Monthly Archives: August 2009

Facebook privacy will get better – thank you Canada

Posted by Andy on August 31, 2009
Security / Comments Off on Facebook privacy will get better – thank you Canada

You know all of those Facebook quizzes and causes and snowball fights and other lists – “25 Random Things” etc?  Did you know that when you sign up for these applications you are giving the application developer access to all of your profile information?  Facebook is notoriously fast and loose with your data, which is why I ignore all requests for causes, lists etc.  The simple truth is that you don’t know what Facebook is doing with your data, and they won’t tell you.

Not any more, thanks to our neighbors in the Great White North.

The Canadian Government has muscledFacebook into making some significant changes to the way that your data is managed.  This is good new for your Privacy, but it emphasizes how little control you have over what happens to your data once you hit the enter key.

The basics of the changes (to be implemented over the next year) are:

1) Applications will have to tell you what data they want and you will have to give them explicit permission to use the data.  Developers will have to tell you how they will use the data too.

2) Account removal – as is stands now, you don’t know what happens to your account when you “deactivate” it on Facebook.  You might think that your data is removed, but is isn’t.  Facebook has agreed to give you the option to deactivate or to delete your account.  Unclear what will happen to data already sent to others (think birthday information on other peoples calendars) so we’ll see what happens here.

3) Privacy for Dead People – After you die, your account does not necessarily go away.  Facebook will update is Privacy Policy to explain what happens when it’s owner passes away.

There are still many problems with Facebook, and there is still litigation pending in the US courts regarding how your data is being used by Facebook at others.  For more information on this, have a look at the Electronic Privacy Information Center’s website, http://epic.org/.  There is a section on Facebook that outlines their concerns, and it’s a great read.

The lesson here is be VERY careful with your information.  I don’t want to be Polly-Anna-ish here, but you can’t be too careful.  Don’t make it easy for people to steal your identity!

Tags: ,

WEP vs WPA

Posted by Andy on August 20, 2009
Security, Tech Tips / 4 Comments

Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn’t help by adding acronym after acronym.  So what do you do?  The answer is fairly simple – secure your network with WPA!!

There are lots of methods to use to secure your wireless network.  The most common is WEP, but that is being replaced by the newer (and better) WPA protocol.  You can also secure the network by allowing only specific computers on the network.  This is simple to do, and doesn’t require security keys and messy settings.  The problem with it is that the data you send wirelessly is not encrypted.  With WEP and WPA, the data is encrypted.

What are these things anyway?

WEP or Wired Equivalent Privacy (see the Wiki for more info) is an encryption protocol developed in the late 1990’s to secure wireless networks.  It offers 64bit and 128 bit encryption using a key generated by a passphrase you enter, but is easily cracked.  Despite this, there are a ton of people who still use WEP since it is the default protection on many routers.

WPA (WiFi Protected Access) is the next generation encryption algorithm that replaced WEP.  WPA uses 256bit encryption keys, and is far more secure than WEP.  It’s not the be-all-end-all, but is very good.  As with WEP, you have the option of generating a security key using a passphrase so that you don’t have to remember a string of random hex digits.  This is great, BUT you have to be careful about the passphrase you use.  DON’T use things like your pets name, your kid’s name, your street, or anything that can be guessed.

The clear answer is to secure your network with WPA.

BUT – do you have to secure your network at all?  The safe answer is yes.

What happens if you don’t secure your network?  That depends on where you live, how close your neighbors are, and how you secure your computers.  Most wireless routers have a range of 150 feet.  That means that if your neighbors are more than 150 feet away, they will not be able to get on your network unless they are standing outside your house with their laptop.

If you don’t change the default security settings on your computers, chances are that even if someone did get on your network, they wouldn’t be able to do much.  By default settings I mean:

  • No shared hard drive locations
  • Remote control disabled
  • Firewalls up and running on every computer
  • Anti-Virus up and running on every computer

Of course, this is not always realistic – I have lots of shared directories, and remote control enabled on my machines because I like to be able to work on any machine from anywhere if I need to.  For that reason, I like to secure the network so that if someone manages to get on they won’t get to my personal files.

The bottom line on security for wireless networks is best practice is to secure your network using WPA.  That said, if you live in a remote area where no one will likely be in range of your wireless, it’s not really necessary, just a good idea.

Tags: , ,

Twitter is mostly useless drivel

Posted by Andy on August 17, 2009
Tech Tips / 2 Comments

A couple of recent studies on Twitter and people who tweet point out that over 40% of all tweets fall into the category of “pointless babble”.  Pear Analytics put out a report with these and other interesting findings.  I’m sure it comes as no surprise that 75% of all tweets come from just 5% of people who tweet. 

Sysomos also does research into twitter usage and in their blog report  that 24% of all tweets are bots and other programatic postings.  Not surprising since the top contributors are posting 150 tweets and more a day.  Interestingly, they also put together a list of the top posters who have 5000 or more followers, and less than 50 posts per day.  The assumption is that these are reall posters, not bots.  Chris Brogan tops that list.  Who is he?  He’s a guy that helps businesses use social media.  Practice what you preach I guess.

Lots of other interesting facts.  55% of tweeters are women, 78% are caucasian.  The number of African American twitter users is well above the average for African American internet users.  I have no idea what that says about African American internet users, but there it is. The demographic information on Twitter is from quantcast.  A very cool stat site for websites.

 

So what does this all mean?  Be careful who you follow, and don’t feel bad about dropping the people who post too much – they are likely just a bot anyway.

35 best iPhone apps of the year so far

Posted by Andy on August 16, 2009
Tech Tips / 4 Comments

AppVee (www.appvee.com) has released their list of the 35 best iPhone apps of the year so far. If you don’t know about AppVee, they are awesome. Basically, they look at every (well almost every, they do ignore the nonsense) iPhone app published and winow out the good from bad. They seemingly impossibly review more apps that I thought possible, and they do a really good job.

The list of apps they like so far is here.

Notable inclusions are TweetDeck, Skype and Kindle – three of my personal favs.

Thanks AppVee!!

Tags:

Outlook 2007 tips

Posted by Andy on August 13, 2009
Outlook, Tech Tips, Windows / 1 Comment

While I’m on the subject of tips, here are a few tips for Outlook 2007.

1) Stop Outlook from suggesting names in the TO field.

This is related to the .nk2 file I blogged about awhile ago.  If you don’t like that outlook suggests names for you, then you can turn this off.  Go to Tools, then Options.  From there choose the Preferences tab, then click the e-mail options button.  In the e-mail options dialog, click the Advanced E-mail Options button.  Uncheck the radio button for “Suggest names while completing To, Cc, and Bcc fields”.  Click “ok”.

2) Configure Outlook to NEVER send read receipts.

Personally, I think read receipts are annoying.  Some people love them, and who am I to judge, but I’d prefer to keep when I read your mail to myself, so I turn this “feature” off.  To do this, go to Tools, then Options.  From there choose the Preferences tab, then click the E-mail options button.  In the E-mail options window, choose the “Tracking Options” button.  Look for “Use this option to decide how to respond to requests for read receipts. Only applies to Internet Mail accounts.”   There are a couple of radio buttons – choose “never send a response”.  Click “ok”.

3) Remove the System Tray icon for new email

Another love it or hate it item.  I like this one, but when the system tray gets cluttered, out it goes.  To remove the icon, once again go to Tools, Options and from there choos the Preferences tab.  On the Preferences tab choose the E-mail Options button.  In the E-mail options dialog choose the Advanced E-mail Options button.  Under the “When new items arrive in My Inbox”, uncheck “Show an envelope icon in the notification area”.  Click “ok”.

4) Configure Outlook to empty the deleted items folder when you exit.

This is really helpful if you have limited mailbox space.  Deleted items count toward your mailbox space limits, so you either need to remember to empty your deleted items, or have outlook do it for you when you exit the application.

To configure Outlook to empty deleted items on exit, go to Tools, the Options, then choose the “Other” tab.  Under “General”, check “Empty the Deleted Items folder upon exiting”.  Click “ok”.  Your sysadmin will love you ;)

5) Add Holidays to your Calendar

Outlook support iCal, so there are thousands of calendars you can add to Outlook.  To add holidays from the default list, go to Tools then Options, then choose the Preferences tab.  In the Calendar section, click the Calendar Options button.  In the Calendar Options window, click the “Add Holidays” button.  Scroll through the resulting list, click the radio button next to the ones you want, then click “ok”.

Just a few things for now.  I’ll add more another time.

Tags:

10 Windows 7 Tips

Posted by Andy on August 13, 2009
Cool Tech, Tech Tips, Windows / Comments Off on 10 Windows 7 Tips

So far, Windows 7 is the bee’s knees.  The more I find out, the more I like, which is saying a lot – with operating systems, it’s usually the other way around!

Here are a few things that make Windows 7 neat.  Big thanks to Tim Sneath for most of these.

1) Windows Management – in XP, your choices on what you could do with arranging windows on your screen was somewhat limited.  You could maximize a window to take the whole screen, you could manually shrink it to the size you wanted and move it to the side, iconize it, etc.  In Windows 7, several “docking” features were introduced that make moving things around on your screen really easy.  If you press the Windows key, then the left arrow, the current window will dock to the left side of the screen.  WIN+right arrow will dock to the right, WIN+up arrow will maximize the window, WIN+down arrow will restore the window.  In addition to the WIN shortcuts, you can drag windows to the top to maximize it (double clicking the title bar still works too), or you can drag the window to the left or right to dock the window there.

On a related note, in a multi monitor setup, you can move windows from one screen to the other using WIN+SHIFT+right or left arrow.  Now were talking!

2) Get rid of the noise – Have you ever been working on a document and been annoyed that all of you other open windows are just in the way?  Press WIN-Home in Windows 7 and all windows but the current are minimized.  Press WIN-Home again to restore the windows.

3) Browser load times – This is really an IE8 tip, but I’ll include it here.  If IE is taking a long time to load, it may be because of the add-ons you are running.  Go to Tools/Manage Add Ons and you will see  a list of what IE loads at startup.  The neat thing is if you scroll to the right in the list, you can see the load times for the Add Ons.  This is a great way to see where the bottle necks are.

4) Quick start for taskbar apps – you can use WIN+1, 2, 3, 4 or 5 to quickly go to or start any of the first 5 apps in your taskbar.

5) Look at the desktop – Another helpful feature is WIN-space bar.  This combo lets you look at the desktop and see any icons or widgets you have.  You can also click on the rectangle all the way in the lower right hand corner – this is the old “show desktop” icon.

6) Additional instance of an open application – there are a couple of ways to do this, but by far the fastest is to hold the shift key while left clicking on the taskbar icon.  Way better than going through the start menu again, or right clicking and choosing to open the app.

7) Running with elevated rights.  If you hold CTL-Shift while clicking on a taskbar app, you will bring up a new instance with full administrator rights (assuming your account has permissions).  When Windows 7 is deployed in an enterprise, this will be GREAT.

8) Specialized Window switching – this one I love.  If you are like me, you have tons of windows open all the time.  In XP if you want to switch between windows you can ALT-Tab through them all, or you can click on the taskbar icon and guess which window is the one you want.  In Windows 7, you can essentially Alt-Tab through all of the open windows associated with a specific application without scrolling through every open window.  You do this by holding down the CTL key, then clicking on the taskbar icon for the application you want.  Windows will “scroll” through the open windows as you click the icon.  This is great if you want to scroll through all of your open Outlook windows, for example, but don’t want to run through everything you have open.

9) Move focus the taskbar – this is neat keyboard shortcut.  If you press WIN-T you will move focus to the taskbar.  You can then use the arrow keys to move through your taskbar apps to choose the one you want.  For keyboard shortcut junkies, this is great.

10) Open windows explorer keyboard shortcut – Press WIN+E.  This will open up and explorer window at the Computer Node.  Note that SHFT+click on the explorer icon opens at the Document Library Node.

More to come –

Tags: ,

Send mail from another address without the "on behalf of" message in gmail

Posted by Andy on August 02, 2009
Cool Tech, Gmail / 3 Comments

From the Gmail blog

One of the neat features of Gmail is that you can use it to aggregate all of your email addresses to one inbox.  You add the email addresses to your gmail account, and they connect via POP or IMAP to your other accounts and everything is in one place.  Until this past Thursday, when you replied to a mail that was not to your mail account, Gmail would put your main account in the “Sender” field so that your mail would not be kicked as spam.  What the recipient would see is a message that the mail was send “on behalf of” the intended address “from” your main account.  While this is ok in most instances, if you are trying to mask that Gmail is the tool you are using for all of your mail, then this can be annoying.

Thursday, Google introduced a way to route your mail through the SMTP server of your choice instead of their SMTP servers, so your mail will look like it is comming from the system you choose and the “on behalf of ” messages will go away.  Neat!  If your office allows POP/IMAP and you allows remote SMTP then you are golden.  If not, well then you have to live with the “on behalf of” messages.