security

Clip Art, Photos, Recent Discoveries

         What a clever picture.  It grabbed my attention and I just had to read what the article said.  Ever said that?
    Google to the rescue.  Well, first I emailed John Carter to ask where he’d found the photo he posted to the pmug.us website.  

         So, I followed his directions and now I can show it to you.
         Google makes it easy to bring up lots of illustrations, clip art, photos.  Here’s a screen shot of the entry I made:  (Click to enlarge this; click again to get back to this page)
    In the search box I had typed “street sign, confused, lost, unclear” not knowing any more descriptive terms for what I wanted.  The first search page allowed me to select “Images.”  
        A huge selection came up, and I could click Show More Results at the bottom of the page.  Click on any illustration and see what the information says.  Some will be stock photos with an embedded watermark.  That means you’ll need to read about licensing, extended license, additional multi-seat License.  Copyright info is on that company’s page.  Click to view Photos, Vectors, Footage, Audio, Mobile, Pricing.  See the company’s phone number, live help number.
      One photo I looked at had a tiny icon in the upper right hand of the page.  Here’s a screen shot of the list that came up. 
      It was fun, clicking to see how the various languages came up in the illustrations. 
        Try it out on some of your blogging or emails.  Your family will be impressed with your knowledge of other languages.

         Looking up “shepherd and sheep”  I scrolled down and when I’d gotten to the 64th picture I found a photo of my son Peter, holding his sheep on his shoulder.  I had posted it to my blog, www.EncouragingU.blogspot.com months ago and  they’ve put it up for anyone to help themselves to the picture.  Clicking on it brings up that page in my blog, with the verses I posted with it.  And on the Google Image page a person can click, bringing it up as JPG 800x533 pixels. 
         We hadn’t thought that it would be automatically available to anyone else.  Hopefully, if someone wanted a copy they’d write and ask for permission.  Maybe that’s wishful thinking, on my part.

Other Recent Discoveries: 
        Planning on selling that nice, older Mac and upping to something new?  You might get some helpful info here:  http://www.mactip.net/how-to-securely-wipe-your-mac-hard-drive-before-selling-it/
        We did decide to go for a new iMac to replace the G4 laptop that Don’s been using.
What do do with a 10 year-old that’s still running, but is before Intel?  We saw the PC column in Courier about recycling or donating.  Asked for info from Prez Art Gorski and John Carter.  John was first to reply, suggesting we donate it to the DAV (Disabled American Veterans) in Prescott. A very knowledgeable man there was happy to take it, and we’re delighted to be able to help someone that way. 
        Curious about all those nifty computers from Apple before you took the plunge and bought yours?  http://apple-history.com/pg4   lists highlights from 1976 to 2012. 
        Wondering about the security of your Contact list, alias Address Book?  http://arstechnica.com/security/2013/10/how-apples-address-book-app-could-allow-the-nsa-to-harvest-your-contacts/
        Keeping up with the latest info posted to our PMUG newsblog?  Look into NetNewsWire  https://www.macupdate.com/app/mac/10350/netnewswire  I didn’t see a date on this page. 
        With schools and businesses using iPhones and iPads here’s what’s new with features to help the IT shops lock iOS down and make it easier to manage.  http://arstechnica.com/apple/2014/02/apples-new-management-features-help-locked-down-ipads-stay-locked-down/
IT’S ALMOST TIME  for nominating PMUG officers for the May election. Give it some thought.  Your experience could mean some encouraging help for others.  You know how much we appreciate your time and your willingness to step up to this challenge.  You help make PMUG a success! 
        Have a chat with Prez Art Gorski, or Vice Prez Dave Rothgery, or Secretary Bobbie Pastor, or Treasurer David Passell.  Or talk to one of the appointed Chairs: John Carter, Ward Stanke, or a Past Prez: Jim Hamm or Howard LaPittus. Each of them has survived as they served our friendly organization!     * * * 

This was today's handout from Elaine Hardt at the PMUG meeting.  See you next time! 

Practical Privacy

    "Here is an interesting article on browser privacy mode," remarks David Passell.  "A use that really stood out for me was the way to circumvent the NY times 10 article/month limit. I will have to try that since I used to get a lot of news from NY Times site before they began charging. Now I use the freely available BBC news site."  Look here. 
       If you're using Safari and have clicked Block Cookies Always, and are continually aggravated at the number of Cookies noted, you might see if Private Browsing works for you.

Secure From Hackers?

        The headline brought attention to a new hackers' method: http://www.foxnews.com/tech/2013/12/12/computers-can-be-hacked-with-high-frequency-sounds/?intcmp=obnetwork
        Time to get John Carter's opinion of the serious possibilities.  This is what he has to say,  "This technique takes advantage of the audio input/output on the computer. Most notably, the computers mentioned were a Lenovo business computer. Also mentioned was Linux. Now, if Linux computers can be hacked like this, so can a Mac or any smart phone or tablet.

        "The security measure mentioned is to turn off the audio and mic, and this can be done just by muting both the mic and sound. (No, I hadn't heard of this before.)"
        But then John goes on, " Now, if you really want to be afraid of your computer being hacked—even a Mac—look at method #3 in this link.
         "The hackers are teaching each other how to break into any computer by posting their findings on the web."  So, what can we do?  Keep alert to what's going on, so we can take action to avoid these problems. 

You Can Sandbox Flash Player

          You can Sandbox Flash Player in Safari for OS Mavericks as described and explained in this article http://techland.time.com/2013/10/24/finally-you-can-sandbox-flash-player-in-safari-for-os-x-mavericks/ 
        What’s an “app sandbox?.  Here’s Apple’s guide to this protection for your security. https://developer.apple.com/library/mac/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html 

Password Problems

        After speaking to the PMUG meeting this morning, Jim Hamm informs us,  "Here's another article about the NSA after our passwords again. As I discussed in my presentation today, articles about passwords and password hacking are increasingly in the news.

        "It's a tough call to balance the needs of national security with the needs for personal privacy."

Dropbox Peeks at Your Files

        "Although I like and use Dropbox frequently, here's an article that reminds us nothing is secure in the 'cloud', unless it's encrypted, and even then NSA might take a peek at your documents," notes Jim Hamm.  Here's the article for you to check: http://www.computerworld.com/s/article/9242384/Dropbox_takes_a_peek_at_files?source=CTWNLE_nlt_dailyam_2013-09-13

Google Defends Sanning Email

"Here is an article discussing how Google defends their scanning every email sent or received through Gmail. Google says this is a 'normal business practice', and uses the info to tailor ads that appear beside your inbox."  Jim Hamm continues,  "I use Gmail, and the adds don't bother me, but I'm not fond of the idea of Google scanning the contents of every email sent through their system. On the other hand, Google is providing a useful service for free, so something or someone has to foot the costs.

        Jim goes on to comment,  "Perhaps Google already states this in their terms of agreement when one sets up a Gmail account, but wording somewhat to the following seems fair to me: as a user of the free Gmail email service the user agrees to having all sent or received emails subject to scanning by Google. If one doesn't like this, then don't sign up for the Gmail service -- use something else for your email service.
        So, this is Jim's question,  "I don't know, but perhaps other free email services such as Yahoo, Outlook Express and others may do the same thing. What do you think about Google's scanning of your emails? Armed with this knowledge, surely you won't send any of your passwords via email anymore, will you...(grin)."

No, Your Data Isn't Secure in the Cloud

          John Carter wants to share his viewpoint on security in the Cloud.  "You do understand that it's the government that is insisting on an open book for all personal information, yet they also insist on not telling us anything they don't want us to know about - like what really happened at Roswell and other places.

        "I really don't care how deep the government is looking into my personal affairs. In fact, I want them to be able to pry into the private life of any citizen planning on running for a public office at every level of government from our local supervisor and councilman to the President. 
        "The ONLY way to have access to my passwords across all devices without using the cloud is to carry a thumb drive —and it won't connect to my iPhone, iPod, or iPad. That makes no sense. 
        "So, using iCloud or Dropbox to store my passwords is my only sure way of being able to access them when I need them from any device. And with 128 bit encryption, that is secure enough to prevent Joe the Plumber (and even my high-tech buddies) from getting at them. I'm safe from the hackers, and that's all that really concerns me.
        "Now, if one of those hackers works for the government and is nefarious enough to steal encrypted data for personal gain, I can't stop that. No one can. It would take an act of Congress to prevent even the government from accessing encrypted files, and then only foreign governments would be able to access my personal files. Right back where I started from."  
        And thanks to John for adding to this discussion.  

Storage Security?

          Yes, we're still concerned about storage security.  Jim Hamm writes, "For your possible interest, here is an article about storage security -- or lack thereof -- in the cloud. For reasons mentioned in the article, I don't, and wouldn't, store passwords in the cloud. I wouldn't even use a Password Manager to store passwords in the cloud."
http://www.computerworld.com/s/article/9241553/No_your_data_isn_t_secure_in_the_cloud?taxonomyId=223&pageNumber=1

OS X Mavericks: Hands-On

        "Here is an article from MacWorld with comments about their hands-on experience with OS X Mavericks, to be released this fall. With various recent articles commenting on password security -- or lack thereof -- in browsers, read the section about a new feature: iCloud Keychain," Jim Hamm informs us.  Scroll down about half way for that password security feature. 

Is Your Router Vulnerable?

        With his thoughtful suggestion Jim Hamm forwards an interesting site.  He starts off, "Here is a description and test to see whether your router may be vulnerable to a UPnP discovery request. I ran the test, and our router is not vulnerable.

        Jim then comments, "In the real world, I don't know how serious this threat may or may not be. I don't recall reading anything about it, and don't really know anything about this vulnerability. So, proceed accordingly."
        Hmmm.  Let's look at this company and their blog to learn more.  Here's a photo of them,  http://www.rapid7.com/company/  and you'll learn more when you scan their Security Street blog: https://community.rapid7.com/community/infosec/blog 
       And this is the latest addition from Jim, "Here is more information on the Universal Plug and Play (UPnP) vulnerability issue. Although this article came out a while back, I guess reading it now is better late than never." 

So, What Do You Want Them to Know?

         It’s not a cheery handout today.  But as we keep hearing news reports the importance of  security and privacy grab our attention.  Of course, there are things we need to know and do.  Keeping up with the latest information is a necessary precaution for all of us.  Here is just a few possibilities for current sites for you to review. 

ID Theft, Opt Out Directions,  Free Credit Report,  Social Networking Danger

        See  http://www.worldprivacyforum.org   lists articles on ID theft, security, privacy, cloud computing, medical info on HIPAA,  medical identity theft, and more.   
Lots of links are provided on this website. One article brought to our attention was “Top ten opt out list.”   The information goes into detail and when printed out is 12 pages long as it describes the various opt-outs you can use to stop information about you from being collected, circulated, and sold among various companies and government agencies.  
One company is described which builds detailed dossiers on consumers with “information scraped from social networking sites like Facebook, and is combined with public record data.”  Dossiers have been used in political campaigns and other businesses.  According to their quotation from Wall Street Journal this company’s segments recently included   “a person's household income range, age range, political leaning, and gender and age of children in the household, as well as interests in topics including religion, the Bible, gambling, tobacco, adult entertainment and ‘get rich quick’ offers. In all . . .  more than 400 categories, the documents indicated."
This site also gives consumer tips and links on how to get your free annual credit report.   
A February 2010 report discloses Digital Signage Privacy Principles which might be a new term and a previously unexplained form of sophisticated digital information collection.  


Traveling Brings New Challenges for Security and Privacy
        See  https://www.eff.org/wp/defending-privacy-us-border-guide-travelers-carrying-digital-devices.  This website gives 20 pages of information.

Defending privacy at the U.S. Border:  a guide for travelers carrying digital devices   states that “for now, a border agent has the legal authority to search your electronic devices at the border even if she has no reason to think that you’ve done anything wrong.”  
It discusses such agencies as CBP, ICE, TSA.  Which other countries have you recently visited before entering the United States?  What other connections do you have there? 
Be aware of two basic precautions:  make regular backups so if your computer is ever taken, lost or destroyed you’ll still have access to your data, and encrypt the information on your computer.    
It gives details on how and why.  Talks about hard drives, flash drives, mobile phones, details, date and disk encryption, digital cameras. It goes into how to interact with border agents, what to say, how to behave.  The appendix lists 47 sources and their links with descriptions.  
You can click to download a PDF with this material. This might be something you’d want to pass along to your grown kids and friends who plan to travel this summer. 


Cookies?

These are not just the yummy ones Ginger brings to PMUG! Read on . . . 

What Info is Available for Internet Sites to Take? 

        Using Firefox:  are you collecting lots and lots of cookies?   See how to view history and clear what you don’t want saved.  http://support.mozilla.org/en-US/kb/how-clear-firefox-cache  Using Safari:  http://support.apple.com/kb/HT1677 

        See  http://kb.iu.edu/data/ahic.html   Indiana University knowledge base, dated 3-3-13.  Brief description of cache, cookies, history.   How to: for Firefox, Internet Explorer 7, 8, 9,  Chrome, Opera, Safari, Mobile Safari for iPhone, iPod touch, iPad, Android. 
        What personal information does Amazon gather and why? There’s 5 pages to read!  http://www.amazon.com/gp/help/customer/display.html?nodeId=468496  dated 4-6-12.
        Google’s Policy:  http://www.google.com/policies/privacy/  last modified 7-27-12.  Their policy in 8 pages; what they take and what you can determine on your end.  “We will not reduce your rights under this Privacy Policy without your explicit consent.”  Hmmmm.  

Password Managers Can Help
The query to Ben Patterson brings up info he wrote about iPhone, iPad:  http://heresthethingblog.com/2013/04/30/reader-mail-simple-password-manager/

How Safe is My Info on a Thumb Drive?

A handy little thumb drive can hold a lot of info.  But they can be misplaced, lost, mishandled.  Make a plan to store them and use them.  How long of a life do they have?  Probably you’ll want to back one up, then buy a new one & copy over again in a few years?  
An infected USB thumb drive can infect a computer.  This discusses software encryption, hardware encryption. http://en.wikipedia.org/wiki/Secure_USB_drive


An Unexpected Phone Call From Your Grandson 

Oh, it was a young man’s voice on the phone, but he said, “Grandma, I’m calling from Rome and I need help.”  Who wouldn’t be concerned?  How did he travel so far from home?  What’s going on?  Asking a few questions like,  “Maybe you have the wrong number.  What did you say your name was?  What’s your sister’s name?”  Ask anything that only the real grandson could possibly know.  “Give me your phone number and I’ll call you back after I ...“  Make some quick excuse and sound sort of confused.  Your brain’s internal warning device is in full swing now.  You’ve heard about scams like this.  Don’t be cheated out of your $$$. 
Facebook gives crooks the information so they can find information to pretend to be your grandchild. http://newyork.cbslocal.com/2013/01/16/scam-artists-using-facebook-to-target-grandparents/     
Alert your grandkids about posting information on Facebook, etc that would jeopardize you or them!  A good reminder now and then shows you care about their safety.


So, What Can We Do?

While we are bemoaning the loss of truth, honesty, and respect in the world today we of the “generation with years of experience” must continue to be relevant and responsible. It’s part of our heritage, how mama and dad raised us to be decent and trustworthy.  It’s like doing push-ups for exercise.  Now, we’re exercising our brains.  And part of that is continuing communication.  Listen and learn.  Respond as best as you can!  
Let your computer help you keep in touch.  Let PMUG help you learn.  

+ + + 
This was today's PMUG meeting handout from Elaine Hardt, May 18, 2013