Streaming...the Roku Video. Thanks, Cliff!
Rich Carlson's Flash Drive Presentation
Thanks to Gloria Washburn for sending us this VERY informative video. Came from a Kevin Roose report from DEF CON. It's a real EYE OPENER!!!!
Think you CAN'T be Hacked??
Kevin Roose is a technology columnist for The New York Times, based in the Bay Area. His column, “The Shift,” examines the intersection of technology
Some Helpful Tips
Use complex passwords.
Using secure passwords is the most important way to prevent network intrusions. The more secure your passwords are, the harder it is for a hacker to invade your system.
More secure often means longer and more complex. Use a password that has at least eight characters and a combination of numbers, uppercase and lowercase letters, and computer symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes.
Don't use recognizable words or combinations that represent birthdays or other information that can be connected to you. Don't reuse passwords, either. If you have too many passwords to remember, consider using a password manager, such as Dashlane, Sticky Password, LastPass or Password Boss.
Keep your OS, apps and browser up-to-date.
Always install new updates to your operating systems. Most updates include security fixes that prevent hackers from accessing and exploiting your data. The same goes for apps. Today's web browsers are increasingly sophisticated, especially in privacy and security. Be sure to review your browser security settings in addition to installing all new updates. For example, you can use your browser to prevent websites from tracking your movements, which increases your online privacy.
Beware of email messages from unknown parties, and never click on links or open attachments that accompany them. Inbox spam filters have gotten pretty good at catching the most conspicuous spam. But more sophisticated phishing emails that mimic your friends, associates and trusted businesses (like your bank) have become common, so keep your eyes open for anything that looks or sounds suspicious.
Back up your computer.
If your business is not already backing up your hard drive, you should begin doing so immediately. Backing up your information is critical in case hackers do succeed in getting through and trashing your system.
Always be sure you can rebuild as quickly as possible after suffering any data breach or loss. Backup utilities built into macOS (Time Machine) and Windows (File History) are good places to start. An external backup hard drive can also provide enough space for these utilities to operate properly.
Links from May 13 workshop on Travel Safety Tips
Boarding Pass Video
Suggested websites to check out:
5 ways to give your phone an eco-friendly spring makeover—and plant a tree, too!
January 28 Info
Below is a link to the site showing some comparisons between Google meet and Zoom... Which one is best for YOUR needs.....?
Thanks, once again, to our own Aida Awad for the great interactive workshop involving Google Earth. Click on the Earth graphic (left) to do some exploring and have some fun!
Organize and file photos
Oct. 8, 2020
From Sept. 10, 2020
A Podcast is an audio program, similar to Talk Radio, but you subscribe to it on your smartphone and listen to it whenever you would like to.
Most Podcasts today are audio only, even though video podcasts do exist.
The majority of podcasts are themed around one particular topic. The host or hosts will talk about that topic on every episode. Sometimes it's really specific, like triathlon racing or dog training, and other times it's more general, like how to lead a happy life.
Podcasts are a series audio episodes, all focused on a particular topic or theme, like cycling or startups. You can subscribe to the show with an app on your phone and listen to episodes whenever you like on your headphones, in the car or through speakers.
Headphones to connect to your smartphone. Otherwise, connect up to your car via Bluetooth, or start listening on Echo or another smart speaker.
Example of a Podcast: id1498202082