Archive for the ‘Computers’ Category

16 Fantastic Google Tricks | Computers & Internet – BabaMail

Great tips on using goggle. Here is a silly one. Try it… -keith —–

5. Typing ‘do a barrel roll’ will actually make Google do one!

Source: 16 Fantastic Google Tricks | Computers & Internet – BabaMail

Advertisements

How to Tell If Your Phone has Been Hacked | Computers & Internet – BabaMail

My new found tip -• When charging your phone through an unknown computer, choose the setting, ‘only charging’. -keith

A guide showing you how to recognize whether your phone has been hacked and what to do about it.

Source: How to Tell If Your Phone has Been Hacked | Computers & Internet – BabaMail

Your phone is not as private as you think it is, and we have yet to be able to purchase a phone that cannot be hacked. To reduce the potential risks, bear in mind the following tips, teaching you how to recognize a phone that has been hacked, as well as how to protect your phone from malevolence.
1. How your phone can be hacked
• The easiest way for hackers to take possession of your phone is through apps such as Spy Phone App, Spyzie, Theonespy, or Spyera.
• It can also occur through an unprotected Wi-Fi network in a cafe or airport.  When you log on to public Wi-Fi, you actually share all your traffic with everyone around you.
• There is also a risk of all your data being revealed and transferred when charging your phone via an unknown USB (even if on an airplane or a car).
• Hacking can also take place through SMS phishing, which happens when you receive a message with a link saying that it is, for instance, your bank statement, a money transfer, or your photos. When you click on the link and download the file, all your phone contents are revealed to the hackers.
• It is also possible for hackers to read your text messages, listen to your phone calls and track your cell phone locations with the help of Signalling System SS7 – used by the majority of telephone stations all over the world.
2. How to recognize that your phone has been hacked
• You may notice that your phone has suddenly started to run out of juice very quickly. This can happen when an unknown app is running inside your phone.
• Noticing that your phone gets warm, even if you hadn’t made a call, is a sign that there is an unknown app running.
• Your phone reboots itself. You may see it switch off, dial numbers or start applications. Unless your system has broken down, it could be tapping.
• You may also notice new unknown phone numbers in your recent calls.
• You are unable to switch off your device. Instead your phone starts opening different apps, increasing the lighting and so on.
• You may also experience noises, or echo during calls, which you haven’t had before.
• When unfamiliar apps pop up on your phone, or a strange message is sent to numbers in your address book, you’ve likely been hacked.
3. I’ve been hacked, what do I do?
• If you’ve been hacked, the first thing you should do is reset your passwords. Starting with your email account, followed by your financial and other critical accounts. Resetting your email passwords first is important because all other accounts are typically sent to your email.
• If you’re locked out of your account or blocked from accessing it, most Web services have steps in place so you can get back in. For instance, Facebook has a system where you can use a trusted source, such as a friend to help you take back your account. Be sure to search each service’s help section for specific instructions.
• It is also important to let your contacts know that you’ve been hacked , reporting the issue to the site. Also, run a scan of your computer or mobile device using a trusted, and up-to-date antivirus program.
• Should you experience identity theft, order a copy of your credit reports, and file an initial fraud alert with the three major credit bureaus: Equifax, Experian and TransUnion. Then contact your local police and report the identity theft, and request new cards from your bank and credit card companies. Be sure to continue to monitor your monthly statements for any unusual activity.
• As such, there is no way to completely eliminate the risk of hack attacks and other cyber crimes. The important thing to do is to safeguard and arm yourself by protecting your phone and minimizing damage.
4. How to protect your phone
• If you receive a message with a link and you cannot see the full URL, do not open it.
• When charging your phone through an unknown computer, choose the setting, ‘only charging’.
• Never use the ‘remember passwords’ function.
• Switch off your automatic connection to public Wi-Fi networks and choose them manually instead.
• Be sure to also avoid networks with suspicious names such as freeinternet, or wififree. Always choose networks that are protected with a password, especially if you are in a cafe.
• Never make an online purchase or transfer money on public Wi-Fi networks.
• Add a password to your phone.
• Run a mobile anti-virus software, protecting your device from the inside out with comprehensive security software. McAfee Movile Security is free for both Android and iOS, and this will help to protect your device and its data from hackers.
• Be sure to keep your phone updated as this will help defend against updated threats.
• Check your credit card statements regularly, ensuring that there are no suspicious payments.

 

Sept – Lincoln City Libraries – Facilities Planning

Lincoln City Libraries Seeks Public Input on Facilities Plan

Lincoln City Libraries (LCL) invites the public to attend meetings in September to provide input regarding the branch library facilities plan. The plan addresses the layout and design of each building and also considers how rearrangement and the reallocation of space, furnishings and technology will strengthen LCL’s ability to serve the community.

Sessions are scheduled at these locations:

Gere Branch, 2400 S. 56th Street, 6 p.m. Wednesday, September 6
Walt Branch, 6701 S. 14th Street, 3 p.m. Sunday, September 24
Eiseley Branch, 1530 Superior Street, 6 p.m. Tuesday, September 26
Anderson Branch, 3635 Touzalin Avenue, 6 p.m. Wednesday, September 27.

Input also may be sent to library@lincolnlibraries.org.

Source: Lincoln City Libraries | Lincoln, Nebraska

Turning Off Auto-Playing Sound for Videos on FB | Computers & Internet – BabaMail

How to Turn Off Auto-Playing Sound for Videos on Facebook

If you’ve got a Facebook account which you use frequently, you’ve probably realized how often changes are made to the app. One new change to be on the look out for are videos, which are about to get a whole lot louder. Due to the upcoming update, videos will start playing sound automatically as you scroll through your feed.

 Previously, you could only hear video sound if you tapped on the video in your Facebook News Feed, but now, as long as your device is not on silent mode, expect to hear the sound of videos fade in and out as you scroll through your feed. While this may not bother everyone, there may be instances where you need to keep the volume down. Read on to discover how to disable it.

Source: Turning Off Auto-Playing Sound for Videos on FB | Computers & Internet – BabaMail

Kris Kobach says he can’t comply with Kris Kobach’s voter data request – The Washington Post

This is the guy who asked for the data. nebraska needs to withhold SSN data as well. Data is never safe enough as we all know. -keith

He’s not the only Election Integrity Commission member with the problem.

Source: Kris Kobach says he can’t comply with Kris Kobach’s voter data request – The Washington Post

Democratic party ask this.
Please contact Nebraska Secretary of State John Gale at 402-471-1572, (email is john.gale@nebraska.gov) and let him know Nebraska voters do not want him to provide this outrageous request to give our voter information to the Presidential Advisory Commission on Election Integrity that Trump calls a “voter fraud panel”. John Gale has not made up his mind yet about this issue. Call now! 
Below is an exerpt from CNN’s interview with Kris Kobach. Click on the blue “letter” to read the entire letter sent to each state and the District of Columbia. Forty four states have refused to comply or to provide only some data requested.  The link to the entire CNN report is http://www.cnn.com/2017/07/03/politics/kris-kobach-letter-voter-fraud-commission-information/index.html
“Kansas Secretary of State Kris Kobach, vice chairman of the Presidential Advisory Commission on Election Integrity, which President Donald Trump created by executive order in May, sent a letter to all 50 states last Wednesday requesting a bevy of voter data, which he notes will eventually be made available to the public.The order came months after Trump claimed without evidence that millions had voted illegally in the 2016 presidential election. When states began to express concerns about the legality of his administration’s efforts to investigate voter fraud, Trump called them out on Twitter on Saturday, questioning whether they were hiding something.
The information the commission is seeking includes registrants’ full names, addresses, dates of birth, political parties, the last four digits of their social security numbers, a list of the elections they voted in since 2006, information on any felony convictions, information on whether they were registered to vote in other states, their military status, and whether they lived overseas.
Jane Egan, Chair
Lancaster County Democratic Party
830 L Street
Lincoln NE 68508

What will happen to my Facebook account if I pass away? | Facebook Help Center

What will happen to my Facebook account if I pass away?
shareShare Article
You can tell us in advance whether you’d like to have your account memorialized or permanently deleted from Facebook.
Memorialized Accounts
Memorialized accounts are a place for friends and family to gather and share memories after a person has passed away. Memorialized accounts have the following key features:
  • The word Remembering will be shown next to the person’s name on their profile
  • Depending on the privacy settings of the account, friends can share memories on the memorialized Timeline
  • Content the person shared (example: photos, posts) stays on Facebook and is visible to the audience it was shared with
  • Memorialized profiles don’t appear in public spaces such as in suggestions for People You May Know, ads or birthday reminders
  • No one can log into a memorialized account
  • Memorialized accounts that don’t have a legacy contact can’t be changed
  • Pages with a sole admin whose account was memorialized will be removed from Facebook if we receive a valid request
Deleting Your Account
You can choose to have your account permanently deleted should you pass away. To do this:
  1. From the top right of Facebook, click  and select Settings
  2. From the left menu, click Security
  3. Click Legacy Contact
  4. Click Request account deletion and follow the on-screen instructions
For Friends and Family
If you’d like to create an additional place for people on Facebook to share memories of your loved one, we suggest creating a group.
Learn how to request the memorialization of an account or how to request the removal of a deceased person’s account from Facebook.

Source: What will happen to my Facebook account if I pass away? | Facebook Help Center

Social Media Etiquette for Seniors

What are older adults doing online? They’re using social media platforms to: Reconnect with long lost friends and relatives Stay in touch with children and grandchildren Talk to family and friends who live far away Find new hobbies and learn about new interests Talk to like-minded people See and share pictures of their children and grandchildren. 5 Rules of Social Media Etiquette, Read More at the Source: Social Media Etiquette for Seniors

Sample
5. Finer Points of Internet Etiquette
You may or may not know that:

  • Writing with CAPS LOCK ON means you’re yelling at someone.
  • Emoji’s (small pictures that express an emotion) are used to show how you’re feeling and can replace words. But if you misuse or overuse them your meaning can be confusing, lost or misinterpreted.
  • Hashtags (a # symbol) are used to categorize and tag pictures and posts so that they can be found again. Misusing or overusing them can be annoying and can make future searches difficult.
  • Tagging someone in a picture (or a post about an event) should only be done when the person is actually in the picture or at the event you’re discussing – and again, don’t overshare information. Make sure the person will be okay with being tagged first.

About the Author – Kimberley Fowler is a writer and editor dedicated to improving seniors’ lives through education, activism, volunteerism and community programs.

%d bloggers like this: