Jere’s Tech Tips

Jere's Tech TipsWindows, Android, Linux tips from Jere Minich, Advisor, Region 5 (AL, FL, GA, SC)        

SECURITY FLAW IN WEB BROWSER AUTOFILL TOOLS CAN STEAL YOUR DATA – Web browsing can sometimes feel like navigating a huge minefield. It’s filled with hidden foxholes, traps, and other tricky dangers that can endanger you even when you least expect it. These days, nothing seems safe online – there’s always an enterprising hacker poking holes on every would-be stalwart system out there. Every day it seems, a vulnerability is always waiting to be discovered. And who knew even one of the conveniences of modern browsers can be exploited to gather more information about you and even potentially steal your data?

Find out about the autofill flaw at this article:

HOW TO FIND AND DELETE GOOGLE ASSISTANT’S STORED VOICE DATA – Every time you use Google Assistant, a recording of the command is uploaded to Google—that’s how it does what it does. A copy of this recording is also stored on your Google account, unless you manually go in and remove it. So, why is this data stored? Well, it can be useful to have. For example, if your Google Home stops responding to commands, you can actually hunt these recordings down and listen to them, which can help you pinpoint mic/listening issues. It’s pretty valuable. That said, if you prefer to delete them, it’s not too hard to do.

WHY YOU NEED TO BE ON NEXTDOOR, THE LOCAL SOCIAL NETWORK – There are all sorts of niche social networks. There are networks for gamers. Networks for beer drinkers. Even networks for academics. But possibly the best social network that you haven’t joined yet is Nextdoor. Nextdoor is a free, private, local social network for people that live in a neighborhood. That might not sound like such a cool thing, but hear me out. It’s a fantastically useful tool. You can buy and sell things more reliably than on Craigslist and get locally-relevant news — even get help with projects. Checkout Nextdoor at this MakeUseOf article:

HOW WILL THE MELTDOWN AND SPECTRE FLAWS AFFECT MY PC? – What Are Meltdown and Spectre? – Spectre is a “fundamental design flaw” that exists in every CPU on the market—including those from AMD and ARM as well as Intel. There is currently no software fix, and it will likely require a complete hardware redesign for CPUs across the board—though thankfully it is fairly difficult to exploit, according to security researchers. It’s possible to protect against specific Spectre attacks, and developers are working on it, but the best solution will be a CPU hardware redesign for all future chips. Read more of this How-To Geek article at:

LOCK DOWN YOUR TECH IN 2018 WITH THESE RESOLUTIONSIf you’re a human person who occasionally engages in commerce, hackers are probably targeting you. This year, resolve to do something about it. You know you need to take better care of your personal information, but you keep putting it off. It’s understandable, but this is the year you take your security into your own hands. Here are seven resolutions you can make to lock down your data in 2018. Like going to the gym regularly, it might be annoying to get started, but you’ll be better off once you build better habits. Read more of this How-To Geek article at:

CALIFORNIA HEALTH OFFICIALS RELEASE GUIDELINES ON CELLPHONE RADIATION – Even though this is specific to California, I thought you might be interested in the information from the Department of Health. California health officials have a new safety message for cellphone users. CBS San Francisco reports that for the first time ever, the California Department of Public Health is releasing guidelines about cellphone radiation and how you can reduce your exposure. Read about the guidelines at:

CYN’S TECH TIPS – IT DOESN’T HAVE TO BE COMPLICATED – Happy 2018! A new year calls for a new outlook. I think it’s a good time to make some tech resolutions. Are you with me?

  1. Secure your device. Install third-party security programs and make sure you protect your lock screen with either a password or a biometric lock like a fingerprint reader. Consider password-protecting important files if you have that option. Read the rest of Cyn’s tips at:

TOO OLD FOR TECH? NO WAY!Cyn Mackley (formerly of WorldStart and now the Tech Whisperer) shared a reader’s assertion that there ought to be a cut-off age for new tech. (He suggested 85.) Your response: No way! Read the original article and responses (mine was to join a computer / tech club to learn about new technology and get help with computers, devices, phones, IoT gadgets, etc. and suggested readers check out to see if there is a club in their area. Judy) at:

17 TECHNOLOGIES THAT DIED IN 2017 – The circle of life applies as much to technology as it does to living things, and so every year brings a wave of old products and failed ideas that make way for newer and better ones. This year, we lost some once-iconic products that lost their utility long ago, along with some that probably shouldn’t have existed in the first place. Read the PCWorld rundown of the most notable technology that died in 2017:

GOOGLE AND APPLE ARE KILLING IT WITH PHOTO TECHWhen it comes to hardware, phone makers are bored because there’s not much left to improve. However, when it comes to the camera in your phone, Apple and Google still have a lot they can do on the software side. On this front, both companies are absolutely killing it. Read more of this How-To Geek review at:

THE 12 BIGGEST HACKS, BREACHES, AND SECURITY THREATS OF 2017 The biggest security hacks, leaks, and breaches of 2017 may impact your privacy for years to come. Security issues took a turn for the serious in 2017. This time around we still suffered the password breaches, malware annoyances, and stolen credit card numbers that have become commonplace in recent years. But the headlines were dominated by more sobering issues. We saw foreign adversaries trying to infiltrate critical infrastructure; major U.S. government hacking tools exposed; a major breach that called into question the use of social security numbers as identification; the U.S. government turning negative towards online user privacy; and popular consumer software dragged into the world of corporate and state espionage. Read more of the PCWorld article at:

FACEBOOK LAUNCHES NEW SECURITY FEATURE YOU NEED TO USE NOW – We all use Facebook for connecting with our friends and family, or engaging with peers online. It is a great system for most, but also having tragic consequences of bringing out some of the worst in our society. Hackers, foreign governments, and even false advertisers take advantage of the great networking capabilities Facebook offers to cause harm in as many ways as you can think of. 

Facebook has had its feet to the fire lately regarding security concerns. The media giant has come under heavy criticism for everything from national security and fake news, to individual account security and the prevalence of hacking and phishing scams.

Read the article to learn about Facebook’s new focus on security. They are unveiling a new feature that can help users avoid having their account information stolen by hackers. Also learn how to use Facebook’s snooze on annoying friends.

HOW TO SET UP ALL YOUR NEW HOLIDAY GADGETS – It’s the holidays, which means new gadgets for everyone! Whether you’re rocking a new PC or trying to get a handle on what the Amazon Echo really does, How-To Geek has you covered. Read their article to find out how to set up all your new tech gifts (and, let’s be honest: your family’s).

THE BEST WINDOWS 10 APPS – Windows 10 apps are better than ever. Their design and usability is unrecognizable from a couple of years ago; Microsoft has largely got the problem of fake and imposter apps under control, and the selection of apps is the most diverse it’s ever been. Yes, some universal apps in the Windows Store are still poor imitations of their desktop cousins. However, it doesn’t mean that you can’t find some really useful, high-quality apps – you just need to know where to look. 

MakeUseOf has rounded up some of the best Windows 10 apps. Make sure you let them know what they missed! 

SO, YOU JUST GOT A GOOGLE HOME. NOW WHAT? – So, you scored a Google Home for Christmas. That’s awesome, because this is a killer little smart speaker that can do a lot of different things—in fact, it can be a little overwhelming. The good news is that we’ve got you covered. How-To Geek has some ideas on where to get started with your new Home.

HOW TO TURN YOUR COMPUTER INTO A DLNA MEDIA SERVER – Many boxes you plug into your TV, including the Roku, PlayStation 4, Xbox One, and even some smart TVs themselves offer DLNA (“Digital Living Network Alliance”) streaming support. They can stream video files and music over the network from your PC—as long as you set up a DLNA server on the PC first.

This feature is also known as Play To or UPnP AV. Using it is easier than you might think, as the server software you’ll need is built into Windows. There are also third-party DLNA servers with more features, and you can run them on any operating system. Here’s how to set up DLNA on your machine.

Go to this How-To Geek web page and get the facts and different options.

HOW TO SET UP CORTANA TO CHECK YOUR GMAIL AND GOOGLE CALENDAR – Microsoft this week added the ability to connect your Google account to Cortana. This will provide Gmail, Calendar, and Contact support. Like with other connected services, once you set it up, Cortana will be able to give you information about upcoming events on your calendar, messages, and more. Google joins other connected services like LinkedIn, Office 365,, Skype, and others. Here is a look at how to set it up and begin using the new ability.

Go to this GroovyPost web page and see how to set it up with Screenshots.

ADD A SLIDER TO CHANGE YOUR DISPLAY BRIGHTNESS IN WINDOWS 10 – Windows 10 aims to make your system easier to manage, but there are still some things that are done best by a third-party utility.

Microsoft is currently moving all system setting from the classic Control Panel to its new Settings app in Windows 10. With each new release, you’re finding more and more system configuration settings end up there. And while that is making some settings easier to access, currently there isn’t a simple way to manage the brightness of your display.

Go to this GroovyPost web page and get started with the Screen Brightness slider.

MICROSOFT ISSUES EMERGENCY WINDOWS SECURITY UPDATE FOR A CRITICAL VULNERABILITYIf your computer is running Microsoft’s Windows operating system, then you need to apply this emergency patch immediately. By immediately, I mean now! Microsoft has just released an emergency security patch to address a critical remote code execution (RCE) vulnerability in its Malware Protection Engine (MPE) that could allow an attacker to take full control of a victim’s PC.

Enabled by default, Microsoft Malware Protection Engine offers the core cybersecurity capabilities, like scanning, detection, and cleaning, for the company’s antivirus and antimalware programs in all its products.

According to Microsoft, the vulnerability affects many Microsoft security products, including Windows Defender and Microsoft Security Essentials along with Endpoint Protection, Forefront Endpoint Protection, and Exchange Server 2013 and 2016, impacting Windows 7, Windows 8.1, Windows 10, Windows RT 8.1, and Windows Server.

Tracked as CVE-2017-11937, the vulnerability is a memory corruption issue which is triggered when the Malware Protection Engine scans a specially crafted file to check for any potential threat.

To see if you’ve been updated properly, bring up Windows Defender. If you see Engine Version 1.1.14306 your machine hasn’t caught up yet.

If your machine isn’t yet up to the latest version, 1.1.14405.2, I strongly suggest that you not touch the machine until it updates itself. 

THE BEST “LITE” VERSIONS OF YOUR FAVORITE ANDROID APPSIf you’re looking for a good way to speed up your phone or cut down on your data usage, there are a lot of official “lite” versions of popular apps like Facebook or YouTube. These are generally less feature-rich than their full-powered counterparts, but they’re often a great middle ground between features and function.

Go to this How-To Geek web page and get the info.

HOW TO CHECK OUT LIBRARY BOOKS ON YOUR KINDLE FOR FREETired of paying so much for e-Books? Most libraries these days let you check out eBooks, for free, just like regular books. It works similarly: libraries have a certain number of copies to lend. If all copies of the book you want are already checked out, you must wait for someone to check it in. Unlike regular books though, you can often schedule an automatic checkout when a copy is available, and you don’t have to worry about dropping by the library for returns.

Go to this How-To Geek web page and get the facts.

HOW TO HIDE SPECIFIC ADS ON FACEBOOKFor a while, Facebook thought I was into basketball. Almost every ad was for something to do with basketball. The thing is, I’m not sure Ireland even has a basketball team. We certainly don’t have a professional one and I’ve never watched a game in my life. It was a confusing phase of my digital life and it took a few months before I started seeing relevant ads again. Facebook won’t always be so off base with who you are or what you’re into, but there’s a good chance that it will occasionally show you ads you have no interest in, annoy you, or even offend you. If that happens, it’s simple to hide them. The process is the same whatever platform you use, so here’s how.

Go to this How-To Geek web page and see what can be done.

TECH TITAN WAR: GOOGLE BLOCKS YOUTUBE ON AMAZON DEVICES IN BITTER FEUDGoogle is pulling its popular YouTube video service from Amazon’s Fire TV and Echo Show devices in an escalating feud that has caught consumers in the crossfire. The decision to block YouTube is retaliation for Amazon’s refusal to sell some Google products that compete with Amazon gadgets. That includes Google’s Chromecast streaming device, an alternative to Fire TV, and an internet-connected speaker called Home, which is trying to catch up to Amazon’s market-leading Echo. Amazon’s high-end Echo Show has a screen that can display video.

“Given this lack of reciprocity, we are no longer supporting YouTube on Echo Show and Fire TV,” Google said in a Tuesday statement.

Go to this CIOTODAY web page and read about the feud.

MICROSOFT SAYS WINDOWS 10 DEVICES CAN BE MADE SECURE: HERE’S HOWIf you have an up-to-date device running Windows 10, Microsoft has enabled new standards that it said can ensure “a highly secure experience.” The new security standards apply to PCs, laptops, tablets, 2-in-1 devices, and mobile workstations running processors certified for the Windows 10 Fall Creators Update that began rolling out last month. Those processors include Intel’s 7th-generation i3, i5, i7, and i9 chips and 7th-generation AMD silicon, along with the Intel Core M3 and Xeon E3 processors and Intel’s latest Atom, Celeron, and Pentium chips.

Microsoft has described its latest version of Windows 10 as its most secure operating system to date, with many new built-in features to protect against malware and other threats such as ransomware. The update includes several new security enhancements specifically for enterprise users, among them a suite of Windows Analytics services for business applications and devices.

Go to this CIOTODAY web page and get the facts.

WATCH OUT: HOW TO BUY A USB TYPE-C CABLE THAT WON’T DAMAGE YOUR DEVICESUSB Type-C brings a new universal connector to laptops and smartphones, and many devices are already starting to use it. But beware: many USB-C cables aren’t designed properly and could potentially damage your hardware.

efore buying any USB Type-C cables for your new devices, you should look up whether the cable is compliant with the USB-C specification. More people are sure to run into this problem as more USB Type-C-enabled devices are released.

he cheap charger or USB cable can ruin your device. Buy only Original Equipment Manufacturers (OEM) accessories, and stay away from cheap replacements. Go to this How-To Geek web page and read all about it.

MICROSOFT AND ADOBE PATCH MORE THAN 100 BUGSOn November’s Patch Tuesday yesterday, Microsoft and Adobe pushed out many bug fixes. They included updates to resolve serious security flaws in Microsoft Office, the Internet Explorer and Edge Web browsers, and Adobe’s Acrobat, Reader, Photoshop, and Flash Player.

Microsoft’s update addressed a total of 53 vulnerabilities, four of which could open the door for security attacks. However, none of them appears to have been exploited in the wild at this point.

Adobe, meanwhile, patched more than five dozen vulnerabilities, including critical flaws that could enable remote code execution in Shockwave, Acrobat/Reader, and Flash Player.

HOW TO STOP SAMSUNG’S APP PERMISSION MONITOR FROM DISPLAYING NOTIFICATIONSIf you have an Android phone, you should be aware of the permissions your apps have been granted. For instance, there’s no reason for a calculator app to connect to the web. On the Galaxy Note 8 (and probably any phones coming after), Samsung has automated this process with a tool called the App Permission Monitor, which notifies you if any apps use a permission that’s especially important or outside their normal operating range.

It’s a really good idea! But sometimes it gets annoying. For example, I use an app called bxActions to repurpose the Bixby button on the Note 8 to turn on the flashlight. Since the LED light is technically part of the phone’s camera, it has to use

Android’s Camera permission to power up the LED. The App Permission Monitor thinks that might be fishy, and sends me a notification about it…every single time I use the button to turn on the flashlight. Which is, in fact, much more often than I actually use the camera.

If you have an app that constantly uses one of these permissions and trips the monitor, here’s how to disable it…or at least tell it to chill out.

Go to this How-To Geek web page and get the screen shots and procedures.

HOW TO RESET WINDOWS 10 ACCOUNT PASSWORD FROM LOGIN SCREENUh oh, you forgot the PC’s password. No worries. Microsoft makes it simple to reset your Microsoft account with Windows 10 Fall Creators Update. Have you been in a situation where you lost or forgotten your password to your Windows 10 machine? No worries, we’ve all been there at some point or another and Microsoft is making it easier to reset your code with Windows 10 Fall Creators Update (version 1709). Now, from the lock screen, you have the option to reset your Microsoft account password.

Go to this GroovyPost webpage and get the short simple procedure with screenshots.

MICROSOFT RELEASES WINDOWS 10 CUMULATIVE UPDATE KB4048955Microsoft rolled out cumulative update KB4048955 for Windows 10 Fall Creators Update version 1709 and other supported Windows versions, too. This update comes as part of Microsoft’s Patch Tuesday which rolls out fixes and improvements to all currently supported versions of Windows. As is usually the case with these types of updates, there are no new features, but a lengthy list of bug fixes and stability improvements. You should get the update automatically, but if you want to stay on top of things head to Settings > Update & security > Windows Update. After you the updates are downloaded, a restart is required to finish the update process.

After the update hit the Windows key and type: winver (in the search bar) and you will see your build number has been bumped up to 16299.64 for version 1709.

Go to this GroovyPost webpage and read about the update.

HOW TO DOWNLOAD VIDEOS TO AMAZON FIRE TABLETS TO WATCH OFFLINEIf you’re ever in a situation where there’s limited or no Wi-Fi, you’ll want a collection of videos already downloaded to watch while offline on your Fire tablet. The Amazon line of Fire tablets is aimed at being an affordable fun and entertaining device. The company’s new Fire HD 10, for example, has a quality 10.1-inch 1080p HD display that’s great for watching movies and TV shows. Obviously, you can stream your video content from Prime video and other non-Amazon services like Netflix. But if you’re in a situation where you have limited or no Wi-Fi, you’ll want to have a collection of video content already downloaded to watch while offline.

Go to this GroovyPost webpage and get the procedure.

HOW TO MAKE YOUR OWN QR CODES FROM YOUR ANDROID PHONEYou might think that QR codes are so 2006, but they’re coming back in a big way. Here’s how to create your own. You might be asking yourself, “Why would I ever want or need to create my own QR code?”, and that’s a valid question. QR codes are a sort of hidden gem that a lot of people underestimate, and they can be used in all sorts of different ways. When scanned, they can take you to a specific website, lead you to a file to download, or even just display a bunch of text about something.

For example, I frequently use a QR code of my phone number. If I want to give my number out to someone, they can just open the camera on their phone and scan the QR code image that I have stored on my own phone. If this is something that is of interest to you, here’s how you can create your own QR codes for just about any situation.

Go to this How-To Geek webpage and get the procedure.

HOW TO SEE WHAT WEB SITES YOUR COMPUTER IS SECRETLY CONNECTING TOYour PC makes lots of Internet connections in a day’s business, and not all of them are necessarily sites you’re aware connections are happening with. While some of these connections are harmless, there is always a chance that you have some malware, spyware, or adware using your Internet connection in the background without your knowledge. Here’s how to see what’s going on under the hood.

This article covers three ways you can view your PC’s active connections. The first uses the good old netstat command from PowerShell or the Command Prompt. Then, we’ll show you two free tools—TCPView and CurrPorts—that also get the job done and may be more convenient.

Go to this How-to Geek webpage and see how to.

HOW TO STOP WINDOWS FROM AUTOMATICALLY CONNECTING TO A WI-FI NETWORKWindows automatically connects to Wi-Fi networks you’ve previously connected to. On Windows 10, you can tell Windows not to automatically connect to certain networks. Windows will remember the passphrase and other connection details, but will only connect when you manually initiate a connection. This is useful for public Wi-Fi networks that you don’t always want to connect to automatically—especially if they require a sign in or have slow internet.

Go to this How-To Geek Webpage and see how to:

HOW TO CHANGE YOUR MAC ADDRESS IN WINDOWS 10 (AND WHY YOU MIGHT WANT TO)Windows 10 includes the ability to edit the physical address (MAC) for your network adapters. Find out how to do it and why you would want to. As we’ve explained in our article on how to find your MAC address, a MAC address serves as a permanent, physical identifier for any device that connects to a network. That includes your phone, your router, your computer, your printer, your Apple TV, anything that connects to your internet. If your computer has an Ethernet port and a Wi-Fi adapter, you have two MAC addresses: one for Ethernet and one for wireless.

MAC addresses are useful for identifying devices on a network. For home users, you might use MAC filtering to restrict access to your WIFI network.  The reason that a MAC address works better for these administrative tasks is that, unlike IP addresses, the MAC address doesn’t change. Or at least it’s not supposed to.

The MAC address is “burned-in” to the physical device at the factory. But it’s fairly simple to change your MAC address by “spoofing” it as another MAC address.

Why would you want to do this?

MAC spoofing can be used maliciously to circumvent network controls, but it’s only effective for blacklists—that is, if someone specifically blocked your device from the network. For whitelists, you’d have to know the MAC address of a specific device you’re trying to spoof.

Changing your MAC address has legitimate uses as well. You can use it to test your own MAC filtering settings. Or you can use it to assign specific rules to a set of devices within a certain MAC address range.

At any rate, the fact that you’ve read this far means you probably have a vested interest in changing your MAC address. So, without further ado, here’s how to do it.

Go to This GroovyPost webpage and get the steps:

HOW TO USE VOICE DICTATION ON WINDOWS 10Windows 10’s Fall Creators Update makes voice dictation much easier to use. Now, you can immediately begin dictation by pressing a key Windows+H on your keyboard. You don’t have to dig through the Control Panel and set anything up first.

The old Speech Recognition tool is still accessible via the Control Panel. It has some advanced features you won’t find in the new dictation tool, like the ability to navigate your desktop with voice commands. But most people will prefer the new dictation tool for more basic dictation.

Go to this How-To Geek Web page and try it out.

HOW TO FIND YOUR LOST OR STOLEN ANDROID PHONEYou’re having a night out. With dinner down the hatch, you’re walking down the street with your sweetheart to the next destination. You reach into your pocket to pull out your phone, when that feeling hits the pit of your stomach: your phone is missing. Did you leave it at the restaurant? Or maybe at home? Did someone steal it? Your mind races. You have no idea.

Apple users have “Find My iPhone”, but is there a “Find My Android” function for Google folks? Fortunately, there is: previously called Android Device Manager, Google’s “Find My Device” is now wrapped up nice and neat under the Google Play Protect umbrella. With this tool, you can track your phone so you can hopefully get it back.

There’s a good chance you’ve stumbled across this article after having lost your phone, so instead of telling you what you should’ve done before losing it, let’s get right to it: you want to know what to do right now.

The good news is that you can quickly find your missing phone with Google’s Find My Device, even if you don’t have the app installed on the lost handset. You can do this in one of three ways:

Go to this How-To Geek Web page and find out how:

HOW TO TETHER YOUR ANDROID PHONE AND SHARE ITS INTERNET CONNECTION WITH OTHER DEVICESTethering is the act of sharing your phone’s mobile data connection with another device—such as your laptop or tablet—connecting it to the Internet through your phone’s data connection. There are several ways to tether on Android.

Tethering is useful when you’re somewhere where and don’t have Wi-Fi access, do have cellular data access, and want to do something on your computer instead of your phone. But you may pay extra for the convenience.

Go to this How-To Geek Web page and get the facts.

HOW TO USE THE MY PEOPLE FEATURE IN WINDOWS 10 FALL CREATORS UPDATEOne of the new features in Windows 10 Fall Creators Update is My People. Here’s a look at what it is, how to use it, or disable it if you’re annoyed by it taking up space on the taskbar.

The Windows 10 Fall Creators Update includes a lot of new features. One of which is My People hub. It’s a new people-centric experience that allows you to pin your favorite contacts to the taskbar and it provides a quick and easy way to send a message, start a chat or share files with the people you need to be in touch with the most. Here’s a look at how to use it for keeping track of contacts and communicate via Skype and email.

Go to this Groovypost Web page and see what is what. Great screenshots.

MICROSOFT ADDS PREMIUM OUTLOOK.COM FEATURES FOR OFFICE 365 SUBSCRIBERSMicrosoft today confirmed that it is bringing Premium features for Office 365 subscribers. The new features include an ad-free inbox, enhanced security protections, larger mailbox sizes and more. Here’s a look at the changes you can expect.

If you use Outlook client email, go here and read about the new enhancements.

HOW TO BOOT INTO SAFE MODE ON WINDOWS 8 OR 10 (THE EASY WAY)One of the most common steps when troubleshooting a PC is to boot into Safe Mode. Up through Windows 7, you did this by pressing the F8 key during boot—right before Windows started loading. This all changed with Windows 8 and its introduction of Automatic Repair mode—something that continues in Windows 10.

If you mash the F8 key at just the right time (or get lucky spamming the key during boot up), Windows might still take you to a screen that lets you get into the recovery environment. From there, you can boot into Safe Mode (and we’ll talk about that environment a bit later. The trouble is that some computer manufacturers disable this option. And even on PCs that still support it, Windows startup (and particularly the hand off between the regular boot process and Windows startup) happens so much faster now, you barely have time to press the key.

The good news is that getting into Safe Mode is doable. The process is just more hidden now. Go to this How-To Geek Web page and get the step-by-step with screen shots:

THE COMPLETE GUIDE TO IMPROVING ANDROID BATTERY LIFE – Once upon a time, you had to really keep an eye on your Android phone to make sure the battery wasn’t being depleted prematurely. Manually toggling connections, constantly adjusting brightness, and the like are basically all things of the past now—but there are still things you can do to maximize your handset’s battery life.

Go to the How-To Geek Web page and get busy with screenshots.

PENTAGON TO SCRUB KASPERSKY FROM DEFENSE SYSTEMS FOLLOWING DHS BANThe Defense Department is doing a thorough review to ensure software from the embattled Russian anti-virus firm Kaspersky does not touch any military systems, a Defense spokeswoman tells Nextgov.

The move follows a September order from the Homeland Security Department directing all civilian government agencies to remove Kaspersky software from their systems within three months. That directive cites intelligence community concerns that the Russian firm is too closely tied to the Kremlin.

That order does not apply to the Defense Department, which is outside Homeland Security’s jurisdiction, but the Pentagon plans to “follow the intent of the directive” and the department’s top information security officer is assessing what changes need to be made, if any, Defense Spokeswoman Heather Babb said.

Make your own choice. Personally, I would dump Kaspersky Anti-Virus if I had it.

ANDROID 7 NOUGAT: UPDATE INFORMATION AND NEW FEATURESAndroid Nougat was Google’s big refresh of its phone and tablet operating system in 2016. Android is an OS that’s been so thoroughly refined that the company is now more than halfway through the alphabet with names.

It hasn’t stopped at Nougat either as there’s now the eighth iteration of Google’s OS called Android Oreo. That is out now for a select number of devices, so it may be worth checking whether your phone is ready to upgrade to even newer software.

Google released the latest version of Nougat as Android 7.1.2 software in July 2017, and many phones are still being upgraded to it now. There’s a good chance your phone already has the latest Android Nougat software update waiting, or it’s coming very soon. Go to this Cio-Today Web page and get the information.

WINDOWS 10 FALL CREATORS UPDATE ADDS RANSOMWARE PROTECTIONWindows 10 Fall Creators Update has a nifty security feature which perhaps hasn’t been trumpeted by Microsoft as much as it should: namely anti-ransomware defenses.

In a blog post detailing how the Fall Creators Update is being deployed in a phased rollout (as all these big upgrades are), Microsoft mentioned that it had hardened security and added protection against ransomware.

Specifically, the main countermeasure is a ‘controlled folder access’ feature which is activated in the Windows Defender Security Center app in Windows 10, in the Virus & Threat Protection section, as the Register reports. Go to this Cio-Today Web page and read all the facts.

HOW TO LIMIT WINDOWS UPDATE’S DOWNLOAD BANDWIDTH ON WINDOWS 10Windows 10’s Fall Creators Update gives you more control of Windows Update’s downloads and uploads. You can now set a download bandwidth limit, ensuring Windows Update won’t hog your Internet connection with its background downloads.

The Settings app also gives you more control of Windows Update’s background uploads and keeps track of how much data Windows Update has downloaded and uploaded. This setting also applies to app updates from the Store and updates for other Microsoft products, not just Windows updates. Go to this How-To Geek Web page and find out how to make the setting.

HOW TO BLOCK SPAM CALLS AND TEXTS IN ANDROID, MANUALLY AND AUTOMATICALLYIt’s dinner time. You’re just sitting down when you get a call. On the other line, a robotic voice says: “We have important information regarding your credit accounts. Please hold to speak to a representative.”


How many times has that scenario happened to you or someone you know? Even if the answer is “once,” that directly translates to “too many times.” It’s scammy, annoying, and downright rude.

If you have an Android phone, though, you don’t have to deal with it. There are actually a few different ways to go about blocking numbers on Android, and we’re going to talk about a few of the easiest ones. Go to this How-To Geek Web page and real all about it. Screen shots provided.

HOW TO INSTALL CUSTOM THEMES AND VISUAL STYLES IN WINDOWS 10, 8.1, 7 – Windows has had support for themes, also known as “visual styles”, since Windows XP. By default, Windows will only load Microsoft-signed themes—but you can get around this fairly easily.

There’s a thriving community of theme-builders who are still creating themes for Windows 7 and 8. These aren’t your standard Windows themes, though—they modify the appearance of window title bars, buttons, and other visual elements.

PATCHING YOUR SYSTEM FILESWindows checks if themes are signed by Microsoft before loading them. If they aren’t, Windows won’t load them at all. To use them, you’ll have to modify Windows system files—uxtheme.dll in particular—and disable the check. In the past, this required booting into Safe Mode and manually replacing system files. Today, there are easier ways to do this. Go to this How-To Geek Web page and find the work around so you can have a Theme or Background on your PC that suit you, not just Microsoft.

WATERPROOF? DUST-RESISTANT? MAKING SENSE OF GADGET RATINGSIP67? IP68? MIL-Spec? It sounds fancy, but it’s not that complicated. Learn what all these designations on your electronics really mean for protection and ruggedness. Go to this PCMag Web page and increase your knowledge.

AMAZON ANNOUNCES ALL-NEW KINDLE APP FOR ANDROID AND IOSAmazon is rolling out a major update of its Kindle mobile app for Android and iOS this week. It includes an all-new design and makes it much easier to turn your phone or tablet into a book that you can read anywhere. It makes it easier to flip between pages and find other items while you’re on the go.

This is a big overhaul for the Kindle app and the result is essentially a brand-new product. “The all-new Kindle app that makes it easier than ever to turn your phone or tablet into a book—so you can read anytime, anywhere,” an Amazon announcement notes. “We’ve built the new Kindle app from the ground up for book lovers, giving readers easy access to everything they might want to do with their books, all in one place,” said Chuck Moore, Vice President, Kindle. Whether you use Android or iOS, here’s a look at what you can expect. Go to this Groovypost Web page and get the information.

WHAT’S NEW IN WINDOWS 10’S FALL CREATORS UPDATE, AVAILABLE NOW – Windows 10’s Fall Creators Update, codenamed Redstone 3, is available to download now. Here are all the new features you’ll see in the latest version of Windows—and some big, splashy features Microsoft announced that never arrived. Windows 10’s Fall Creators Update, codenamed Redstone 3, is available to download now. This article covers all the new features you’ll see in the latest version of Windows—and some big, splashy features Microsoft announced that never arrived. Read more of this How-To Geek article at:

 5 THINGS YOU DIDN’T KNOW YOUR TABLET CAN DO – It’s hard to believe the first iPad was released in 2010. We use tablets for entertainment, work, and even to pay for a mocha at the local café. The device that once looked like science fiction is now a staple of American homes. But most of us don’t realize how many different ways we can use our tablets. Switch around a few settings or download the right app, and you can perform all kinds of digital magic tricks. Read more of Kim Komando’s article at:

18 THINGS YOU MAY NOT HAVE KNOWN GOOGLE PHOTOS CAN DOGoogle Photos may seem like a simple image hosting service, but it’s actually quite powerful. Google Photos bridges the gap between cloud storage, image hosting, and image sharing services, giving stiff competition to Flickr, iCloud, Dropbox, and OneDrive.

Search for People, Places, and Objects – Google Photos will automatically arrange your uploaded pictures by location and by date taken. Using advanced image recognition and Google’s large database of information, it can recognize the subject of your photos quite easily. Search your photos for anything: a wedding you attended last month, pictures you took during holidays, pictures of your pets, food, and much more. At the bottom right, touch the search icon and from the box, type what you want to find–like food, cars, or your pet and touch “Enter” or “Search.” Read more at this How-To Geek Web page:

HOW WINDOWS 10 DICTATION WORKS – Dictation within Windows has lived in the shadows for years. Finally, with Windows 10 and the Fall Creators Update (see our review!), dictating text is almost as easy as talking to Siri, Cortana, or Google. Within Windows 10, you can turn on dictation with just a keystroke. It’s easy. I wrote this whole article with just my voice. I edited it, though, with my mouse and keyboard. It’s all part of Windows 10’s new emphasis on modality: first touch, then writing with a pen, voice control, and finally dictation. Read more of the PCWorld article at:

WINDOWS 10 FALL CREATORS UPDATE: TOP 10 NEW FEATURESThe latest update to Microsoft’s OS adds new app capabilities, sharing features, and helpful tweaks.

The latest version of Microsoft Windows 10, the Fall Creators Update, is upon us. Well, that’s not entirely true: Windows no longer really comes in full-stop updates; it’s delivered as a continually updating service.

For example, several of the Fall Creators features have been steadily making their way into Windows, like the video editing and Fluent Design aspects.

In addition to Fluent Design, which features attractive translucency and new animations in the interface, mobile device integration, My People contact pinning, and OneDrive Files On-Demand are highlights of the new version. But there’s lots more, as you’ll see when you visit this PC Mag Web page:

KRACK ATTACK WIFI VULNERABILITY: WHAT YOU NEEDAnother day, another scary-sounding widespread cybersecurity vulnerability in the news. This time, it’s about Wi-Fi—specifically, the WPA2 encryption protocol that practically everyone uses. As Ars Technica reported, Key Reinstallation Attacks—or KRACK—lets attackers intercept data between your device and a Wi-Fi router including emails, passwords, personal information and anything else you’d transmit over the supposedly secure WPA2 connection.

So, how worried should you be? And what should you do? Here’s what we know right now.

Go to this Groovypost Web page and get the facts.

HOW TO CONVERT A PDF FILE INTO AN EDITABLE TEXT DOCUMENTAdobe’s PDF standard is handy whenever you need to distribute some information and be sure that it’s seen the same way by all recipients. But PDF files are also infamously tough to edit.

Unless you’ve paid for Adobe Acrobat (the full version, not just the Reader), you’ll have to look for a specific tool to edit the text of PDFs. Many of these are available on various platforms, but for an easy and free method that works across all kinds of desktops and mobile devices, you can use Google Docs. Go to this How-To Geek Web page and find out how to:

HAS LINUX’S MARKET SHARE REALLY DOUBLED IN TWO MONTHS?Something weird just happened. Linux – the sprightly insurgent of operating systems – just saw its market share double. According to NetMarketShare, its share of the desktop jumped from around 2.5 percent in July, to nearly 5 percent in September.

Read more at this TNW NYC article:

WHAT IS NET NEUTRALITY? – Net Neutrality aims to make sure that all traffic accessing the Internet is treated the same by the companies providing the access. They would include ISPs like AT&T or your cable company and companies that route the traffic between you and that company. Read more of Cyn Mackley’s article at:

GOOGLE’S ANDROID NOUGAT 7.1.2 UPDATE IS OUT NOW – Android Nougat is Google’s big refresh of its phone and tablet operating system. Android is an OS that’s been so thoroughly refined that the company is now more than halfway through the alphabet with names at letter 14 of 26. Android 7.1.2 is out now while Android Oreo is now in beta for very select devices too.

Read the techradar article for all of the devices they know have the update already and the latest information on when it will launch. That said, you need to bear in mind the official release date for the update won’t always be reflected in the software update section on your phone.

MICROSOFT: WINDOWS 10 IS BETTER THAN BEFORE – With the Fall Creators Update just around the corner, Microsoft is talking up the improvements it has made to Windows 10 so far. Specifically, the Windows 10 Creators Update released in April 2017. This is, according to Microsoft, “the most performant and reliable version of Windows 10 ever!”

According to John Cable, the Director of Program Management, Windows Servicing and Delivery at Microsoft, the Windows 10 Creators Update is a quality product. And this is thanks to Microsoft’s “dedicated focus on customer obsession – listening and responding to user and partner feedback”. Read about what’s new in this MakeUseOf article:

HOW TO ENABLE AND USE THE NEW FIREFOX SCREENSHOTS FEATURE – If you are a Firefox user and have upgraded to version 55, you might have noticed a new screenshot button on the toolbar in the upper-right corner of the browser. However, not all users have it yet. It’s still in beta and the company is gradually rolling it out as it works out any remaining bugs. The screenshot tool will be available to all users when Firefox 56 is released at the end of September. If you don’t want to wait, read the groovyPost article to look at how to turn on and use Firefox Screenshots.

HOW TO RECORD & RUN MACROS TO AUTOMATE TASKS IN WORD – Macros in Microsoft Word allow you to record a series of actions and then execute them with a single click of a button. Microsoft Word Macros are like using Automator on a Mac. They can save you time on actions you perform often in Word. This groovyPost article covers 7 steps to creating and running a Word macro:

CCleaner COMPROMISED WITH MALWARE – CCleaner version 5.33 was compromised with malware. Please check to see which version of CCleaner you have on your computer.

Open CCleaner and you will find the version number in the upper left corner on the title bar.

Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware, according to a report published by Cisco Talos a few minutes ago. Updating to recent versions removes malware.

Floxif is a malware downloader that gathers information about infected systems and sends it back to its C&C server. The malware also had the ability to download and run other binaries, but at the time of writing, there is no evidence that Floxif downloaded additional second-stage payloads on infected hosts.

The malware collected information such as computer name, a list of installed software, a list of running processes, MAC addresses for the first three network interfaces, and unique IDs to identify each computer in part. Researchers noted that the malware only ran on 32-bit systems. The malware also quit execution if the user was not using an administrator account.

Avast recently bought Piriform – below from Avast CTO:

In an email to Bleeping Computer, Avast CTO Ondrej Vlcek said that updating CCleaner to the most recent recent versions fixes any issues, as “the only malware to remove is the one embedded in the CCleaner binary itself.”

“The affected software (CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191) has been installed on 2.27M machines from its inception up until now,” Vlcek also added. “We believe that these users are safe now as our investigation indicates we were able to disarm the threat before it was able to do any harm.”

“There is no indication or evidence that any additional “malware” has been delivered through the backdoor,” Vlcek added.

Read the complete Bleeping Computer article at:

FORMER GALAXY NOTE 7 OWNERS CAN GET A GREAT DEAL ON A NOTE 8The Galaxy Note 7 was something of a disaster for Samsung. Those fans who put down the better part of a thousand bucks for the flagship phone a year ago were disheartened to learn that their top-of-the-line gadgets had an unusually high chance of melting through their pockets. It was, to put it lightly, a bummer.

But there’s good news for those of you who are still firmly in Samsung’s camp, and who didn’t use your return and refund to go out and buy something equally expensive. Samsung has a fantastic trade-in deal for former Galaxy Note 7 owners, offering $425 off the new Galaxy Note 8 with a valid trade-in phone. Combined with free pre-order accessories, that’s an effective value of well over $500—not a bad way to say “sorry” to those customers who had to bid farewell to their Notes last year. Here’s how to get the best deal and the maximum rebate.

Go to this How-To Geek Web page and find out how to get that savings.

USERS STILL RUNNING WINDOWS 10 VERSION 1511 HAVE UNTIL OCTOBER 2017 TO UPGRADEAnother version of Windows 10 is about to bite the dust; support for version 1511, which was launched in November of 2015, will end October 2017. In early May 2017, Microsoft ended support for version 1507; the first version of Windows 10 released in July of 2015.

Since then, Microsoft has released four feature updates, with the next release expected in September, called the Fall Creators Update or version 1709. Users should expect each feature update to receive 18 months of support before Microsoft require users to be on a current release in order to continue receiving updates and support.

Go to this proovyPost Web page and read the news.  If you have not updated, you will lose support.

 HOW TO TAKE A SCREENSHOT ON ALMOST ANY DEVICE, (INCLUDING YOUR DESKTOP OR LAPTOP)You’re a grownup. You know how to use a computer and a phone. So, when it’s time to show off some portion of your screen, don’t try to take a photo of it—that’s kid’s stuff, and it looks like junk anyway. Just about every modern operating system has some method of saving what’s on your screen, and most of them make it pretty easy. Keep this simple guide bookmarked for every method you’ll ever need.

Go to this How-To Geek Web page and learn how.

NO BARS? HERE’S EVERYTHING THAT CAN AFFECT YOUR CELLULAR SIGNAL STRENGTHCell signal is weird. One moment you could have five bars, but walk a few feet and it drops to two. In my house, the signal downstairs is awful, but it’s perfect upstairs. There’s a lot going on with cell reception, so let’s look at some of the main factors that affect it.

Go to this How-To Geek Web page and get informed.

 ANDROID NOUGAT FEATURES AND TIPS YOU NEED TO START USINGAndroid Oreo is coming, but you probably haven’t tried everything in Nougat. Now’s the time.

Google used to produce a rather bare-bones version of Android, counting on OEMs like Samsung and LG to add in all the other cool features people might want. But today’s stock Android is more powerful, more feature-rich, and more attractive without any help from the device makers.

In fact, Google has pushed OEMs to use even more of the basic Android experience without making unnecessary changes. This could mean some awesome features are lurking inside your phone that you don’t even know about. So here are eight cool features inside Nougat (Android 7.0) you’re probably not using.

Go to this PCWorld Web page and read all about the eight cool features.

WHICH FILES SHOULD YOU BACK UP ON YOUR WINDOWS PC?Your PC’s hard drive could fail tomorrow, or a software bug could erase your files, so backups are critical. But you don’t need to back up all the files on your PC. That would just waste space and make your backups take longer to complete.

The All-Important Rule of Backups – The most important rule of backups is that any important data should exist in two or more physical locations at once. You cannot create a backup and delete the original. If you do, it’s no longer really a backup. You still have just one copy of your data—you just moved it to a different place.

You might think this is obvious, but you’d be surprised how often we’ve been approached by readers that lost their data after their “backup” drive died.

Go to this How-To Geek Web page and read about the best method for backups.

HOW TO GET OUT OF WINDOWS SAFE MODESolutions, Tips and Answers for PC Problems. You went into Windows Safe Mode to fix something, and now you can’t get out. Luckily, you have two emergency exits. Watch the Windows 10 Safe Mode

video at the below Web page for more details.

Go to this PCWorld Web page and get the tips.

GOOGLE MAPS TIPSDon’t take Google’s trusty Maps app for granted. It gets even better once you dig into its settings and start customizing it. Here are some tips to make it even more efficient.

Go to this PCworld Web page and learn the new capabilities for Google Maps.

AMAZON AND MICROSOFT AGREE THEIR VOICE ASSISTANTS WILL TALK (TO EACH OTHER)Those betting big on AI making voice the dominant user interface of the future are not betting so big as to believe their respective artificially intelligent voice assistants will be the sole vocal oracle that Internet users want or need.

And so, Microsoft’s Satya Nadella and Amazon’s Jeff Bezos announced a tie-up, which will — at an unspecified point later this year — enable users of the latter’s Alexa voice assistant to ask her to summon Microsoft’s Cortana voice assistant to ask it to do stuff, and vice versa.

Go to this Techcrunch Web page and read the story.

HOW TO REMOVE THIRD-PARTY FACEBOOK APPS FROM YOUR ACCOUNT – Logging in with Facebook is a fast and handy way to avoid making a new account and password for every web service under the sun, but that free convenience sometimes comes with a price: access to your data. Companies treasure details of your personal life and the implicit right to send you messages. Read this How-To Geek article to learn how to cut off that connection when you’re done with it.

BEST WEB BROWSERS OF 2017: CHROME, EDGE, FIREFOX, AND OPERA GO HEAD-TO-HEAD – It’s important to make sure you’ve always got the best tool for the job; this PC World article looks at the four major (and modern) browsers to see how they stack up in 2017. Interested in checking out their roundup of 10 intriguing alternative browsers? Click on the link in the article.

HOW TO STOP GOOGLE ASSISTANT, SIRI, CORTANA, AND ALEXA ACTIVE LISTENING – The devices don’t record or transmit any data until the digital assistant is activated by the wake word first – in theory anyway. However, convenience and ease of use will trump security and privacy. After all, the selling point is the how simple it is to get things done — hands-free. However, you might want to have more control and kill the active listening on these devices when not in use. Read more at this groovyPost web page:

FEDS STOP USING KASPERSKY ANTIVIRUS OVER REPORTED RUSSIAN CONNECTION; STATES MAY STICK WITH ITHaving an antivirus program and malware prevention suite on your computer is a good idea. A great idea, in fact. Everyone should have one, especially businesses and government agencies. But now one security company, Kaspersky Lab, is under fire for its Russian connections — leaving local, state, and federal agencies figuring out what to do next.

Make up your own mind and read the article at

HOW TO CALIBRATE A WINDOWS 10 TOUCH SCREEN DEVICE – Microsoft’s Surface line of devices are designed to optimize the Windows 10 touch and pen input capabilities. However, after a period of time, the input accuracy can decline. Also, there are a lot of other touch-enabled two-in-one laptops and hybrid devices from other manufacturers on the market. And not all of them are calibrated with the best touch input accuracy when they leave the factory. That results in swipes and on-screen targets not being as responsive as they should be. See how to improve your experience by calibrating the touch screen in Windows 10.

Go to this groovyPost Web page and get the facts with screen shots.

GMAIL FOR ANDROID: TIPS, TRICKS AND SECRETSAndroid’s oldest app still hides some cool secrets. The Gmail app has been on Android literally since the beginning, but it’s gotten much more powerful over the years. Today, the app does so many things, it can be hard to keep track of them all. Now, you don’t have to know everything Gmail can do in order to improve your efficiency, so here are the six most useful Gmail features you probably aren’t using.

Go to this PCworld Web page and get the facts with screen shots.

14 TIPS FOR PUBLIC WI-FI HOTSPOT SECURITYWi-Fi Hotspots can be a hacker’s paradise. Following these basic security tips can mean the difference between safe surfing and an identity-theft or data-loss nightmare. Public Wi-Fi Hotspots can be a hacker’s paradise. Following these basic security tips can mean the difference between safe surfing and an identity-theft or data-loss nightmare.

Go to this PCmag Web page and make yourself safer at Wi-Fi hot spots.

CONNECT YOUR ANDROID PHONE TO WINDOWS 10 WITH “CONTINUE ON PC”Your smartphone today has a ton of computing power, but not everything can be done on it. A lot of times, for complex tasks you need to complete your workflow on a PC. Microsoft understands this, and with the upcoming Fall Creators Update, it’s introducing a new Phone-to-PC linking feature that lets you start work on your phone, and then transition it to your Windows 10 system.

groovyPost has shown how to use Continue on PC with iOS and here’s a look at connecting your Android phone with Windows 10. Note that for this to work you’ll need to be running Build 16251 or above.

Go to this groovyPost Web page and see the step-by-step instructions with screenshots.

HOW TO SEE A LOG OF EVERYTHING YOU’VE EVER DONE ON FACEBOOK – Facebook keeps an Activity Log of absolutely everything you do—tracking things you like, post, or share on someone’s Timeline. You can view that Activity Log anytime you like.

Go to this How-To Geek Web page and get the information with screen shots.

GALAXY S8 BATTERY LIFE TIPS: HOW TO CONTROL BATTERY DRAINIs your Samsung Galaxy S8 or S8+ draining too fast? These battery-saving tips can help you get a few more hours of use.

Samsung’s Galaxy S8 has a power-saving mode to help the battery last longer. We’ll walk you through setup and some best practices for extending battery life.

Tips for prolonging your Galaxy S8’s battery life

The Galaxy S8 and S8+ are two of the best Android smartphones available, but if you’re going to get any use out of features like Bixby Voice and Samsung’s stellar camera, you’ll want to implement a few power-saving strategies.

Fortunately, Samsung bundled in a helpful power-saving mode to keep the Galaxy S8’s battery steadily pumping throughout the day. We’ll teach you how to set it up, as well as how to implement some best practices for prolonging the life of your shiny Samsung phone.

The best part is that you don’t need to download anything to improve the health of your Galaxy S8’s battery. All you have to do is read on.

Go to this PCworld Web page and get the facts.

HOW TO LOG IN TO WINDOWS 10 WITH A NON-MICROSOFT cMAIL ADDRESSBy default, Windows 10 asks you to create a Microsoft account when you log in to Windows for the first time. But if you’d prefer to use an email that you actually use for, you know, email, that’s an option too. Windows 10 accepts new non-Microsoft email accounts on setup, and you can create a new Windows user with any email account.

Doing this will get you most of the benefits of using a Microsoft account—like syncing your settings between Windows PCs. But you won’t have to remember an entirely different email address to do it.

Go to this How-To Geek Web page and get the facts.

HOW TO CHANGE THE SIZE OF DESKTOP ICONS AND MORE IN WINDOWS 10In general, Windows 10 does a good job of adapting to the screen resolution of whatever device you are running it on. However, one size doesn’t fit all and you might want the shortcut icons to appear larger. Or maybe there isn’t enough room for everything on your desktop and you’d like to make things smaller. Here’s a look at how to change the size of icons on your desktop and File Explorer.

Go to this groovyPost website and read about the changes you can make.

MANAGE YOUR GOOGLE CALENDAR WITH CORTANA IN WINDOWS 10Windows 10 includes a built-in calendar app, and if you’re a Google Calendar user you might want to connect the two. Maybe you’re using Google for work and Windows for personal activities or vice versa. Here’s a look at integrating your Google Calendar with Windows 10 so you can use Cortana to create and edit appointments.

Go to this groovyPost Web page and find out how.

HOW TO COMPLETELY REMOVE A BOOK FROM YOUR KINDLE LIBRARYYou’ve probably been happily reading eBbooks on your Kindle (or the Kindle app) for years, accruing a nice digital library full of interesting titles. But what if, for some reason, someone else needs to see that library of yours…and there are some items within that you’d rather they didn’t? Say, perhaps, one of those steamy romance novels that makes up a massive 34% of fiction sales in US?

Don’t worry, dear reader. We’re not here to judge your taste in fiction. But if for some reason you want to scrub your Amazon Kindle library clean of any not-so-family-friendly novels, here’s how to do it.

Go to this How-To Geek Web page and get the information.

HOW TO AVOID TOLL ROADS IN GOOGLE MAPSNo one likes to pay to be able to drive on a specific road, especially if you’re just passing through. Thankfully, Google Maps has an easy way to bypass toll roads when using navigation.

Aside from just toll roads, Maps can also bypass highways if you’d prefer the scenic route, and avoid ferries if that can be a problem where you live. The only issue here is that avoiding these modern conveniences will almost definitely increase your mileage and drive time, but if you’re okay with that (and plan ahead) then it’s definitely worth the extra hassle to make your day a little bit better.

Go to this How-To Geek webpage and get the step by step with screen shots.

HOW TO PROPERLY TEST 911 SERVICES ON YOUR CELL PHONERecently, OnePlus owners got a scare when users discovered the new OnePlus 5 would reboot upon trying to call to 911 emergency services. Other Android users then showed up to say the same thing happened to them—many on non-OnePlus phones. The last thing you need is for your phone to not work when you need it most, so here’s the right way to test 911 services on your phone to make sure it actually works.

Before we get into it, however, I want to point out that OnePlus is aware of the 911 issue and is reportedly sending a fix. So if you’re a OnePlus 5 owner, make sure you always have the latest software. This is exactly why you should always have the latest software on any device you use, regardless of manufacturer. Automatic updates save lives!

But if this whole mess has gotten the ol’ noodle wondering if you’d have that issue on your phone, then the time to address that curiosity isn’t when an emergency happens—it’s right now.

Go to this How-To Geek Web page and get the step-by-step procedure to check out your 911 call from your cell phone.

WHAT’S NEW IN WINDOWS 10’S FALL CREATORS UPDATE, ARRIVING SEPTEMBER 2017Windows 10’s Fall Creators Update, code named Redstone 3, will be released in September 2017. Here are all the new features you’ll see in the latest version of Windows—and some big, splashy features Microsoft announced that never arrived.

This post was originally written based on features Microsoft announced at its BUILD 2017 event on May 11. It’s been updated with features added up to Insider Build 16241, released on July 13. There will be many more new features and small changes that make Windows better to use, just as there were in previous updates. We’ll learn about those through the Insider Previews released between now and September, so check back with this post for more useful, smaller, geeky features.

Go to this How-To Geek webpage and get a jump on things to come with the next Windows 10 Update.

HOW (AND WHY) TO DISABLE 2.4GHz WI-FI ON YOUR NETWORK AND USE 5GHz – Technology is an odd duck: in less than 20 years, Wi-Fi has gone from an amazing (and expensive) luxury to an assumed inclusion in every device you own. And yet, there’s plenty of room for improvement…which is why you should consider disabling the old 2.4GHz band on your home’s Wi-Fi network and using the newer, faster, less crowded 5GHz band exclusively.

Why? Let’s break it down. Go to this How-To Geek Web page and get the facts.

13 SECRET CODES THAT UNLOCK HIDDEN FEATURES ON YOUR PHONEThe USSD protocol allows you to access hidden features you didn’t know about right from your smartphone’s dialer. But there is some trickiness you’ll need to know about.

The USSD protocol allows you to access hidden features you didn’t know about right from your smartphone’s dialer. But there is some trickiness you’ll need to know about.

Unstructured Supplementary Service Data (USSD)—sometimes known as “quick codes” or “feature codes”—is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that’s a bunch of acronym gibberish to you, here’s a quick primer).

Go to this PCmag website and learn about the different codes.

GOOGLE’S SEARCH PAGE IS ABOUT TO CHANGE FOREVER – Google’s homepage on the web – which has pretty much always been a sparse white page with a simple logo and search box – is about to become very different, as the company intends to populate it with a personalized newsfeed, Facebook-style.

The new look is set to replicate the Google mobile app, which witnessed the introduction of such a feed for both news and event (appointments, travel info and so forth) updates at the end of last year.

Go to this Techradar Web page and real the news.

SAMSUNG GALAXY NOTE 8 RELEASE DATE, NEWS AND RUMORS – Update: The Samsung Galaxy Note 8 launch date has been confirmed to be August 23, and new renders appear to gives a full look at the new phablet.

The Samsung Galaxy Note 8 is the biggest comeback story in phones following all of the disastrous Galaxy Note 7 battery failures last year.

And now that our Galaxy S8 and Galaxy S8 Plus reviews are up, we’re focused on what next for Samsung’s S Pen-equipped smartphone and its launch date.

Go to this Techradar Web page and read the predictions.

MICROSOFT CUTS OFF WINDOWS 10 CREATORS UPDATE FROM SOME OLDER DEVICES – No Windows 10 Creators Update for you, Microsoft says—at least, not if you happen to be the unlucky owner of certain older Atom-based Windows devices, and other aging models in the future. After stories arose of failed attempts to upgrade such hardware to the Creators Update, Microsoft confirmed late Wednesday that any hardware device that falls out of the manufacturer’s support cycle may be ineligible for future Windows 10 updates.

In the case of the four “Clover Trail” processors (part of the Cloverview platform) that have fallen into Intel’s End of Interactive Support phase, they will be ineligible for the Windows 10 Creators Update, Microsoft confirmed. Instead, they’ll simply be offered the Windows 10 Anniversary Update, plus security updates through January, 2023, the end of the original Windows 8.1 support period.

Go to this PCworld web site and get the facts.

FREE Microsoft eBook Giveaway by Microsoft Director of Sales Excellence Eric Ligman. Largest FREE Microsoft eBook Giveaway! He is Giving Away MILLIONS of FREE Microsoft eBooks again.

HOW TO TAKE A SCREENSHOT ON ANY ANDROID PHONE – No matter what phone you have, we’ll help you figure out the easiest way to snap the screen.

Every Android phone is different, and so is taking screenshots with them. Even though Android 4 introduced simple screenshots for all with the handy power-and-volume-down-key combo, nailing it can still be tricky. That’s why some phone makers have introduced new methods. We’re here to help: Just find your Android phone on the list below to learn the various ways to snap, share, and save a screenshot.

Go to this PC World webpage and get the steps.

MICROSOFT WORD’S DESKTOP PUBLISHING TOOLS – Smarter, faster ways to get things done. Better graphics, better features, more options. Microsoft Word has come a long way since the “pre-Windows, non-mouse” versions used between 1983 to 1990. Back then, there were NO graphics, not even a graphical user interface. The Word 1.0 for Windows 3.0 version was a notable improvement, but then it took two decades for Microsoft to figure out how to integrate quality graphics successfully.

Insert images from a hard drive or other source. Now, with Word’s many amazing graphical improvements, our jobs are much easier, plus you don’t need a separate desktop publishing program anymore. Word 2016 can now adequately fulfill that task.

Go to this PC World web site and get the step by step procedures with screen shots on the graphics available in Word 2016.

CLOUD COMPUTING – GOOGLE BACKUP AND SYNC LETS YOU BACK UP EVERYTHING ON YOUR PC – Whatever digital data you have on whatever device, Google has a new way for automatically backing up those files in the cloud: Backup and Sync. Announced last month, the new backup service, available to anyone with a Google account, combines the capabilities of two previous Google apps: the Mac or PC app for the cloud-based data storage service Google Drive and the desktop uploader Google Photos.

The new Backup and Sync, which Google said yesterday was now live for most users, is an app for both Mac and PC that also backs up data on any device regularly connected to a desktop, including phones, digital cameras, and SD cards. Users can specify which folders on their desktops to automatically and continuously back up, while USB devices and SD cards can be backed up and synced when they’re connected to desktops.

Go to this Web page and get the facts.

MICROSOFT BOOSTS RANSOMWARE DEFENSES FOR WINDOWS 10 – Users of newer, patch-supported versions of the Windows operating system aren’t the only ones to receive security updates aimed at protecting them against ransomware attacks such as last month’s WannaCry. Citing the “elevated risk for destructive cyberattacks at this time,” Microsoft said yesterday it’s also making those updates available to customers with older versions of Windows no longer supported with regular patches.

Also known as WannaCrypt, the WannaCry ransomware attack hit computer systems around the world that are still using outdated software like Windows XP and Windows 7. Among the organizations affected were FedEx and the U.K.’s National Health Service (NHS).

Go to this Web page and read the facts.

WINDOWS 10 WILL USE PROTECTED FOLDERS TO THWART CRYPTO RANSOMWARE – Windows 10 Fall Creators Update (the next major update of Microsoft’s popular OS) is scheduled to be released in September, and will come with major new end-to-end security features.

As announced last week, the Enhanced Mitigation Experience Toolkit (EMET) is making a partial comeback, along with new vulnerability mitigations, in a new feature called Windows Defender Exploit Guard.

“Using intelligence from the Microsoft Intelligent Security Graph (ISG), Exploit Guard comes with a rich set of intrusion rules and policies to protect organizations from advanced threats, including zero day exploits. The inclusion of these built-in rules and policies addresses one of the key challenges with host intrusion prevention solutions which often takes significant expertise and development efforts to make effective,” the company explained.

Windows Defender Application Guard is designed to isolate threats like downloaded malware from the rest of the corporate network, and Windows Defender Device Guard, integrated with Windows Defender Advanced Threat Protection will allow the automated management of the safe application lists

The latest Windows 10 build (16232) for PC has also brought improvements aimed at stopping ransomware from encrypting users’ important files.

Help is on the way!

MANUALLY INSTALL STANDALONE AND CUMULATIVE UPDATES AND VIRUS DEFINITIONS IN WINDOWS 10 – For any Windows 10 PC—be it in an office, a home, a school, or a government institution—there are endless Windows Updates to install. Microsoft has gone to great lengths to make this process unobtrusive. In fact, for most home users with steady internet connections, Windows Updates are installed automatically with little to no input from the user. In an ideal world, this is how updates would go for everyone.

. For reasons technological and logistical, you may not be able to get on board with set-it-and-forget-it automatic Windows Updates. Microsoft has made welcome update service improvements that make installing Windows Updates require fewer resources and install faster. Still, there are times when you might need to install updates manually.

Go to this groovyPost web page and read all about it.

HOW TO UNSEND A GMAIL MESSAGE WITH UNDO SEND – Have you ever found yourself in the embarrassing situation where you sent an inappropriate email in haste to your boss or to the wrong contact? Or, maybe you inadvertently forwarded a distasteful message or image to the wrong individual thanks to the autofill feature. If you deal with hundreds of emails every day it’s an easy mistake to make.

But what if you’re using Gmail for your personal communications and need to recall a message? No worries, Google has you covered with the Undo Send feature.

Go to this groovyPost Web page and get the details.

HOW TO PERFORM A REPAIR UPGRADE IN WINDOWS 10 – When your Windows 10 installation gets funky or slow, you will try anything to get it fixed: system file checker, DISM, check disk just to name a few. Usually, the last resort ends up being a clean install, but it doesn’t necessarily have to be that way. We all know, Microsoft’s reinstall options for Windows 10 include Start Fresh, Reset and a clean install from setup media such as DVD or USB. But another handy option is the Repair Upgrade.

What exactly is a repair upgrade though?

It is simply a way to perform a fresh install of Windows 10 without deleting your apps, files, and settings. In this article, we take a quick run through the process of performing a repair upgrade.

Go to this groovyPost Web page article and get the facts.

THE BEST PASSWORD MANAGERS OF 2017 – Everyone Needs a Password Manager – once you start one, you will love it.

Are you oppressed by passwords? You know that you should use a different password for every website, and that each one should be strong and un-guessable, but it’s just so hard! Fortunately, you can get help with declaring your independence from the tyranny of passwords. Just install a password manager, and help it learn all your existing logins. Then go through and start upgrading those passwords so that each is a different, random collection of characters. The software should help you by generating those new passwords for you. PCMag has evaluated dozens of password managers to help you make an informed choice.

Go to this web page and get started.

SHOULD I BUY A CHROMEBOOK? BUYING GUIDE AND ADVICE – A Chromebook is a laptop of a different breed. Instead of Windows 10 or macOS, Chromebooks run Google’s Chrome OS. (Operating System) These machines are designed to be used primarily while connected to the Internet, with most applications and documents living in the cloud. These machines have done quite well in the education market, but their appeal has broadened. Low prices, long battery life and ease of use are just a few reasons why Chromebooks are attractive. Chromebooks outsold Macs for the first time in 2016, and Gartner is predicting that Chromebook sales will grow by 16.3 percent in 2017.

But is a Chromebook right for you? Laptop Mag’s Chromebook buying guide has the answers to these and other questions. Go to this web site and read one opinion: 

GOOGLE TO STOP SCANNING GMAIL MESSAGES TO SERVE UP ADS – Google apparently has enough data about your online activity to serve you targeted ads without its controversial email-scanning program.

 Google already knows so much about you that it has decided it no longer needs to read your emails in order to serve up targeted advertisements.

That’s not to say Gmail will now be ad-free: the search giant simply announced on Friday that it is bringing its email service in line with the rest of its free consumer web services, which display ads based on your search history, YouTube viewing history, and a wealth of other data Google collects about your online activity. Go to the website and read the entire article.

ADOBE SCAN TURNS ANY PHYSICAL DOCUMENT INTO AN EDITABLE PDF – A free mobile app released by Adobe yesterday lets users photograph documents of any kind using their smartphones or tablets and turn them into PDF documents that can be edited, shared, and searched. 

Available for iOS and Android devices, the Adobe Scan app  cleans up photo images of documents using Adobe’s Sensei artificial intelligence service. Through Adobe’s optical character recognition tool, the Scan app can also convert photographed text into digital text that can be annotated using the Adobe Document Cloud’s Acrobat or Acrobat Reader. Go to this web site and read the rest of the story.

8 EASY WAYS TO MAKE YOUR ANDROID PHONE LESS ANNOYING – Smartphone frustrations can snowball and add real stress to your day. Here are eight quick and simple things you can do to make your life a bit easier.

(Note: There are many versions of Android; these tips were tested on a Galaxy S7 Edge and Nexus 7 tablet, both running 7.0 Nougat.) Go to this web site and get to the 8 different things you can do. 

 WHAT’S NEW AND IMPROVED IN THE WINDOWS 10 SETTINGS APP? – Once upon a time, tweaking and configuring Windows was done entirely through the Control Panel. Then, along came Windows 8, which introduced the more streamlined and intuitive Settings app. The Settings app organizes various Windows system settings and user preferences into navigable categories with a much more modern interface. 

In Windows 10, Microsoft has continued to improve the Settings app by adding new settings and refining others. The Anniversary Update saw the most improvements and the Creators Update takes it even further. Not only are there more options to customize Windows 10, but new categories make it easier to find and access settings; and even more are coming in the next revision called the Fall Creators Update. In this article, we take a step back and review some of the significant changes over the past two years. Go to this web site to see some screenshots and read all about it. 

WHAT IT WILL TAKE FOR CYBERSECURITY TO BECOME COMMON SENSE – Changing your password needs to become like washing your hands after using the bathroom — a habit. We’re a long way off from that. Look both ways before you cross the street. Wash your hands before leaving the bathroom. Put a seat belt on when you get in the car. Don’t eat the yellow snow. These are all common-sense tips for safety that people have learned, whether from parents or one really embarrassing moment in the winter. But when it comes to cybersecurity, common sense is rare. Thanks to Jim Fromm, the Hawaii group’s editor/webmaster, for sending this CNET article. Take the test to see how you compare to the average American. Read more at:

6 GREAT ANDROID FEATURES MISSING FROM iOS 11 – Sure, iOS 11 looks cool, but Android’s still cooler in some key ways. Call me (author Ben Patterson) a flip-flopper, but the new features in iOS 11 have me thinking of jumping back to iOS after switching to Android barely a year ago.

Indeed, the new version of iOS brings such enticing features as a revamped App Store, a customizable Control Center, and drag-and-drop for iPad users, plus such catch-up features as one-handed typing and easy person-to-person payments.

But returning to iOS would mean leaving behind many Android features I’ve grown to love, from the ability to set up multiple user profiles to one-touch Google searches on whatever’s onscreen at a given moment. Read the PCWorld by IDG article for six awesome Android features that iOS 11 has yet to match.

HOW TO BACK UP ALL YOUR PHOTOS WITH AMAZON’S PRIME PHOTOSMillions of people are Amazon Prime subscribers, but many of them don’t realize that in addition to free shipping and Prime Instant Video, they also get unlimited photo storage for all their computers and mobile devices.

We’ve been encouraging people to get more out of their Amazon account by taking advantage of all the extra features—and unlimited photo storage is definitely a feature that Prime subscribers should take advantage of. Even if you already have a total PC backup system in place, or you’re taking advantage of another type of backup service for your photos like iCloud, we’d still encourage you to take advantage of Prime Photo storage—after all, you’ve already paid for it, and you can never have your irreplaceable photos backed up in too many places.

Thanks to a combination of manual upload through the Prime Photos site, the Amazon Drive + Photos app for Windows and Mac computers, and mobile apps for iOS and Android, it’s absolutely trivial to get your photos into Prime Photo and keep them up to date. Let’s take a look at each method, starting with the no-software-needed manual way.

Go to this HowtoGeek website and get the picture. (Bad Pun)

10 COMMAND LINE TIPS EVERY WINDOWS 10 USER SHOULD KNOW (ADVANCED USERS) –  In this day and age, many users would probably say they have no reason to be exploring a command prompt; especially with all the richness of the graphical user interface (GUI) advancements over the past 20 years.

True, but it doesn’t hurt to collect a few tricks or more, especially for those times you might be in a tight spot.

The command line is an interface that provides all the same facilities as those found in the GUI. In fact, for many years, this is how users operated a computer; it was just a fact of life. Once you get comfortable with the command line, you may even prefer it to the GUI for some tasks.

Command Line Operations in Windows 10 Every User Should Know. Our psyche has been so greatly changed by the power of the GUI, for many of us, the command line can feel primitive. But it shouldn’t and that’s why we are going learn some fun ways you can use it to perform some of the same tasks you normally do using point and click.  Command line operations come in handy when you want to create scripts and automation tasks, too.

Before we begin, check out our previous article for instructions how to find and open the Command Prompt.  Some of these commands call for administrator privileges, so, that’s a good way to start off our adventure.

Go to this website and read the entire article with screenshots.

40 POPULAR TOURIST SCAMS EVERY TRAVELER SHOULD KNOW ABOUTThese are some of the scams that are covered in this Senior Safety Online article: On the Street – The dropped wallet, the Photographer, the Music Artist; Travelling – Drop and Swap, Overnight Bus, Train pickpockets; Shops and Services – Slow counting, Fake Policeman, Fake Ticket; Locals and Children – Overly Helpful Local, Map Seller, Broken Camera; At the Hotel – Fake Front Desk Call, Fake Takeaway Menu. All of these scams and more can be found at:

WHAT DOES LOOKING UNDER THE HOOD OF YOUR BROWSER REVEAL ABOUT YOU? – Imagine you’re running a nonprofit site dedicated to keeping seniors safe online. You write articles about conmen bilking people out of their life savings, romance scams, identity theft and the like.

One day, somebody recommends a chat app called Tawk that enables you to respond in real time when your visitors write in with questions. The price is right, particularly for a nonprofit: it is, in fact, free.

All you have to do is copy a simple line of JavaScript into the HTML of your website, and you’re off and running: the chat widget starts working instantly. Read more of this naked security by SOPHOS article at:

SKYPE OUTAGE TO BLAME ON ‘DDOS ATTACK’, HACKING GROUP CLAIMS RESPONSIBILITYThe Skype outage first began on Monday, and problems have continued into Wednesday. Microsoft hasn’t said much about it, but did say on its website earlier this week that Skype was suffering from connectivity problems. Beware – Steam might be next. Read more of the Inquirer article at:

THE 11 MOST INTRIGUING FALL CREATORS UPDATE FEATURES IN WINDOWS 10 BUILD 16215Microsoft just revealed a service pack’s worth of additions as part of Windows 10 Build 16215: dictation, predictive typing, a “Find My Pen” mode, full-screen Microsoft Edge, and tons more. Microsoft’s blog post lists dozens of changes, so PC World picked 11 especially cool features you definitely need to know about. Read more at:

WINDOWS DEFENDER ANTIVIRUS IN THE WINDOWS DEFENDER SECURITY CENTER APPIn Windows 10, version 1703 (also known as the Creators Update), the Windows Defender app is now part of the Windows Defender Security Center.

Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.

All of the previous functions and settings from the Windows Defender app (in versions of Windows 10 before version 1703) are now found in the new Windows Defender Security Center app. Settings that were previously located in Windows Settings under Update & security > Windows Defender are also now in the new app.

Go to this web page and read about the updated security setting app.;

12 THINGS YOU SHOULD DO BEFORE INSTALLING WINDOWS 10 CREATORS UPDATE (VERSION 1703)The “Spring 2017” Windows 10 Creators Update has been released. This is the second major revision of the operating system since 2015. Microsoft has put an immense amount of work into making sure Windows 10 updates happen smoothly. But inevitably, there are a handful of users who experience difficulty during the upgrade. This is due to the millions of configurations that exist and the complexity of making a product like Windows 10 work on the vast majority of them.

If you haven’t upgraded, this post shows you a few things to do in advance. Some of these are simple safeguards that everyone should do. Others are more conservative measures that might only be worth your time if your Windows 10 PC is mission critical.

In this guide, we’ll walk through: backing up your data, creating recovery media, and disabling software and hardware that might interfere with the upgrade. Use this guide for reference for what you need to do to make sure the Windows 10 Creators Update goes off without a hitch.

Before You Begin: Am I Eligible to Upgrade?

Go to this groovypost website and get the 12 things to do that will ensure you a better update of the Creators edition of Windows 10.;

MICROSOFT ELIMINATES PASSWORDS FOR SIGNING INTO ONLINE SERVICES – HERE’S HOW TO SET IT UP!Microsoft is enhancing its approach to two-factor authentication and looking beyond the password as a means of security and identification. With our smartphones now a mechanical extension of our physical being (I know… depressing isn’t it), the mobile device is likely the safest way to sign into your accounts. That’s exactly what Microsoft has done using its Authenticator app, which we looked at previously. Now, instead of having to remember a complex password; you can ditch the password altogether and use your phone to log into all your Microsoft accounts and services.

Use Your Phone to Sign Into Microsoft Services – Users will need to have the free Microsoft Authenticator app for iOS or Android installed. If you already have an account setup in the app, then all you need to do is Enable Phone sign in.

Go to this groovypost website to read all about it.:

The Microsoft Authenticator lets you quickly and securely verify your identity online, for all of your accounts. A variety of features are available for all types of accounts.

Two-step verification: Two-step verification helps protect your account by providing an extra layer of security beyond simply your password. Here’s how it works – when signing in, after entering your password, you’ll be asked for an additional way to prove it’s really you. Either approve the notification sent to the Microsoft Authenticator, or enter the verification code generated by the app. With this feature, even if someone manages to find your password, they’ll be stopped if they don’t have access to your phone too.

Phone sign-in: Introducing phone sign-in for personal Microsoft accounts! After enrolling your account through the app, you can sign in to your account with only your phone. Just approve the notification sent to the Microsoft Authenticator after entering your username. Available on most Android devices.

Device registration: Some organizations require that you register your device before accessing certain files, emails, or apps. This way, they know that the sign-in request is coming from a trusted device. This can easily be completed through the app.

This app replaces the Azure Authenticator, Microsoft account, and Multi-Factor Authentication apps.

Enroll in our beta program! Follow this link for an early preview of our latest updates:

Go to this groovypost web page to find out how to use the Microsoft Authenticator App.:

ONELOGIN SUFFERS DATA BREACH, AGAIN – OneLogin, a popular single sign-on service that allows users to access thousands of popular cloud-based apps with just one password, has suffered what seems to be a serious data breach.

According to a short blog post by the company’s Chief Information Security Officer Alvaro Hoyos, they discovered the breach when, on Wednesday, they detected unauthorized access to OneLogin data in their US data region.

“We have since blocked this unauthorized access, reported the matter to law enforcement, and are working with an independent security firm to determine how the unauthorized access happened and verify the extent of the impact of this incident,” Hoyos noted, and added that impacted customers have been notified via email and provided with specific recommended remediation steps.

Go to this Helpnetsecurity web page and read all about it if you use Onelogin.

WHAT TO DO WHEN WINDOWS WON’T BOOT – You turn on your computer one day and Windows refuses to boot—what do you do? “Windows won’t boot” is a common symptom with a variety of causes, so you’ll need to perform some troubleshooting.

Modern versions of Windows are better at recovering from this sort of thing. Where Windows XP might have stopped in its tracks when faced with this problem, modern versions of Windows will try to automatically run Startup Repair.

Go to this How-to Geek web page and read about what you can do to get things back to normal.

AMAZON JUST DISCOUNTED ECHO, KINDLE AND MORE FOR FATHER’S DAY Login into your amazon account and check it out.

MICROSOFT SHOWS OFF BIG CHANGES FOR WINDOWS 10 – Released yesterday, the latest developer preview build for Microsoft’s Windows 10 brings a large number of changes to the operating system. New features include a more easily resizeable user interface for the Start menu and Action Center, the ability to pin favorite Web sites and other improvements to the Edge Web browser, Cortana intelligent digital assistant, and a pen-based handwriting experience.

Other improvements arriving with this preview are a new panel for quicker and easier selection of emojis, new phone keyboard-like experiences for PCs, and a one-touch microphone button for desktop dictation in English or Chinese.

Go to this web page to get a look at what is in the future for Windows 10.

HOW A SUPREME COURT RULING ON PRINTER CARTRIDGES CHANGES WHAT IT MEANS TO BUY ALMOST ANYTHING – Last week, the Supreme Court dealt a major blow to corporations that try to use patent law as a weapon against other firms, saying that companies can only be sued for patent infringement in the places they actually do business. Now, the Court has ruled again along those same lines, handing a victory to consumer groups in a case about printer cartridges — or more specifically, toner cartridges, the kind used by laser printers. Thanks to Lou Torraca, MOAA User Group in Hawaii for the link. Read more of the Washington Post article at:

WHATEVER YOU DO, DON’T DOWNLOAD THESE APPS – THEY’RE HIDING MALWARE! – Do you play games? How about your grandkids? Usually, Google’s official Play Store is the safest source for Android apps but as evidenced by the recent massive Judy malware campaign, unscrupulous developers sometimes find ways to smuggle malware through official apps and circumvent Google’s screening process.

Two Google Play apps that appear to be innocent games were discovered to be hiding pesky malware and you should delete them immediately. Read more about these apps in the 5/31/17 Kim Komando article (link below). Don’t forget to click on the massive Judy malware campaign link in the article to see more games with malware. (I think I’m going to change my first name—Judy Taylour 😊)

WATCH OUT! TECH SUPPORT SCAMS EXPLOITING WORLDWIDE RANSOMWARE SCARE – It’s been less than two weeks since WannaCry ransomware started creating havoc all over the globe. It infected hundreds of thousands of computers in more than 150 countries in a very short period of time. This ransomware campaign was especially scary in the way that it spread. Scammers have started sending out fake tech-support warnings, piggybacking on fears from WannaCry. How the scam works is, victims see a pop-up warning on their computer that’s supposedly from Microsoft tech-support. The pop-up message claims that the user’s gadget has been infected with WannaCry ransomware.

Read more by Mark Jones,

HOW FAST WILL IDENTITY THIEVES USE STOLEN INFO? – If you’ve been affected by a data breach, or otherwise had your information hacked or stolen, you’ve probably asked yourself, “What happens when my stolen information is made public?” At the FTC’s Identity Theft workshop this morning (5/24), our Office of Technology staff reported on research they did to find out. Read more at:

12 ANDROID APPS WIN 2017 GOOGLE PLAY AWARDS The results are in for the second annual Google Play Awards, the company’s new tradition to honor excellence in the world of Android apps.

Go to this PC World website and see the list with descriptions.:

MICROSOFT REDESIGNS ONENOTE UI (USER INTERFACE) to make it more universally accessible – OneNote is changing to benefit users with vision and mobility impairments, Microsoft announced Thursday. The redesign will place navigation on the left-hand rail, where screen readers and Microsoft’s own Narrator will find it more accessible. The redesign will apply to what Microsoft calls the Windows 10 Universal Windows Platform (UWP) version of OneNote, as well as the versions for iOS and Android, the Mac, and the Web.

Go to this PC World webpage to read all about it.

HOW TO DIAGNOSE YOUR CAR’S CHECK ENGINE LIGHT (WITHOUT GOING TO A MECHANIC), but using your Cell Phone and an App – The Check Engine light on your car is both useful and infuriating. You know something is wrong (which is good!), but you don’t know what. Rather than taking your car all the way down to your mechanic, you can get a pretty good idea what’s wrong with your car with a simple OBD-II adapter. Every car sold in the US after 1996 has an OBD-II port that you can use to connect your car to your phone. This is the same port that a mechanic will connect to in order to find out what’s wrong with your car when the Check Engine light comes on. For a long time, you needed special hardware to use it, but cheap Bluetooth OBD-II adapters (and your cell phone) have made it easy to do it yourself.

There are several ways to diagnose your check engine light, but we’re going to use an app called Dash. This app lets you store important information about your car, track your driving and, as a bonus, diagnose check engine lights. It’s available for Android and iOS, so download it before moving on. If you’ve never used an OBD-II adapter before, check out our guide here to get set up.

Go to this How-to-Geek website and get all the info.:

The OBD II adapter is available at

HOW TO DEAL WITH BAD PHOTOS ON FACEBOOKNot everyone is model pretty and capable of posing perfectly on a split second’s notice. For most mere mortals, photographs can be a risky business. If you’re caught mid-word, after a few drinks or, God forbid, while you’re dancing, no amount of work in Photoshop can ever save the photo.

While most of the time these pictures are fairly harmless fun, if it’s a really bad photo (or perhaps you’re trying to curate a specific professional image) then you might need to do something about it. Here’s what to do if someone else posts a bad photo of you on Facebook.

Go to this How-to-Geek website and read all about it.:

GOOGLE HOME GETS HANDS-FREE CALLING AND 6 OTHER COOL NEW FEATURESGoogle’s answer to the Amazon Echo and Dot equals Google Home. Google’s A.I.(artificial-intelligence) speaker gets hands-free calling, proactive assistance, and HBONow support, among other interesting tricks.

Google Home is barely six months old, and Google is piling on new features. On Wednesday at its I/O developer conference in Mountain View, the company announced upgrades focused on personalizing your interactions and making them hands-free. Presented by Rishi Chandra, Google’s Vice President for Home Products, the new features leapfrog Amazon’s popular Echo assistant in some ways, while in other ways Google is just catching up. Here’s what Google revealed:

Go to this PC World web site and get the latest information:

What is Google Home? – is a voice-activated speaker powered by the Google Assistant. … A simple voice request triggers Google Home to play music, podcasts or radio from services like Google Play Music, Spotify, YouTube Music, Pandora and TuneIn.

GOOGLE’S SMART REPLY FOR GMAIL may make automated replies sound less canned – Google is making it easier for people to dash off a quick email reply from Gmail on their smartphones. The Smart Reply feature, which offers a handful of contextually-aware, computer-generated responses, is coming to Google’s flagship email app for iOS and Android, the company announced at its I/O developer conference Wednesday.

The feature provides users with three machine-generated responses, based on the content of whatever message the user is replying to. It’s built using machine learning, and is designed for use with smartphones, so that people on the go can dash off a reply to their correspondence partners without much effort.

At first, Smart Reply will be available globally in English for users of the Gmail app for iOS and Android. In the coming weeks, Google will also make it available for users who write in Spanish, with other languages coming after that.

Go to this PC World website and read all about it.:

TWITTER ROLLS OUT NEW PRIVACY TOOLS as it ditches Do Not Track and expands data sharing – Privacy conscious Twitter users have some check boxes to de-select. Twitter is dumping its support for Do Not Track (DNT), changing how it shares user data with third parties, and holding any web browsing data it collects for a longer duration—all to better aid in ad targeting, of course. But, at the same time, Twitter is giving users more control over what kind of user data can be used for targeted advertising, as well as more transparency about the information it collects about you.

The privacy features are active now, but the new privacy policies that dump DNT, change data sharing policies, and hold your data longer don’t come into effect until June 18. Here’s a look at what’s going on.

Go to this PC World Web site and get all the new features and setting for your Twitter account:

MEDICARE SCAM ALERT: New Medicare cards are on the way – Changes are coming to your Medicare card. By April 2019, your card will be replaced with one that no longer shows your Social Security number. Instead, your card will have a new Medicare Beneficiary Identifier (MBI) that will be used for billing and for checking your eligibility and claim status. And it will all happen automatically – you won’t have to pay anyone or give anyone information, no matter what someone might tell you. Read more of the blog post by Andrew Johnson, Consumer Education Specialist, FTC, at:

WHAT’S NEW IN WINDOWS 10’S FALL CREATORS UPDATE, ARRIVING SEPTEMBER 2017 – I imagine many of us still don’t have the Spring Creators Update; here’s info by Chris Hoffman, How-to Geek, about the next Creators Update release.  

Windows 10’s Fall Creators Update, codenamed Redstone 3, will be released in September 2017. Here are all the new features Microsoft announced at its BUILD 2017 event on May 11. There will be many more new features and small changes that make Windows better to use, just as there were in previous updates. We’ll learn about those through the Insider Previews released between now and September, so check back with this post for more useful, smaller, geeky features.

MICROSOFT ISSUES WANACRYPT PATCH FOR WINDOWS 8, XP – Microsoft Corp. today (5/13) took the unusual step of issuing security updates to address flaws in older, unsupported versions of Windows — including Windows XP and Windows 8. The move is a bid to slow the spread of the WanaCrypt ransomware strain that infected tens of thousands of Windows computers virtually overnight this week. Read more of the Krebs on Security article at:

PASS IT ON: TECH SUPPORT SCAMS – Earlier today (May 12), the FTC announced a bunch of cases against tech support scammers: the people who act like there’s a problem with your computer and then try to convince you to fork over money to fix – ahem – “fix” it. Except there never was a problem, and they weren’t really from tech support. Read the rest of this post by Jennifer Leach, Assistant Director, Division of Consumer and Business Education, FTC at:

AVOID A TECH TRAP – I will drive for a week with my car’s Check Engine light blinking, but if a security warning shows up on my computer, I act immediately. Scammers have been taking advantage of people like me, who care about computer security. They ran operations in the US and overseas that used pop-up messages and phone calls to convince people their computers needed fixing. The callers pitched unnecessary — and sometimes harmful — tech support services that cost people time and money. The FTC announced four new cases against these operations today, and — along with its state, federal and international partners — launched a national and international effort to stop these scams and get money back to the victims. Read the rest of this post by Bridget Small, FTC Consumer Education Specialist, at:

PRIVACY AWARENESS WEEK: A TIME TO LEARN – Privacy Awareness Week is May 8-12, 2017. It’s an annual initiative of the Asia Pacific Privacy Authorities Forum that combines the efforts of privacy agencies in the region to share information about privacy practices and rules. If you’ve been following this blog, you know the FTC has tips on how to secure your routers, IP cameras and ‘Internet of Things’ devices, protecting them from hackers and malware attacks. We’ve also reminded you about steps to take to control online tracking by advertisers, as well as how to protect your personal information when connecting mobile devices to a rental car’s infotainment system….. by Melinda Claybaugh, Counsel for International Consumer Protection, FTC. Read the rest of her May 7 blog post at: 

MICROSOFT BULLETIN – WINDOWS 10 VERSION 1507 WILL NO LONGER RECEIVE SECURITY UPDATES – After May 9, 2017, Windows 10 devices running version 1507 will no longer receive security and quality updates. Microsoft recommends updating devices to the latest version of Windows 10 by visiting the Software Download site and selecting Update now to manually update your device. For additional info, check out the Windows lifecycle fact sheet. See the rest of the article at:

DON’T INSTALL THE WINDOWS 10 CREATORS UPDATE ON YOUR OWN, MICROSOFT ADVISES – Microsoft would prefer it if you didn’t try to install the Windows 10 Creators Update yourself. Instead, the company is encouraging everyone but advanced users to wait for the Creators Update to become available via Windows Update. That means workarounds for excited users, like the Media Creation Tool or the Windows Update Assistant, are discouraged. 

Go to this PC World magazine website and read all about it.: 

HOW TO STOP WEBSITES FROM ASKING FOR YOUR LOCATION IN CHROME, EDGE, FIREFOX, OPERA, SAFARI – Browsers can supply your location when you permit it. If you have no plans of ever permitting it here’s how to turn that feature off.

Go to this PC World magazine web site and get the details.:

indows 10’s Creators Update makes it easier to disable location tracking and also erase location history. 

Windows 10 Privacy: How to Disable the Location Features – Go to this PC World magazine web page and get the facts.:

BLIND TRUST IN EMAIL COULD COST YOU YOUR HOME – The process of buying or selling a home can be extremely stressful and complex, but imagine the stress that would boil up if — at settlement — your money was wired to scammers in another country instead of to the settlement firm or escrow company. Here’s the story about a phishing email that cost a couple their home and left them scrambling for months to recover hundreds of thousands in cash that went missing. Don’t forget to watch the video! 

Read the rest of Brian Krebs, KrebsonSecurity, article at:

BE CAREFUL ON GOOGLE PLAY – These malicious apps were discovered on Google Play:

  • A modified version of the Charger mobile ransomware masquerading as a flashlight app
  • The BankBot credential stealer embedded in video apps
  • The DressCode backdoor found in 200 unique Android apps, ranging from style guides and books for children to Doodle applications
  • Spyware posing as an Android system update app.

The unfortunate reality is that most users don’t know enough about the technology they use to keep themselves safe, and aren’t interested in learning or simply don’t know where to start. 

LINKSYS SMART WI-FI ROUTERS FULL OF FLAWS, but temporary fix is available – Over 20 models of Linksys Smart Wi-Fi routers have been found to have vulnerabilities that, if exploited, could allow attackers to overload a router and force a reboot, deny user access, leak sensitive information about the router and connected devices, change restricted settings, and inject and execute commands on the operating system of the router with root privileges. 

They are still there and open to exploitation.

Go to this webpage and read all about it.: 

FLASHLIGHT APP ON GOOGLE PLAY DELIVERED HIGHLY ADAPTABLE BANKING TROJAN – A modified version of the Charger mobile ransomware has been downloaded from Google Play by up to 5,000 users. This new variant of the malware was shipped inside a legitimate-looking flashlight app called “Flashlight LED Widget” and, unlike its predecessor, locking the device and demanding a ransom from the user in order to unlock it is not its main goal. 

Charger.B: A highly flexible credential stealer – The threat was spotted by ESET researchers, who notified Google and got the app pulled from Google Play some ten days ago. 

According to their analysis, the malware works on all Android versions, and is able to minimize its visibility on the infected phones, display fake (phishing) screens mimicking legitimate apps, intercept text messages, and temporarily lock the device to prevent victims from interfering with the crooks’ fraudulent activity. 

How to remove the malware? Go to this website and read all about it.: 

MASTERCARD INTRODUCES CARDS THAT WORK WITH FINGERPRINTS INSTEAD OF PINS – MasterCard has added fingerprint sensors to its payment cards, in an attempt to make face-to-face payments more convenient and more secure.

How does it work? “A cardholder enrolls their card by simply registering with their financial institution. Upon registration, their fingerprint is converted into an encrypted digital template that is stored on the card. The card is now ready to be used at any EMV card terminal globally,” the credit card provider explained. 

“When shopping and paying in-store, the biometric card works like any other chip card. The cardholder simply dips the card into a retailer’s terminal while placing their finger on the embedded sensor. The fingerprint is verified against the template and – if the biometrics match – the cardholder is successfully authenticated and the transaction can then be approved with the card never leaving the consumer’s hand.” 

Go to this website and read the entire article.: 

SAMSUNG ANDROID OWNERS WILL GET SPECIAL GOOGLE PLAY MUSIC FEATURES – Samsung has always been special as the world’s largest Android smartphone maker, and on Friday Google made it even more special. The two companies are teaming up to make Google Play Music the default music app on Samsung Android smartphone and tablets starting with the Galaxy S8 and S8+—both of which start shipping today. 

As part of the perks, users of new Samsung mobile devices will be able to add up to 100,000 songs to Google Play Music’s cloud locker for free. Anyone with a non-Samsung device is limited to the standard 50,000 free song upload. 

In addition, new Samsung devices will come with the free three-month trial of Play Music for new users that Pixel customers and other select Android phones already see. 

HOW TO MAKE WINDOWS TROUBLESHOOT YOUR PC’S PROBLEMS FOR YOU – Windows includes a variety of “troubleshooters” designed to quickly diagnose and automatically solve various computer problems. Troubleshooters can’t fix everything, but they’re a great place to start if you encounter a problem with your computer.

Troubleshooters are built into the Control Panel on Windows 10, 8, and 7, so practically all Windows users can take advantage of them. On Windows 10’s Creators Update, most troubleshooters are now available through the Settings app. 

Go to the following How-to-Geek website and read all about this troubleshooting aid for all current Windows operating systems.:

HOW TECH SUPPORT SCAMMERS HAVE MADE MILLIONS OF DOLLARS – Ahhh, the sweet smell of revenge! Nothing like unleashing some ransomware on those tech support scammers, eh?  

However, fortunately for them, there aren’t hours enough in the day to turn the tables on the swindlers and social-engineer their pants off.  

Unless, that is, you’re talking about researchers at Stony Brook University, who recently cooked up a robot to automatically crawl the web finding tech support scammers and figuring out where they lurk, how they monetize the scam, and what software tools they use to pull off their dastardly deeds. Read more of this article by Lisa Vaas, Naked Security by Sophos, at:

WHAT’S NEW IN WINDOWS 10’S CREATORS UPDATE – The Windows 10 Creators Update—codenamed Redstone 2—began rolling out on April 11, 2017. Like other updates to Windows 10, it’s free, and includes a host of new features. It will be rolled out slowly like the Anniversary Update, so it will be a few months before Microsoft offers it to everyone. Read the rest of Chris Hoffman’s excellent article (with screenshots) at:

WINDOWS 10 CREATORS UPDATE WILL COME WITH CLEARER PRIVACY OPTIONS – Nearly two years after Microsoft released Windows 10, the company has finally revealed what data it collects from users. The revelation comes as part of a recent change of the company’s privacy statement, which has been made to reflect the company’s move towards more transparency.

Go to this Microsoft Website to see their statements.:

I recommend that all users of Windows 10 check their Privacy Settings after they install Windows 10 Creators Update.

LAPTOP/NOTEBOOK BATTERIES RECALL – The May 2017 issue of Consumer Reports has the following recall notice on page 22:

”HP and Toshiba are expanding recalls of lithium-ion computer battery packs that can overheat, posing burn and fire hazards. HP is recalling HP and Compaq packs sold from March 2013 through October 2016. Toshiba is recalling Panasonic packs sold from June 2011 through November 2016.

What to Do. For Toshiba, call 866-224-1346 or go to  for replacement Information; for HP, call 888-202-4320 or go to If your battery is affected by the recall, remove it and power the computer only by plugging in into an outlet until you receive the replacement.”

6 EASY WAYS TO KEEP YOUR ANDROID PHONE SECURE – Protect your device from hackers with these tips. Nope, you’re not being paranoid. From pickpockets to malware, your Android phone is under siege from all sides. Wily attackers are continually switching up their tactics in hopes of taking control of your device.

Let’s acknowledge that there’s no foolproof way to protect your Android device from thieves and hackers. Indeed, as a wise technology guru once told me, if a sophisticated crook decides to target your phone, good luck trying to stop them.

That said, there are plenty of ways to keep your Android handset safe from the most common security threats, all with a minimum of effort. Just as a deadbolt will thwart a casual thief, so will a passcode foil a pickpocket, while the right security settings can keep most malware-infected apps at bay.

Read on for six easy ways to keep your Android phone secure, at this PC World Magazine Web page:

BEST MEDIA STREAMING DEVICE – Whether you’ve just gotten rid of cable or want to supplement your TV package with online video, now’s an excellent time to buy a media streaming device. Compared to the typical smart TV, standalone streamers such as the Roku Streaming Stick and Amazon Fire TV tend to have bigger app selections, faster performance, and more features. And with so much competition between device makers, the hardware is becoming faster, more capable, and more affordable.

Here are some picks for the best streaming boxes and sticks, along with current product reviews. Recommendations will change over time as new products come to market.

Go to This PC World Magazine web page and read the reviews:

LASTPASS IS SCRAMBLING TO FIX ANOTHER SERIOUS VULNERABILITY – The flaw could allow for remote code execution or password theft. For the second time in two weeks, developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or infect computers with malware. Thanks to The TUG – MOAA Hawaii Aloha Chapter Computer User Group for the info.

WHY ARE SOME iMESSAGES GREEN AND SOME BLUE ON MY iPHONE? – You may have noticed that some messages in iPhone’s Message app are green, while some are blue. What do those colors mean and does it even matter?

Messages with green bubbles are normal SMS text messages. (SMS = Short Message Service)

Message with blue bubbles are sent via the iMessage instant messaging protocol—a messaging platform specific to Apple devices.

If you’re communicating between two Apple devices with iMessage enabled, you’ll see blue messages. If you’re communicating with any device that doesn’t use iMessage—like an Android phone, or an iPhone that doesn’t have iMessage turned on—you’ll see green messages.

Go to this How-to Geek webpage and read all about it.:

WHICH VERSION OF CHROME DO I HAVE? – Chrome is Chrome, right? You download Google’s browser—now the most popular in the world—and you’d think you have the same experience as everyone else. But like most large software vendors, Google releases Chrome in differing “channels,” testing out features in more unstable versions before they get to the release build that hundreds of millions of people use every day.

Whether you want to know what version number you’re on, what development channel you’re using, or whether it’s 32-bit or 64-bit, the About page will tell you everything you need to know.

Go to this How-to Geek web page and get the inside facts.:

WHAT’S THE DIFFERENCE BETWEEN NOTEPAD AND WORDPAD IN WINDOWS? – If you have always used Microsoft Word since you started using a computer, maybe you’ve never looked at those other writing options in Windows.

Notepad and WordPad are both developed by Microsoft itself, and included in every copy of Windows. Don’t dismiss them out of hand—while neither are as powerful as paid software in the same niches, they might just do for you.

Notepad and WordPad, despite their similar names, serve different purposes.

Notepad is a text editor, meant for basic plain text entry.

WordPad is a word processor, meant for formatting and printing documents—like Microsoft Word, but not quite as advanced.

They aren’t the only programs in their respective categories, either. Let’s read a little bit about text editors and word processors, and their intentions.

Go to this How-to Geek web page and read all about it.:

HOW TO SET UP GOOGLE PHOTOS – Having access to all of your photos at a swipe is kind of like living the dream, at least for many photographers it is. If you’re snap-happy, then you owe it to yourself to make sure that you never lose another photo again with Google Photos. This service will back up, store, and organize your photos so that as soon as you capture that moment it’s protected from accidental deletion when your phone runs out of storage space. Getting everything set up is a quick process, provided you already have a Google account, and in many cases comes preloaded on your phone.
Detailed steps at:

WARNING: DANGEROUS NEW GMAIL PHISHING ATTACK CAN EASILY STEAL YOUR GOOGLE LOGINWhy are the Windows and Android platforms always targeted by malware and other malicious attacks from nefarious hackers? Because they’re used by so many people that the odds of a successful attack are dramatically increased compared to less popular platforms like macOS. For that same reason, Google’s Gmail service is often the target of phishing scams that have become increasingly effective in recent years. Now, a new scam has been uncovered that may very well be the most well-executed scam in recent history, making it all too easy for victims to have their Google login credentials stolen. Read more at:

NEW ANDROID SMARTPHONES FOUND TO BE ALREADY INFECTED BY MALWARE: ARE YOU AT RISK?It seems that avoiding the insecure practices of clicking on suspicious links and downloading shady apps is no longer enough to prevent Android smartphones from being attacked by malware and ransomware, as new devices are found to be already infected right out of the box.

The discovery, made by cybersecurity company Check Point, raises fresh concerns on Android security and highlights the importance of malware scanners even on new smartphones.

Check Point Discovers Pre-Installed Malware
According to a blog post published by Check Point, the cybersecurity company discovered a “severe infection” on 38 Android-powered devices. While this is certainly not an unusual incident considering the increasing number of hackers using malware, the alarming detail is that the malware were not downloaded into the devices. Instead, they arrived with the malware pre-installed.

GO to this Tech Times Newsletter website and read the entire article.:

HOW TO GET FREE MONEY FROM GOOGLE BY ANSWERING QUICK SURVEYS – IN THE FORM OF GOOGLE PLAY CREDIT – A search engine always wants  more data. If you want to earn some extra money (in the form of Google Play Credit), Google will give you some in exchange for answering a few occasional survey questions.

The Google Opinion Rewards app periodically gives you surveys consisting of a few simple questions. Most are based around your shopping habits and come from market researchers. If you’d like to know how your data will be used, you can read Google’s FAQ on the subject uses.

The rewards you get won’t pay your bills or anything, but each survey rewards anywhere from ten cents to a dollar or so for a few seconds of your time. It seems small, but it can add up fast—and when it does, and you can get free movie rentals or buy a couple games on the Play Store. Google Play credit even works on in-app purchases, so you can buy Pokéballs or comic books. All for passing a few seconds of time when you’re bored waiting in line at the grocery store.

To get started, download the Google Opinion Rewards app. Then go to this How-to-Geek website and read all about it, or read all about it first.

IRS WARNS OF LAST-MINUTE TAX SCAMSThe Internal Revenue Service (IRS) has released an alert warning of phishing email scams targeting last-minute tax filers. The alert describes common features of these cyber crimes and includes recommendations to protect against them: strengthen passwords, recognize phishing attempts, and forward suspicious emails to


OFFICE 2016 VS. OFFICE 365 AND FREE APPS – Here’s the main difference: Office 2016 is the traditional Microsoft Office product, sold for a one-time, up-front fee. You pay once to buy a version of Office 2016 you can install on a single PC or Mac and use for as long as you like. There’s no expiration date.

Office 365, on the other hand, is the new way Microsoft wants you to buy Office. Rather than paying a hefty up-front price, you pay a monthly or yearly fee and get access to the latest version of Office for as long as you pay the fee. You also get additional OneDrive cloud storage and access to the Office apps for tablets. You can choose a subscription that allows you to install Office on up to five different computers, sharing it with your family, or just get Office for yourself.

MICROSOFT OFFICE, POWERPOINT, EXCEL AND ONE NOTE ARE FREE WHEN YOU USE THE ONLINE APPSAccess anywhere, Create and collaborate using your favorite desktop browser; Familiar user interface, Enjoy a familiar experience with the Office apps you already know—so there’s nothing new to learn; Easy transition.

Move seamlessly from Office Online to the full-featured desktop apps—without leaving your document.

Go to This Microsoft Website to read all about it and get started with your Free Apps: 

THE EASIEST WAY TO FIX WI-FI ISSUES: MOVE YOUR ROUTER (SERIOUSLY)Your laptop and iPad connect to the Internet using a century old technology: radio waves.

And radio waves have limits. If you drive through a tunnel with the FM radio on, you’ll mostly hear a bunch of static. This is because the signal from the radio tower can’t reach you underground. There are barriers that block the signal.

The same principle applies to your Wi-Fi: barriers between your router and your devices make the signal worse. So, the physical placement of your device makes a startlingly big difference in your signal across the house.

Place Your Router in the Center of Your House

Go to this How-To-Geek Website and read the entire article:

HOW TO FIX INACCURATE CHARGE PERCENTAGES BY CALIBRATING YOUR PHONE’S BATTERYIf you’ve ever noticed that your phone’s battery goes from 60% to 50% in a matter of minutes, only to remain on 50% for what seems like ages, it probably means the battery needs to be calibrated.

Why Your Phone’s Battery Percentage Becomes Inaccurate

This is a problem that occurs in most battery-powered electronics these days, so this process should work on iPhone, Android, and even tablets or laptops (almost all of which use lithium ion batteries). While it’s really not that big of a problem, it can be a bit annoying when your phone says you have 25% battery left, only to look again and see that it’s nearly dying.

The reason for this is simple. Batteries naturally degrade over time, and their capacity slowly decreases. But your phone isn’t always great at measuring that—if your battery has degraded to 95% of its original capacity, your phone might still report that as 95% full, instead of 100% full (the “new normal”). Calibrating your battery can fix this.

Go to this How -to- Geek Website and read the article.

HOW TO SEE WHICH SERVICES OFFER A MOVIE OR SHOW FOR STREAMINGBack in ancient days, when you wanted a movie, you got off the couch and went to the video store. Sure, you had to leave your house and talk to a person (things no one has to do against their will in 2017,) but you didn’t need to wonder where to look for what. Every store had basically every movie.

That’s not true today. Netflix, Hulu, and Amazon all offer a lot of movies, but figuring out what’s offered where is up to you. That’s where JustWatch comes in. Instead of searching Netflix, then Amazon, then Hulu, JustWatch is a “streaming search engine” that lets you find out who is offering which movies and TV shows. If there are no streaming options for the movie or show you want, you’ll see where you can rent or buy it, and how much it will cost.

This feature is already available on some streaming boxes built-in, like the Roku. If it isn’t on your streaming box, there are several sites that can do the trick, including and Can I Stream It. After testing quite a few, we settled on JustWatch for its superior results and layout.

Go to this How-to-Geek website and read the article.

APPLE PUSHING TWO-FACTOR AUTHENTICATION FOR iOS 10.3 USERS -Beta users of Apple iOS 10.3 are reporting that they’re receiving push notifications from Apple to enable two-factor authentication (2FA) for their Apple IDs, which is used on Apple devices (like iPads, iPhones and Macs) to synchronize and share iCloud user data.

Apple’s 2FA provides an extra layer of security for iCloud data as well as for devices registered to an Apple ID, and it seems with iOS 10.3 that Apple is taking stronger measures to encourage its users to enable this feature.

Two-factor authentication isn’t new on iDevices, as it has been available for well over a year since iOS9 and OS X El Capitan – notably, the feature became available first for iCloud after a spate of celebrity iCloud hacking incidents, and then more broadly to secure Apple devices soon after. Read more from Naked Security / Sophos at:

STOP CHARGING YOUR PHONE AT PUBLIC CHARGING STATIONS – If you use a public charging station to charge your phone, you are exposing it to being hacked. Once a port is compromised, a hacker can view and steal your emails, text messages, photos, and contacts. This kind of hacking is called juice jacking, by which malware might be installed on to, or data surreptitiously copied from a device using a charging port that doubles as a data connection, typically over a USB connection. Read the rest of the Vipre Security News article at:

HOW TO STOP WEBSITES FROM ASKING FOR YOUR LOCATION – Modern web browsers allow websites to ask for your location through a prompt. If you’re tired of seeing these prompts, you can disable them and websites won’t be able to ask for your location anymore. The setting to change is in your Browser.

Websites that ask for your location usually allow you to plug in a zip code or address instead. You don’t need to provide precise access to your location via your web browser’s location services, so you likely won’t lose much functionality by turning this off.

Go to this How-to-Geek website and see the setting changes for all the popular Browsers:

HOW TO QUICKLY ADJUST WHICH FACEBOOK NOTIFICATIONS YOU SEE ON YOUR SMART PHONE OR ON THE WEB – Notifications are one of the worst things about smartphones. It’s one thing to get notifications for things you want, like text messages, but it’s a completely different story if your phone is beeping because someone has invited you to play a game on Facebook.

It’s great then, that on Facebook for iOS and Android, there’s a really quick and handy way to manage notifications you don’t want to see. There’s also a web option, though it isn’t quite as good. Let’s look at both.

Go to this How-to-Geek website for step by step procedures:

SPORA RANSOMWARE SPREADS VIA FAKE ‘CHROME FONT PACK’ – Spora, a powerful new ransomware strain that is able to encrypt files without communicating to a command-and-control server, is using a social engineering attack vector using fake “Chrome Font Pack” pop-ups.

Spora’s evil geniuses have compromised multiple websites, turn the websites’ pages into unreadable text and tell visitors that the “HoeflerText” font is missing and that they can fix this by downloading the “Chrome Font Pack.” People then download and install the malicious code by double-clicking the “update.exe” file.

How do you avoid the Spora malware? If, while browsing a site, you can’t read the type, and if you get a popup which mentions an error with the fonts… Close your browser.  Do not visit that site.

If you happen to know the company or website this has occurred on, send them an email or contact them to inform them that they might have been hacked.

iPHONE ROBBERS TRY TO iPHISH VICTIMS – In another strange tale from the kinetic-attack-meets-cyberattack department, earlier this week I heard from a loyal reader in Brazil whose wife was recently mugged by three robbers who nabbed her iPhone. Not long after the husband texted the stolen phone — offering to buy back the locked device — he soon began receiving text messages stating the phone had been found. All he had to do to begin the process of retrieving the device was click the texted link and log in to the phishing page mimicking Apple’s site. Read the rest of the Krebs on Security article at

WHAT IS JAVASCRIPT, AND WHY IS GMAIL BLOCKING IT?Starting February 13, 2017, Gmail changed its policy regarding JavaScript. Here’s why this is changing, and how you can protect yourself from malicious JavaScript.

What Is JavaScript, Anyway? JavaScript (not to be confused with Java, a separate programming language with a similar name) is not inherently a dangerous or malicious thing. JavaScript is a programming language that is stored in plain text and executed by various programs, including web browsers. Currently, it is likely the most popular language on the web.

Why Is Gmail Blocking It? Security experts have noted a trend of more malware written in JavaScript. These are often sent over email, disguised as a resume, or phishing message targeting businesses, or a claim the attachment will “track a recent order.” This is a “trojan horse” (or simply “trojan”) kind of injection of malicious software, because it needs an unsuspecting user to download, open, run, or install malicious bits of code. One frightening recent trend from the past few years is Ransomware. Given access to your computer, a JavaScript program might install software to turn your important files to unreadable gibberish through a process called Encryption, forcing you to pay someone halfway around the globe to get back the files that used to be yours. Google keeps a list of common filetypes used by malware creators, and Gmail blocks them. Because of the increase of this kind of malware, the JavaScript filetype has been added to that list. It’s unlikely this will cause most users any problems, most users will not likely notice any difference.

What you can do to keep yourself safe – Never open email attachments from untrusted or unknown senders, or from known senders if the email looks suspicious or confusing. Doing this will cut your risk to all malicious Trojan code down to almost nothing, since the majority of it comes from spam or hijacked email accounts. And that’s roughly all you need to know about keeping safe from any bad bits of JavaScript. Gmail also blocks password protected files and archives as these, too, can be used to send malicious payloads. How-to-Geek

RSA CYBERSECURITY CONFERENCE  2017. SOPHOSLABS SEES SPIKE IN LINUX-IOT MALWARE – Attackers are increasingly using Linux security holes to target and infect Internet of Things (IoT) devices that include everything from webcams to Internet-connecting household appliances. NakedSecurity by SOPHOS 2/13/17. Read more at:

SOPHOSLABS REPORT EXAMINES TOP 10 ANDROID MALWARE – SophosLabs analysis systems processed more than 8.5m suspicious Android applications in 2016. More than half of them were either malware or potentially unwanted applications (PUA), including poorly behaved adware. NakedSecurity by SOPHOS 2/14/17. Read more at:

DECONSTRUCTING MAC OS RANSOMWARE – Though Mac malware is comparatively rare, Apple computers are not immune, as this year’s SophosLabs malware forecast shows. Mac malware is often technically sneaky and geared towards harvesting data or providing covert remote access to thieves. NakedSecurity by SOPHOS 2/15/17. Read more at:

GOOGLE SET TO PURGE PLAY STORE OF APPS LACKING A PRIVACY POLICY – Google is warning developers that it plans to purge its Play store of apps that don’t have privacy policies. The move could affect millions of apps that don’t spell out what they do with user data. Studies have found that mobile apps in general – both those in Google Play and in Apple’s app store – have been pretty dismal when it comes to privacy. Google Play store app developers have until March 15 to do one of two things: either link to a “valid” privacy policy on their app store listing page and within their app, or stop asking for sensitive user data. That’s the bare minimum requirement, though. Requirements get stiffer still for personal and sensitive information. Read more at:

WHAT IS A “PORTABLE” APP, AND WHY DOES IT MATTER?Portable applications offer some definite advantages over their traditional counterparts. They’re lightweight and they allow you to move between computers while taking your applications and settings with you.

A portable app is simply one that doesn’t use an installer. All the files required to run the app reside in a single folder, which you can put anywhere on the system. If you move the folder, the app will still work the same. Instead of installing a portable app, you typically download it as a ZIP file, extract that ZIP it a folder, and run the executable file for the app. If the app allows you to save settings, those settings are saved in files right inside the same folder.

Stick them on a USB drive and you can carry them around from computer to computer. They won’t leave any footprint on the PCs you run them on. Everything, including any settings you’ve saved, is saved right in the portable app’s folder on the USB drive.

Go to How to Geek Webpage to see the whole article.

33% OFF SANDISK IXPAND FLASH DRIVE 32GB FOR iPHONE AND iPAD – DEAL ALERT – The SanDisk iXpand Flash Drive lets you quickly free up space on iPhones, iPads, and iPods; automatically back up photos and watch videos straight from the drive. The flexible Lightning connector works with most protective iDevice cases.

The USB 3.0 connector makes it easy to move content between devices. This flash drive also includes encryption software to password protect files, so you can share content while keeping sensitive files secure.

The SanDisk iXpand Drive app provides a fast and simple way to organize content and play music and videos directly from the drive. TheSanDisk iXpand Flash Drive currently averages 4 out of 5 stars on Amazon from over 600 customers and its list price of $59.99 is currently discounted 33% to $39.94.

Go to and get one while they last at this price.

HOW TO SET UP A PICTURE PASSWORD IN WINDOWS 10A picture password is an alternative to typing regular passwords when signing into Windows 10.

Windows 8 and Windows 10 each brought in new ways of signing into your account. You now have options like signing in using a PIN or a picture password built into your basic account options. With the right add-on hardware, you can use Windows Hello to sign on with a fingerprint or even your webcam.

And that’s all in addition to the unified login across devices you get when you use an online Microsoft account rather than a local user account.

Go To this How to Geek Webpage for the complete story.:

HOW TO ADD ANY SEARCH ENGINE TO YOUR WEB BROWSERThere is a difference between a Browser and a Search Engine.Web browsers include a few search engines for you to choose from, but you can easily add more. Even if a website doesn’t offer an official search plugin, you can add any custom search engine you like with a few tricks.

Go to this How-to-Geek webpage and get the step-by-step plus pictures for your favorite Browser. The major 5 Browsers are covered. 

HOW TO OPT OUT OF PERSONALIZED ADS FROM GOOGLE – Ads are an unfortunate necessity on the Internet—they’re how sites are able to operate. But if you find personalized ads a little too creepy, you can tell Google (one of the Internet’s biggest ad networks) to stop showing you personalized ads.

That way, instead of getting ads for things that you’ve recently searched for (or similar items), you could see completely unrelated, un-personalized ads that aren’t based on your search and browser history. This way, you can still support the sites you love without feeling like Google’s stalking your every move.

Go to How-to Geek web site for a step by step explanation:

WINDOWS 10’S PRIVACY SETTINGS WILL BE SIMPLER BUT MORE LIMITED WITH CREATORS’ UPDATEAn announcement Tuesday says that Microsoft would soon reduce the amount of diagnostic data collected from Windows 10 under an optional setting, and immediately launch an online portal where customers can lock in privacy settings.

Microsoft plans to revamp how privacy is managed in the upcoming Creators Update to Windows 10, both as part of the initial setup as well as the amount of data it collects in day-to-day diagnostics. That amount will actually decrease, if a user so chooses. But Microsoft has also eliminated an intermediary option, forcing the user to choose whether to provide Microsoft minimal or “full” access to their PC.Windows 10 users will not see all these changes until around April 2017.

MICROSOFT PRIVACY DASHBOARD – This Microsoft website is the place where you can manage your privacy settings for the Microsoft products and services you use, and where you can view and clear the data that Microsoft saves to the cloud.

For other data that is saved to your Windows 10 device, you’ll need to go to your device to change those privacy settings and view the data collected. You’ll find detailed instructions for viewing and changing your privacy settings on your device on the individual settings pages listed below.

Browsing history; Search history; Location activity; Cortana’s Notebook; Health activity.

Windows – Change any of your privacy settings on your Windows 10 device by going to Start > Settings > Privacy.

Apps and services – Manage the apps and services that are allowed to access your data.

Xbox – Adjust your Xbox privacy settings either on your console or by signing in to

Office – View your privacy settings in any Office program by going to File > Options > Trust Center.

In free Office apps, go to Settings > Trust Center.

Skype – Edit who can see your profile in Skype and other privacy settings by signing in to your account at

Advertising preferences – Choose whether you would like to see personalized advertising.

Marketing preferences – Manage promotional communications associated with your Microsoft account by signing into the Promotional Communications Manager.

If you don’t have a Microsoft account, you can manage promotional email communications by using this web form.

FTC SUES D-LINK OVER ROUTER AND CAMERA SECURITY FLAWS – If you’ve got a wireless network, your wireless router connects your computer and other devices to the internet. If it’s reasonably designed and configured, the router also is a gate that should prevent hackers from accessing your devices and data.

January 5 by Ari Lazarus, Consumer Education Specialist, FTC

POLICE RAIDS IN INDIA CUT DOWN IRS IMPOSTER CALLS (FTC) – Over the last few years, we’ve warned about a lot of imposter scams. In one of the most common types, callers pretending to be from the IRS demand payments and threaten to arrest people.

January 5 by Nat Wood – Associate Director, Consumer & Business Education, FTC

TECH TIPS: 19 INTERNATIONAL TRAVEL LIFEHACKS TO PROTECT YOUR PRIVACY AND POCKETBOOK – Andre Da Costa, groovyPost – “It’s that time of the year when family and loved one’s schedule travel plans around the world, whether it’s a student going home for the holidays or a warm vacation getaway to the Caribbean. International and domestic travel are not like what it was 15 years ago. In a post 9/11 world, increased security measures have made traveling beyond borders a hassle. The annoyance of going through security checkpoints at your airport of departure and hubs can seriously put a damper on your travel experience. I believe part of overcoming unexpected obstacles is always to prepare.”

THERE’S AN APP FOR THAT (BUT IT MIGHT BE FAKE) FTC 12/22/16 – Fraudulent apps can take your credit card or bank information. Some fake apps may even install malware onto your phone and demand money from you to unlock it. Read more at:

iOS 10.2 UPDATE: THE 5 BEST FEATURES FOR YOUR iPHONE – Go to this Tech Times web site and read all about it.

HOW TO DOWNGRADE FROM iOS 10.2 TO 10.1.1 OR 10.1: QUICK TIPS FOR iPHONE AND iPAD OWNERSIf you do not like iOS 10.2, go to this Tech Times website and see how to downgrade.

HOW TO REPLACE 5 MAJOR YAHOO SERVICES AND DELETE YOUR YAHOO ACCOUNTThe news is full of Yahoo account problems. There is a way to get out of Yahoo. Go to this CSO Online web site and read all about it. 

YAHOO: ONE BILLION MORE ACCOUNTS HACKED – Krebs on Security, 12/14/16. “Just months after disclosing a breach that compromised the passwords for a half billion of its users, Yahoo now says a separate incident has jeopardized data from at least a billion more user accounts. The company also warned attackers have figured out a way to log into targeted Yahoo accounts without even supplying the victim’s password.” Read more from Krebs at:

Toby Scott, Tech Guru at the Channel Islands PCUG in SoCal gave a presentation at their September meeting on the Yahoo hack that was publicized around that time. He’s got some great tips for people who use Yahoo e-mail. Actually, everyone who uses e-mail should read the tips.   AnatomyofanEmailHack

GOOLIGAN MALWARE SPREADING LIKE WILDFIRE – Ask Bob Rankin reports that a new malware known as “Gooligan” is infecting 13,000 Android phones each day, according to CheckPoint, a cybersecurity firm headquartered in San Carlos, CA. Over one million smartphones have already been infected, making Gooligan the biggest security breach that Android has ever experienced. Do you need to worry? December 5, 2016 – Read on…

REPORT: ANDROID 7.1 ROLLOUT TO NEXUS DEVICES WILL BEGIN DECEMBER 6The software will bring the latest features and the December security patch. The update will be called Android 7.1.1 when it’s released as it also incorporates some bug fixes and optimizations since the Pixel launched with 7.1. Google’s Pixel will also get the update to 7.1.1 in December alongside the Nexus updates, to avoid confusion about version numbers.

Such updates usually come in waves that take about two weeks to reach everyone. So if you have a Nexus 6P, 5X, 6, 9, or Pixel C you may need to exhibit patience or flash the software manually when it arrives.

Go to: PC World Magazine this link and read the entire story.:

HOW TO SECURE YOUR AMAZON ACCOUNTIf you’re like me,  you do a lot of shopping on Amazon. But because it’s so encompassing, it’s also something you’re going to want to take extra care to secure.

Odds are you have at least one credit card, your home address, and phone number stored on your Amazon account, which could be very bad should that account fall into the wrong hands. Fortunately, there are a few things you can—and should!—do in order to make sure your Amazon data is as safe as it can be.

Go To the following ‘How to Geek’ web site and read all about it with step by step pictures and directions.:

LOCKY HIDDEN IN IMAGE FILE HITTING FACEBOOK, LINKEDIN USERSMalware masquerading as an image file is still spreading on Facebook, LinkedIn, and other social networks.

“The attackers exploit a misconfiguration on the social media infrastructure to deliberately force their victims to download the image file. This results in infection of the users’ device as soon as the end-user clicks on the downloaded file,” they noted.

The good news about this particular attack vector, is that it’s not automatic, i.e. it requires users to actually download and run the malicious files themselves. The bad news is that users like to look at image someone has sent them.

A video demonstration of the attack can be viewed at the following website: 

HOW TO CUSTOMIZE THE TASKBAR IN WINDOWS 10Windows 10 offers all kinds of ways to customize the taskbar to your liking. Go to the following “How to Geek” website to learn more step by step.:

WHAT TO DO IF SAFARI, CAMERA, FACETIME, OR THE APP STORE ARE MISSING FROM YOUR HOME SCREEN ON IPAD OR IPHONEIf an app doesn’t show up on your home screen, you may have just uninstalled it. But if a pre-bundled app has gone missing, there could be a few causes.

Go to the following “How to Geek” website to learn more step by step.:

HOW TO GET YOUR STREAMING VIDEO TO STOP BUFFERING SO DARN MUCH – If you’re dealing with stuttering, hanging, or just low quality video, there are a few things you can do to improve it.

Go to the following “How to Geek” website to learn more step by step.:

APPLE SAVES IPHONE CALL HISTORY TO iCLOUD, BUT BARELY MENTIONS IT – As a convenience feature, Apple will sync your call history to iCloud, but the company doesn’t make it easy or obvious to shut it off.

Modern smartphones make it easy to back up all your data to the cloud so you can keep it synced across devices, or download it to a new phone. That can have unfortunate consequences, however—especially when phones are syncing sensitive information that users aren’t explicitly aware of, and then a company famous for developing smartphone cracking software finds out.

Go to the following PC World magazine website to read all about it.:

ENTRY-LEVEL US ANDROID PHONES ARE SECRETLY SENDING TEXT MESSAGES AND CALL LOG DATA TO CHINA EVERY 72 HOURS – Security firm Kryptowire published an analysis listing several entry-level smartphones sold in the United States that have been stockpiling sensitive personal data without receiving user consent. One such smartphone was the $50 Blu R1 HD, according to Kryptowire.

Answer: “We confirm that no ZTE devices in the U.S. have ever had the Adups software cited in recent news reports installed on them, and will not. ZTE always makes security and privacy a top priority for our customers. We will continue to ensure customer privacy and information remain protected.”

The full article is in “Tech Times .com web site as follows:

This ANTI-SNORE WEARABLE HAS TAKEN KICKSTARTER BY STORM: How Does It Work? It’s a wearable known as Anti-Snore, and it’s all the rave on Kickstarter right now. It’s designed to save non-snorers from having to wake up to stop someone else from snoring.

Go to “Tech Times “ article to see the idea.: (Kickstarter is a web site where people can raise funds for a new project. Check it out)

iPHONES VULNERABLE TO YET ANOTHER LOCKSCREEN BYPASS – “iPhone aficionados at iDeviceHelp and EverythingApplePro have discovered yet another way for someone who has physical access to your phone to access your messages, photos, and contacts, even if the phone is locked with both a passcode and properly configured TouchID.” by Maria Varmazis, Naked Security by SOPHOS.

AMERICA RECYCLES DAY – November 15.  Both Best Buy and Staples have extensive recycling programs that accept most types of electronics independent of where it was purchased. Staples is offering a $10 off coupon for use in December for recycling tech between 11/13/16 and 11/19/16. Best Buy offers 15% off an HP inkjet printer when you recycle any brand of printer. (From the Philadelphia Area Computer Society November meeting announcement.)

Staples –

Best Buy –

HOW TO DEFEND AGAINST RANSOMWAREIn September, the FTC hosted a workshop on ransomware, one of the most serious online threats facing people and businesses today — and the most profitable form of malware criminals use. Check out the videos featuring conversations with security researchers, technologists, law enforcers, and business leaders.
November 10, 2016
Ben Rossen, Attorney, Division of Privacy and Identity Protection

ANDROID USERS AT HIGH RISK FROM CHROME FLAW –  LOSING YOUR PASSWORDS ON AN ANDROID DEVICE. November 9, 2016.  If you’re using your Android device for online banking, you should be extremely careful about what apps you download in the next few weeks.

Exploiting a Chrome browser bug, malicious hackers are installing a Trojan that steals banking credentials. The infection is typically delivered in bogus updates to Instagram, Skype, WhatsApp, and Chrome, as reported in a Help Net Security article.

Users of the mobile version of Google Chrome should be extra careful when faced with unsolicited offers to install a popular app, Kaspersky Lab researchers warn. Cyber crooks pushing the Svpeng Android banking Trojan are taking advantage of a bug that allows them to force the download of the malware on the target’s Android device without any user interaction, and other malware peddlers might soon hop on that particular train.

This Trojan works only on Google Chrome. Other Browsers are not affected.

What to do: This threat might not be resolved for several weeks. Until it is, I suggest using a mobile-device security app such as Lookout Personal to protect your Android system.

REMOTELY RING, LOCK, OR ERASE A LOST ANDROID DEVICE – If you or a friend lose a device that is signed into a Google Account, you can use Android Device Manager to remotely ring, lock, or erase that device. When Android Device Manager interacts with the device, it’ll get a notification. You can also use Android Device Manager to show your device’s location.

Important: Android Device Manager won’t work for devices that are turned off, or that don’t have a Wi-Fi connection or mobile data connection with an active SIM card.

Tip: If you’ve linked your phone to Google, you can locate or ring it by searching for find my phone on

Go to this Google website and read all about it:

MICROSOFT CONFIRMS MASSIVE WINDOWS 10 UPGRADE CHANGES – Speaking on the official Windows blog, Windows program manager Bill Karagounis explained that Windows 10 is going to get much smarter about how it downloads updates. UUP will become the universal system used by all versions of Windows 10 – including on smartphones and tablets – and it should mean users not only save valuable bandwidth but also waste less time as devices focus purely on installing new patches.

Read more at:

WHAT YOU CAN DO TO STOP ROBOCALLS RIGHT NOW, by The Watch Dog, Dave Lieber, The Dallas Morning News – Why isn’t the Robocall Strike Force – led by the Federal Communications Commission, AT&T Chairman Randall Stephenson and the nation’s leading tech companies – working to make hideous Caller ID spoofing illegal? Dave shares with you the latest tools to block and filter bad callers. You don’t have to wait the projected 20 more months until the Strike Force completes its work to stop crooked callers from pecking away at your sanity.

HOW TO TROUBLESHOOT BLUETOOTH PROBLEMS ON YOUR IPHONE OR IPAD – Bluetooth can be a little finicky on its best of days. There are several possible points of failure between your iOS device and whatever accessory you’re connecting to. Here’s how to troubleshoot them.

Go to This How to Geek Website and read the step by step article:


KEEP YOUR FAMILY SAFE WITH THESE TIPS FROM SOPHOS – “Whether you use Sophos Home or other security software to protect your home computers, that’s only half the battle of keeping your family safe and secure online. What about the other steps you need to take in order to batten down the hatches against those sneaky cybercriminals?”

HP RETHINKS ITS INK POLICY, ALLOWING THIRD-PARTY INK AGAIN – HP said it will provide the firmware update in about two weeks via a dedicated support forum. The affected printers are the small-business OfficeJet, OfficeJet Pro, and OfficeJet Pro X. It wasn’t immediately clear whether updated firmware would roll out for all affected models at the same time.

Customers with immediate concerns can email HP at

Go to this PC World  Website for the complete story.


  • Review your Yahoo Mail settings (good advice for any email account.)
  • Delete email contacts that you don’t recognize.
  • Delete linked Mail accounts that you don’t recognize or control.
  • Change your password on any linked accounts that you control.
  • Make sure your vacation response is turned off.
  • See if someone else has been accessing your account.

No matter what, if you think your account has been accessed without your permission, change your password immediately. If you don’t have access to your account, use the Sign-in Helper to get back in.

Signs your account has been hacked

  • Your account information has changed without your knowledge.
  • There are logins from locations you don’t recognize on your recent activity page.
  • You aren’t receiving expected emails.
  • Your Yahoo Mail account is sending spam.
  • Go to this ‘Yahoo Help’ Website and follow the directions to get things right.

System Restore is a Windows feature that can help fix certain types of crashes and other computer problems. Here’s how it works, how to set it up, and how to use it when things go awry.

We’re going to be using Windows 10 in this article, but System Restore has been around a long time–and works pretty much the same way in each version of Windows. The instructions here are good for Windows 7, 8, and 10, and you’ll encounter only minor differences throughout the process.

What is System Restore?
When something goes wrong on your system as a result of a bad piece of software–maybe an app you installed, or a driver that broke something important–it can be hard to fix. System Restore lets you restore your Windows installation back to its last working state.

It does this by creating “restore points” every so often.

Go to this ‘How to Geek’ Website for a complete explanation and step by step for System Restore.

HOW TO BOOST PERFORMANCE ON YOUR OLDER iPHONE OR iPADIf your iPhone or iPad is showing its age, try these tricks to squeeze out a bit more performance. Even though Apple strives to keep iOS running well on older iPhones and iPads, the sad truth is, eventually they won’t be able to keep up. Plus, as apps become more advanced, they too won’t run as quickly. So, aside from falling into an endless upgrade cycle, what can you do?

Turns out, there are quite a few things. See this article for a complete list of things you can do:

WHY MOBILE PRIVACY IS NOW MORE IMPORTANT THAN EVER – HACKING YOUR PHONESharyn Alfonsi reports on how cellphones and mobile phone networks are vulnerable to hacking. This was broadcast on 60 Minutes TV show in April and September 2016. Take a look and be safe.

  • A lot of modern life is interconnected through the Internet of Things — a global empire of billions of devices and machines.
  • Automobile navigation systems.
  • Smart TVs
  • Thermostats
  • Telephone networks
  • Home security systems
  • Online banking
  • Almost everything you can imagine is linked to the World Wide Web. And the emperor of it all is the smartphone.

You’ve probably been warned to be careful about what you say and do on your phone, but after you see what we found, you won’t need to be warned again. Go to the following link to read all about it:

PASSWORD vs PASSPHRASE: 5 Reasons to Use a Passphrase – 
The debate between passwords versus passphrases is currently the trending buzz online. After all the password hacking and identity theft incidents have caught media attention, a lot of online users have now become aware of the ominous danger that is lurking in the world of the Internet.

Hence, the recommendation to use passphrases instead of passwords by “Information Technology,” experts just came at the right time.

However, some people are still confused as to the difference between a password and a passphrase, and why the latter is more reliable.

The difference between passwords and passphrases

  • A password,  as you know, is typically composed of letters or symbols, or a combination of both. It could be a string of random symbols such as “B@3!&O$$” or a combination of both such as “sh@tup!”.
  • A passphrase is longer than a password and contains spaces in between words such as this: “The road to success is always under construction!”
  • A passphrase can also contain symbols, and does not have to be a proper sentence or grammatically correct. The main difference of the two is that passwords do not have spaces while passphrases have spaces and are longer than any random string of letters/ numbers/ symbols.

So why is a passphrase better than passwords?

  1. Passphrases are easier to remember than a random password of symbols and letters combined together. It would be easier to remember a phrase from your favorite song, favorite quotation, than to remember a short but complicated password.
  2. Passwords are relatively easy to guess or crack by both human and robots. The online criminals have developed state-of-the-art hacking tools that are designed to crack even the most complicated password.
  3. Passphrases Satisfy complex rules easily. The use of punctuation, upper and lower cases in Passphrases also meets the complexity requirements for passwords.
  4. Major OS and applications supports passphrases. All major OS’ including Windows, Linux and Mac allow passphrases of up to 127 characters long. Hence, you can opt for longer passphrases for maximum security.
  5. Passphrases are next to impossible to crack because most of the highly-efficient password cracking tools break down at around 10 characters. Hence, even the most advanced cracking tool won’t be able to guess, brute-force or pre-compute passphrases.

I recommend you change your MO and use passphrases.
If the Password block requires 8 to 16 characters, use all 16 in a passphrase.
3 Examples: my Mother tells, everyone I am 63, allthegoodisIt88

SOME FREEWARE DOWNLOAD WEBSITES HAVE FINALLY STOPPED BUNDLING CRAPWARECrapware is regularly foisted upon unsuspecting users by pretty much every big freeware site. A few sites have started cleaning up their act.

Most freeware download sites still use shady tactics, cramming their own installers full of unwanted software and misleading advertisements down your throat in order to make a buck.

But now that a few are getting better, let’s give credit where credit is due–so consider this an ongoing list of sites that have made things right.

My favorite Freeware Download is: It is not only crapware free, but a secure site. (https:) ☺Go to this website for complete information:

3 ALTERNATIVES IF YOU DON’T WANT TO ENTER A PASSWORD ON YOUR WINDOWS MACHINE – A reader who wants to remain anonymous doesn’t want to type in his Windows password more than once or twice a day. By default, Windows requires you to prove that you’re you every time you boot or just wake the computer out of sleep mode. There are good reasons for that. You don’t want someone else reading your email or shopping with your Amazon account. But all that typing can get annoying, and if you only use your PC in a secure place, it may not be necessary. Here are three ways to avoid this repetitive typing.
Go to this website for the complete article.

HOW TO SET DEFAULT APPS ON ANDROIDWhen you have multiple applications that do the same thing—like browsers, for example—Android will ask you which one you want to use every time, at least until you set one as the default with the “always” action. In the earlier days of the app picker, you’d have to clear defaults for each one before applying another, but things have changed.

Now, there’s a simple way to manage default applications for the most-used apps all in one place. The only problem is that it’s in a different place for every major manufacturer. Just Android things, right?

Go to this website for step by step instructions.

DO YOU MAKE ONLINE PAYMENTS? “Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in over 190 countries over the course of the past year.” The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and Microsoft, is releasing this Technical Alert to provide further information about Dorkbot. A system infected with Dorkbot may be used to send spam, participate in DDoS attacks, or harvest users’ credentials for online services, including banking services.”

Click on the link to read more about Dorkbot plus suggested steps to help keep your computer free from malware.

HOW TO DELETE YOUR “OK GOOGLE” VOICE ACTIVITY HISTORY – If you’re an owner of an Android device, you’re certainly familiar with the “OK Google” feature for searches and other voice commands. What you may not know is that every time you use it Google records and keeps a record of what you’re saying.

If that sounds unsettling and you are concerned about your privacy, the good news is you can delete it. In fact, you can listen to all of your voice activity and get a text transcript as well.

Google (and virtual assistant technology on other platforms) does this presumably to help improve language recognition and search results.

Go to this Web site for the complete article and step by step with pictures.
The JTT on the end is for Jere’s Tech Tips.

COMPLETE GUIDE TO TAKING SCREENSHOTS ON PC, MAC AND MOBILE DEVICES – Ever wanted to know how to capture screenshots on your mobile device or computer? This complete guide will provide the answers.

Screenshots are images of on-screen items, such as the interface or a portion of it.

With all the different devices and form factors, capturing a screenshot varies.

Go to this Web site to see the complete article and procedures (with pictures).

RUNNING OUT OF SPACE ON YOUR IPHONE? – EIGHT TIPS TO HELP YOU QUICKLY AND EASILY FREE UP SPACE – By Adrian Kingsley-Hughes for Hardware 2.0, April 23, 2016 – Are you running out of space on your iPhone (or iPad)? Are you starting to feel like you’re going to have to delete your existing data to make space for new apps? Feel like just deleting a bunch of stuff randomly to make more room? Stop!

Before you go deleting potentially precious data like photos or notes, here are some tips to help you make the most from the storage space you have on your device. Find the tips at:

DO YOU HAVE AN ANDROID PHONE? – It’s unfortunate, but there are a lot scammers out there looking to steal personal and financial information from Android devices. Read about the Android scams you should know about and how you can avoid getting caught in them. Cory Schmidt, Contributor, AndroidPIT

SCAMMERS TARGET SMARTPHONES THROUGH SOFTWARE UPDATES –  The next time you need a software update on your cell phone, make sure it’s legitimate.

In the tech support scam, crooks call or email smart phones at random and claim an attempted software update has failed because of a virus. They say the purported problem can be remedied via a $10 credit card payment.

The scammer not only collects the money but also has the credit card number that can be used later for fraudulent charges.


  • Get any software updates directly from your phone
  • Never provide information to an unsolicited caller
  • If you paid, report the crime online to the FBI Internet Crime Complaint Center at

Learn more about how to avoid this type of fraud in this video:

See more Fraud Friday Alerts at:

PICTURE THIS: YOU START YOUR COMPUTER AND WAIT. And wait. And wait some more. Your Internet is sluggish, your programs are taking forever to load. You might be infected.

Sometimes a malware infection is plain as day. Other times it’s a silent killer. If you want to know whether or not your machine is sick, you first need to understand the symptoms. So let’s take a look at the telltale signs.

See the full article at:

DO YOU MAKE ONLINE PAYMENTS?… According to the US-CERT – “Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in over 190 countries over the course of the past year.” The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and Microsoft, is releasing this Technical Alert to provide further information about Dorkbot. A system infected with Dorkbot may be used to send spam, participate in DDoS attacks, or harvest users’ credentials for online services, including banking services.”

Click on the link to read more about Dorkbot plus suggested steps to help keep your computer free from malware.


  • Tech support scammers now want you to call.
  • Don’t call the toll-free tech support number – you don’t want online crooks taking remote control of your PC.
  • Don’t buy the tech support plan; if you fell for this in the past, make sure that automatic renewal isn’t going to happen.


  • Why are people concerned with cloud security?
  • Risks of Cloud Storage
  • Benefits of Cloud Storage

….All of this and more is covered in their official Security Blog.40 POPULAR TOURIST SCAMS EVERY TRAVELER SHOULD KNOW ABOUT – These are some of the scams that are covered in this Senior Safety Online article:
On the Street – The dropped wallet, the Photographer, the Music Artist; Travelling – Drop and Swap, Overnight Bus, Train pickpockets; Shops and Services – Slow counting, Fake Policeman, Fake Ticket; Locals and Children – Overly Helpful Local, Map Seller, Broken Camera; At the Hotel – Fake Front Desk Call, Fake Takeaway Menu. All of these scams and more can be found at: