Five Tools Everyone in the Technological World Should Be Using
By Rosina S Khan
There are quite a many digital tools out there available in the digital world. Among these I recommend everyone should be using five digital tools which they cannot escape. What are they? Read on to find out.
Among everyone I mean grandparents, great grandparents, truck driver, waitress, inn keeper and all other laypeople included.
1) Viber: Cell phones should have the free tool installed. Then you can use the cell phone number on any digital device such as laptop, iPAD, TAB and others, provided Viber is also installed on these devices. It is meant for making free phone calls where there is also the option of video chatting.
2) Gmail: You should access this email client via internet on your cell phone and other digital devices. This is a free tool as well. You should sign up for this service and start sending out formal or cordial emails as you wish. Along with Viber, which is actually used for making phone calls, you can use Gmail for sending out emails to people with whom you think you can better communicate by using this tool.
3) Google Search: This is a free tool used widely all over the world. You can look up meanings of words or any information you would like to know by typing keywords on the Google search bar and hitting the enter key of your keyboard. And there you go: you will have information page links coming up.
4) Facebook: This is also a free tool where you get to post, like a post, comment and network with friends. You can also upload photos on albums and access as well as view your friends' photos. Limit access to your Facebook account to friends only for security reasons.
5) LinkedIn: This is also a free tool where you get to upload your CV and other profile information about yourself. You get to network with professional people, chat and discuss issues related to work, projects and other worldly issues. Even if you retire, your professional network stays intact and you still get to keep in touch with professionals.
Summing up, these five free digital tools are what you should retain for keeping in touch with friends, acquaintances and professionals and grow your networks to a large extent gradually and feel further inspired and empowered.
However, please keep their usage to a balanced level. Because you need to work, laugh, play, cook and hang around in mother nature. So keep using the digital tools at a balanced level and you will have managed everything up to the mark.
Rosina S Khan has authored this article. For a wealth of free resources based on an Academic Guide on Databases, quality scholar papers, valuable blogs, commendable articles, amazing self-help eBooks and stunning fiction stories, all authored by her, and much more, visit: http://rosinaskhan.weebly.com. You will be glad that you did.
If you would rather like to access her terrific collection of eBooks based only on fiction and self-help and download them for free, visit: http://www.facebook.com/RosinaSKhan.hub. You won't be disappointed and remember to like her Facebook page.
How To Avoid Being Hacked - Part 1, Email
By Steve Burgess
Hacking is a common occurrence these days, but it's good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online data is much more common than taking control of your computer.
Most people don't understand their computers or operating systems deeply. There's no shame in that. No one really understands everything about computers. But that makes it easier for those types who are forever trying to make an illicit buck with some new way they have to separate you from your stuff, or some tool they've bought to apply leverage to an unprotected digital niche. Furthermore, the digital world changes quickly and it's much easier for those providing software and hardware to sell insecure wares rather than to take the extra time (and loss of market share) to make them very safe.
So it remains up to us to be more conscious in our behavior online, on the phone, and with our purchased equipment. Some of these conscious behaviors apply across the board to computers, tablets, and phones; others are specific to certain platforms.
Email - Phishing
I got an email from Apple, referencing a recent purchase and asking me to verify it. I clicked on the link and my browser went to Apple's website, but something didn't seem quite right. I stopped a moment to think: I had made a purchase online from Apple the previous day, but the email didn't reference the specific item. I dropped off the website and took a look at the email. I hovered my cursor over the link and sure enough, it didn't even mention Apple in the link. This is super-common - phishing emails designed to get you to go to some official-looking but bogus website (like the Apple website I'd thought I was on) and enter in your credentials which then give the hacker free access to your online account. And because many people use the same password and login for many of their online accounts it can give the hacker control of your digital life in short order. This happens to people who should know better and even almost happened to me, who also should know better!
But how did they know I had just bought something from Apple, or in other bogus emails - how do they know I just bought something on eBay, or what bank I'm with? How do they even know my email address?
The short answer is - they probably don't. They send that same email to a million likely email addresses - either from a list they bought, email addresses they harvested online, or just randomly generated by a program ("firstname.lastname@example.org," "email@example.com," "firstname.lastname@example.org," etc). It costs almost nothing to send an email and it doesn't cost much more to send a million. It's easy enough to add an official logo snagged off a corporate website to an email, and it's similarly easy to make an official-looking website. In fact, one could just snatch the code off an official website and replace the official links with bogus ones that steal your login credentials. Furthermore, a link isn't always what it appears to be. For instance, if I say to click here to WinAMillionBucks.com you'll see that it goes to a site that may save you some money, but won't win you a million bucks.
It can be enlightening to hover (without clicking) your cursor over a given hyperlink like the one above, and see what pops up. Or if nothing pops up, right-click (on a single-button mouse, [ctrl]-click) to reveal the link.
The short form answer to not being taken in like this is: DON'T click on links in emails. Type the desired URL into a browser. Or copy the link, paste it into a text document, and see if it is actually your bank, or Apple, or eBay or where you really wanted to go.
Coming up in part 2: Two-Factor Authentication, Passwords, and Giving Away the Form.
Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the principal of Burgess Forensics, and a contributor to the just released Scientific Evidence in Civil and Criminal Cases, 5th Edition by Moenssens, et al. Mr. Burgess may be reached at http://www.burgessforensics.com or via email at email@example.com