Twitter is used for connecting. It is used for socializing, sharing, and speaking to the world around you. Hashtags such as #CloudChat used by IBM to discuss cloud computing, is an example of a Twitter Chat. It's easy to get a lot of input using it, and it's easy to share with the world your ideas. However, it's based on Twitter and all of those limitations that it implies. Twitter has 140 character limits, and it can be difficult to ask a complex question within that space, let alone answer it. It's easy to find ways around those limits, but it's not always ideal. I absolutely adore Twitter, though, so I think that Twitter Chat is a great tool for those of us who spend probably way too much time on it.
http://www.pcworld.com/article/2032657/listen-for-the-next-big-thing-on-twitter-twitterchats.html
Saturday, March 30, 2013
Sunday, March 24, 2013
Shortened Links
This is definitely an article that I needed to read, so I'm glad that I took the plunge to click on it. It's about those handy little links that are abbreviated. Twitter uses it a lot, which is understandable since there's a limit of 140 characters per tweet. I never thought about the potential security risk these links could cause, though. You never know where the links could take you, as the usual obvious details are hidden, and they could be Trojan links. There is this really cool extension, though, called "Unshorten.it" for Chrome and Firefox. It allows you to right click on one of those shortened links, and you can "Unshorten this link...", which will take you to a new page where it can tell you all of the information about that link. It's a super handy extension, and there's a link to installing it within the article below. I highly recommend everyone at least consider using it for daily use.
http://www.pcworld.com/article/2013522/peek-behind-abbreviated-web-links-with-unshorten-it.html
http://www.pcworld.com/article/2013522/peek-behind-abbreviated-web-links-with-unshorten-it.html
Friday, March 22, 2013
Downloading
This is by far one of my biggest pet peeves. Fake Download Buttons. It bothers me that so many people are unaware of which ones to avoid (they're usually the biggest and flashiest!), and it bothers me that it works. I would love to be able to help others to learn to differentiate between fake and legitimate downloading buttons. One of my favorite places to download programs is cnet.com, as they keep everything verified and you're less likely to accidentally click on a download button that takes you to a malicious site or downloads a malicious program. This article definitely has some good pointers of how to avoid clicking on those dreaded fake downloads: http://www.pcworld.com/article/2012958/how-to-avoid-fake-download-buttons.html. I suggest EVERYONE go and check this out. It's worth it.
Monday, March 18, 2013
Data, Security Pros, Scary
I read this article because of the title: "Why IT security pros can be scarier than the 'bad guys'". I could understand why they can be, but this article took it in a direction that I wasn't expecting. Our data is always being used and mined for information, to the point where businesses can target us better. Even this post about the article will be used in some way. Because our information is being collected, we could always ask the companies to not track us, but sometimes that defeats the purpose of why you're using them in the first place. For example the article mentioned Pinterest, due to the growing usage of pinners. I have plenty of information, and I know data about me is being collected. However, I love the use of Pinterest in my life, from recipes to inspirational quotes, so I willingly give them my information. I don't think we need to be scared at the way information is being collected, I think we all just need to be aware that we are willingly giving them that information about us by utilizing their products.
http://www.pcworld.com/article/2029705/why-it-security-pros-can-be-scarier-than-the-bad-guys.html
http://www.pcworld.com/article/2029705/why-it-security-pros-can-be-scarier-than-the-bad-guys.html
Labels:
big data,
pcworld,
privacy,
security,
social media
Thursday, March 7, 2013
TrueCrypt vs. .Zip
I have never heard of TrueCrypt, but this article helped explain it to me. It's similar to an encrypted .zip file, but the author of the article really loves it. It's secure, and it's a "TrueCrypt vault' - which is seen as a virtual drive. There were a lot of pros and cons to it, such as the TrueCrypt vault is set in its size, while a .zip file can expand and compress as needed for which files are in it. The author of this article brought out some good points for both TrueCrypt and .zip files.
http://www.pcworld.com/article/2016558/answer-line-truecrypt-vs-encrypted-zip-files.html
http://www.pcworld.com/article/2016558/answer-line-truecrypt-vs-encrypted-zip-files.html
Tuesday, March 5, 2013
Windows 8
This was definitely an interesting article to read. For one, I am not rushing to get a computer with Windows 8. Once it's been more fine-tuned and worn-in, then maybe, but I'm not itching for it. This article was discussing the "hidden" security features built in with Windows 8, and that if you are thinking of getting it then you should purchase a new computer with updated hardware rather than just updating your OS. I understand where they're coming from, but it also felt like they were trying to "sell" the reader on upgrading their computer and spending more money (when we all know that this will be outdated quickly). I've had my laptop since the beginning of college, and my goal is to make it until graduation (whether from grad school or just with my undergrad is a different matter...). I've succeeded so far in my goal, but it's also 'cause I'm trying to take care of it and I won't be sucked in to buying a brand new laptop that'll be outdated immediately. Technology is growing at a rapid rate, and unless you have your heart set on one particular computer and have had it set on it for months, you have to be willing to bide your time before upgrading. Kind of like with cell phones... I really want a Galaxy SIII or SIV, but I also realize that by the time I need a new phone, there will be plenty of even greater options out there and it's not worth my money right now.
http://www.pcworld.com/article/2027593/windows-8-put-its-hidden-security-features-to-work-.html
http://www.pcworld.com/article/2027593/windows-8-put-its-hidden-security-features-to-work-.html
Saturday, March 2, 2013
Evernote was Hacked!
Oh no! Evernote is my favorite ever! They are requiring every single user to go in and change their password, which is a smart move on their part. It seems that it was a coordinated attack and that Evernote blocked the attacked when it noticed the suspicious activity. According to their blog, none of the data was accessed, changed, or lost, and none of the payment information was accessed either. Evernote posted in their blog some basic steps that you can take to protect yourself, for those who don't have any experience with security, and they've made it so you have to login and change your password before you can access your data and sync it up again. For more information about this exploit, you just need to check out their blog and any articles that may be about it!
http://evernote.com/corp/news/password_reset.php
http://www.techhive.com/article/2029974/evernote-reports-hack-attack-tells-users-to-reset-passwords.html
http://evernote.com/corp/news/password_reset.php
http://www.techhive.com/article/2029974/evernote-reports-hack-attack-tells-users-to-reset-passwords.html
Subscribe to:
Posts (Atom)