Wednesday, June 26, 2013

Microsoft Announces Windows 8.1 Preview: Fixes Windows 8 Frustrations

Windows 8.1 Preview Announced



Microsoft kicked off their build conference for developers this week. During the keynote speech, they announced the release of the preview version of Windows 8.1, the next version of their flagship Windows 8 operating system.  Windows 8 has suffered its share of complaints, and Microsoft aims to fix many of the issues that have kept users at bay from the program. The Windows 8.1 upgrade, previously named "Windows Blue,"  offers a number of fixes for common frustrations.


A New Start: One of the biggest complaints about Windows 8 was the disappearance of the start button from the taskbar at the bottom of the screen. While its functionality had been replaced with the new "Metro" interface, the change left many users confused and irritated. Windows 8.1 adds the start button back in, but its function remains essentially the same as opening the Metro screen. One addition is the ability to right-click the button to access power options, instead of having to open the "charm bar."

More Productive Screen-Splitting: Windows 8 offered the option to split the screen between two apps, but had limited options. Windows 8.1 offers a few new default modes for splitting the screen, and adds the welcome ability to snap as many apps side-by-side as desired. For those who work with their email, calendar, writing program, and music all open, this is a god-send.

Bing it On: Microsoft's search platform, Bing, has been implemented into Windows in Windows 8.1 for a more holistic search experience. Whereas the launch version of Windows 8 had a very limiting search ability, users of Windows 8.1 can search for any item from the start screen and see results from their files, system settings, as well as web search results, presented with large, informative previews.

Windows 8.1 offers dozens of other new features as well, but won't be available until the end of this year. The preview version is available  to those curious enough to risk their computer's stability, but the majority of us will have to wait. In the meantime, Microsoft promises to add and refine more new features.

Tuesday, June 25, 2013

Teens Hiding Online: Study Reveals Shocking Data

What your Teen is Hiding Online: Part 1



A 2012 Teen Internet Behavior study commissioned by the security technology company, McAfee, reveals a surprising chasm between the number of teens hiding what they do on the Internet and parents who are confident that they’re in-the-know about their kids’ online activities. Perhaps most telling: 71% of teens have done something to hide their online behavior but only 56% of parents are aware of this. Over the next two weeks, we’ll explore what your teen may be hiding and how they may be doing it.


In the McAfee study, 2,017 online interviews were conducted in the U.S. Among respondents, 1,004 teens (age 13-17) and 1,013 parents of teens reported on their online habits and behaviors. The information gathered from respondents shows a fundamental disconnect between what teens are actually doing online and their parent’s perception of their activities. A surprising number of parents believe that they are aware of their kid’s activities and/or able to find out with little difficulty, while the majority of teens admit that they hide activities from their parents.

According to the McAfee report, “more than three in four parents express confidence they know how to find out what their teen is doing online, and half of parents live under the assumption that their teen tells then everything he/she does online. In reality, over two in three teens say their parents don’t need to know everything they do online...”

 

Here are some of the most common online activities that teens admit to hiding from their parents:

44.8% of teens visit a website parents disapprove of, but only 23.6% of parents are aware of it. In fact, the vast majority of parents interviewed (73.5%) trust their teens to not access age-inappropriate content online.

43% of teens intentionally access simulated violence online, but only 15% of parents are aware of it.

32% of teens intentionally access nude content or porn online, but only 12% of parents are aware of it.

In addition to visiting unsavory websites, easy access to technology has led many teens to participate in illegal or unauthorized activities. Most common, cheating in school: nearly half of teens interviewed (48%) admit to intentionally looking up answers to tests or assignments online while only 23% of parents expressed concern about their teen going online to cheat in school. A surprising 22% of teens have cheated on a test via online or mobile phones while only 5% of parents are aware.

Pirating of media is also more common than many parents are aware. About a third of teens (31%) pirate music or movies online, while only 12% of parents are aware. Since teens are likely using their parent’s internet connection to carry out the piracy, their illicit activities put their parents at risk of repercussions from entities looking to enforce copyright protection, such as the RIAA.

Even more disconcerting, some teens are engaging in dangerous behaviors and most parents are unaware of the risks their teen is undertaking: 12% of teens have met in person with someone they met online (that’s more than one out of every ten teenage respondents!) while only 4% of parents are aware. In fact, only 21.7% of parents think their teen can get in trouble online. Yet more than half of teens queried have posted private information like their email address or the name of their school online and almost a third (29%) have posted their cell phone number somewhere on the Internet. This puts them at risk for cyber bullying, identity theft, or even real-world victimization by those who’ve found them online.

What seems to be the cause of the disparity between parents’ perception and their teen’s actual behavior online? One in three parents believes that their teen is “much more tech-savvy than they are,” leading to a feeling of hopelessness when it comes to keeping ahead of their teen’s online activities. Many feel overwhelmed by technology (23% of respondents) and feel they can only “hope for the best when it comes to their kids online,” and just as many indicate that they don’t have the time or energy to monitor their kid’s behavior online.

The good news? Half of the teens who were polled stated that they would actually change their online behavior if they knew their parents were watching. Stay tuned next week for the most common ways that teens are hiding their online activities and what you can do to keep your kids safe online.

Find Free WiFi (almost) Anywhere

Find Free WiFi with a Few Simple Tips



You can find free WiFi just about anywhere, particularly if you plan ahead and know where to look. Here’s how to stay productive, or kill some time surfing the net, when you’re on the go.

From Panera to McDonalds to Starbucks or Barnes and Noble, getting online for free in a metropolitan area is just a matter of driving down the street. If you’re on unfamiliar terrain, check the comprehensive list of free WiFi options posted on WiFiFreeSpot (www.wififreespot.com). Start with the huge list of multi-location chain stores that offer free WiFi nationwide, or select your state for an alphabetical city list of individual providers.


Many libraries offer free WiFi – not to mention a quiet atmosphere to enjoy it – or hop online at one of the hundreds of airports that offer free Internet across the country. Click on the “Airports with Free Wi-Fi” link on WiFiFreeSpot’s homepage for an alphabetical list by state, as well as tips to avoid hidden fees. For example, avoid networks named “Free Public WiFi” in airports as it’s likely a fake, unsecure network set up to siphon personal info from unsuspecting travelers.

Free WiFi is available in many unexpected locations. Several bus lines now offer free WiFi, including Megabus (www.megabus.com) and Bolt (www.boltbus.com), as does Amtrak. Many Laundromats are adding WiFi hotspots to make waiting on your laundry more bearable and gyms often provide free WiFi to let you surf while on the treadmill. You may even find a free hookup where you get your oil changed or in the courthouse when you're stuck with jury duty. Call ahead to confirm availability, or if you’re in a major metropolitan area check out www.openwifispots.com to search by address or zip code.

When it comes to finding a hotel with free WiFi, going with a budget or smaller chain is a better choice than a luxury brand. You may think paying more for the room will get you more perks, but many of the “high-end” places (like Hyatt, Marriott, Waldorf-Astoria, Crowne Plaza, etc) charge $10 or more per night for Internet while their “budget” brands (like Courtyard, Fairfield Inn, Holiday Inn, Hyatt Place, etc) offer it for free. Check out the annual report released by Hotel Chatter for a list of best and worst hotel WiFi by cost and reliability: www.hotelchatter.com/story/2012/4/5/21415/90173/hotels/The_2012_HotelChatter_Hotel_WiFi_Report

Being part of the “in-crowd” can also save you a bundle. Airline priority clubs and hotel loyalty programs often provide free WiFi to members. While some of these programs require a minimum number of stays or miles traveled, many offer free Internet access upon sign-up.

Use a program like iStumbler for Mac or WeFi for Windows to plan ahead for WiFi near your destination. WeFi, for example, has an exhaustive list of millions of hotspots around the world, even in places you wouldn't expect like rural areas. They also have an app you can download to your iPhone or Android for hotspot searches on-the-go.

Foursquare devotees can take advantage of the affiliated free app 4sqwifi (available for iOS devices through the iTunes app store). It shows nearby venues which offer Wi-Fi and their passwords, anywhere in the world. Wifi Tracker is a good option for Android users ($1.56 through Android Store). It uses Google Earth to pinpoint your current location and show free Wi-Fi in your area.

If you subscribe to cable Internet, you may have access to their WiFi hotspots around town. Some companies even partner with other cable providers to extend their network. Check with your cable company for availability.

Finally, try asking for the WEP password if your mobile device finds a network you'd like access to. Many shop owners are happy to oblige.

Wednesday, June 19, 2013

Take Better Photos with these Smartphone Photography Tips

Smartphone Photography Tips for Better Pictures



We take our Smartphones with us everywhere, so chances are when you're ready to snap a quick picture of your kid or four-legged friend doing something especially cute, you're not going to have your fancy-schmancy camera handy. Yet more often than not, these fast photo-ops end up looking dark or fuzzy and out-of-focus. Here are a few tips for making your Smartphone photos go from blah to beautiful.


Experiment with apps. You can generally take better pictures with your phone if you're using an app to do it. Photo apps often have settings that may not be offered with the standard camera on your phone. There are tons out there to choose from, so experiment to find one that matches your own personal style. Better yet, download a couple so you have some variety from shot-to-shot. Start with CameraZOOM FX for Android (http://www.androidslide.com/camerazoom) or Camera+ for iPhone and iPad (http://campl.us/) – both are great for beginners while offering cool features.

If you want to make your photos more unique or "interesting,” Hipstamatic (http://hipstamatic.com/), Instagram (http://instagram.com/#) and FxCamera (http://fxcamera.com/) emulate old, cheap cameras with digital effects. Doesn’t sound like a selling feature? The end result is a retro, unique style for your photos and easy-to-use options to modify colors or tweak your photos on the fly.

Camera settings. Once you've settled on the app that's right for you, make sure you perfect the settings before you start shooting. First, make sure the camera’s resolution is set to the highest quality. The last thing you want is to take some really spectacular photos only to discover they're completely pixilated when blown up on your computer screen. Next, enable the "stable shot" setting on your application. Sometimes it's hard to hold the camera steady and prevent picture blurring - this setting won't allow you to snap until your hand is stable. Lastly, allow your phone’s camera to acclimate to the current lighting conditions and then adjust for white balance and exposure within the application. Experiment with different exposure settings to find the vibrant photo you're looking for.

Lighting. This is good photography 101, but it really can make or break your photo. Make sure your subjects are facing the light source and if the lighting in the room is dim, turn it up before you shoot. Better yet, move your subjects outside if you can - natural lighting makes for a much better photo. Watch the flash, too. Sometimes the flash goes off when you really don't need it and people's faces in your photo end up washed-out and pasty-looking. If it's dark and you're sure you need the flash, try muting it with a piece of tissue paper or a white sticker. That way, you'll still get some light from your flash, but it won't produce as much glare. When trying to capture a photo at night, take advantage of your camera's night mode (if it has one). It can make the difference between getting the shot you want and a totally-black picture.

Get the cool shot. Try to focus on one subject, rather than the scenery around it. Get up-close and personal when you can - you'll get a much more detailed photo. Aim to get at least a few pictures on-the-sly (you know your kids never want to "pose" anyway). Your subject’s demeanor will be a lot less stiff and self-conscious. Shy away from using the digital zoom. You can avoid some really lousy (read: blurry) pictures, and frankly that's what your fancy-schmancy camera with the mega-lens is for. Last but not least, always keep your camera lens clean; you know how dirty cell phones can get.

Back up frequently. It's so easy to forget to back up the pictures taken on your Smartphone - much more so than even your camera when you've been out-and-about shooting. Downloading your pictures directly to your computer is best (rather than emailing from your phone), because it will preserve the highest resolution possible. Then you can run those photos through your computer's photo editing software for last minute color adjustments. Experiment with black and white rendering too - it's always better to take your photo in color, and then change it to black and white later. If the image is well-composed, you can do some rather cool things with software to make it even better.

Tuesday, June 18, 2013

Big Developments for Apple at WWDC 2013

Apple WWDC 2013 Makes Big Changes



On June 10, 2013, Apple held their annual World Wide Developers Conference in San Francisco, CA. The event serves as a forum for Apple to announce upcoming product releases and innovations so that developers can begin to create supporting applications and hardware. It has become a reveal party for Apple fans. Here are some of the highlights of what you can expect from your iPhone, iPad or Apple computer in the months to come.


Mobile devices get an OS overhaul. Slated to be released this fall, iOS 7 is a major redesign of Apple’s mobile operating system, updating the look and capabilities of your iPhone (4, 4S or 5), or recent generation iPod touch, iPad or iPad mini. New icons will look more like those found on the Windows phone in terms of color and design. Double clicking the home button will show preview panels of all active applications (that you can quickly scroll through) for easier multitasking, instead of iOS 6’s icon-only list that appears at the bottom of the screen.

AirDrop will allow you to instantly share files, photos, contacts, or anything with an in-app “share” option by listing any fellow iOS 7 users in range and letting you click to share. Updates to the camera include panorama mode and built-in filters for making your images unique and photo organization will be more automated.

The App Store will offer suggestions of apps that are popular in your current geographical area or among your friends, and anyone who has longed for a more masculine automated-assistant will have the option to select a male voice for Siri interactions.

OSX Moves from cats to California. The next generation of Operating System for Mac desktops and laptops, Mac OSX Mavericks, promises more responsive scrolling and web surfing (via an update to the Safari browser) and improved battery life by managing power usage. With its release this fall, multiple displays will be better supported, iBooks will be available on your Mac, and iCloud keychain will encrypt, store and generate passwords to allow you to improve your online security without requiring a super-human memory.

Mac Pro sports a whole new look. At just 9.9 inches tall and 6.6 inches in diameter, the sleek, black cylinder is an unexpected design. It will easily fit on your desk, and Apple promises it will be faster and run cooler than previous generations.

MacBook Air aims to work all day. Previewed MacBook Airs are even thinner and lighter, and a new CPU draws less power, supporting improved battery life – the 11-inch version promises to keep on chugging for nine hours, the 13-inch version up to twelve hours. They should hit shelves any day and prices start at $999.

Google gets kicked to the curb. Apple seemed to be repeatedly suggesting, “Google? Who needs them?” Siri will default its web searches to Bing; iWork for iCloud aims to replace Google Cloud as a web-based document creation, management and collaboration tool; Safari will sport Chrome-like tabs; and Apple’s Maps app will be integrated with Mail, Contacts and Calendar in OSX Maverick.

Pandora is put on notice. iTunes Radio will offer streaming radio, similar to the service available through Pandora or Google Play. ITunes Radio will track what you listen to across platforms (such as on your Mac or through your Apple TV) to personalize suggestions. Create playlists based on music you like and listen for free, provided you are willing to listen to ads. ITunes Match subscribers will get ad-free tunes included with their $24.99 annual subscription.

To see Apple’s announcements yourself, go to www.apple.com/apple-events/june-2013/ for roughly two hours of footage from the conference.

Thursday, June 13, 2013

Zeus Trojan Steals Bank Account Info via Facebook

Zeus Trojan Steals Bank Account Access



A nasty Trojan virus nicknamed Zeus has been spreading quickly through social media forums like Facebook and via links to fake webpages. Once a system is compromised, the virus lays in wait until the user accesses a banking account or credit card website wherein it captures login and personal data. That information is then transferred to servers controlled by cybercriminals who sell the data or drain the victim’s bank account.


Zeus began circulating the net about six years ago, but has seen resurgence in recent months according to Internet security firm Trend Micro. The New York Times’s Nicole Perlroth (http://bits.blogs.nytimes.com/2013/06/03/malware-that-drains-your-bank-account-thriving-on-facebook/) reports that millions of computers are already infected, most of which are in the United States.

Much of this malware’s recent rapid disbursement is via links posted on Facebook. Culprits set up fake profiles and post links on popular fan pages or hack user accounts to spam links to “Friends.” In many cases, links take the user to a website where they’re prompted to purchase knock-off designer goods. After entering credit card info to complete the purchase, the victim’s credit card number (along with name and address) is sold or used to place fraudulent charges. In other cases, the website link takes the user to an infected page that installs malicious code when accessed by the unsuspecting victim.

The virus is also spread from compromised email accounts: the Trojan accesses an infected user’s contact list and then sends emails with links to malware-infected pages. The sender address is spoofed to appear as though the email was sent by the infected account, so anyone in the infected user’s contact list receives a message that appears to have come from a known source. If you ever receive a suspicious-looking email with a link or attachment, even if you recognize the sender, do not click the link. Instead, contact the sender to confirm that the email was truly sent by them.

Once infected, the Trojan virus runs silently in the background, harvesting users’ private data. In some cases, compromised systems redirect victims to dummy websites made to appear like the user’s bank or credit card account login page so that more valuable personal information (such as social security number, date of birth, address, etc) can be collected.

Many of the fraudulent links used to spread Zeus via Facebook in recent months have ended in .tk (where you’d typically see .com or .org). This domain indicates that the website is hosted via Tokelau, a small territory part of New Zealand which is, according to Jerome Segura of the anti-malware software company Malwabytes, “a hotbed for all sorts of online fraud.” As infected webpages are identified and blocked by browsers and/or antivirus software, cybercriminals simply set up a new web address, so there’s no easy way to eradicate Zeus and its variants from the net.

While Facebook has partnered with web security specialists WebSense and Web Of Trust (WOT) to identify, flag and alert users of potentially fraudulent links, it’s ultimately up to the user to exercise caution when clicking links on Facebook, in emails, or anywhere on the net. Keep in mind that links to Zeus-infected pages are cropping up all over the Web, from comments on articles or blogs to sponsored ads, so users must remain diligent about avoiding weblinks from anywhere but a completely trusted source.

In a blog posted to Trend Micro’s “TrendLabs” (http://blog.trendmicro.com/trendlabs-security-intelligence/zeuszbot-malware-shapes-up-in-2013/), Jay Yaneza recommends that you bookmark trusted websites so that you don’t inadvertently mis-type an address and end up re-directed to an imposter site. He cautions that users should avoid visiting unknown websites and keep their system’s anti-malware software up to date to reduce the risk of exposure.

Mobile Malware Explodes in 2013

Mobile Malware Gains Ground in 2013



The numbers are out: McAfee's report on viruses in the first quarter of the year shows mobile malware, which exploded last year, is showing no signs of stopping. Smartphones, which just recently outnumbered “dumb phones” worldwide are increasingly becoming the targets of the same sorts of viruses and malware that we've worried about on our computers for years. McAfee, a large security firm owned by Intel, reports that 28% of all malicious smartphone software has appeared in the first quarter of 2013. The year previous saw a huge spike in which the rest of the 50,000 programs emerged, although some estimates claim there are up to a million mobile viruses at the time of this writing.


The most common form of mobile viruses is the age-old Trojan Horse virus. This virus pretends to be another sort of software and coaxes the user into installing it. After being installed, it spreads throughout the system and locks down many of the phone functions, essentially turning the phone into a zombie under the control of the hacker. The zombie phone will then send out text messages to infect its next targets. For instance in South Korea, a widely-spread virus poses as a coupon app for a coffee shop and then takes control of the user's phone.

There are a number of security products for smartphones on the market. One such app is AVG's Antivirus for Android http://www.avg.com/us-en/antivirus-for-android. It will also help you locate your device in the event that it's lost or stolen. It's only available for Android, which is also the only system that runs a high risk of infection. However, some research shows that mobile antivirus programs aren't nearly as effective as their PC counterparts, due to the way antiviruses access the phone's system http://www.informationweek.com/security/antivirus/does-mobile-antivirus-software-really-pr/240008673.

The best antivirus for iPhones running iOS is Lookout Mobile Security, which is available for free. While there are fewer viruses on iPhones, Lookout also notifies you of connections to unsecured networks and allows you to track your phone if it's lost.

So how do you tell if you have a piece of this mobile malware? The warning signs are largely the same as on PCs: applications will start to slow down and strange things will start happening. Make sure you've installed an anti-virus first, but if it's gotten past that, you may be out of luck. Call a phone repair company or use a service like Sugar Sync to back up your personal files from your phone and follow your provider's instructions to reformat and reinstall your Android phone.

For now, the best way to keep your smartphone free of mobile malware relies on vigilance from you. Make sure not to download any apps that you didn't go looking for. If it comes to you, it's probably too good to be true! Make sure to only download from authorized sources. And as always, don't give your passwords to anyone you don't trust. If it looks sketchy, it almost certainly is! If you think you may have been the victim of mobile malware, call a smartphone repair company that can salvage your data and restore your phone.

Tuesday, June 11, 2013

Waterproof your Phone and Other Gadgets this Summer

Waterproof your Phone & Gadgets


It's finally the summer and it's time to spend less time indoors and more time soaking up sun. Whether you have a pool or head to the lake to get your fill of vitamin D, everyone spends more time outdoors in the summer. And most of us will end up bringing at least a few gadgets with us, like our cell phones. But while the beach is a relaxing place for us humans, our phones don't react to well to sand, water, or heat - common ingredients for summer fun. Fortunately they're not too hard to protect. We've gathered a few ways to summer-proof your devices here.


An essential part of summer is heat, and it's only getting hotter. Unfortunately your cell phone doesn't react to heat too well. Overheated phones will shut off, and running your phone for too long at a high temperature will permanently damage its battery. Make sure not to leave your phone in a hot car, and pay attention to how hot it is when you're using it. If you don't need to use your phone for a bit and it's getting hot, just turn it off and let it cool down. Also, charging your phone only at night will keep it cool and save energy.


For physical damage, consider buying a protective case for your phone. For a bit of money (around $100), consider the OtterBox armor series. If you're a professional device-dropper or if you just spend a lot of time in dangerous situations, this case can protect your phone underwater and can protect it being dropped onto concrete.


If you're not too worried about water, but you want to protect your laptop or tablet from the bumps and drops of everyday use, the Just Air Cushion https://www.justaircases.com/ provides a lightweight and inexpensive ($30) way to protect your devices from unfortunate falls.

No matter where you're going this summer, make sure to install tracking software on your phone. With all the beach parties, vacations, and other outings over the summer, there's a lot of opportunity for your phone to get lost. Prey http://preyproject.com is a free app for your phone that allows you to track your phone if it's lost. 

Monday, June 10, 2013

Tech Gifts for Dad on Father's Day

Find the Best Tech Gifts for Dad this Father's Day



Father’s Day, aka “Dad Appreciation Day,” is rapidly approaching and there are some great online resources that can help you to show dad (or help the kiddos show their main man) that he’s one of a kind. Before you pick up another tie or coffee mug, consider easy ways to customize and make it unique. Get inspired with Pinterest and links to simple crafts, or if dad is a technophile we’ll suggest a few of our favorite gift-worthy gadgets.


One of the quickest ways to make a gift distinctive is to use custom labels, referred to as “printables.” Armed with your computer, a decent color printer and some sheets of un-cut labels, you can make your own cards or turn any ho-hum gift into a custom show-stopper.

At first the idea of creating a custom label seems too work-intensive. From having to be creative enough to come up with a cool design, then meticulous enough to get the label sized correctly for the finished product – it makes you want to just head to the store for a gift card instead. Luckily, many friendly bloggers and talented folks have done the work for you and posted their templates online so you need only find a style and message that appeals to you, print and cut at home. Some will be available for purchase but there are loads to be had for free.

DIY crafts abound. The crafty and creative bloggers at “How Does She” (www.howdoesshe.com/26-adorable-fathers-day-ideas/) have compiled a collection of projects for all skill levels, including free printables and links to customized gifts, most often with detailed walkthroughs. Not feeling creative? Some items can be purchased so you look like you made it yourself without busting out the scissors.

Before you wrap up a pair of socks or a bottle of dad’s favorite cologne, slap on a quick, free Father’s Day label to give a run-of-the-mill gift a little extra pizzazz. Babble.com provides links to chic, free Father’s Day printables, already created and sized: www.babble.com/home/10-amazing-fathers-day-printables/

Treat your beer or wine aficionado to a truly custom bottle when you upload your own images to personalize a bottle of wine or beer at GrogTag (http://www.grogtag.com). Tags run $20 for 48 labels, and they’re reusable so you can get more bang for your buck. There are video tutorials if you run into trouble, but the process seems pretty simple.

If you still haven’t decided on the perfect gift or gesture of appreciation, Pinterest (www.pinterest.com) offers Father’s Day gift inspiration. While searching for pins labeled “Father’s Day” will return an overwhelming number of results, try searching for boards instead. Scan images (you’ll see the one the pinner has selected for their cover image as well as their most recent four pins right on the search results page) for someone whose tastes are in-line with yours. Check out their board for a quick path to a collection of gifts, crafts, or things to do to show dad you appreciate him.

Finally, it your Nerdy dad is hinting that he wants to increase his collection of gadgets; here are a few favorites that are sure to please:

For the dad who’s always lamenting the lousy WiFi in the far reaches of the house, the Amped 600mW Compact Wi-Fi Range Extender (www.ampedwireless.com/products/rec10.html?gclid=CITtju-Ty7cCFQ1xQgodiBAAJA, $80) plugs into any electrical outlet and boosts the signal from your wireless router. Never dropping off the network in your own home again? Priceless.

For the guy who loves his snazzy home theater but hates fighting with the remotes to go from movie to TV to video game, the Harmony One remote control (www.amazon.com/dp/B005FO43OU, $300) is truly an all-in-one, press one button and it works like a magic remote. Use your computer to customize it to your equipment and from that point you’ll press one button, such as “watch TV” or “play game” and every device is changed to the right channel and input to work. No more struggling to remember that you need to scroll to “surround 7.1” when you want to watch a movie and the docking station will let you save on batteries.

If his computer can never be fast enough, a solid state drive will give him blazing fast start-up and responsiveness. The installation and set up process can be daunting (“Happy Father’s Day! Now spend the weekend reinstalling your operating system”), but he’ll thank you every time he turns on his computer to get some work done. The Samsung 840 series 2.5” SATA III Solid State Drive (www.samsung.com/us/computer/memory-storage/MZ-7TD120BW ) starts at around $100 for 120GB of storage.

Thursday, June 6, 2013

Job Hunting after Graduation: Manage your Online Reputation

Manage your Online Reputation while Job Hunting after Graduation



Once your proud graduate has grown up too quickly and has left the podium with her diploma, she's probably ready to jump into the “real world” of getting a stable job at a big company and starting a career. But we all know that the “real world” has gotten much more complicated than that. One of the biggest complications is navigating the tricky world of social media and its affects on finding a job after college. So many young people spend their teenage years posting content on the internet that can be difficult to manage when they're going to look for a job.


In January 2012, Microsoft released a study of consumer behavior activity online. Out of more than 5,000 polled, they found that 14% of adults reported negative consequences from their online activities. Out of those 14%, 21% were fired, 16% lost out on a job, and 14% were passed over by a college.

In December 2009, Microsoft reported that 79% of hiring managers reviewed online material and 70% of them supported rejecting candidates based on this online material.

With the majority of employers checking the online reputation of graduates and job seekers, it's more important than ever to know the message that's being spread about your online reputation. Your online reputation is easy to check, but difficult to manage. As always prevention is the best protection, but you'll never know how bad it is until you look. Here's the steps to taking control of your online reputation:

Google Yourself: 42% of people in the U.S. Google themselves. While it may often be merely a form of amusement, it provides valuable insight into your online reputation. Whether you like it or not, the first page of your Google results often weighs more heavily on your reputation than the first page of your resume. To get the best view, Google yourself using private browsing mode so that your personalized results don't affect what you see. Then set up a Google Alert for your name so that whenever a new page is published on the web with your name, you'll be among the first to see it.

Build Your Buzz: If there's not much about you on the web, or all the results are people with similar names, you're in luck: all you have to do is build content and they will come. Most people who haven't marketed themselves will be in this category. But even if there's been some stuff posted that you don't want associated with you, the method to improve your results is the same: create content that Google can associate with you. Sign up for LinkedIn, which is a professional networking service that is good for building positive results. It's free and can tell potential employers about your skills, education, and employment. If you already have a LinkedIn account, simply create as much content on the web that features your name prominently, as well as any keywords you want people to associate with you. Over time these links should rise to the top.

Present Yourself Professionally: Sometimes the most damaging content about you or your recent graduate isn't content posted by others. Typos, embarrassing photos, and revealing statuses can send warning signals to potential employers. If you don't believe your friend circle on Facebook is the place to worry about grammar and spelling, make it private. Whenever you post something visible by potential employers, think about how it will come across to them.

The Last Resort: Sometimes you can't always clean up the content by yourself. Many people have found themselves in this situation, usually maliciously, but sometimes passively slighted by online content. There are services for managing your internet reputation like reputation.com. However, these services are expensive.

Most problems can be solved simply by creating enough content relevant to you. Unless you've done something worth plastering all over the web, the content most favorable to you will usually float to the top. Just make sure there isn't any debris floating around in there.

Wednesday, June 5, 2013

Learn About Two-Step Verification and Which Services Use It

Why Should You Use Two-Step Verification?



A lot of online services have announced recently that they're introducing two-step or two-factor verification for their users. It all started when Google implemented the security feature into their Google services, but what exactly is two-step verification?


Two-step verification solves a very old problem with computer security. If a hacker gained access to a user's password that they were using across multiple accounts, they could string together their hacks by sending password resets to alternate email accounts. Two-step verification solves this in an ingenious way. There are a few ways to implement two-step verification.

The simplest way, like LinkedIn's two-step verification or Twitter's two-step verification, is to send a text message to a user's phone every time that account is signed in from a new device. If the correct code is not entered, the account cannot be accessed from that computer. That way, hackers have to have access to the user's phone as well to hack their account, which is highly unlikely.

Google and Facebook use a more secure method of two-step verification. If you have a smartphone, Google or Facebook's two-step verification installs an app on your phone that generates a new access code at timed intervals of around a minute. Instead of getting a text message when a new device accesses the account, the person trying to sign in is prompted to use the current security code, which will not work again for the account. This method of two-step verification is more secure.

Computer repair experts highly recommend enabling two-step verification if you have a phone with texting. It's much more secure and highly reduces the chances of you getting hacked. We've included the links to a number of popular services with two-step verification to help you out:
Google Two-Step Verification
Facebook Two-Step Verification
Dropbox Two-Step Verification
Microsoft Two-Step Verification
Yahoo Two-Step Verification
Twitter Two-Step Verification


 

Tuesday, June 4, 2013

Bing vs Google: The Challenge

The Bing vs Google Challenge



When it comes to searching the net, Google is the far and away market leader.  In the U.S., Google captures an average of 67% of monthly queries with the runner-up, Microsoft’s Bing, accounting for just about 17%.  Microsoft wants to change the public’s searching habits with their “Bing It On” campaign wherein users are asked to perform a blind, side-by-side comparison of the two search engines and vote on which they prefer.  Can Bing take-on heavyweight Google?


I started off by taking the “Bing It On” challenge at www.bingiton.com.  You’re prompted to perform five searches.  Results are presented side-by-side with ads stripped and the pages looked remarkably similar.  The first time Bing was favored 3-1 with one “draw,” the second time I ended up with a straight tie with Bing winning two, Google winning two, and one draw. This surprised me.  I found that while in many cases results were nearly identical, Bing’s results were somewhat more pertinent and from sources that I found more reliable.

I then performed the same searches using my favorite browser (Chrome) with Bing in one tab and Google in another.

Typing www.google.com into my address bar resulted in a plain white page with the search bar.  Going to www.bing.com produced full-screen, colorful beach play scene with the search bar prominently placed near the top.  At the bottom of the page is a scrollable bar of images related to “Popular Now” news and interest stories.

Bing was a more colorful search home page, which I found more appealing.  Google is designed to be completely customizable so that you choose your own background, appearance and interest tabs.  However, I’m a lazy surfer and in all my years of using Google have never taken the time to change its default appearance.

Google and Bing both softly pre-fill with frequently searched suggestions while you type your inquiry; however I liked that Google also provided sample search results as I filled in details.  This allowed me to start with a relatively generic search, “best family vacations” and use the suggested search options and actively updating results to modify my search.  I ended up with “best deals all inclusive family vacations” based on Google suggestions and results returned before I even finished submitting my query.  Bing doesn’t return results until you submit, so I found that I had to search and go back, search and go back, a few times until I was able to narrow down the results to the information I was interested in.  This resulted in Google returning more relevant results more quickly as it helped me figure out what I was really looking for.

This may explain Google’s higher “click-through” rate.  According to Slingshot SEO, the first result that appears on Google’s search engine results page is clicked (to see the resultant page) approximately 18% of the time vs. Bing’s approximately 10%.  This indicates that Google results are more often pertinent to what the user is looking for. Both search engines include ads, with “featured” results (paid listings) in a highlighted box at the top of the search results page.  However, Google’s right portion of the screen is dedicated to a list of additional ads while Bing returned only one ad on the right followed by a list of related searches.  I liked Bing’s related search options for quickly surfing for additional info.  I also find that a large amount of “sponsored results” can be visually confusing when looking for accurate results.

The amount of ads on Google is indicative of the popularity of their search engine and resultant appeal to advertisers.  If Microsoft is successful in gaining converts with their campaign it may result in an increase in sponsored results.

 

 

Monday, June 3, 2013

Summer Computer Protection for and from the Kids

Summer Computer Protection From the Kids



Summer is the season for computer mayhem.  The kids are home from school, often unsupervised, and boredom does not bode well for you system's health and welfare.  Your endlessly-curious teenager will inevitably find a million add-ons, applications and potentially shifty files to download onto your system while you're at work.  Before chaos ensues, here are some quick tips to protect your computer from having "too much fun" this season.


Anti-virus/ anti-malware software is an absolute must.  Make sure the software is current by configuring it to automatically update itself when new versions are released.  Set it up to scan your system routinely.  You may want to have it run more frequently during the summer months.  For Windows users, I recommend Microsoft Security Essentials (http://windows.microsoft.com/en-us/windows/security-essentials-download).  It's free, easy to use and install, and helps protect your computer against viruses, spyware and other malicious software.  It supports Windows 7, Vista and XP.

While Mac users are less likely to encounter viruses or malware, it's still a good idea to have some protection.  Avast Free Antivirus for Mac (http://download.cnet.com/Avast-Free-Antivirus/3000-2239_4-75451160.html?tag=dropDownForm;productListing;pop) provides anti-virus shields on your filing system, email and the Internet by scanning the pages you attempt to navigate to.  It supports Safari, Firefox and Chrome browsers.

Create separate user accounts for each member of the family.  Aesthetically, it allows everyone to have a sense of individuality with customized backgrounds, desktop icons and folders.  It also gives kids some privacy by keeping prying siblings out of each other’s “business.”  From a practical standpoint, if the administrator account is the default user account on the machine, spyware and malicious software can potentially get administrative rights over your computer.  When you visit a website that is infected, you may be prompted to "allow" a program to run.  Clicking "yes" can allow malicious software to run rampant.  Separate user accounts may help keep it contained.

Every operating system is slightly different, but here's a link for creating separate accounts for Windows 2000, Windows XP and Mac OS X: http://support.hubris.net/knowledge_base/018.html.  Make sure Mom and Dad are able to access the accounts of everyone in the household.  Peruse the restrictions options to limit the ability of users so they can’t install or remove programs.

Use parental control software.  Programs like NetNanny (www.netnanny.com) can help you keep control of your system.  You can use them to set time limits on Internet usage and control the video games your kids are able to play.  You can establish permission restrictions so they can't download and play potentially dangerous programs.  Parental control programs also monitor many sorts of social contacts to protect your kids from dangerous individuals and monitor who they're interacting with.  If you want to be in the loop when you’re away from home, enter your email or text info so that it can send you notifications of which sites were blocked from your kids and why.

Windows users also have access to Family Safety.  If it's not already installed on your computer it can be easily downloaded from Microsoft's website (http://windows.microsoft.com/en-ca/windows7/protecting-your-kids-with-family-safety#section_1).  Once you've set up user profiles for every member of your family, tailor their allowed computer activities and Internet access to their individual needs.  Control categories of websites they can view, put time restrictions on computer usage, specify the times of day they're able to use the computer and receive activity reports detailing what they’re up to while you're away.  The Family Safety Website allows you to manage settings from anywhere and the changes apply to every computer you've set the Family Safety Filter on.  Best of all, it's free.

Finally, don't discount the importance of talking to your kids about your expectations.  Automated monitoring can only go so far.  Let them know you don't want them downloading anything to the computer without your permission and/or supervision.  Talk to them about where they should and shouldn't be surfing on the web.  Set limits regarding screen time that includes all devices they have access to.  This way, you can hopefully avoid any nasty surprises.

Worst case scenario: add your favorite computer repair professional to speed dial and pre-book your September tune-up before all the other desperate parents clog up the schedule.

Saturday, June 1, 2013

Nerds On Call: Complaints about Windows 8 lead Microsoft to Deploy Fixes

Nerds On Call: Complaints about Windows 8 lead Microsoft to Deploy Fixes




If you've used Windows 8 yet, chances are you have your fair share of frustrations with the operating system. Perhaps it's the lack of the start button, the way that snapping works, or otherwise it's just too confusing. In a welcome move, the maker of the operating system, the software giant Microsoft announced that it would be fixing a number of these problems in an update to Windows 8 that will be available on June 26. It will certainly be a welcome upgrade at Nerds On Call Computer Repair. Complaints about some of its more frustrating features have become commonplace among our Nerds. So what exactly does this promising update provide?


Return of the Start Menu: So far Microsoft has announced a few key features for Windows 8.1, promising more to come. The first and most exciting announcement is the return of the start menu. It will appear on the taskbar as a windows logo in the same position that the lower-left icon now occupies. According to Microsoft, this change comes because "we also recognize there are many non-touch devices in use today – especially in the commercial setting. As such we’ve focused on a number of improvements to ensure easier navigation for people using a mouse and keyboard."

Search for Everything: Another new feature that Microsoft is including in the Windows 8.1 update is an improved search experience. The new version will integrate much more with Bing and will provide contextual information from the web based on your search. The previous, Windows 8, version of this feature only allowed searches for local files, settings, or apps. The new search bar promises to be more powerful. According to Microsoft, "It is the modern version of the command line!" Those who have been using the command line for years welcome an upgrade, like those of us at Nerds On Call Computer Repair. Complaints about the limited functionality of the search bar seem to have been fixed, although time will tell how users adapt to Bing's search engine. The move could gain Microsoft ground in their battle against Google's search superiority.

Make it Yours: Windows 8.1 will also be including more personalization options, including the ability to choose your own background for the start screen - including animated backgrounds. Windows 8.1 also provides the option to keep your start screen and desktop background the same, "creating a greater sense of unity and familiarity." The lock screen can now also be used as a slideshow so that Windows 8.1 running on a tablet device can serve as a picture frame.

Control Everything: Among the tech types like us at Nerds On Call Computer Repair, complaints have been high about the way that the control panel is set up in Windows 8. Windows 8.1 promises to "give[] you access to all your settings on your device without having to go to the Control Panel on the desktop. You can do things like change your display resolution, set your power options, see the make and model of your PC, change the product key, let you run Windows Update, and even join a domain – all from PC Settings."

There are a number of other minor updates to Windows 8.1 apps like SkyDrive, Internet Explorer, and the Windows Store and more changes are promised. This Windows 8 update looks to be a step in the right direction for Microsoft. If they keep this up, Nerds On Call complaints about Windows 8 will surely decrease. The release date of June 26 can't come soon enough!

Quotes from: http://blogs.windows.com/windows/b/bloggingwindows/archive/2013/05/30/continuing-the-windows-8-vision-with-windows-8-1.aspx