounts, social media profiles, video games or chat groups they participate in. I think that your teen can decide what they want to use their “connected time” for (within reason, of course) and the number of electronic activities they participate in shouldn’t increase overall daily time limitations.

If, for example, the house rule is no more than two hours a day spent with leisure electronics activities, your teen’s choice to spend those two hours playing Wii is theirs to make – it just means they won’t have time to update their Facebook status about it. Some parents have found success with a system to earn additional screen time through chore completion, reading or physical activities which would allow a kid that got carried away and used up their time to “buy” a few extra minutes.

Clear Choices, not just “House Rules:” It’s important that teenagers be given the reasons behind your choices, not just arbitrary rules. Reducing distractions to improve school work and allow family together time are great reasons to limit overall electronics use.

 

Be Specific:  Make your family rules device-specific and control the device so you don’t have to spend as much energy policing behavior. “No texting when doing homework” will be easier to enforce if you make it a habit to collect cell phones and internet-connected devices when everyone walks in the door. Once homework is done, phones can be handed back under the parameters you are comfortable with. Everyone puts their electronics away and the TV turns off at meal times and for the last hour before bed, for example.

As for the in between homework done and dinner time, or on the weekend when there’s no homework to do? It’s ok to have different limits on different days, so long as you’re consistent. If you make usage rules on the fly you’re going to get push-back every time you try to get your kid to disconnect.

Set the Example:  Set family rules that even the adults abide by. If you say “no phones at dinner,” but then pick up yours to check a text it sends the wrong message. Use your own challenges to highlight why you are using tools like parental controls to help them stay focused. Did you lose an hour trolling Pinterest when you should have been working? Admit to your lapses and let them know that you’re working to reduce tech distractions in your day as well.

Control if Necessary:  Parental control software like Netnanny allows you to limit access to specific sites by setting time restrictions, both to limit when the sites can be accessed (say, only 5-6pm and 7-8pm) and setting a total limit on computer time for each child. It can be challenging to limit distractions when kids are using the computer for their homework. These types of tools work in conjunction with parental oversight to keep your kids on track and focused on their studies.

I also really like the Mikko Que (http://www.insightmediaintl.com/) as it allows parents to set personal limits on all devices (TV, gaming consoles, etc). When the time’s up, Mikko will physically disable the device so your kids can’t argue or cheat their way around your limits.

Thursday, January 17, 2013

Selling or Donating Old Computers: How To

What's the Best way to Go About Selling or Donating Old Computers?




Once you’ve set up that brand new shiny PC or laptop, it’s time to ditch the old clunker taking up coveted space under your desk. Before you sell or donate your old PC, however,ensure that the information you stored on it doesn’t fall into the wrong hands.

Back Up Your Data. First, make sure you get everything you need off your old system because the rest of this process is irreversible.  Don’t count on your memory of what files are important - take a complete disk image of your computer to capture everything from data to bookmarks and application settings.


Mac users should consider SuperDuper (http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html).  Basic features are free, including easy instructions and complete cloning of your hard drive.  Advanced features such as scheduled automatic backups and software updates are available for around $30.

Since you’re taking the time to backup your data, it may be worth considering transferring your files to a cloud application such as Carbonite or Mozy.  Carbonite includes software to automate transfer to your new PC and data storage is unlimited (www.carbonite.com, HomePlus Plan is $99/yr).  For more information on cloud backup, see my previous article on the subject.

Deauthorize All DRM'ed Software.  When you make digital purchases online, most of them come with digital rights management (DRM) that limits their use to only a few devices.  ITunes, for example, limits files to five devices and they add up quickly.  For iTunes specifically, sign into your account and navigate to the iTunes store.  Click on Manage Devices and remove your old PC from the list.  Don't forget to check other accounts that you have DRM'ed materials with, such as Adobe Creative Suites and Amazon Kindle.

Securely Reformat the Hard Drive.  Simply reformatting your hard drive doesn’t remove the data on it, just hides it from view and removes it from your system’s index.  A dedicated party can restore data from a formatted drive using recovery software.  To securely delete your data, use a program that actually writes over the area of the disk where the file was stored (sometimes with multiple passes to be super safe).

Mac makes it simple in OS X.  Use the Disk Utility found via the Tools menu.  Choose Erase and Security Options, electing the more "secure" version.  Windows users can use Darik's Boot and Nuke (www.dban.org/, free) to reformat.

Re-Install the Operating System (OS).  After you've reformatted your hard drive, your computer is essentially a blank slate.  As a courtesy to your buyer, reinstall the OS.  Hopefully, you hung on to all those system discs that came with your computer when you purchased it.

Windows will automatically boot from the disc once you power back on, but Mac users will need to hold down the Option key to start the process.  A word of caution: if you don't have your install discs, don't be tempted to install something you don't have a license for.  How far you go into the install process is up to you, but the easiest method is to just power off when prompts you to create a user account and leave that set up for the new owner.

Finally, if you’re planning to sell it give it a thorough cleaning with a Mr. Clean Magic Eraser and some compressed air.  The nicer it looks, the better your chance to get top dollar.

Wednesday, January 16, 2013

Pay by Phone: Next big thing?

Take the Next Step and Pay by Phone?




If you’ve noticed offers at your gas station or grocery store to “pay with your phone,” you’ve seen what many claim is the future of how we’ll pay for goods and services: Near Field Communication, or NFC.  Whether you relish the idea of ditching your wallet in favor of swiping your phone everywhere you go or you shudder at the thought of losing a phone laden with all your credit card info, NFC is likely to gain in popularity in years to come.

Bluetooth and Wi-Fi are familiar forms of electronic communications that allow devices to transfer information back and forth.  They operate on radio transmissions and are designed to accommodate distance between devices.  Near Field Communication, on the other hand, utilizes electromagnetic radio fields which require the communication partners to be in close proximity - typically less than 4 inches apart.


Proponents point out the multitude of benefits beyond just a way to pay without pulling out your credit card.  If you’ve seen the commercials for the Samsung Galaxy S III where data is transferred from one phone to the other by tapping them together, you’ve witnessed integrated NFC in action.  Syncing data with other devices or transferring files is quicker and easier using NFC than via Wi-Fi or Bluetooth.

While many focus on the “mobile wallet” aspect of the technology (i.e., using your phone in place of a credit card to pay for goods or services), it can also be used to store public transportation passes and/or concert tickets, loyalty cards, even allow you to ditch key cards in favor of swiping your phone to access your office building, hotel room or parking lot.

The ease of using your phone for everything you previously had to dig out a plastic card for is appealing; however many are concerned about the security risks of having all this stored on such an easy-to-lose gadget.  I certainly envision someone snatching my phone for an afternoon shopping spree before I notice it missing.  Yet in truth, with how often I use my smartphone throughout the day, I’d be more likely to notice my phone missing than one of my credit cards.

Is it wise to consolidate access to every aspect of your life (bank accounts and credit cards, data, access to your home, car or office, etc) on your phone?  Proponents argue that it’s more secure than losing your wallet or purse due to the quick and easy ability to disable the device remotely (which is certainly faster than calling all your credit card companies if you lose your wallet).  NFC often establishes a secure channel and utilizes encryption when sending sensitive data like credit card numbers.  In conjunction with the required close proximity, there’s little risk that your data could be hacked by a passerby.

Should you get started with a service like Google Wallet (www.google.com/wallet) to store credit cards, loyalty cards and special offers on your mobile devices?  Maybe.  I like the idea of never again having to dig out my PetSmart card to get money off dog food, but to be truly useful more retailers need to upgrade their equipment to support NFC.  This means I’d have to carry phone and wallet to accommodate a day of errands.  However, if enough of the merchants you frequent support it, it may be worth looking into – provided you implement the mobile device security measures I highlighted last week.

Java Virus Vulnerability Discovered

NERDS ON CALL: JAVA VIRUS Not an Urban Myth but a True Threat




You may have experienced this situation before: out of nowhere, a friend messages you on Facebook or via email with a link. You instinctively click on it, and sometimes as you’re clicking on it, sometimes later, you realize it’s probably a virus. In those split seconds while you’re scrambling to close the browser window, tiny lines of code are working away inside your computer through “holes” in its programming. They’re trying to gain access through a “backdoor exploit” and reprogram your computer for their creator’s own intents. These backdoor exploits are not created on purpose – they are just human oversight among millions and millions of lines of code that has to be checked by hand.


The viruses which have been shown to spread via these backdoors are mostly variants of the Renekton virus. The Renekton virus is a program that enters via a vulnerability (more commonly known as the “FBI Scam) and then locks the user’s computer, claiming that the U.S. Department of Justice has blocked the computer on the grounds of some criminal charge, and that the user must pay a fee via prepaid card to view their computer’s contents again.  The money is transferred via the card and disappears into the hacker’s pockets. A computer repair expert would be able to fix the problem, but many are intimidated by the threats.

What to do?  You need to disable Java in your browser and don’t click on any suspicious links.  Especially until this vulnerability is fixed, make sure all your antivirus and anti-malware programs are current and scan regularly for viruses. Don’t click on any shady links.

In order to disable Java, go to your start menu, then the control panel. Open the Java application there and go to its security tab. Un-check the box entitled “Enable Java Content in the Browser.”

You should also run a virus scan just to be sure. This particular Java issue is usually picked up by Malwarebytes as a “Trojan” and can be removed if it hasn’t been activated yet. If you’ve already been infected by this scam you will need to call computer repair professional before it can do more damage.

 

 

Tuesday, January 15, 2013

Health Websites to Keep you to your Resolution

Trying to Keep your Resolution? Try these Health Websites




Now that 2012 is nearing its close (and we all made it through that “end-of-days” Mayan calendar thing), the dawning of 2013 heralds a new opportunity to make those life changes you shelved over the busy holiday season.  Over the next few weeks, we’ll explore ways your computer or mobile device can help you keep this year’s resolutions, from eating better to learning a new skill.

One of the most common resolutions year after year is to eat better.  Whether it’s to lose weight or simply be healthier, the temptation to fall off the wagon assaults you every time you grab a bite.  This year, use your computer or mobile handheld device to help you stay on track.


Sparkpeople (http://www.sparkpeople.com/) is a great wellness resource, offering tools and information to help you make healthy lifestyle changes in diet and fitness as well as offering articles on skin care, mental health, and more.  Membership is free and allows you to use their online food and fitness trackers, create personalized meal plans, and access expert advice via articles and message boards.  Meal programs are customizable, allowing you to tailor suggestions to your health goals, such as “low sodium” or “high protein.”

The site offers motivational tips when you login as well as “challenges” that you can accept with other users (such as skipping fast food for a week).  You can even set up a meal plan using the database of recipes and printable shopping lists.  Their statistics boast that it’s the “#1 Health Website,” with the highest average amount of time spent by users on the site - visiting various pages to enter data, gather information and get guidance.

Most diet and nutrition experts will tell you that a key factor in improving your eating habits is to maintain a food journal, detailing what you eat and tracking calories ingested.  A study published in the August 2008 edition of the American Journal of Preventative Medicine found that dieters who kept a food diary lost about twice as much weight as those who did not.

Yet maintaining a hand-written journal can get tedious – writing notes, looking up food values in a book, tallying up your day’s calories.  This leads many to ditch the practice before they gain the true benefit: becoming aware of the food they eat and how much they’re truly consuming.

Sparkpeople’s online food journal makes it easy.   Its food database is extensive and easily searchable, allowing you to quickly and easily log your intake.

However, if you find Sparkpeople’s  social aspect and motivational tidbits more annoying than helpful, Fitday (www.fitday.com) is a great basic, free online diet journal and calorie tracking tool.  Just about any food (even brand name or prepared meal items) is included in their database, allowing you to add items with a few clicks.  Create a free account to start your personalized log.  Enter a keyword such as oatmeal and select the specific oatmeal product and amount (easy drop-down options) to add it to your daily intake log.

With both sites, calories are automatically calculated and tallied for you.  You’re prompted to log your daily activity in order to compare calories ingested with calories expended.  The selection of available activities is more extensive at Fitday than Sparkpeople, but the food database is harder to navigate.  For example, that “oatmeal” keyword entry on Fitday gives you twelve pages of results in which you have to locate the specific oatmeal you’re looking for.  However, it gets faster once you enter some of your favorite foods, get familiar with its categorization and learn how to effectively search.

The Fitday site is simple and sleek, making it easy to use but not necessarily compelling.  It’s a tool, pure and simple.  For those seeking information and support as well as a tool to track diet and exercise, Sparkpeople is a great option.

Finally, if you are looking for a more tailored diet program, keep in mind that the most well-known names in dieting now maintain extensive web-based resources.  You can join Weight Watchers, NutriSystem or South Beach online (fees vary) to gain access to the programs you’d normally have to sign up for in person.

 

Image from Vanier College. Some rights reserved

Monday, January 14, 2013

Great Pinterest Style Boards to Inspire You

Pinterest Style Boards for Inspiration




Pinterest is all about what impassions you. That makes picking a few top boards about style incredibly tricky. Here are some beautiful choices that offer a glimpse into some very stylish people’s lives and loves.

Polyvore: For anyone who has ever stood in a clothing store pondering an adorable top and wondering what to pair it with, or anyone who’s played a similar game in their own closet, Polyvore is for you. Like a virtual Barbie, the associated website lets you mix and match pieces to create a style collage that you can pin to your own wall. Their Pinterest page hosts 35 boards with over 3,400 pins of celebrity style, accessories, home décor, hair, nails, and, of course, outfits upon glorious outfits. I see more Polyvore virtual outfits on my friends’ boards than any other fashion related pins due to the ability to create completely custom ensembles and see how each piece works together from head to toe. Want to wear it in the real world? Polyvore tells you where you can buy what’s posted on their site, or you can post images of things you find to their “ask” board so other members can help you track items down.


Making It Lovely: The name alone speaks to me. Whether it’s your home, office, wardrobe, or any other aspect of your life, who wouldn’t want to make it lovely? Nicole Balch, the board’s creator, hosts a website dedicated to tracking the progress of transforming her home from, as she says, "so-so" to lovely. Her Pinterest boards also share her personal style picks, so you can dress your home, yourself, and your family. Her images share a plush yet do-able motif that’s unique and somewhat mod, without feeling over the top. Bright colors marry simple, clean lines and designs that often nod to the 50s and 60s – what I can best describe as “trendy-chic”.  There are even boards devoted to the ideas she finds appealing, from inspirational sayings to an eclectic book club. If you connect with her style, you’ll find a wealth of gorgeous images to make it your own.

The Beauty Department: Focusing on hair, makeup and nails, The Beauty Department gives you tutorials to create just about any “look,” from ethereal to bright and glittery.  The style tips on their boards, as well as their originating website will help you create the perfect look for a day at the office or a night on the town. Bonus for fans of Lauren Conrad’s style and beauty books: many of the DIY videos showcase her walking you through the process of putting on individual fake eyelashes or creating the perfect bun.

Merche Grosso: If your taste runs more Euro-modern, you may just fall in love with the images pinned by Madrid-based textile and graphic designer Merche Degrosso. You certainly won’t be alone – she has over 874,000 Pinterest fans following her eclectic posts. With over 7,000 pins ranging from apparel to home design, cute animals to food, you’re sure to find something that strikes your fancy. Even if you aren’t attracted by her art, she has compiled a board called “Most Followed Pinterest Users” detailing over 50 of the most followed pinners in art, design, health, travel, and more. Save yourself some time tracking down the Pinterest trendsetters – they’re here!

Glitter Guide: Those of us who believe that all that glitters is not gold, but that everything that sparkles is sensational, can’t help but peruse the collection from Glitter Guide.  A few moments spent awash in some of the over 6,000 pins reveals that while there are certainly odes to shine and twinkle, be it glittery glamour, fashion, nails, or décor, the boards are, in essence, a collection of things that bring sparkle to life. From their affiliated website: “We believe a smile is a woman’s best accessory, that sequins are appropriate no matter what the occasion and that some days simply require a glass of champagne. We hope to encourage your creative energy and add “sparkle” to your day!” I love the DIY gems that share adorable ways to add some pizzazz to your home or attire. But who am I kidding? Come for the glitter, stay for the style.

 

 

Sunday, January 13, 2013

Nerdy Women You Should Know

Top 5 Nerdy Women Today




Most people think of goofy looking guys in horn rimmed glasses when they think of geeks, bloggers, or businesspeople, like the quintessential geek, Bill Gates.  These stereotypes completely embody a “nerd” persona in our mind’s eye, but rarely you think of a computer-savvy successful person as feminine – but that is about to change! The powerful and talented women who make up the list below are in no particular order, because geeks don’t have to be better than each other when they’re better than everyone else!

EBay Maven:  Marsha Collier is well-known for building a career off a website – something only a geek would do. In the early days of eBay, she became one of the site’s most well-known sellers. She used the money she made from her efforts to put her daughter through school as well as college. She’s written a number of books on her success and how to replicate it. For those interested in making a career out of eBaying, you might want to check out her “Starting an eBay Business for Dummies.” Recently, she’s become active online, and has been ranked as one of Forbes’ Top 50 Social Media Influencers, is listed on the top 12 Twitter accounts to follow in 2012, as well as on the 100 Most Powerful Women on Twitter.


Actress by day, Blogger by night:   No list of female techies and geeks would be complete without Felicia Day. While she did not build her career around the culture, she has certainly used her fame to push computer-lover interests. She started as an actress, and has since branched into blogging at feliciaday.com/blog, tweeting @feliciaday, and promoting the acceptance of women within the traditionally male-dominated internet and techie culture.

Reporter, Tech Expert:  Maegan Carberry first rose to prominence as a reporter and columnist for the Chicago Tribune, then becoming Chief of Staff for the Huffington Post, a major news organization. She has been heavily involved with Rock the Vote, which aims to use modern technology and tools to help promote social activism in a younger population. She has a large following on Twitter, where she continues to promote political activism and social media use in an evolving technological world. She currently serves as “viral curator” for Upworthy, a position which requires her to stay ahead of the game of the internet and to be a progressive face of technology. Her cat also tweets! @KittyScarlettO

Social Buzz:  Shelly Kramer has been consistently listed as one of the most influential entrepreneurs in the field of social media. She’s had mentions on Forbes as well as other well-known publications for being such a driving force. She has worked in marketing for more than twenty years and is the founder of V3 Integrated Marketing as well as Kramer & Co. She describes herself as the “Chief Imagination Officer,” because as she says on her corporate bio “if you can or want to imagine something incredibly happening with regard to your business, she’s the one you want to rely on to make it happen.”

Fictional, but noteworthy:  Despite being fictional, Liz Lemon is one of our heroes for geeky women in the workplace. She’s smart, funny, and can’t get enough Star Wars references in her life. She’s a hero for women trying to make their way in the business world all over America. And her real-life counterpart, Tina Fey, is just as adept as her character. Always staying true to her geeky upbringing, she’s established a name for herself as one of the funniest people in the entertainment business, and has won multiple Emmy Awards, Golden Globe Awards, and a multitude of other accolades. In addition, she’ll be hosting the Golden Globes this year with her friend Amy Poehler .

That’s just a few of the female nerdy bloggers, businesswomen, and entrepreneurs who have made it big by embracing their own uniqueness. Don’t be afraid to be labeled as a geek or a nerd! Great things come out of being exactly who you are!

 

Image from 30 Rock on NBC

Saturday, January 12, 2013

Daily Dose of Funny Websites

Funny Websites to Brighten your Day




When I was working in an office, the latest joke email circulating was always there to give me a chuckle and brighten my day.  Nowadays, my LOLs come from many places and social media makes it easier to share the laughs with friends and family.  There are lots of online sources for a daily dose of smiles.  A word of caution: while I attempted to find as-clean-as-possible recommendations, racier videos and pictures cropped up everywhere I looked.  There are plenty of alternatives if one doesn’t suit you, but clicker beware!

If you ever think, "it's funny because it's true," one of the best laugh-out-loud websites I've found is Some E-Cards (www.someecards.com).  Whether you're looking for a birthday card that says exactly how you feel, or just crave a little sarcasm, look no further.  Click "share" to post to a friend's Facebook wall or Twitter feed.  If you find yourself really LOLing, you can have images placed on coffee mugs, tee-shirts and tote bags.  Very similar to Some E-Cards and also easily sharable is Lolsotrue (www.lolsotrue.com).  Example: "I'm glad my pets can't talk. They know too much."  And speaking of sarcasm, I love the little messages people are leaving for each other at Passive-Aggressive Notes (www.passiveaggressivenotes.com).  Heck, they say it themselves: "many of the notes on this site are not passive-aggressive. Many of them are just plain aggressive" - in a funny sort of way.


Animal lovers should check out an old favorite Lolcats for funny animal pictures and videos, mostly for cat lovers, and those craving a daily dose of cuteness.  Another I've recently discovered is Dog Shaming (www.dog-shaming.com) - a must-see if you've ever had a "bad dog" in your life.  Users post pictures of their puppies, looking pathetic, with a sign in front of them telling what dirty deed they did that day.  My favorite so far: "we are the reason Mommy and Daddy can't have nice things."  Yes, that about covers it.

Since America's Funniest Home Videos first aired, people have been obsessed with funny videos of our human foibles.  We are human, after all.  Break (www.break.com) aims to connect you with as many videos and pictures as possible, with new submissions daily.  Several of their collections are snippets of funny videos under a subject heading like "funny things kids say," or "your pet is sort of a jerk."  Want more video fun? More can be found at VideoBash (www.videobash.com/videos/funny).

Most of us have worked in the customer service industry at one time or another, enough to know "the customer is always right," right?  Not necessarily.  Not Always Right (www.notalwaysright.com) strives to share those funny and sometimes crazy stories we all experience at work.  Make sure to check out the Hall of Fame favorite: Pepperoni Pizza With a Side of Pointless Paranoia.  More funny customer service stories abound at Clients from Hell (www.clientsfromhell.net).  They aren't really "from hell," but they're certainly good for a laugh.

Facebook can also be a good source of your "daily dose."  Search out your favorite comedian and "like" his or her page so you'll see their daily posts.  My favorite person to follow is actually not known for his comedy: George Takei.  You remember Mr. Sulu from the old Star Trek episodes?  His Facebook page has over 2.5 million followers, and for good reason.  He posts an average of two times a day and I find myself laughing out loud at least once or twice. They're too funny not to share.

Lastly, if you need a break from mainstream news stories, websites like The Onion (www.theonion.com) and Fark (www.fark.com) may be your answer.  The Onion tells the news “like they're pretty sure it happened” (meaning they're mostly, if not all, satire).  Fark takes real news stories on topics from sports to politics and highlights the funny and notable news, so you get a more entertaining twist on what's actually happening in the world.

 

Image credit 4chan

Friday, January 11, 2013

A Tour of CES 2013 Part 1

What Cool Stuff is Showing up at CES 2013?




Every year, tech enthusiasts and future-focused consumers alike converge on Las Vegas for the Consumer Electronics Show.  From the innovative to the downright wacky, it’s a platform to showcase the newest tech gadgets and get a preview of what electronics will be capable of in the years to come.   CES 2013 offered an expansive collection of cool – from next generation TVs to connected homes and cars, the future of gaming, and more.

Televisions typically dominate CES.  Last year brought a bevy of integrated 3D options, while this year heralds the next stage in high definition resolution.  Current model high definition TVs are typically 1080p resolution.  TVs showcased at this year’s CES are rolling out with 4K, i.e. “Ultra HD” resolution.  This roughly translates to 4 times the high definition resolution of 1080p, making it possible to bring ultra clear picture to ever larger screens.


With no content currently available to take advantage of that concentrated resolution (heck, your eyes aren’t even capable of processing that level of detail), the technology isn’t something most of us will be running out to buy tomorrow, but in a few years it’s sure to be more mainstream.

Speaking of watching TV, Dish took advantage of CES to announce their partnership with Sling to allow customers with their Hopper DVR service to watch content anywhere, via any internet capable device.  More impressive yet, they’ll offer iOS and Android apps to allow users to download recorded content onto their mobile devices to watch offline.  This addresses the main limitation to those looking to catch up on their favorite shows while travelling or when out of area of a stable WiFi connection.

Smart homes and Smart cars were also a big hit at this year’s CES.  AT&T announced plans to offer expanded home security automation.  Their “Digital Doorman” is a touchscreen doorknob that opens with a PIN instead of a key.  If the kids lock themselves out, you can open the door remotely over the internet.  They’re also planning to offer motion sensor video cameras to be installed around the house, allowing you to keep tabs on your home when you’re away via your computer, smartphone, or mobile handheld device.

Car manufacturers are integrating more technology into the dash. The 2014 Chevy Impala will come with expanded “My Link” infotainment capability integrated into the dash.  Access apps right from the touchscreen on your dash, so you can use your navigation or Pandora radio applications without having to pull out your Smartphone.  The screen is fully customizable, letting you have your favorite apps, common numbers dialed or radio stations right on the home screen.  Hands free calling and integrated navigation are also included.

GM and Ford both announced plans to offer app developers access to their software so they can develop apps to incorporate your car with your wireless technology.  Expect future generation of these vehicles to offer more seamless integration with your smartphone (allowing in-dash access to contacts, calendars and reminders, for example), as well as custom apps to improve fuel economy, safe driving, and more.

In addition to these cool innovations, CES 2013 was dominated by next generation gaming.  Stay tuned next week for a new handheld gaming platform, playing PC games on tablets and true game immersion via a virtual reality headset.

 

Files Gone? Could be a Hidden Files Virus

Hidden Files Virus Hits Victims Hard




Imagine starting up your system one fine morning only to discover that everything appears to be missing – your files, installed programs, even your Start menu shortcuts.  If you’re one of the many people who’ve recently become victims of the “Hidden Files Virus,” this scenario may be a painful reality.

The good news: your files aren’t actually gone for good.  The bad news: your system has a virus and getting your files back will require some work.

First, a few things NOT to do:

DON’T install any “anti-virus” or “removal utility” program that presents itself in the form of a pop-up, dialog box or un-closeable message on your screen.  In many cases, the virus has come onto your PC via a trial installation of a program claiming to be an anti-virus or utility program (for example, an application promising to optimize your hard drive or speed up your PC).  Once infected, the program seems to be the only way to get your files back, but it is in fact the source of the problem.

DON’T pay for any program claiming it can clean the infection off your PC.  The program itself is the virus and holding you hostage by hiding your files is how it extorts money from victims.  Giving your credit card number to the same nefarious individuals that have created a virus to con you is quite possibly the worst thing you can do.  If you’ve already done so, I recommend that you contact your credit card company to close your account and consider keeping an eye on your credit report in the months to come to ensure the crooks don’t use your personal information for more fraudulent activities.

DON’T run a registry or temporary file cleaning tool (like CCleaner).  In most cases, your settings and recovery data are in this folder.  If you “clean” (i.e. permanently delete) the contents of your temporary folders you may lose your data for good.


What SHOULD you do?

If you are a beginning user, you should strongly consider contacting a reliable computer repair professional.  If you’re pretty savvy and familiar with navigating through your system settings, here are some steps to try:

Make a backup of your start menu and settings:

Windows 7 & Windows Vista users: navigate to C:\programdata\microsoft\windows. From the list of folders right click “Start Menu” and select “Restore previous versions.”  Follow the prompts to restore back to a date prior to when your system became infected.

Windows XP users: go to C:\documents and settings\[your username]\local settings\temp\smtmp\ and navigate through the process of restoring to a date prior to when your system became infected.

Unhide your Files:

Download and install the executable file located here: Unhide.exe

Once you’ve downloaded the program, double-click the icon on your desktop and allow the program to run.  The program will remove the hidden attribute (+H) attached to all your files.  If you’ve intentionally hidden files you’ll need to re-hide them after you’ve fixed your system and removed the virus, but I’m guessing you’ll find that’s a small price to pay for getting the rest of your stuff back.

Update and run your anti-malware software:

Once your files have re-appeared, it’s time to get rid of the nasty bug that tried to hold them hostage in the first place.  Download and install Microsoft Security Essentials (http://www.microsoft.com/security/pc-security/mse.aspx )and the free version of Malware Bytes (found here: http://www.malwarebytes.org/lp/malware_lp_form/).  If you’ve already got one or both of these programs installed, download any updates and run a full system scan.

Prevention = Protection:

Now that you can breathe a sigh of relief that you dodged that bullet, help ensure that it doesn’t happen again.  Be wary of installing software from untested sources.  Never click through pop-ups warning you that your system is infected and prompting you to install an anti-virus program or removal tool.  Avoid downloading files from sharing and torrent sites – when you’re tempted to try to get the latest episode of True Blood from BitTorrent, remember the pain and suffering you just went through to get your files back.

Thursday, January 10, 2013

Speed up Windows - Software Alternatives

Looking to Speed Up Windows? Try these programs



“My computer is so blazingly fast I can hardly keep up with it!” – said no one, ever. The complaint I hear voiced most often by people calling to have their computer serviced is that their system is sluggish, slow to boot up and unresponsive. While the usual culprits (viruses and spyware) often factor in, sometimes even clean computers run slower than they should. If you have a decent, malware-free system that’s underperforming, you may be able to get noticeable improvement by replacing some of its resource-sucking software with less bloated alternatives.

Norton and McAfee are the most well-known anti-virus programs around – just about everyone with a computer has at least heard of them. They have relationships with most computer distributors, resulting in the vast majority of pre-built systems arriving at the user’s door with one of these software packages pre-installed. Unfortunately, Norton and McAfee are massive programs that hog system resources. Heavy-handed online monitoring can lead to slow-as-molasses Internet surfing and in some cases can even restrict access to certain sites, or break a user’s web-access entirely.


Adobe Reader is the most widely used PDF reader around, yet it’s large file size (it takes up over 100MB of drive space) and drain on your system’s resources makes it one of the slowest PDF reader programs on the market. Many websites instruct users to install Adobe Reader and include links to download it, though in most cases it came pre-installed on the machine. While some advanced PDF functions may work best with Adobe (like watermarks, for example), you do have alternatives that can quickly and easily handle basic PDF viewing.

Sumatra PDF (http://download.cnet.com/Sumatra-PDF/3000-18497_4-10698785.html) is a simple reader program with a small file size (4 MB drive space used) and streamlined configuration. Another popular option is Foxit Reader (www.foxitsoftware.com/Secure_PDF_Reader/). It's less than 1 MB to download and allows you to open, view, and print all types of PDFs. It integrates with DocuSign®, a program that allows users to securely send documents with eSignatures.

iTunes an easy way to get your tunes and videos on your iPod, but you may be regretting making it your default media player. It’s slow to launch, slow to run and is constantly popping up notices to download updates to itself and its partner program, QuickTime. Save iTunes for your Apple gadgets and use any number of other media players to listen to your music – even the default Windows Media Player is faster to load and less of a drain on your system’s resources.

To get all of the organizational tools you’re used to from iTunes, check out MediaMonkey (www.mediamonkey.com/), a free media management program. Play MP3s, audiobooks, podcasts and videos, sync with your mobile devices and even burn CDs and DVDs, all the while keeping your media collection in order, be it small or massive (its site claims it can “manage 100,000+ music and video files without bogging down”). It supports most file types and can even convert file types to enable syncing across devices.

With a few software swaps, you could be singing a different tune about your system’s speed and responsiveness.

 

Image of Windows 7 by Microsoft

Wednesday, January 9, 2013

Great New Year's Resolution Websites

Resolution Websites for the New Year




Whether you've dreamed of making delicious meals like a professional chef or would like to become fluent in French, this is the year you've resolved to make it happen.  In the past, you would have had to enroll in a class at your local college, requiring that you accommodate your work or personal commitments around the class time parameters.  Today you need only a computer and access to the Internet to dive into the abundance of knowledge available online – in many cases for free if you know where to look.

Start Cooking Like a Pro.  We love Epicurious (www.epicurious.com) for their inventive recipes and delicious food ideas, and now they offer online classes in conjunction with The Culinary Institute of America.  Learn everything about Italian cooking or how to concoct the perfect dessert.  The first class is free, and then you pay about $50 for several hours of video instruction on the topic of your choosing.


Become More Crafty. Always wanted to learn how to knit a sweater?  Maybe you've thought about baking a unique cake for your son's 5th birthday party, but don't know where to begin.  Craftsy (www.craftsy.com) offers courses on knitting, baking, jewelry crafting and much more.  Costs for full individual classes vary, but there are many free mini-classes you can try, and they offer a money-back guarantee.  Watch classes from any device with an internet connection – they even offer an app for iPhones and iPads.

Pinterest (www.pinterest.com) is also a great resource for inspiration and links to craft how-to’s, most are free with photos or videos. Many are geared toward the novice so you can learn from your fellow hobbyists how to tie-dye, create your own candles, decorate adorable cupcakes, and much more.

Become your Own Handyman (or Handywoman).  If you feel like your home is falling apart, one leaky faucet at a time, look no further than www.diynetwork.com for everything home-improvement.  VideoJug (www.videojug.com) is another great resource for short videos showing you how to complete a bevy of common repairs - they promise to help you "get good at life."  The “DIY & Home” tab gives you a wide selection of tutorial videos on topics like Electrical, Plumbing, Interior Design and much more.

Learn to Play the Guitar.  Learn a little about music theory before you get started.  Get yourself a music lesson from Ricci Adams' Music Theory (www.musictheory.net). Choose from two apps for iOS devices, designed to teach you the fundamentals of music and to practice what you've learned.  Once you've mastered the basics, check out Justin Guitar (www.justinguitar.com) for your free guitar lessons.  Improve your Internet karma and donate if you can to support the cause.

Wrap your Tongue Around a New Language.  Rosetta Stone may be effective, but it’s pretty pricey.  The BBC has a nice program for complete learning of upwards of 40 languages (www.bbc.co.uk/languages) with step-by-step courses including pronunciation, grammar and exams.  Once you're beginning to master the language, you can test your knowledge further by listening to BBC World Service broadcasts in the language of your choice.

Anki (http://ankisrs.net/) can help you learn more quickly.  It's a flashcard program that runs on computers and smartphones and is designed to put a large number of words into your long-term memory rapidly while allowing you to "study" anywhere you have a few minutes to spare.

Feed Your Intellect. We all have that class that "got away" while we were attending university, but never fear: there are resources for free online education aplenty.  Apple device users should start at iTunesU (www.apple.com/education/itunes-u/).  With courses from hundreds of universities, including Stanford, Yale and MIT, you can watch lectures and take entire courses on all subjects from biology to economics.  It seamlessly integrates with iBooks in case you want to purchase the textbook for future reference.

Finally, the Open Courseware Consortium (www.ocwconsortium.org) is a worldwide community of institutions that provides free continuing education, complete with notes, memos and examinations.  They also have a list of member schools so you can take courses online directly with the university.

What is Siri, Really?

What is Siri? An Explanation



Apple made headlines in December when it introduced Siri with the latest iteration of their iPhone, the 4S. Siri has been billed as an “intelligent personal assistant that helps you get things done by just asking.” It’s a new feature to the phone and coming to the iPad that allows you to control pretty much every life-related feature on the device. It has been touted to be able to do just about everything that your phone is capable of by entering simple, natural-language voice commands. So, what is Siri, really? How does it work in the real world we interact with daily, and not just in a controlled marketing test environment?

The Nuances of Siri


Siri was developed at Stanford Research Institute and takes its name from the organization’s initialism. Apple purchased the project and adapted it to their device. Siri utilizes a few third-party technologies as well. Nuance, the most well-known voice recognition technology, powers Siri’s ability to recognize what you’re saying, even if it’s “Hey Siri, think you could remind me to meet my brother tomorrow for lunch?” Nuance filters out exactly what you mean and schedules an appointment for tomorrow at lunchtime that notes your brother. Siri also utilizes Yelp and Wolfram Alpha for some of its other features. This allows you to search for local businesses and do computations like “What’s 15% of 34.86?”, useful for calculating tips, or finding out the number of calories in a cubic foot of guacamole.
Holding the home button or moving the phone to your ear whenever you’re not in a call activates Siri. It’s simple and natural to use – which is what Apple tries to do with most of its interfaces.

The reality of Siri


Siri has been marketed as being able to do just about anything. The commercials, which star famous personalities like Samuel L. Jackson and Martin Scorsese, claim that you can locate friends, ask the meaning of life, or schedule appointments – all talking to the device like you would your personal assistant. We all know technology ads tend to exaggerate the actual usability of devices, so how accurate are these ads?

As long as you understand what the “sequences shortened” title card at the end of all the ads means, Siri is actually remarkably good at doing exactly what it claims. While the device won’t respond at conversational speeds like purported, the actual features are mostly there. Siri responds amazingly to contextual awareness, both location-wise and in your conversation. If you ask it the weather, it will tell you what the forecast is for your current location, but if you say “What about in New York?” it will remember that you’re talking about the weather and tell you the forecast for New York. It “just works,” instead of trying to plow through technical jargon with you.
One of the very few limitations, though, is that if you try to do anything outside the features that have been integrated, Siri loses you. You can’t launch other apps or search your notes for that thing you wanted to look up. Apple has noticed this missing integration too and with the release of iOS 6, this fall, Siri is supposed to gain new abilities.

Siri is very human like and you will quickly find yourself saying “please” or “sorry” to your phone before you realize what you’re doing. It, essentially, replicates all the functionality of a personal secretary– albeit one constantly connected to the Internet. Therein lays a major drawback. If you don’t have a network connection, Siri can do almost nothing. So if you’re on a limited data plan, you might want to be more conservative with your queries.

Overall, Siri is moving in an excellent direction. I’m sure we’ll see more voice-powered interfaces in the future, and for now Siri does pretty much what it claims it can. I look forward to seeing what it turns into and for now – I think I’ll hold off on hiring a secretary.

Tuesday, January 8, 2013

Antivirus Problems: Overzealous Scanning

How to Deal with Antivirus Problems




Whether you’re a Nerd who’s adept at surfing the web, or an amateur who has yet to learn the ins and outs of it, a virus scanner is one of the most critical parts of your computer. If you don’t have a virus scanner, you should probably stop reading this article and go download Microsoft Security Essentials right now.

Back? Alright...Now, virus scanners are wonderful, but often a little paranoid. Back in 2010, McAfee’s virus protection had a glitch which caused it to register critical system files as viruses. So even though you have virus protection, you should probably double-check files that it marks as positive if you have any suspicion about them.

If your virus scanner happens to alert you to a file that you’re pretty sure is clean, you don’t have to take its word as the truth. It might just be a false positive. Now, there’s no 100% sure way to tell if something is a virus or not, but there are a few tips you can take to narrow it down. It’s probably even more accurate than diagnosing real viruses, so you can be pretty sure here.


So if something like this pops up on your computer, and you’re not sure whether to delete the file that your virus scanner is telling you to delete, you can upload it to a website called VirusTotal to check. The process is pretty simple. You can do a one-time check via their website, or install their up loader in order to check any file simply via right-clicking the suspect file and running it through their database.

The final option for checking if a program has a virus is simply to contact the developers. You can tell them that your virus scanner identified the program as suspect and that you were wondering if this is a problem. If they’re legitimate, you will probably receive a personalized email back explaining the problem. If they’re not legitimate, you will probably receive either nothing or an email that further confirms your suspicions. If you get nothing, you can always just Google the program name and the word “virus” and see if others are having the same problem.

Fortunately, you shouldn't have to go through these steps too often. They’re just precautions, but it never hurts to be informed!

 

Image copyright Malwarebytes

Monday, January 7, 2013

Use Amazon at Your best

Get the Best when you Use Amazon.com




Whether you’re in the market for the latest hit movie, coffee, electronics, or even a drum set, Amazon.com has just about anything you can imagine buying online. In addition to massive selection, Amazon is known for its competitive pricing. Save even more time and money by taking advantage of some of its shopper incentive programs.

While the $79 price tag may seem steep at first glance, Amazon Prime entitles users to more than just free 2-day shipping on eligible items – though that’s a big selling point. One-click shopping stores your billing and shipping information so you don't have to type it in every time or navigate multiple confirmation screens. Stream a large selection of on-demand movies and TV shows for free over the Internet to any device that supports Amazon Prime Instant Video (including your computer, most gaming consoles, and many TVs and set-top boxes). Kindle owners can take advantage of the Kindle Owner’s Lending Library to borrow one e-book a month to read on your Kindle device with no late fees or due date. There are currently over 145,000 titles available.


Even if shipping is the only Prime benefit you’re likely to use, one holiday’s worth of shipping to family members throughout the U.S. can make it break even: you need only make about 13 purchases a year for it to pay for itself.

If you're already a Prime member, share your account with up to four other people for added value. In the upper right-hand corner after logging in, click on "Your Account." Under the Settings section, select "Manage Prime Membership." Just below your membership information is a section labeled "Invite a Household Member." Enter their name, relation, email address and birth date. Each person you invite will need to know your birth date to confirm their identity. Once they're set up, they'll benefit from unlimited two-day shipping, but not Amazon Prime Instant Video or Kindle Owner’s Lending Library benefits.

The Amazon Mom program (www.amazon.com/gp/mom/signup/info) is free to join and benefits caregivers of small children with three free months of Prime membership, 20% off diapers and wipes subscriptions, and exclusive deals and discounts.

Students currently enrolled in a college or university with a valid .edu e-mail address can sign up for Amazon Student (www.amazon.com/student). Membership includes six months of free Prime membership and the option to continue Prime for up to four years at $39/year. One caveat: you can't share an Amazon Prime Student account.

You probably wouldn’t consider Amazon a good place to pick up a jar of peanut butter - shipping costs as much as the item, unless you buy in bulk and have more than you need. Amazon's new Add-on Program now offers thousands of small, low-priced items, available to be "added on" to orders of $25 or more. These items can be combined with free super saver shipping or Amazon Prime accounts for additional savings.
While e-books are great for tomes that would be bulky and unmanageable in hardback, there are some books you want to hang on to. Harry Potter series, anyone? With Amazon Upgrade, you can have the best of both worlds. Purchase a physical book from Amazon that's part of the program and Upgrade lets you obtain a digital copy for a discounted price. You can even upgrade past purchases, so long as you've made them through Amazon and the titles are included in the program.

Lastly, if you find yourself purchasing certain products regularly, consider Amazon's Subscribe and Save program. Eligible items include everything from toothpaste and deodorant to diapers and cereal, and garner up to a 15% discount in addition to free shipping. Simply choose an eligible product and the quantity you'd like to receive. Customize your delivery schedule, from once-a-month to once-every-six months. Amazon sends an email notification a week prior to shipment, so you can delay or cancel at any time. You're only charged when the order ships and subscriptions are managed through the Your Account page so you can manage or update them any time you like.

Sunday, January 6, 2013

Hidden Mac Features: Getting the most from your computer

How to Find the Best Hidden Mac Features




Last week I explored some of the cool, less-well-known things your Windows PC can do and this week it’s Mac’s turn. If you’re ready to unleash your Mountain Lion, here are some under-utilized tools built into Mac OS X.

Dictation and Text to Speech:


Imagine how quickly you could reply to Aunt Edna’s email if you could talk instead of type. Click the Apple menu in the top left corner and select System Preferences. Choose the Dictation & Speech icon. Use the Dictation tab to turn it on and set a shortcut to launch (such as “Press Left Command Key Twice”). You can speak continuously for up to 30 seconds – that’s a lot of text!
Those who multi-task should explore the Text to Speech tab. Activate “Speak selected text when the key is pressed” and choose a key to launch (default is Option + Esc). Now you can have that accounting report or lengthy email from your college roommate read to you while you prune your bonsai tree. You can choose the system voice you prefer, have alerts or application notifications announced, and even have the clock broadcast the time to break you from your Facebook stupor and remind you to get back to work.

Add secret services to your default services list:


Launch an application such as Safari or Pages and click on the application name in the upper left Finder bar. Choose Services, then Services Preferences to see a list of options you can activate to appear in your default Services menu.

Capture Full Screen lets you easily obtain an image of whatever’s on your screen, or activate Capture Screen using Timer to get images of what’s on your screen at certain times or intervals.

Check the box next to Summarize and the next time you want to speed read a lengthy document select the text, click on the name of the application you’re using to view the material (such as Safari), choose services and then summarize. You’ll be presented with an abbreviated version that you can pare down further using the Summary Size scroll to increase or decrease the length of summarized text.

Customize text “hotkeys”:


If you find yourself typing the same things repetitively (such as your email address or a closing salutation in correspondence), create a hot key to cause the text to automatically appear when you type associated text or symbols. From the System Preferences menu choose the Language & Text icon and select the Text tab. The list of default symbol and text substitutions is shown so you can choose which you’d like to activate, or click the + in the lower left corner of the pane to add your own.

Note: this works in Apple default apps like Pages and can be activated in Safari by clicking Edit – Substitutions and enabling Text Replacement. Third party applications like Microsoft Word may not support your custom hotkeys.

Encrypt a flash or external hard drive:


Encrypting data you’ve transferred to a flash drive or external hard drive is a good way to keep it from falling into the wrong hands should your portable device be lost or stolen. Connect the device you wish to encrypt, find the icon created for it on your desktop and right-click on the icon. A dialog box appears with an option for Encrypt “.” Once selected, a dialog box will appear prompting you to select a password and password hint.

Encryption is time consuming - expect 5 GB to take 30 minutes or more, depending on your system’s capabilities. This feature also requires the device have a GUID Partition Table, so you may have to format the drive before you transfer data and encrypt.

Saturday, January 5, 2013

Computer Tune Up for 2013

Resolve to Regular Computer Tune Up This Year




New Year’s morning – you wake up and within a few hours you’ve broken half the resolutions you’ve set for the year. “I’ll start tomorrow,” you swear. You log on the computer, go directly to Facebook (another resolution down) and start to browse. Just like you, another year passes and your computer gets a little bit slower. If only there were some way to make sure it went to the gym and ate more healthily.

According to a study performed by Crucial.com, 4 out of 5 computer users would like to change something about their computer. The top 5 changes they’d make: faster startup, faster programs, more reliability, longer battery life, and more storage space.

While your computer can’t make these changes on its own, unlike you, there are some things you can resolve to do to make sure your computer stays fit.


1. Faster Startup:

Humans need a cup of coffee for faster startup, but don’t pour one on your computer. Instead, check your startup programs and get rid of anything you don’t use. If you’re unsure of something, consult a computer repair expert with questions. To get rid of programs bogging down your computer, hold the Windows key, then press R, type ‘msconfig’ (without quotes) and go the “startup” tab. Uncheck anything you’re not using.

2. Faster programs:

While you can’t just make your programs run faster with something as simple as the above trick, adding more RAM to your computer will usually speed it up. Talk to a computer repair expert to see if you can add more memory. This is a cheap way of upgrading your computer to squeeze some more life out of it.

3. Improved reliability:

If your system isn’t rock-solid, it means there’s something wrong with it. Computers run like they should until an outside force intervenes. Most often, that outside force is a virus or malware. Make sure you install an antivirus software this year. We recommend Microsoft Security Essentials. It’s free and gets the job done. MalwareBytes is also great for periodical scans, which you should resolve to do as well.

4. Longer battery life:

Laptop owners are perpetually cursed by the low battery warning. If you want to avoid this happening to your laptop you just got for Christmas, resolve to do a few things. Make sure not to let it overheat. Long-term heat can severely damage your laptop’s battery. Also, don’t let the battery drain all the way out. Just like driving your car on empty can strain it, running the laptop out will damage it as well.

5. More storage space:

This is by far the easiest resolution to carry through on. You can even fulfill it today. If you have a laptop, you’ll need to get an external hard drive, which you can buy online or in your local store. They come in capacities up to two terabytes, but that will surely be tiny by the time this year is over. If you have a desktop, you can install another internal drive for more storage. And if you want to be able to access files from anywhere, you should consider looking into a cloud storage solution. Google Drive has ever-increasing storage and is free!

Infographic by crucial.com

Using Technology at Work

Using Technology at Work is Changing: keep up with it




Now that almost half of all Americans own a smartphone and roughly a quarter of all Americans own a tablet computer, it’s apparent that we are growing increasingly dependent on mobile handheld devices. Yet most companies haven’t outfitted their workforce with these gadgets, leading many of us to use personal devices at work. While this may make it easier to get the job done, there are some issues to consider, whether you’re a business owner or employee.

In an ideal situation, your company should have a written policy in place detailing expectations and procedures for using your personal device at work. These should include data and software control and ownership, as well as detail any liability you are exposing yourself to and what the company expects to happen to data or programs on your device at the end of your employment.


Consider potential costs you may bear in order to make your gadget work compatible. Will your company reimburse you for software that you acquire for work use? If so, do you own the software or does it belong to the company? While your boss footing the bill for your tablet’s productivity programs may seem like a sweet deal, having to uninstall them and ditch any data you’ve used them to create at your employer’s behest will likely be a hassle.

In addition to data or cell usage fees, using your device on the job is sure to lead to additional wear and tear. Should your phone or tablet get damaged while using it for work, it’s unlikely your employer will cover its replacement.

Determine what you’ll be expected to provide upon termination of your employment. If your employer expects that all company-related data (such as emails, contacts or documents) be purged, be careful not to merge work files with personal. Look for applications that allow you to segregate your work files from your personal data or, better yet, utilize a cloud storage solution (there are many options, including Dropbox and Google Drive) and refrain from storing any work-related data on your device.

If you must store company data on your phone or tablet, be sure to protect yourself from potential liability should it be lost or stolen. Establish a login password to deter a passerby from gaining easy access to your device. Install a mobile security application such as Lookout Mobile Security (https://www.lookout.com/). For $2.99/month or $29.99/year, the premium version allows you to remotely passcode lock and/or wipe data should your gadget go missing. Apple device users should activate the free “Find My iPhone” or “Find My iPad” service in order to gain the remote lock and wipe functionality on their iOS gadgets.

Using your cell phone to communicate with clients can lead to muddy waters once those clients begin to call you directly on your cell (either because you provide them with the number or it appears on their caller-ID). Your employer may expect that any number provided to a client be forfeited upon termination. Protect yourself from hassle by blocking your number from appearing on outgoing calls. If you must have work clients call you back on your cell, consider setting up a voice over IP (VOIP) account that forwards to your cell using a service such as Google Voice Mobile (http://www.google.com/mobile/voice/, free) or Skype (www.skype.com, $4.99/month). You can use the account to call out as well, though using a 3rd party application to place calls on your cell can be a hassle.

Photo Used Royalty-Free From sxc.hu

Friday, January 4, 2013

Before You Upgrade to Windows 8, Prepare your PC

Looking to Upgrade to Windows 8? Check this out first




Windows 8 officially hit the market on Friday, October 26th. I haven’t waivered in my recommendation that you use caution when considering upgrading to such a drastically different Operating System, but if you’re eager to join the ranks of early adopters, here are some tips to smooth your transition to the next generation of Windows.

First, make sure your computer is compatible with and able to support Windows 8. It actually doesn’t require many resources to run (one of its benefits – its streamlined nature helps it to boot up and run fast), so if your system was built in the last six years or so you’re probably good to go. The minimum requirements are: 1 GHz or faster processor, 1 GB of RAM, 16 GB of hard disk space, and a Graphics card with Microsoft DirectX 9 and WDDM driver.

Next, head over to Microsoft’s Compatibility Center (www.microsoft.com/en-us/windows/compatibility/win8/) to confirm that your peripheral devices (such as printers, monitor, mouse, cell phone, camera, etc.) are compatible. Most devices that work with Windows 7 will work with Windows 8, but its best to make sure before you upgrade.

Once you’ve determined that your system is ready for Windows 8, watch a few online walk-through videos to see the software in action. I don’t mean the glossy commercial-style videos produced by Windows and designed to sell you on the “coolness” of the product. I mean videos like those posted on CNN’s technology page or even those on YouTube (search “Windows 8 walkthrough”) - just prepare to weed through some truly atrocious amateur contributions.

This is the best way to get an idea of how drastically different Windows 8 will be. Keep in mind that it’s designed to be used with a touch screen device, so if you’re planning to install it on a standard PC with a mouse and keyboard, make sure you peruse some video coverage of how it runs without touch capability.

Now it’s time to hunt and gather – for all the installation disks, codes and/or drivers for your software and peripheral devices. Without a way to reinstall the software that supports your system’s hardware and peripherals, you could be left without a working display or way to input commands should Windows 8 fail to recognize the drivers for your monitor or keyboard. Be prepared to reconfigure your modem and/or router to get back online.

If you don’t have a handy keepsake box full of installation CDs (doesn’t everyone?), look up your devices online and download a backup copy of the drivers BEFORE you upgrade lest you be left without internet access after installing Windows 8.
Are you still on board? Now do a complete backup of your data. While upgrading to Windows 8 shouldn’t affect the programs and data stored on your system, performing such a major change always warrants backing up first. Backup your important files to another computer, an external hard disk, or cloud-based storage account.

Finally, prepare for the worst and make sure that you’re prepared to do a re-format of your hard disk in order to reinstall Windows 7. This will require a valid Product ID (it can be found on the System page where you found your system specifications) or Windows activation key (for Windows XP it’s often located on a sticker on the system itself.

Good luck on your new Windows adventure!

Mobile Security: Protecting your Phone

Mobile Security for your Android Phone


Two Easy Steps to Protect Yourself
Whether you’re one of the millions of Americans that already owns a mobile handheld device (like a Smartphone, tablet or iPod Touch), or you’re hoping Santa slips one under your tree this year, there’s something you likely haven’t put much thought towards: mobile security.

 

According to a report released by Forrester Research, it’s estimated that 46% of all bank account holders will utilize mobile banking services by 2017.  Even if you aren’t accessing your bank or credit account from your handheld device, you likely have email; social networking and a multitude of apps that give a would-be thief plenty of valuable information should they get a hold of your phone or tablet.  Take a few easy steps to protect that information from loss or theft.


Step One:  First, enable a pass code lock that requires a code or pattern be entered when your phone or tablet is reactivated from sleep mode.  I know, you’re thinking, “what a hassle to have to enter a number or trace a pattern every time I want to use the phone,” but keep in mind that most thieves are looking for an easy target.  If the gadget they snatch turns out to be locked, someone looking to steal data is likely to abandon the endeavor rather than go to the effort of trying to hack past the lock screen.

 

Apple devices (as well as many other handheld gadgets) offer the option to erase all data in the event that the wrong code is entered more than ten times.  This safety measure immediately brings to my mind the image of my son relentlessly pressing buttons trying to get to his games until my phone is made useless.  However, if you’ve taken the precaution of backing up your data and apps to a cloud application (such as iCloud, SugarSync, etc), even an errant data wipe isn’t tragic.

 

Step Two:  Next, utilize a mobile security application that allows you to control your phone or tablet remotely in the event it is lost or stolen.  Look for one that shows your gadget’s approximate location (provided your device is powered and you have GPS activated) on an online map.  If it’s somewhere in or around your home, use the software to activate a repeating alarm beep to help you find it.  Should you discover it’s at your local Starbucks, or worse, in someone else’s possession, the application should allow you to remotely lock the phone, post a message on the home screen with your contact info, or if necessary remotely wipe your data.

 

iPhone, iPod and iPad users should activate Apple’s Find my iPhone (or Find my iPod/iPad). It does all of the things listed above; best of all it’s free and comes pre-installed on all current iOS mobile devices.  If you didn’t enable it when you activated your device, navigate through the Settings menu to the section for iCloud, then the Find My iPhone (iPod/iPad) option. Toggle the switch to ON. When prompted to allow the application to access your location, select Allow.

 

Avast! Free Mobile Security (www.avast.com/en-us/free-mobile-security#tab3) is a great free option for Android users. It runs silently in the background so it's difficult to detect or remove and can survive hard-resets. In addition to the features listed above, it includes a siren that gets louder if thieves try to turn it off and call forwarding so you don't miss a call or text while your phone is MIA.  If an unauthorized SIM card is detected, the phone will lock, activate the siren and send you a notification containing the phone's new number and geographic location.  All the anti-theft settings are able to be modified remotely, so they're easily customizable to your particular situation.

 

Andrea Eldridge is CEO and co-founder of Nerds On Call, an on-site computer and laptop repair service for consumers and businesses. Andrea is the writer of two weekly columns, Nerd Chick Adventures in The Record Searchlight, and Computer Nerds On Call, a nationally syndicated column for the Scripps-Howard News Service.  She regularly appears on ABC, NBC, FOX, and CBS on shows such as Good Day Sacramento, Good Morning Arizona and MORE Good Day Portland, offering viewers easy tips on technology, Internet lifestyle, and gadgets.  Andrea recently has begun working with Demand Media to produce content for eHow.com and has written a book for them Smartphone101: Integrating your iPhone into a Windows World. Andrea is available for Q & A’s, expert tech quotes and will appear on your show, call today! See Andrea in action at www.callnerds.com/andrea.

 

 

Thursday, January 3, 2013

Speed Up Mac Computers with Software Alternatives

Computer Running Slow? Speed Up Mac Default Applications




Apple fans may claim that Macs have a blissfully symbiotic relationship between software and hardware, but the truth is that some of the applications that come standard (or are very common) on Macs could be improved upon. Here are some alternatives to Mac’s most ditch-able software.

Last week I highlighted iTunes as a program Windows users should avoid unless necessary. While it tends to work faster on Macs, it can still be a system hog, and users commonly complain of random track deletions and duplications. Consider using iTunes to download music and podcasts and Spotify (www.spotify.com/us/) to do everything else. The basic version is free, organizes and syncs your music and iTunes library across a multitude of OS and mobile device platforms, all the while allowing you to stream millions of songs you don’t own from their massive music library. Upgrade to a premium account for $9.99/month to ditch commercials and stream to your mobile devices.


Firefox has advantages, too. They're launching a silent update feature in the near future which will allow it to update itself in the background so you're not bothered by all those pesky reminders.

ICal is the default calendar application for Macs, but it lacks some of the features of Google Calendar. Notifications can be both annoying and difficult to modify. Google Calendar works across all OS platforms, an advantage over iCal. Google supports syncing multiple calendars, allowing you to see work and personal events simultaneously while color-coding them for organization. It’s compatible with all Smartphone platforms and allows any authorized party to edit shared Google calendars, whereas iCal is read-only to non-Mac users.

Macs come with Mail pre-installed as the application to organize your email, similar to Outlook Express. It's extremely basic and not really worth the effort to configure if you're using a Gmail or Yahoo account. Simply log in to your email provider from your browser window and disregard Mail. Gmail's spam filtering is also much more robust than what you'll get with Mail.

IWork is the Mac alternative to Microsoft Office. It provides such programs as Pages (for word processing) and Numbers (for spreadsheets). Its advantage is that it integrates with iCloud to sync seamlessly with your other Apple products. The drawback: limited functionality makes it difficult to use across OS platforms. Opening documents created in Microsoft Office is possible but often involves some modification or loss of functionality to more advanced features and alternatively, Office users may encounter difficulty viewing your Pages document in its full glory. NeoOffice (www.neooffice.org/neojava/en/index.php) is free and considered a more stable alternative to the Mac OS versions of OpenOffice or LibreOffice. In addition, NeoOffice sports a host of features those suites don't offer.

Movies and TV shows downloaded from iTunes usually play seamlessly in QuickTime, but if you find yourself more often watching home DVDs or movie files from your video camera, QuickTime can be slow and buggy. It's also not robust enough to read or play corrupted files. For that you should try VLC Media Player (www.videolan.org/vlc/). It's free (unlike many other alternatives to QuickTime) and recognizes more file types than QuickTime does, so you don't have to worry about cross-compatibility with your devices.