ie8 fix

How To

The right way and wrong way to use Twitter

The right way and wrong way to use Twitter

"Thank you for sharing" takes on an entirely new meaning when using social media. Most of the people who use Twitter, Facebook, and other social networks intend their posts to enlighten, amuse, or inspire their friends and followers. It doesn't always work out that way.

For businesses, Twitter is primarily about customer relations, but this can backfire, too, as Customer Think's Trish Miller points out in the Top 10 Twitter Mistakes of 2012.

The first time you sat behind the wheel of a car you didn't just turn the key and head for the freeway … Read more

Free services make Gmail, Google Drive, Google search more private

Free services make Gmail, Google Drive, Google search more private

It's no secret that any information you provide to a Google service is no secret.

When Google changed its terms of service last year, the company granted itself and any other company it chooses complete, unfettered access to anonymized (we hope) versions of all the messages you send and receive via Gmail, all the files you upload to Google Drive, and all the terms you enter in the Google search box.

As CNET's Rafe Needleman reported in April 2012, Google's rights go beyond simply perusing your personal information. Google's terms of service include the following:

When … Read more

Three essential security add-ons for Firefox, Chrome, and IE

Three essential security add-ons for Firefox, Chrome, and IE

If you ask people what they like least about the Internet, the three items at the top of their list of complaints will likely be trackers, ads, and viruses.

While you may not be able to eliminate these and other Web nuisances, you can minimize their effect on your browsing via three free add-ons for Firefox, Google Chrome, and Internet Explorer: Ghostery, Adblock Plus, and Web of Trust. (Note that Adblock Plus is not available for IE; blocking ads in Internet Explorer 10 is accomplished by using the program's Tracking Protection feature, as explained below.)

Do-it-yourself do not track … Read more

How to prepare for your last log-off

How to prepare for your last log-off

Technology doesn't just complicate our lives, it also does a number on our deaths.

Imagine the challenge of accounting for all of your digital assets once you've shuffled off to Buffalo. Even if you consider your e-mail, text messages, and social-media posts disposable, you've probably stored photos, videos, and very personal documents on one or more Web services. You probably want to bequeath some or all of these items to family and friends.

If you run an online business, ensuring a smooth transition in the event of your demise becomes even more important. To ease the burden … Read more

How to use two-step verification with your Microsoft account

How to use two-step verification with your Microsoft account

Microsoft started rolling out its two-step verification process on April 17. Also known as two-factor authentication or two-step authentication, the process strengthens your account security by requiring you to enter your password (step 1), then a security code (step 2). The security code can be sent to you by e-mail, SMS, or phone call, or you can use an authenticator app on your mobile device.

Enabling two-step verification on your Microsoft account will enable it across all Microsoft services that currently support two-step verification, like Windows, Outlook.com, Office, and SkyDrive. If you're interested in trying it out, here'… Read more

Prepare for and respond to a lost or stolen smartphone

Prepare for and respond to a lost or stolen smartphone

How bad is the smartphone-theft epidemic? San Francisco District Attorney George Gascon accuses phone companies of profiting from stolen phones, as Michael Scherer reported last month on Time's Swampland site. Gascon is one of several leading law-enforcement officials calling for carriers to be required to implement technology that permanently deactivates stolen phones. It is simply too easy for thieves to resell smartphones.

One year ago, the major cellphone services announced via the CTIA Wireless Association plans to create a database "designed to prevent GSM smartphones reported as stolen from being activated or provided service." The database was … Read more

OS X not accepting your screensaver password? Try this

OS X not accepting your screensaver password? Try this

In the OS X Security system preferences you can set the system to require a password when the system wakes from sleep or after the screensaver has been active for a period of time. However, you may run into a few cases in which entering your account password then does not work.

One cause can be if you have recently changed the name of your user account. For authentication, OS X will use either the short or long username, along with any aliases that you have associated with your account. However, if you have changed the long username for your … Read more

How you may have inadvertently participated in recent DDoS attacks

How you may have inadvertently participated in recent DDoS attacks

The risk that an Internet-connected computer is infected with malware will never be reducible to zero. It's just the nature of software that errors happen. Where there are software-design errors, there are people who will exploit those errors to their advantage.

The best PC users can hope for is to minimize the chances of an infection and to mitigate the damage a piece of malware can inflict -- whether it intends to steal a user's sensitive data or to commandeer the machine as part of a cyber attack on servers thousands of miles away.

Last week, Internet users … Read more

GSA vulnerability highlights dangers of SSNs as IDs

GSA vulnerability highlights dangers of SSNs as IDs

Recently, the General Services Administration sent an e-mail alert to users of its System for Award Management (SAM), reporting that a security vulnerability exposed the users' names, taxpayer identification numbers (TINs), marketing partner information numbers, and bank account information to "[r]egistered SAM users with entity administrator rights and delegated entity registration rights."

The notice warned that "[r]egistrants using their Social Security Numbers instead of a TIN for purposes of doing business with the federal government may be at greater risk for potential identity theft." Also provided was a link to a page on the agency's siteRead more

How to remove 'Yontoo' adware Trojan from your OS X system

How to remove 'Yontoo' adware Trojan from your OS X system

Security company Dr. Web is reporting on a new adware Trojan attack that is targeting Mac users, where malicious Web sites will trick users into installing a plugin that will track your browsing and display ads to you.

The malware, called "Yontoo," will be first encountered as a media player, download manager, or other plug-in requirement for viewing contents on some maliciously crafted Web sites disguised as sources for file sharing and movie trailers. When the plug-in prompt is clicked, you're redirected to a site that downloads the Trojan installer and requires you to run it. The … Read more