Why Should I Sign Out of Websites on Public Computers?

We have to sign into many things during the day: email, websites, social networking. But when we’re done using them, why do we have to sign out? Why can’t we just close the browser window and call it at that?

Well, think of the computer you’re using like your home. By leaving yourself signed into websites, it’s like leaving the door to your home wide open for anyone to walk inside. If that person that walked into your home (or onto your profile on a website) is not a very nice person, you run the risk of them impersonating you or worse, going through your data. If you have sensitive information in these accounts, that can lead to access to financial accounts, business ventures, or even personal information! It’s just like you handed the person using the computer after you carte blanche to do with your information what they see fit!

If you’re checking email, logging into social networks, or checking your bank accounts, please make sure you sign out of those websites and close the browser windows when you are done. It’s safer for you!

—–

Do you sign out of websites on public computers, or do you think you don’t have anything worth stealing if someone gets in there?

Posted in Online Safety, Tips and Tricks | Tagged , , | Comments Off on Why Should I Sign Out of Websites on Public Computers?

Tips for Parents to Curb Children’s Online Risky Behaviors

It’s no surprise that a computer in the household is practically a requirement for parents with school-age children. Just think of all the things the family computer is used for: online shopping, online banking, contact lists and email, social networking, and more. Knowing just how important this tool is to modern life, it’s just as important to know how to keep it, your family, and possibly your business safe from online threats. All it takes is a single exposure to an infection and your family computer can practically turn against you.

Gone are the days when the only way to get an infection was through an unsafe email attachment. Nowadays, all it takes is a simple virus or piece of malware to be embedded into a known, trusted website. Unfortunately, many of the websites that school-age children, especially teenagers, tend to frequent are the types of websites that are commonly infected with viruses and malware.

According to a recent study by GFI Software, a leading internet security company, a surprisingly large amount of families have a false sense of security regarding the family computer’s impenetrability. Of the families surveyed, three-quarters of them were confident that their computer couldn’t be infected by viruses or malware. However, of those same families, two-thirds of them admitted to having had their computers infected at least once in the past year.

How Can I Protect My Family from Online Threats?

First, parents need to be aware that children are becoming more and more tech-savvy, and they need to become as close to their children’s level of competence with the computer as possible. Parents should at least be familiar with whatever tools their children are using online. Take some time to set up a Facebook, Twitter, or Tumblr account, and learn how to adjust the security settings on them. You can take it a step further and liken it to learning to drive. It would be very difficult to teach someone how to drive if you have never drove yourself, and if you didn’t know the rules of the road, you couldn’t teach them to your student either.

Second, recognize that the family computer is no longer the only way kids are reaching the internet. With smartphones, tablets, and other portable devices, kids are able to get online in more ways than ever. This leaves you open to more fronts of attack by the infection creators. While attacks on these devices are not as prevalent as those on computers, they also leave children open to other threats, such as cyberbullying or sexting.

Third, parents need to make sure that there is a good, current anti-virus product installed on all computers in the household. Many people do no realize that the anti-virus product that was originally installed on the computer may have been either a trial or has expired. In either case, that anti-virus product is no longer protecting you from current threats. However, you don’t need to purchase anti-virus software to receive good protection. Computer Works currently recommends Microsoft Security Essentials, a free anti-virus product from Microsoft.

Fourth, parents should create an administrative-rights account with a password for themselves, and set the children’s accounts to limited (Windows XP) or standard (Windows Vista, Windows 7) accounts. With a limited or standard account, the user cannot download or install programs without the administrator’s permission. This can also help keep infections from coming into the computer, as many infections require themselves to be installed on the computer to begin wreaking havoc.

Fifth, parents should be aware of what software is installed on the family computer. Many teens will try to download different internet browsers or programs in an attempt to get around parents’ parental controls. If you choose not to use different account settings for different members of the family, you absolutely must keep yourself up to date on what has been installed on the computer.

Sixth, consider installing web-monitoring software. While some parents choose not do this, some consider it a must-have. These programs run in the background, generally unseen by the user, and it tracks exactly what kids are doing online. Computer Works does not have a recommended monitoring program, but we do encourage parents to do their research if they choose to use these types of software.

The Best Advice to Curb Online Risky Behaviors

The absolute best advice to curb children’s online risky behaviors is for parents to be better online role models themselves. Many parents engage in computer practices that are just as risky as those their children do. Talk to your children about what is and what is not an acceptable online behavior. Teach by example, and don’t wait to address the issue until after it’s too late.

—–

What are your tips to help keep kids safe online?

Posted in Online Safety, Tips and Tricks | Tagged , , | Comments Off on Tips for Parents to Curb Children’s Online Risky Behaviors

How to Get the Best Life Out of a New Laptop Battery

With many people planning to take their laptops to family gatherings this holiday season, not having a good battery can be a real pain. No one likes to be tethered to the wall while the family moves around, enjoying time spent together. However, like any rechargeable battery, there are a few steps that you need to take to insure that you get the best life from your new battery.

Battery Basics

A new battery comes in a discharged condition and must be charged before use. Upon initial use (or after a prolonged storage period) the battery may require three to four “Charge – Discharge” cycles before achieving maximum capacity.

If the battery will not be in use for a month or longer, it is recommended that it be removed from the device and stored in a cool, clean place.

It is normal for a battery to become warm to the touch during charging and discharging. A charged battery will eventually lose its charge if unused. It may therefore be necessary to recharge the battery after a storage period.

When charging the battery for the first time, the device may indicate that charging is complete after just 10 or 15 minutes. This is a normal phenomenon with rechargeable batteries. Remove the battery from the device and reinsert it then repeat the charging procedure.

Actual battery runtime depends upon the power demands made by the equipment. In the case of notebook computers, screen brightness, the use of the CPU, the hard drive, and other Peripheral’s result in an additional drain upon the battery, effectively reducing the battery’s run-time. The total run-time of the battery is also heavily dependent upon the design of the equipment. To ensure the maximum performance of the battery, optimize the computers power management features. (Refer to the computer manual for further instructions.)

How can l Maximize battery performance?

  • Break in New Batteries: New batteries come in a discharged condition and must be fully charged before use. It is recommended that you fully charge and discharge the new battery two to four times to allow it to reach its maximum rated capacity. Keep the battery clean; its good idea to clean dirty battery contacts with a cotton swab and alcohol. This helps maintain a good connection between the battery and the portable device.
  • Exercise the battery: Do not leave the battery dormant for long period time. We recommend using the battery at least once every two to three weeks. lf the battery has not been used for a long period of time…perform the new battery break in procedure described above.
  • Battery storage: if you don’t plan on using the battery for a month or more, we recommend storing it in a clean, dry cool place away from heat and metal objects. Batteries will seIf discharge during storage: remember to break them in before use.
  • Notebook users: to get maximum performance from the battery, fully optimize the notebooks power management features prior to use. Power management is a trade off: better power conservation exchange for lesser computer performance. The power management system conserves battery power by setting the processor to run at a slower speed, dimming the screen, spinning down the hard drive when not in use and causing the machine to go into sleep mode when inactive. The notebook user’s guide will provide the information relating to specific power management features.

How are batteries rated?

There are two ratings on every battery: volts and Milliamp-hours (mAH). The voltage of the new battery should always match the voltage of the original unless the battery is a different chemistry (NiMH and Li-lon batteries have different voltage ratings. even if they’re for the same laptop). Some batteries will have higher milliamp-hour ratings than the original battery found in the device. This is indicative of a longer run-time (higher capacity) and will not cause any incompatibilities. On rare occasions your Notebook’s BIOS might need updating so it can recognize the higher capacity battery.

How long do batteries last?

The life of a rechargeable battery operating under normal condition is generally between 500 and 800 charge-discharge cycles. This translates into one and a half to three years of the battery life for the average user. As the rechargeable battery begins to die, that user will notice a decline in the running time of the battery.  When a battery that originally operated the notebook for two hours is only supplying the user with a half hours worth of use, it’s time for a new battery. To prolong the life of any battery, we highly recommend fully charging and fully discharging, not charging when the battery is 50% full.

Should I recycle the older battery? How?

Be environmentally conscious; do NOT throw these batteries in the trash. If you don’t know where your local recycling facility is, call us at 248-738-8700.  We will do our best to help.  (or visit www.mygreenelectronics.org)

Disclaimer:  This helpful information is given to you as a courtesy. We cannot be held responsible for any damage that may occur as a result of these instructions (hardware or software). We are not battery experts.

—–

Do you have any tricks for getting a better lifespan from your rechargeable batteries?

Posted in Tips and Tricks | Tagged | 1 Comment

Wireless Network Security

Almost one-third of Americans admit to using their neighbor’s wireless internet connection according to the Wifi Alliance Trade Alliance. While most people are using these connections innocently, there are some that will take advantage of an open wireless network. Securing your wireless network at your home or business is one of the easiest ways to protect yourself from those that would use your internet connection for nefarious purposes.

What Can Happen if You Don’t Secure Your Wireless Network

First and foremost, if you have a data usage cap on your internet – particularly if you use a form of wireless hotspot from your cellular provider – having others on it can push you over your limit far quicker than you would like. This can cost you many hundreds of dollars in overage charges that you didn’t even incur!

Secondly, if you leave file sharing open across your wireless network, anyone who can connect to the network can see your files. That means that if you have a document with all your passwords or bank account numbers on your computer, it could potentially be stumbled upon by someone using your wireless signal. Who knows what the wrong person would do with that information?

Finally, people can use your internet connection to do whatever they want online without your permission. This includes normal things like checking their email or browsing the web, but it also includes things like using a stolen credit card for purchases or viewing illegal content. Regardless of what people are doing online, their activities can be traced back to the internet connection they were using – in this case, yours. On the off chance that something unsavory does cross your internet connection, you will be the person the authorities go after first. Mind you, in most cases charges will either not be filed or dropped after further investigation, but between the time lost and the possible stigma of the accusation, it can be a terrible thing to endure. A lawyer based out of New York is currently representing two clients that were facing child pornography charges from the U.S. Attorney’s Office, something that could have cost them over $100,000 in legal fees had it gone to court.

What Can Happen if You Use Someone Else’s Unsecured Wireless Network

While it is extremely hard to be caught using someone else’s wireless network without their permission, it is worth mentioning that in Michigan, “unauthorized use of computer access” laws are on the books, and they carry varying penalties from a misdemeanor to a felony charge (which carries a 5-year sentence and a $100,000 fine).

You also don’t know what kinds of software the individual may be using on their network. Some particularly malicious people can have programs running that intercept the information your computer is sending to gain access to any websites, usernames, or passwords that you type in.

How Can I Protect Myself?

The answer is very simple. If your wireless network has a password on it, it is far less likely to be used by unauthorized individuals than one without. Wireless network passwords can be cracked, but many people who are looking to cause trouble are looking for the easiest route and will move on to someone’s wireless network that doesn’t have a password. If you suspect that your wireless password may have been compromised, then it’s time to change it.

—–

Do you use your neighbors internet? Are you worried about your neighbors using your internet? Discuss below.

Posted in Online Safety | Tagged , | 1 Comment

Good Passwords and Account Protection

It is almost impossible to function without needing some sort of password, whether it is a password for your email, your financial institution’s website, or just to log into you work computer. With the current prevalence of account hacking, it is more important than ever to make sure that your passwords – and by extension, your accounts – are secure.

How Passwords Get Stolen and Accounts Get Hacked

There are two main ways that passwords are stolen and accounts are compromised: key-logging infections and trial-and-error password entry.

Key-logging Infections
This method for account hacking is not as common as many would think. Key-logging infections are very bad infections that actually log what keys you press and place the results into a file that is sent back to the infection’s creator. If you were to type into your internet browser your financial institution’s website and then log in, they will have all that information in the file that gets sent back to them. This type of account compromise is on the downturn due to most financial institutions having several layers of protection for logging into your account from an unusual computer. However, this does not stop the hackers from getting into other accounts, such as your email or Facebook account.

Trial-and-Error Method
This is the most common method for compromising accounts. The trial-and-error method for hacking into accounts is exactly what it sounds like. An individual will somehow gain your email address. They will then try to log into your email account using common passwords. According to a recent study, about 50% of all passwords are based on family member’s names, birthdays, pet’s names, and actual words. These are known as “dictionary” passwords: passwords made of words that can be found in the dictionary.

The Multiple-Password Method for Security

About 75% of us use the same password for everything, ranging from our emails, to our social networking sites, to our financial institutions. That means that if someone gets your one password, they can potentially have access to all your accounts! Using the multiple-password method will give you an added level of security; if someone manages to get one password, you don’t have to worry that all your accounts will be compromised!

First Tier Password: This is a password used for accounts where you probably don’t want people pretending they are you. Some examples of these types of accounts are Twitter, Facebook, and other social website accounts. If someone gets hold of this password, they can potentially damage relationships you have with your contacts on those sites, and possibly convince them to click on links that will infect their computers. This password should be longer – 6-8 characters – and should use at least one special character and number. The special character and number should not be placed at the beginning or end of the password. It should also not be a real word found in a dictionary.

Second Tier Password: This is a password used for email accounts and possibly your cell phone. Treat this password as a master key, since information regarding your other accounts can sometimes be found in your email. This password should be long – 8-12 characters – and should have several numbers and special characters in it. This password should never be an actual word, and it should be very different from your First Tier password.

Third Tier Password: This is a password that is only used for your banking and financial institution websites. This should be the Fort Knox of all your passwords, and it should never be used for anything else. This password should be long – 8-12 characters – and should have several numbers and special characters in it. This password should never be an actual word, and it should be drastically different from all your other passwords.

How Do I Remember All These Passwords?

Trying to remember all your different passwords can be a bit daunting. One method is to have your password actually be a sentence. Instead of writing out the whole sentence, as in ‘The quick red fox jumped over the lazy brown dog,’ you would use the first letter of each word of the sentence, as in ‘Tqrfj0t1bd’. You’ll notice that for the words ‘over’ and ‘lazy’ the letters were replaced with numbers that resemble the letters. While this password is rather secure, it’s not as secure as it could be.

Another method is to use a type of password storage software. We recommend that if you do choose to go this route, please do your research and make sure the company is both reputable and safe.

—–

Do you think your passwords are safe? Do you have any tips that we missed for creating a good password?

Posted in Online Safety, Tips and Tricks | Tagged , | 9 Comments