<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4744842068877935962</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:42:24 +0000</lastBuildDate><title>Steve Richardson</title><description>Technology Simplified</description><link>http://srichardsonhf233.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>13</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-8404851198433430669</guid><pubDate>Thu, 14 Feb 2013 21:14:00 +0000</pubDate><atom:updated>2013-02-14T15:24:19.768-06:00</atom:updated><title>Get that iPhone Updated Before It&#39;s Too Late</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYXH9WDhtGPDDL-OB33HU26JfDOndSLgXwF-z7tYaDTeSLEiRIHfr06-8wlo-Pgr76_iZqrYmNMkhuQcqR9vPlXCCku-i_On24Ds3TYQoUI-r-wZFidlgFbf4LAj0fiw08k3rKz3efiJk/s1600/ios6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYXH9WDhtGPDDL-OB33HU26JfDOndSLgXwF-z7tYaDTeSLEiRIHfr06-8wlo-Pgr76_iZqrYmNMkhuQcqR9vPlXCCku-i_On24Ds3TYQoUI-r-wZFidlgFbf4LAj0fiw08k3rKz3efiJk/s1600/ios6.jpg&quot; height=&quot;237&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;http://www.apple.com/&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt; has faced numerous challenges over the last year in relation to software errors and flaws on its flagship iPhone.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Now a new exploit has been discovered that allows a user to bypass the lock screen on the &lt;a href=&quot;http://www.apple.com/ios/?cid=wwa-us-kwg-features-00001&amp;amp;siclientid=6381&amp;amp;sessguid=dc2fc607-5a25-4247-b9a3-0c351fe2806c&amp;amp;userguid=dc2fc607-5a25-4247-b9a3-0c351fe2806c&amp;amp;permguid=dc2fc607-5a25-4247-b9a3-0c351fe2806c&quot; target=&quot;_blank&quot;&gt;iOS6.1&lt;/a&gt; platform. The flaw is relatively easy to exploit and allows you to bypass the security code with full phone access.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Luckily, as of this morning, Apple has released iOS6.1.1 to address this bug and patch the security flaw.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Make sure to apply the patch right away to protect yourself from this latest exploit.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2013/02/get-that-iphone-updated-before-its-too.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYXH9WDhtGPDDL-OB33HU26JfDOndSLgXwF-z7tYaDTeSLEiRIHfr06-8wlo-Pgr76_iZqrYmNMkhuQcqR9vPlXCCku-i_On24Ds3TYQoUI-r-wZFidlgFbf4LAj0fiw08k3rKz3efiJk/s72-c/ios6.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-7606279280605421756</guid><pubDate>Tue, 29 Jan 2013 21:30:00 +0000</pubDate><atom:updated>2013-01-30T07:45:15.483-06:00</atom:updated><title>How to Remove Those Embarrassing Facebook Photos</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTi6USFiw8VVvBUYrD1NVNqYa70J-JH7-F9imjerdNF-huSaxF4jNxEmNbHwMyOTTdULRc-K6nVzkmmRh98MZBxSE7LrRq4B_2j_GjBgP9nypGF1VnmFLd_x_MV5gukWLZZYnJo1822pU/s1600/bunny_xlarge.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTi6USFiw8VVvBUYrD1NVNqYa70J-JH7-F9imjerdNF-huSaxF4jNxEmNbHwMyOTTdULRc-K6nVzkmmRh98MZBxSE7LrRq4B_2j_GjBgP9nypGF1VnmFLd_x_MV5gukWLZZYnJo1822pU/s1600/bunny_xlarge.png&quot; height=&quot;224&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
Still haunted by that picture your Aunt Clara posted of you on Facebook? Many of us have pictures we wish never seen the light of day. With the new privacy updates that Facebook has issued, you now have the option to make that happen.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
This new feature can untag multiple photos at once and quickly request the removal of posts from friends&#39; profiles.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
Ready to make those bad pics finally disappear? Here&#39;s how.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Click the &lt;b&gt;Activity Log&lt;/b&gt; button found on your profile page.&lt;/li&gt;
&lt;li&gt;Click &lt;b&gt;Photos&lt;/b&gt; from the menu on the left side of the page.&lt;/li&gt;
&lt;li&gt;Once you click Photos the option &lt;b&gt;Photos of You&lt;/b&gt; will appear. Select that.&lt;/li&gt;
&lt;li&gt;Select the photos you want removed by clicking the check box to the left of each photo.&lt;/li&gt;
&lt;li&gt;Once you have selected the photos, you will see a &lt;b&gt;Report/Remove Tags&lt;/b&gt; button at the top of the page.&lt;/li&gt;
&lt;li&gt;Once you click that, you will be presented with the following 2 options&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXcGKYR5r3wva4_Jwq4tj76kWDnyqiXABYFFsA2lyUhSS4Nu35JaFGO5hNnfQhOA0rYdVBWYyIze7M0pLj0Hc6viDv9YyR0hte0kDFpSlza26irjR5XiPbnAcgOf0fEMNlfProfNz9Zfk/s1600/picrequest.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXcGKYR5r3wva4_Jwq4tj76kWDnyqiXABYFFsA2lyUhSS4Nu35JaFGO5hNnfQhOA0rYdVBWYyIze7M0pLj0Hc6viDv9YyR0hte0kDFpSlza26irjR5XiPbnAcgOf0fEMNlfProfNz9Zfk/s1600/picrequest.jpg&quot; height=&quot;215&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Untagging the photos will remove them from your timeline immediately. To be untagged and taken down, Fabebook will send a notification to the person who posted the photo with a request to remove it. They will have the option to remove it or send you a response.&lt;br /&gt;
&lt;br /&gt;
Facebook still advises you to contact people directly about removing embarrassing photos. With either option, hopefully you will finally make that photo disappear for good!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2013/01/how-to-remove-those-embarrassing.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTi6USFiw8VVvBUYrD1NVNqYa70J-JH7-F9imjerdNF-huSaxF4jNxEmNbHwMyOTTdULRc-K6nVzkmmRh98MZBxSE7LrRq4B_2j_GjBgP9nypGF1VnmFLd_x_MV5gukWLZZYnJo1822pU/s72-c/bunny_xlarge.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-823384290719137801</guid><pubDate>Mon, 28 Jan 2013 21:44:00 +0000</pubDate><atom:updated>2013-01-28T15:44:05.636-06:00</atom:updated><title>Don&#39;t Get Love Sick on Valentine&#39;s Day</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6y2f_Ng2fokvIYgVRU3W_dh1bAAKWLDf5cVI2R1lrPmsfOP9BXeHNLfq8QP_dS_e1oqHcll0d8UFyI88ljYcbM3BZoqGZvWG7nhgziP7brw8yr6PgFdJIIiJtDXUag87jBtu94ue0tIQ/s1600/virus-day.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6y2f_Ng2fokvIYgVRU3W_dh1bAAKWLDf5cVI2R1lrPmsfOP9BXeHNLfq8QP_dS_e1oqHcll0d8UFyI88ljYcbM3BZoqGZvWG7nhgziP7brw8yr6PgFdJIIiJtDXUag87jBtu94ue0tIQ/s1600/virus-day.jpg&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
With Valentine&#39;s Day approaching, many will be struck with the love bug. As romantic as that sounds, it&#39;s actually a bad thing. The&lt;i&gt; &quot;love bug&quot; &lt;/i&gt;is a computer virus.&lt;br /&gt;
&lt;br /&gt;
SophosLabs is warning users about a widespread worm posing as a Valentine&#39;s Day greeting that is spreading quickly.&amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Sophos reports the &lt;a href=&quot;http://www.sophos.com/virusinfo/analyses/w32drefab.html&quot;&gt;W32/Dref-AB worm&lt;/a&gt; started spreading via e-mail in many subject variations. Some of the ones spotted include: &quot;A Valentine Love Song,&quot; &quot;Be My Valentine,&quot; &quot;Fly Away Valentine,&quot; &quot;Happy Valentine&#39;s Day&quot; and &quot;The Valentine Love Bug.&quot; The worm is hidden in files that are attached to the e-mail. They&#39;re often called postcard.exe, greeting postcard.exe, greeting card.exe, or postcard.exe.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
The worm is designed to download a Trojan that will set up on the infected computer and leave it open to remote control. Hackers often do this to create zombie armies or botnets, which are then used to send out spam or even launch denial-of-service attacks.&amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The new Valentine attack is spreading hard and fast across the net. Be cautious and don&#39;t open any attachments in&amp;nbsp;suspicious&amp;nbsp;emails such as these. This is the one time you will &lt;b&gt;not &lt;/b&gt;want to get love sick on Valentine&#39;s Day!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: inherit; font-size: 13px; line-height: 20.796875px;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2013/01/dont-get-love-sick-on-valentines-day.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6y2f_Ng2fokvIYgVRU3W_dh1bAAKWLDf5cVI2R1lrPmsfOP9BXeHNLfq8QP_dS_e1oqHcll0d8UFyI88ljYcbM3BZoqGZvWG7nhgziP7brw8yr6PgFdJIIiJtDXUag87jBtu94ue0tIQ/s72-c/virus-day.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-1072985682141116555</guid><pubDate>Sun, 20 Jan 2013 18:01:00 +0000</pubDate><atom:updated>2013-01-20T12:01:57.753-06:00</atom:updated><title>How Does My Search Engine Know Me So Well?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2wi-YdrD-DB7Emx4p79pwBPYabIBSps5rKl3He60-8i6L6ASc7L375gDhrCEVcXqHL7Bo-Li3rTGOmkwonFiCuoObmGaobr5Y5eEZO95jzF8__pzZ11mJJ6NAQfbfuR8aoNpb8RVR6go/s1600/Search-Engine-Optimization.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;185&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2wi-YdrD-DB7Emx4p79pwBPYabIBSps5rKl3He60-8i6L6ASc7L375gDhrCEVcXqHL7Bo-Li3rTGOmkwonFiCuoObmGaobr5Y5eEZO95jzF8__pzZ11mJJ6NAQfbfuR8aoNpb8RVR6go/s200/Search-Engine-Optimization.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;How is it that Google knows where you live when you do a search for &quot;pizza&quot;? Or knows you just can&#39;t seem to get enough &lt;a href=&quot;https://www.pajamajeans.com/&quot; target=&quot;_blank&quot;&gt;PajamaJeans&lt;/a&gt;? Or why do those ads seem to be things I&#39;ve searched for before&lt;span style=&quot;font-size: small;&quot;&gt;?&lt;/span&gt; Well, it&#39;s time to expose the &lt;i&gt;&#39;wizard behind the curtain&#39;&lt;/i&gt; and explain how your search engine knows you so well.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Major search engines like Google, Yahoo, and Bing all strive to create a personalized user-experience when searching. Just like any other business, they want to please their customers. The way that they collect your personal data is broken down into 3 categories.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;


&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;Location&lt;/strong&gt;&lt;br /&gt;
Type “pizza” into Google; what does your results look like? Most likely the
 first results Google pulled are&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;pizza places near your town. National brands like Dominos and Papa John’s will usually appear at the top of the search. But how 
does Google know where you live? Easy, it uses the IP address from 
computer to determine your location. If using a smart phone, your GPS location is used. Google knows that when most people 
search for things like “pizza” or “dry cleaner” they are looking for 
local results, even if they didn’t search using localized keywords.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;Search History&lt;/strong&gt;&lt;br /&gt;
As referenced in my earlier article, &lt;a href=&quot;http://www.srichardsonhf233.blogspot.com/2012/11/spyware-protection-and-garden-gnomes.html&quot; target=&quot;_blank&quot;&gt;Spyware and Lawn Gnomes&lt;/a&gt;, what you do on the Internet is tracked for marketing purposes. They know 
where you’ve been, how you search, and what you look at online. It may sound a lot like &lt;i&gt;&#39;Big Brother&#39;&lt;/i&gt;, but knowing your search history means that Google, Yahoo,
 and Bing can deliver results that you are more likely to find useful 
and interesting.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;Social Media Information&lt;/strong&gt;&lt;br /&gt;
In 2011, Bing and Facebook teamed up to enhance Bing’s search results. The Bing-Facebook integration allowed users, 
who were signed into Facebook, to see what websites their social 
connections had Liked and Shared in Facebook. 
Some pages would actually rank better when a user was logged in to 
Facebook than they would normally, just because that person’s social 
network had &lt;i&gt;&#39;Liked&#39;&lt;/i&gt; it.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Google has created their version of the Like button with the +1 for &lt;a href=&quot;https://plus.google.com/&quot; target=&quot;_blank&quot;&gt;Google+&lt;/a&gt;. When a user is logged into their Google account, they can 
publicly +1 a webpage they like. The +1 will show up in their Google 
profile, and their profile image will be placed next to the +1 button.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Facebook has now decided to take on Google with their new search engine, &lt;a href=&quot;http://www.facebook.com/about/graphsearch&quot; target=&quot;_blank&quot;&gt;Facebook Graph Search&lt;/a&gt;. With Facebook Graph Search, the objects we search for aren’t Web pages, 
but instead virtual representations of real world objects: people, 
places and things. The connections are primarily Facebook Likes. Did 
such-and-such a person like a particular photo? A particular doctor? A 
particular restaurant? Those likes are the ties that bind the 
information in Facebook together. Although still in beta, it has taken social &lt;span style=&quot;font-size: small;&quot;&gt;trend data to a whole new level.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Ho&lt;span style=&quot;font-size: small;&quot;&gt;w to Get &lt;span style=&quot;font-size: small;&quot;&gt;Your Privacy &lt;span style=&quot;font-size: small;&quot;&gt;Back&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Perhaps you don&#39;t want your search history tracked&lt;span style=&quot;font-size: small;&quot;&gt;. There are options. CNET has a great article on opting-out from G&lt;span style=&quot;font-size: small;&quot;&gt;oogle tracking.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://howto.cnet.com/8301-11310_39-57368016-285/how-to-prevent-google-from-tracking-you/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;How to Prevent Google From T&lt;span style=&quot;font-size: small;&quot;&gt;racking You&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Reputation.com &lt;span style=&quot;font-size: small;&quot;&gt;also has a great article on &lt;span style=&quot;font-size: small;&quot;&gt;online privacy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.reputation.com/reputationwatch/articles/how-block-internet-ad-tracking-and-maintain-your-online-privacy&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Blocking Internet Ad Tracking and Maintaining Your Online Privacy&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Some might debate this technology is taking the &quot;fun&quot; out of searching &lt;span style=&quot;font-size: small;&quot;&gt;online&lt;span style=&quot;font-size: small;&quot;&gt; because it n&lt;span style=&quot;font-size: small;&quot;&gt;arrows the search results&lt;span style=&quot;font-size: small;&quot;&gt; drastically. In many ways &lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;choosing&lt;/span&gt; what you do an&lt;span style=&quot;font-size: small;&quot;&gt;d do not see. Others say&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;personalized search results provide more valuable information to users. &lt;span style=&quot;font-size: small;&quot;&gt;I&lt;/span&gt;t reduces the clutter and &lt;span style=&quot;font-size: small;&quot;&gt;focuses on what the user really wants. &lt;span style=&quot;font-size: small;&quot;&gt;Either way, it&#39;s all about &lt;b&gt;YOU&lt;/b&gt; now. What you want&lt;span style=&quot;font-size: small;&quot;&gt;, need, or will need. Now it&#39;s time for me to &lt;span style=&quot;font-size: small;&quot;&gt;continue my search for &lt;a href=&quot;http://thestir.cafemom.com/beauty_style/130319/finally_pajama_jeans_for_men&quot; target=&quot;_blank&quot;&gt;PajamaJeans for men&lt;/a&gt;!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All
 product and company names mentioned herein are for identification 
purposes only and are the property of, and may be trademarks of, their 
respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://srichardsonhf233.blogspot.com/2013/01/how-does-my-search-engine-know-me-so.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2wi-YdrD-DB7Emx4p79pwBPYabIBSps5rKl3He60-8i6L6ASc7L375gDhrCEVcXqHL7Bo-Li3rTGOmkwonFiCuoObmGaobr5Y5eEZO95jzF8__pzZ11mJJ6NAQfbfuR8aoNpb8RVR6go/s72-c/Search-Engine-Optimization.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-5939374338454507401</guid><pubDate>Fri, 04 Jan 2013 04:49:00 +0000</pubDate><atom:updated>2013-01-28T16:03:04.552-06:00</atom:updated><title>The Art of Creating Secure Passwords That You Can Remember</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-vFQQQtcUTbhtJZoZGLXvTlRLabsRNP3YoPXsSfdQZcw1rs371KqGvZJZn-7eR98jeZlVAVVEyKQWheQvWgPLCC0yP90EY4RwuciR2Pbs_zN5h7xub2TKAso-vj7Z2pFCkagZo7gKdj4/s1600/SecurePassword.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-vFQQQtcUTbhtJZoZGLXvTlRLabsRNP3YoPXsSfdQZcw1rs371KqGvZJZn-7eR98jeZlVAVVEyKQWheQvWgPLCC0yP90EY4RwuciR2Pbs_zN5h7xub2TKAso-vj7Z2pFCkagZo7gKdj4/s1600/SecurePassword.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; line-height: 21.983333587646484px;&quot;&gt;“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months” –&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;background-color: white; color: #666666; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; line-height: 21.983333587646484px; margin: 0px; padding: 0px;&quot;&gt;Clifford Stoll&lt;/strong&gt;&lt;/i&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Back in 2004, at the RSA&amp;nbsp;&lt;span style=&quot;background-color: white; color: #222222; line-height: 21px;&quot;&gt;Security Conference,&lt;/span&gt;&amp;nbsp;Bill Gates proclaimed the password is dead. His statement may have been premature but his assessment is accurate.&amp;nbsp;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;He told his audience that the password can&#39;t meet the challenge of keeping sensitive information protected, saying &quot;People use the same password on different systems, they write them down and they just don&#39;t meet the challenge for anything you really want to secure.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
The art of creating secure passwords can be quite easy. &amp;nbsp;Any sysadmin will tell you, the challenge comes in getting people to &lt;b&gt;use&lt;/b&gt; secure passwords. Even the most protected networks can be thwarted by someone using simplistic credentials. Put into proper perspective, the only barrier between you and your data, is your password. Isn&#39;t it worth the time to make sure it&#39;s secure?&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;line-height: 25.5px;&quot;&gt;Here are a few simple steps to make sure you&#39;re protected.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;background-color: white; box-sizing: border-box; color: #222222; line-height: 25.5px;&quot;&gt;Don&#39;t Use Personal Information -&amp;nbsp;&lt;/strong&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;&amp;nbsp;Any novice can easily figure out your full name, names of your spouse or children, your pet cat &quot;Mr. Whiskers&quot;, or your favorite sports teams. Never use a password that has anything associated to you.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;background-color: white; box-sizing: border-box; color: #222222; line-height: 25.5px;&quot;&gt;No Dictionary Words -&lt;/strong&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;&amp;nbsp;In addition to not using personal information, it&#39;s important not to use any words found in the dictionary. Passwords like that can be easily cracked by password software.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Mixed Characters&amp;nbsp;&lt;/strong&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;&lt;b&gt;-&lt;/b&gt;&lt;/span&gt;&amp;nbsp;Passwords are usually case-sensitive, so mix both upper and lower case letters to make it more difficult. Just capitalizing the first letter is not sufficient. For example, use &quot;paSswoRd&quot; to make it more complex. Better yet, throw in some numbers and special characters to substitute for letters, and do &quot;p@Ssw0Rd&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Don&#39;t Use the Same Password for Everything - &lt;/b&gt;It&#39;s common for most people to use the same password for all accounts. It does make it easier to remember. But what if your password was compromised? Then &lt;b&gt;ALL&lt;/b&gt; of your accounts would be vulnerable.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 25.5px;&quot;&gt;&lt;span style=&quot;line-height: 1.7em;&quot;&gt;&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Use a Passphrase -&amp;nbsp;&lt;/strong&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;T&lt;/span&gt;&lt;span style=&quot;line-height: 1.7em;&quot;&gt;ake your favorite line from a movie, song, or something memorable to you and convert it to a passphrase. &lt;i&gt;&quot;PinkFluffyBunny&quot;&lt;/i&gt; is a pretty cool passphrase but c&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; line-height: 1.7em;&quot;&gt;&lt;span style=&quot;line-height: 1.7em;&quot;&gt;&lt;span style=&quot;color: #333333; line-height: normal;&quot;&gt;onsider this better example: &lt;b&gt;##1PinkFluffyBUNNY##&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;color: #333333; line-height: normal; margin-bottom: 1em;&quot;&gt;
The above example has the following:&lt;/div&gt;
&lt;ul style=&quot;color: #333333; line-height: normal; list-style-type: disc; margin: 0px 0px 1em; padding-left: 10px;&quot;&gt;
&lt;li&gt;It meets common password strength criteria&amp;nbsp; to include upper and lowercase letters, a number and a symbol&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;color: #333333; line-height: normal; list-style-type: disc; margin: 0px 0px 1em; padding-left: 10px;&quot;&gt;
&lt;li&gt;It combines multiple words, numbers and symbols to create a unique phrase&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;color: #333333; line-height: normal; list-style-type: disc; margin: 0px 0px 1em; padding-left: 10px;&quot;&gt;
&lt;li&gt;It is memorable for the user&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong style=&quot;background-color: white; box-sizing: border-box; color: #222222; font-family: inherit; line-height: 1.7em;&quot;&gt;Use a Password Management Tool -&lt;/strong&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: inherit; line-height: 1.7em;&quot;&gt;&amp;nbsp;Use a password management tool to store complex passwords. This enables you to use stronger passwords for various web sites, accounts, and applications without having to remember them all.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; line-height: 27.200000762939453px;&quot;&gt;&lt;span style=&quot;color: #222222;&quot;&gt;Windows has included a &lt;/span&gt;&lt;a href=&quot;http://windows.microsoft.com/is-IS/windows7/What-is-Credential-Manager&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Credential Manager&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #222222;&quot;&gt; utility since Windows XP that lets users save passwords and provides a single sign-on solution. Logging in to Windows unlocks the vault and automatically applies the credentials from the vault as needed to access sites and applications.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #333333; margin-bottom: 1em;&quot;&gt;
&lt;strong&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The Time is Now&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; margin-bottom: 1em;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;The sheer volume of attacks proliferating the Internet and business headlines should be a wake-up call to anyone using a weak password. Now is the time to practice vigilance, both professionally and personally, to secure your accounts.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;line-height: 27.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em style=&quot;border: 0px; color: #333333; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;line-height: 27.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;line-height: 27.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2013/01/the-art-of-creating-secure-passwords.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-vFQQQtcUTbhtJZoZGLXvTlRLabsRNP3YoPXsSfdQZcw1rs371KqGvZJZn-7eR98jeZlVAVVEyKQWheQvWgPLCC0yP90EY4RwuciR2Pbs_zN5h7xub2TKAso-vj7Z2pFCkagZo7gKdj4/s72-c/SecurePassword.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-8245463634018430219</guid><pubDate>Sun, 30 Dec 2012 05:26:00 +0000</pubDate><atom:updated>2012-12-29T23:52:29.359-06:00</atom:updated><title>Free Programs to Ensure Computer Nirvana</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhptvsd-a89mAIJ2wSxP_ISf20Gk2KoCQJSyFy8hNX6jwXGwVaAOxNnK_fC9Q0-FSoWc84pOWRJRMtqGkfjkSyaUQQUPOzotm67DV6t2bM5HYglE6Hdtu4PipNdHZK5RqANFhJwnURGIHU/s1600/free.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhptvsd-a89mAIJ2wSxP_ISf20Gk2KoCQJSyFy8hNX6jwXGwVaAOxNnK_fC9Q0-FSoWc84pOWRJRMtqGkfjkSyaUQQUPOzotm67DV6t2bM5HYglE6Hdtu4PipNdHZK5RqANFhJwnURGIHU/s1600/free.jpg&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
We have all heard the expression &quot;nothing in this world is free&quot;, but cyberspace can be the exception.&amp;nbsp;&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;And while these offerings might not be as feature-rich as their paid counterparts, you might just be surprised at the scope and quality of the selection that’s out there today. So it&#39;s time to put away your wallet and take advantage of &lt;i&gt;free&lt;/i&gt; advice on getting these freebies!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;line-height: 15px;&quot;&gt;Before I get into this list, I want to mention one important thing. Many new computers come pre-loaded with lots of software. Usually some type of anti-virus program is included. What many fail to realize is that it&#39;s all trial software. I have many clients bring their systems to me infected with viruses, all because they didn&#39;t know their trial expired. This leads to my first category . . .&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h3&gt;
&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;b&gt;&lt;u&gt;Anti-Virus&amp;nbsp;Programs&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVXyhygnQHKBB_STvkXJH4rMuUiaYz_xc3zcfXAudLdKXYM1Ep6zgDLn3Cjs52ajso_hpbSgnnycBC1F4XQ43oYkA5d0Px4x_6PnjM-hzthaaYi0YikUJJ4OIetot9lVAjeHZyAsXpKhU/s1600/AVG-Antivirus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVXyhygnQHKBB_STvkXJH4rMuUiaYz_xc3zcfXAudLdKXYM1Ep6zgDLn3Cjs52ajso_hpbSgnnycBC1F4XQ43oYkA5d0Px4x_6PnjM-hzthaaYi0YikUJJ4OIetot9lVAjeHZyAsXpKhU/s1600/AVG-Antivirus.jpg&quot; height=&quot;200&quot; width=&quot;146&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;a href=&quot;http://download.cnet.com/AVG-AntiVirus-Free-2013/3000-2239_4-10320142.html?part=dl-avg_free_us&amp;amp;subj=dl&amp;amp;tag=button&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;AVG Free 2013&lt;/span&gt;&lt;/a&gt; has just been optimized for Microsoft Windows 8.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;AVG delivers security features usually only found in paid-for products.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;AVG also goes beyond detecting and removing viruses on your PC. Its &#39;AVG Do Not Track&#39; feature gives you control over which websites can collect and use your data (available if you take AVG Security Toolbar as part of your installation). This feature joins Anti-Spyware and WiFi hacker-defeating technology to deliver powerful personal protection at home or on the move.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbTAqO9w_GcjoreXHAEbKU1fdo5nIa9F5harw6DLwMizWpQxAhGZx2MZPe3x9ZVlTEj1PubFWzReduAEu_-k2q3iHlHh-cMHDbGt5zL_R40XruDa8PE6yh-SKf2fvqFuS57ch7Hr7T_vQ/s1600/Avast-.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbTAqO9w_GcjoreXHAEbKU1fdo5nIa9F5harw6DLwMizWpQxAhGZx2MZPe3x9ZVlTEj1PubFWzReduAEu_-k2q3iHlHh-cMHDbGt5zL_R40XruDa8PE6yh-SKf2fvqFuS57ch7Hr7T_vQ/s1600/Avast-.png&quot; height=&quot;163&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://download.cnet.com/Avast-Free-Antivirus/3000-2239_4-10019223.html?tag=main;pop&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Avast Free Antivirus&lt;/span&gt;&lt;/a&gt; is a full-featured product, with the same anti-virus and anti-spyware scanning engine used in their premium products.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The free version of Avast has arguably the most comprehensive set of freely available security features on the market. There&#39;s a reason these guys have more than 150 million active users (at the time this article was written).&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;u&gt;Anti-Malware Program&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl8n6UUaWM8rJhQbcN9BTletqI_8f3BAld-Og_Alw4in4MvLJ0ubFT5cyvdL3uJmjpxaxE1GXke3YuwyAOoyv7A6byYcC-Hhp1KjGCB8PLiUOiBhyphenhyphenpB3IEWixL9IgoUUuT3FC6QkP9hOs/s1600/malwarebytes.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl8n6UUaWM8rJhQbcN9BTletqI_8f3BAld-Og_Alw4in4MvLJ0ubFT5cyvdL3uJmjpxaxE1GXke3YuwyAOoyv7A6byYcC-Hhp1KjGCB8PLiUOiBhyphenhyphenpB3IEWixL9IgoUUuT3FC6QkP9hOs/s1600/malwarebytes.png&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?tag=main;pop&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Malwarebytes Anti-Malware&lt;/span&gt;&lt;/a&gt; combines powerful new technologies designed to seek out, destroy, and prevent malware infections.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Malwarebytes is an easy-to-use anti-malware application available in both a Free and PRO version. This free version is well-known for its detection and removal capabilities. You might recall my blog&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20.78333282470703px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://srichardsonhf233.blogspot.com/2012/11/spyware-protection-and-garden-gnomes.html&quot; style=&quot;color: blue; font-weight: bold;&quot; target=&quot;_blank&quot;&gt;Spyware Protection and Garden Gnomes&lt;/a&gt;,&lt;span style=&quot;color: blue; font-weight: bold;&quot;&gt;&amp;nbsp;&lt;/span&gt;which references this program. When installing, make sure to uncheck the &#39;trial&#39; of the PRO software unless you want to try it out.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20.78333282470703px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20.78333282470703px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
&lt;span style=&quot;line-height: 20.766666412353516px;&quot;&gt;&lt;b&gt;&lt;u&gt;Performance Boosting Utility&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0lIMUky1FTCqLIdQ65KLW-VEj_-1iRxo6jSYUYvth6UCNGLGRon9ih2fpUdZ9yRy7xk69zEALEQnI4oFtbqIln6Bqn8FbjNUullHaxaT9ic4pyzh0s45a3VsTpRPqf1MmAzXES7UNyUk/s1600/ASC-Ultimate-icon.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0lIMUky1FTCqLIdQ65KLW-VEj_-1iRxo6jSYUYvth6UCNGLGRon9ih2fpUdZ9yRy7xk69zEALEQnI4oFtbqIln6Bqn8FbjNUullHaxaT9ic4pyzh0s45a3VsTpRPqf1MmAzXES7UNyUk/s1600/ASC-Ultimate-icon.jpg&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://download.cnet.com/Advanced-SystemCare/3000-2086_4-10407614.html?tag=main;pop&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Advanced SystemCare Free&lt;/span&gt;&lt;/a&gt; is a comprehensive PC care utility that takes a one-click approach to help protect, repair and optimize your computer.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This software utility focuses on the performance of your PC. It helps to repair your registry and clean up what most programs fail to find.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;It also repairs the parts that are missing and makes the PC complete to run&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;optimally.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;&lt;b&gt;&lt;u&gt;Bringing It All Together&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Just by utilizing these free resources, you can ensure your computer performs at its best. I personally use these programs to not only protect my own systems, but to also clean up the infections of my client&#39;s computers.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Not only will you save money by taking advantage of these programs, you will save even more from unnecessary computer repairs. To add another layer of protection, see my article on&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://srichardsonhf233.blogspot.com/2012/11/dont-let-your-data-be-next-tragic-love.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;Don&#39;t Let Your Data be the Next Tragic Love Story&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: inherit; font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 15px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;iframe bordercolor=&quot;#000000&quot; frameborder=&quot;0&quot; height=&quot;150&quot; hspace=&quot;0&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://ad.doubleclick.net/adi/N7433.148119.BLOGGEREN/B6631428.120977;sz=180x150;ord=[timestamp]?;lid=41000613802464048;pid=23178927;usg=AFHzDLs01aTl53cfkW9tRdcbCKYqBMdQ0Q;adurl=http%253A%252F%252Fwww.officemax.com%252Ftechnology%252Fcomputers%252Fdesktop-computers%252Fproduct-prod3610124%253Fcm_mmc%253DPerformics-_-Technology-_-Computers-_-Desktop%252520Computers%2526ci_src%253D14110944%2526ci_sku%253D23178927;pubid=606581;price=%24529.88;title=HP+Touchsmart+All-in-O...;merc=OfficeMax;imgsrc=http%3A%2F%2Fwww.officemax.com%2Fcatalog%2Fimages%2F397x353%2F23178927i_01.jpg;width=95;height=85&quot; vspace=&quot;0&quot; width=&quot;180&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 20.766666412353516px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 20.766666412353516px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 20.766666412353516px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://srichardsonhf233.blogspot.com/2012/12/free-programs-to-ensure-computer-nirvana.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhptvsd-a89mAIJ2wSxP_ISf20Gk2KoCQJSyFy8hNX6jwXGwVaAOxNnK_fC9Q0-FSoWc84pOWRJRMtqGkfjkSyaUQQUPOzotm67DV6t2bM5HYglE6Hdtu4PipNdHZK5RqANFhJwnURGIHU/s72-c/free.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-173734270861618437</guid><pubDate>Tue, 18 Dec 2012 22:46:00 +0000</pubDate><atom:updated>2012-12-19T15:22:52.637-06:00</atom:updated><title>Coursera: How to Take Ivy League Classes for Free</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinPa_cGa_BS6ERk5LnSz9kEFNpoGjJHKrYRDHg38dxmSuzhhx3PYWaRrdF3ERQQ2g8YETtfKj1x18bQOSuKhXNDgVjjrufiByFwLg55NIr-Kwj-x4O8evKj1KMsefSuLNmxZ8vhxSaYDY/s1600/onlinelearning.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinPa_cGa_BS6ERk5LnSz9kEFNpoGjJHKrYRDHg38dxmSuzhhx3PYWaRrdF3ERQQ2g8YETtfKj1x18bQOSuKhXNDgVjjrufiByFwLg55NIr-Kwj-x4O8evKj1KMsefSuLNmxZ8vhxSaYDY/s1600/onlinelearning.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
How often do we find ourselves needing to further our education? Whether it&#39;s to expand our job skills or broaden our mind, finding a good educational resource is difficult. There is a multitude of choices and the costs can be astronomical!&lt;br /&gt;
&lt;br /&gt;
What if I told you there was a way to take online courses from &lt;a href=&quot;http://www.stanford.edu/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Stanford&lt;/span&gt;&lt;/a&gt;, &lt;a href=&quot;http://www.princeton.edu/main/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Princeton&lt;/span&gt;&lt;/a&gt;, &lt;a href=&quot;http://www.brown.edu/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Brown&lt;/span&gt;&lt;/a&gt;, or 33 other&amp;nbsp;universities&amp;nbsp;for FREE? Yes, FREE! Lucky for you it won&#39;t take hacking the admissions site or forging your transcripts to make this happen. All it takes is a site called &lt;a href=&quot;https://www.coursera.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Coursera&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;Stanford professors Daphne Koller and Andrew Ng launched&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.coursera.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Coursera&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;&amp;nbsp;earlier this year to provide&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;a platform to host courses, via the Web, for an elite education for free. With over 200 courses being offered, from 33 prestigious universities, they have already reached over 1.3 million students.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;Will this bolster your job resume? Absolutely! Many have reported that completion of these courses has opened up more job opportunities. And employers are starting to watch for students completing some of these courses. Coursera is even exploring career placement opportunities to further help students.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;Will it enhance your degree? Not exactly. The courses being offered currently are not&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;accredited but that is also in future development. With accreditation, surely there will be some type of cost structure put in place. Nothing has been formally announced as of yet.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPj6qMcNYCcZgShrhOkvJ5hDkIcNqPDeLDtTcXYWovlujJSEh-XFXO5H_FWlxEeZhSJG9-2YV63D43Tn8aPelDX97EJtuYphp1iU-PL8mca6T8bcOS6DgZ2HNI4dnV_TIv-C4-6ou2DFM/s1600/sweater.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPj6qMcNYCcZgShrhOkvJ5hDkIcNqPDeLDtTcXYWovlujJSEh-XFXO5H_FWlxEeZhSJG9-2YV63D43Tn8aPelDX97EJtuYphp1iU-PL8mca6T8bcOS6DgZ2HNI4dnV_TIv-C4-6ou2DFM/s1600/sweater.jpg&quot; height=&quot;200&quot; width=&quot;117&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;You won&#39;t exactly get your letterman&#39;s sweater from your favorite Ivy league school, but you &lt;i&gt;can&lt;/i&gt; get the bragging rights to say you took &lt;a href=&quot;https://www.coursera.org/course/crypto&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Cryptography&lt;/span&gt;&lt;/a&gt; from Stanford University!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVV_KLPBEaileCtuCtDxDtGONPHMIJH2HmQDJ_i0BaDXPQlYxlL_T8lNZtqrQOUMTfFSCqq9MAjmTydtcEuKlZZhtUpG0i8fCutr5Ob3uv7fGbn0R9DOJii7WjcaDLQ7Zfpd7BCbVraMA/s1600/coursera-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVV_KLPBEaileCtuCtDxDtGONPHMIJH2HmQDJ_i0BaDXPQlYxlL_T8lNZtqrQOUMTfFSCqq9MAjmTydtcEuKlZZhtUpG0i8fCutr5Ob3uv7fGbn0R9DOJii7WjcaDLQ7Zfpd7BCbVraMA/s1600/coursera-logo.jpg&quot; height=&quot;150&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://srichardsonhf233.blogspot.com/2012/12/coursera-how-to-join-ivy-league-for-free.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinPa_cGa_BS6ERk5LnSz9kEFNpoGjJHKrYRDHg38dxmSuzhhx3PYWaRrdF3ERQQ2g8YETtfKj1x18bQOSuKhXNDgVjjrufiByFwLg55NIr-Kwj-x4O8evKj1KMsefSuLNmxZ8vhxSaYDY/s72-c/onlinelearning.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-2737978619830398507</guid><pubDate>Sun, 09 Dec 2012 07:30:00 +0000</pubDate><atom:updated>2012-12-19T15:22:43.990-06:00</atom:updated><title>Computer Shopping Tips</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh61Owd3EVg9p_d0YoOGNEmghPVs5b6vLthIlBmMQQHLf7vCN4AcMU1c-OoE-VB2Fn9wsISrHFSfzpTBY9flFJ7DZOticDMNn1-MA1x0QbUg4RC8u6SM2Em1Z1QWhofMYaAfsC20SIiito/s1600/cshopping.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh61Owd3EVg9p_d0YoOGNEmghPVs5b6vLthIlBmMQQHLf7vCN4AcMU1c-OoE-VB2Fn9wsISrHFSfzpTBY9flFJ7DZOticDMNn1-MA1x0QbUg4RC8u6SM2Em1Z1QWhofMYaAfsC20SIiito/s1600/cshopping.jpg&quot; height=&quot;228&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Shopping for a computer can be a daunting experience. Trying to understand what all the specifications mean is like trying to learn another language. Well, until&amp;nbsp;&lt;em style=&quot;background-color: white; font-family: arial, sans-serif; font-size: small; font-style: normal; font-weight: bold; line-height: 16px;&quot;&gt;Rosetta Stone&lt;/em&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;&quot;&gt;®&lt;/span&gt;&amp;nbsp;figures out a way to teach &lt;i&gt;computer lingo&lt;/i&gt;, I am going to simplify the process for you.&lt;br /&gt;
&lt;br /&gt;
Finding the right computer can be a very rewarding experience. But that doesn&#39;t come without some basic understanding of what the features mean and how they apply to your needs.&lt;br /&gt;
&lt;br /&gt;
So go grab your favorite pocket protector and beanie hat. It&#39;s time to learn a little &lt;i&gt;computer geek lingo&lt;/i&gt; with my article on:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;&lt;a href=&quot;http://www.sbtechrepair.com/articles/cst.html&quot; target=&quot;_blank&quot;&gt;Computer Shopping Tips&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;/h3&gt;
&lt;div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;
&lt;em style=&quot;border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2012/12/computer-shopping-tips.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh61Owd3EVg9p_d0YoOGNEmghPVs5b6vLthIlBmMQQHLf7vCN4AcMU1c-OoE-VB2Fn9wsISrHFSfzpTBY9flFJ7DZOticDMNn1-MA1x0QbUg4RC8u6SM2Em1Z1QWhofMYaAfsC20SIiito/s72-c/cshopping.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-6560746957165203464</guid><pubDate>Sat, 01 Dec 2012 05:37:00 +0000</pubDate><atom:updated>2012-12-19T15:22:32.887-06:00</atom:updated><title>Facebook Fake-out: Exposing the Hoaxes</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNiBtPu8SXowhGvbH92bj5spnJG4ht4vlbbiBa9PxlA-zWVuASvm_nqMeLJHwVf55pdATeRbFaN-SsT_5RjrImo9E4jQqiOy2_odzrwwyClpwySwpfPWCuJcQUoWDK4PR-2QXmZRPs12U/s1600/facebook-hoax.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNiBtPu8SXowhGvbH92bj5spnJG4ht4vlbbiBa9PxlA-zWVuASvm_nqMeLJHwVf55pdATeRbFaN-SsT_5RjrImo9E4jQqiOy2_odzrwwyClpwySwpfPWCuJcQUoWDK4PR-2QXmZRPs12U/s1600/facebook-hoax.png&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Everyone has fallen for some sort of Internet hoax at one point, and there are plenty to fall for. &lt;a href=&quot;http://www.facebook.com/&quot; target=&quot;_blank&quot;&gt;Facebook&lt;/a&gt; is the perfect platform for spreading untruths, misinformation, rumors, and propaganda.&lt;br /&gt;
&lt;br /&gt;
So how does one tackle this plethora of false&amp;nbsp;rumors? The good news is that it won&#39;t require a digital CSI lab to investigate these mysteries. Let&#39;s debunk a few of the most popular hoaxes spreading now, and then I will give you the tools to be your very own Hoax-Buster!&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;u&gt;Facebook Copyright Notice &lt;span style=&quot;color: red;&quot;&gt;Hoax&lt;/span&gt;&lt;/u&gt;&lt;/h4&gt;
&lt;div&gt;
Posts are circulating lately that implore Facebook users to protect their information.&amp;nbsp;The post states that copying and pasting the message protects the user&#39;s information under &quot;copyright laws&quot;. As much as I would love to flex a little free legal muscle, this is a complete hoax. &lt;a href=&quot;http://www.facebook.com/legal/terms&quot; style=&quot;background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-bottom-width: 0px; border-top-color: rgb(255, 255, 255); border-top-style: solid; border-top-width: 0px; color: #44aadd; display: inline; font-family: Helvetica; font-size: 14px; padding: 0px; text-align: right; text-decoration: initial; width: auto;&quot; target=&quot;_blank&quot;&gt;Facebook Statement of Rights and Responsibilities&lt;/a&gt;&amp;nbsp;is what governs how your info is used. You agreed to that when you signed up. No post on your wall can change that. Not all is lost. Facebook users who post original content onto Facebook are still the copyright holders of that information.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHdixCAFbp2kOVhiJjGTQN-HE7bfF2iqwUzVzQBmENJD_vuP77GyDH3j8xqKo2IHfc1fHj9_ReZcUFZXO9aPKUtDBr6aw19NdEE27KUJD7Io2u_oqaHg_I5jZHrX5ify75sXnUqUvw8VY/s1600/fb-copyright.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHdixCAFbp2kOVhiJjGTQN-HE7bfF2iqwUzVzQBmENJD_vuP77GyDH3j8xqKo2IHfc1fHj9_ReZcUFZXO9aPKUtDBr6aw19NdEE27KUJD7Io2u_oqaHg_I5jZHrX5ify75sXnUqUvw8VY/s1600/fb-copyright.jpg&quot; height=&quot;320&quot; width=&quot;297&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;u&gt;Exhibit B-5: Girl Dies from a Prank Gone Wrong Video &lt;span style=&quot;color: red;&quot;&gt;Hoax&lt;/span&gt;&lt;/u&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Helvetica; font-size: 14px; text-align: justify;&quot;&gt;This video shows a man in a mask jump out in order to scare a poor, unsuspecting woman. In a frenzied panic, the woman runs into the street only to be fatally struck by a car.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;font-family: Helvetica; font-size: 14px; text-align: justify;&quot; /&gt;
&lt;span style=&quot;font-family: Helvetica; font-size: 14px; text-align: justify;&quot;&gt;I will admit, I was completely fooled by this one. It is very convincing. However, the video is staged, and all the people featured in the video are actors.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;font-family: Helvetica; font-size: 14px; text-align: justify;&quot; /&gt;
&lt;span style=&quot;font-family: Helvetica; font-size: 14px; text-align: justify;&quot;&gt;A Facebook page belonging to Cindy Vela, who played the &quot;tragically killed&quot; girl in the video, can be&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.facebook.com/media/set/?set=a.424811197634.219538.49938117634&quot; style=&quot;background-color: white; border-bottom-color: rgb(255, 255, 255); border-bottom-style: solid; border-bottom-width: 0px; border-top-color: rgb(255, 255, 255); border-top-style: solid; border-top-width: 0px; display: inline; font-family: Helvetica; font-size: 14px; padding: 0px; text-align: right; text-decoration: initial; width: auto;&quot; target=&quot;_blank&quot;&gt;seen here&lt;/a&gt;,&lt;span style=&quot;font-family: Helvetica; font-size: 14px; text-align: justify;&quot;&gt;&amp;nbsp;which&amp;nbsp;includes information about the video.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM_XeUUfstgpjmhFl1GCfprCwMcdN4SEB3jSTF8AlRkD5joPh3oP1xsLAxelOLjG7pi64H0_5q9uI6mKU2yQf_HO6bcXEx3NWQkZaExnAMnCNdwatxqUyFu2HtkfYdPNaIYsN_v6aFYCw/s1600/fbprank.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM_XeUUfstgpjmhFl1GCfprCwMcdN4SEB3jSTF8AlRkD5joPh3oP1xsLAxelOLjG7pi64H0_5q9uI6mKU2yQf_HO6bcXEx3NWQkZaExnAMnCNdwatxqUyFu2HtkfYdPNaIYsN_v6aFYCw/s1600/fbprank.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;u&gt;Facebook to Start Charging Fees &lt;span style=&quot;color: red;&quot;&gt;Hoax&lt;/span&gt;&lt;/u&gt;&lt;/h4&gt;
It appears you just can’t make a good hoax go away. Repeatedly, spammers and uninformed users are spreading the falsehood that Facebook intends to start charging.&amp;nbsp;These rumors circulate every time Facebook makes a significant change. The next time you see this post, keep this in mind; Facebook generated $4.27 billion in revenue last year, 89 percent of which came from advertising. Do you really think they need to charge?&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwJuyubk14Lhb3ww4PHaAHa5OeTdKXFp-pj9xVhRjLPXVPhJ-FZ1mAir78fZK8KouLWZxYxzUvP3K2IyELno4g4W7bGmZucekbmdRDut2LWaJmCSdYBOFZ-mldCbduiAlTvVe3Ap1RcZ0/s1600/FB-Charge.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwJuyubk14Lhb3ww4PHaAHa5OeTdKXFp-pj9xVhRjLPXVPhJ-FZ1mAir78fZK8KouLWZxYxzUvP3K2IyELno4g4W7bGmZucekbmdRDut2LWaJmCSdYBOFZ-mldCbduiAlTvVe3Ap1RcZ0/s1600/FB-Charge.jpg&quot; height=&quot;103&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;u&gt;See Who&#39;s Viewing/Stalking Your Profile &lt;span style=&quot;color: red;&quot;&gt;Hoax&lt;/span&gt;&lt;/u&gt;&lt;/h4&gt;
One of the most popular scams on Facebook includes applications made so that you can see who has blocked or viewed your profile. Facebook prohibits these activities. As such, all of these applications are phony. Many contain viruses and other malware, so beware!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVoeJ3QNjZQvqhOwpfEJDmduF_iO0jrDG02ddZ_coojQSGvdbqjO9KRKCzhyZmg6EvOzeK4UsmjtDm4V2M3vb3Q2ZjT74biSO6ytyA4EuV1rje_xqaZnRaOv6kyLsC7VbBn2SrwL1fzhw/s1600/see-who-viewed-profile.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVoeJ3QNjZQvqhOwpfEJDmduF_iO0jrDG02ddZ_coojQSGvdbqjO9KRKCzhyZmg6EvOzeK4UsmjtDm4V2M3vb3Q2ZjT74biSO6ytyA4EuV1rje_xqaZnRaOv6kyLsC7VbBn2SrwL1fzhw/s1600/see-who-viewed-profile.jpg&quot; height=&quot;255&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;h4&gt;
&lt;u&gt;Time to Load your Hoax Busting Arsenal&lt;/u&gt;&lt;/h4&gt;
&lt;div&gt;
Separating the fact from fiction is much easier than you think. It takes only a few minutes to do your research. Here are a few sites to aid in your crusade.&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://snopes.com/&quot; target=&quot;_blank&quot;&gt;Snopes.com&lt;/a&gt;&amp;nbsp;- This site is great for hoax-busting! Paste the information you want to check into the search box to see the results.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.facebook.com/help/344403945636114/&quot; target=&quot;_blank&quot;&gt;Facebook&lt;/a&gt;&amp;nbsp;- The Facebook help center is the place to debunk the latest scams.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.hoaxbusters.org/&quot; target=&quot;_blank&quot;&gt;HoaxBusters.org&lt;/a&gt;&amp;nbsp;- A good site with an index of known Internet hoaxes.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.hoax-slayer.com/&quot; target=&quot;_blank&quot;&gt;Hoax-Slayer.com&lt;/a&gt;&amp;nbsp;- This is a hoax research site that has been around since 2003. He also has a&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/pages/Hoax-Slayer/69502133435?ref=nf&quot; target=&quot;_blank&quot;&gt;Hoax-Slayer Facebook page&lt;/a&gt; and newsletter.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://google.com/&quot; target=&quot;_blank&quot;&gt;Google.com&lt;/a&gt;&amp;nbsp;- There are an army of sites checking hoaxes daily. Use Google to do a quick search to validate your suspicions.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Now you are a hoax-busting vigilante! Wear your badge with honor. Spread the word, too. Your friends will thank you for keeping the egg off their faces.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em style=&quot;background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em style=&quot;background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em style=&quot;background-color: white; border: 0px; font-family: Helvetica, Arial, sans-serif; font-size: 12px; line-height: 20px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Arial, serif; font-size: 13px; line-height: 20.766666412353516px;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2012/11/facebook-fake-out-exposing-hoaxes.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNiBtPu8SXowhGvbH92bj5spnJG4ht4vlbbiBa9PxlA-zWVuASvm_nqMeLJHwVf55pdATeRbFaN-SsT_5RjrImo9E4jQqiOy2_odzrwwyClpwySwpfPWCuJcQUoWDK4PR-2QXmZRPs12U/s72-c/facebook-hoax.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-2958821628387568278</guid><pubDate>Wed, 21 Nov 2012 18:57:00 +0000</pubDate><atom:updated>2012-12-19T15:22:19.386-06:00</atom:updated><title>10 Tips for Shopping Safely Online</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuLpNvmh0XJOVkYLWAinsS40AZS6GZNYPO7cocmXXyqzda6Rh7A7pRjjIEucX8l0jhAUK4XTyjXI7Xu4lpCCybotxIRUkWzVQqoiR1CqPC7Wyl5niwEctHWO069JwaaEEWOcx5YFUaVIA/s1600/awsecurity1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuLpNvmh0XJOVkYLWAinsS40AZS6GZNYPO7cocmXXyqzda6Rh7A7pRjjIEucX8l0jhAUK4XTyjXI7Xu4lpCCybotxIRUkWzVQqoiR1CqPC7Wyl5niwEctHWO069JwaaEEWOcx5YFUaVIA/s1600/awsecurity1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The holiday shopping season is upon us, and if you&#39;re like me, you will do most of your shopping online to avoid frantic crowds. Online shopping is a great way to snag major deals, but you want to do it with minimal risk. Finding that&lt;i&gt; &quot;Zombie Ninja that shoots lasers from his eyes&quot;&lt;/i&gt; toy for little Johnny is hard enough without dealing with the nightmare of identity theft. Here are 10 tips to ensure you have a happy holiday shopping experience.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. &lt;u&gt;Make Sure the Site is Encrypted&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
When checking out or inputting any personal information, make sure the web address has an &quot;HTTPS&quot;. HTTPS verifies that your connection is encrypted and safe to input personal data. In most cases you will also see a &lt;i&gt;padlock&lt;/i&gt; icon next to the web address. This also signifies the site is encrypted and will also provide certificate information about the seller.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipVzGSDfvogMqatOULucTXLSUH4HgeUMI2s4rbEt1x2pUcTFJQV0Kr5c0B5oW3gpqNn65EuQZoK_W31ROrK-_4iX21pcEubAkkEBLEdpOXTAw0nP_PPO6rXoZw5zlKhAAMMnJwffRLyls/s1600/secure-small.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipVzGSDfvogMqatOULucTXLSUH4HgeUMI2s4rbEt1x2pUcTFJQV0Kr5c0B5oW3gpqNn65EuQZoK_W31ROrK-_4iX21pcEubAkkEBLEdpOXTAw0nP_PPO6rXoZw5zlKhAAMMnJwffRLyls/s1600/secure-small.png&quot; height=&quot;134&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. &lt;u&gt;Try to Use Familiar Sites&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
There are tons of sites all fighting for your business but keep in mind &lt;i&gt;cheaper&lt;/i&gt; is not always &lt;i&gt;better&lt;/i&gt;. Try to stick to sites you know. The big online retailers will usually provide better security and services as compared to some of the cheaper&amp;nbsp;sites. Plus you want a company you can depend on if you have to return or exchange an item.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. &lt;u&gt;Make Sure Your Anti-Virus is Updated&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Remember my blog on&amp;nbsp;&lt;b&gt;&lt;a href=&quot;http://srichardsonhf233.blogspot.com/2012/11/spyware-protection-and-garden-gnomes.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Spyware Protection and Garden Gnomes&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;? Well this is a perfect example of when to take those safe guards. Updating your anti-virus and malware protection programs will ensure you are only buying gifts, not receiving one from a hacker!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. &lt;u&gt;Use Strong Passwords&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Most online retailers will require you to create an account before making your purchase. Make sure to use strong and unique passwords for each site. This will maximize the security of your data now and for future purchases.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. &lt;u&gt;Never Give Out Your Social Security Number or Birthday&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;NEVER&lt;/b&gt; give any retailer your social security number! No reputable retailer would ever ask you for this information. Although many sites ask for your date of birth for trend data, it should not be a requirement. You want to avoid matching your social with your birthday. This gives a thief exactly what they need to steal your identity!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6. &lt;u&gt;Check Seller Ratings&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Most retailers have some type of rating posted on their site and the items you are looking to buy. Look for customer satisfaction comments. This will give you an idea of what to expect when you place your order.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;7. &lt;u&gt;Avoid Using Public Computers&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Using publicly accessible computers to do your shopping comes with many risks. What sites you visit and the data you entered is cached in the system. You may not have the ability to clear the cache yourself so that leaves you vulnerable.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;8. &lt;u&gt;Check Your Credit Card Statements&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Just as an extra precaution, it&#39;s a good idea to watch your statements closely for any suspicious activity. If possible, monitor them online so you can act quickly. In most cases, you have 30 days to notify your card company of&amp;nbsp;fraudulent&amp;nbsp;charges.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;9. &lt;u&gt;Avoid Gift Card Scams&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
It&#39;s no secret gift cards are the most purchased item this time of year. Many auction sites have people selling gift cards at a discount. Be cautious with such offers. Many people have been scammed with cards that are already used or have small balances on them.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;10.&amp;nbsp;&lt;u&gt;Know Where to Go if You Think You&#39;ve Been Scammed&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
If you find yourself in a circumstance where you have been scammed, you need to know where to go. Here is a small list of resources. Your bank or card issuer will also work with you to get your situation resolved.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.ic3.gov/default.aspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Internet Crime Complaint Center&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.crime-research.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Computer Crime Research Center&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.cybercrime.gov/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;CCIPS&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Shopping online can be a great and rewarding experience. Use these tips to safely get the bargains, not more than what you bargained for!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, serif; font-size: 13px; line-height: 20.78333282470703px;&quot;&gt;Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://srichardsonhf233.blogspot.com/2012/11/10-tips-for-shopping-safely-online.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuLpNvmh0XJOVkYLWAinsS40AZS6GZNYPO7cocmXXyqzda6Rh7A7pRjjIEucX8l0jhAUK4XTyjXI7Xu4lpCCybotxIRUkWzVQqoiR1CqPC7Wyl5niwEctHWO069JwaaEEWOcx5YFUaVIA/s72-c/awsecurity1.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-7351258713744245544</guid><pubDate>Sun, 18 Nov 2012 20:21:00 +0000</pubDate><atom:updated>2012-12-19T15:21:22.216-06:00</atom:updated><title>Don&#39;t Let Your Data be the Next Tragic Love Story</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7vfjpK4lzd6wLZCJG55QZ0YJaCkyJcVmqGVc0M-7ou4PYiulZyzEUirx2-3ZKWTKFSNA5m6_FkO7zC1Yiv1OPbm2sDwsIAgK8PTIynGPeKV-_6MQOpPofQPePeBHqT7gA541bAeQGkng/s1600/cryingwoman.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7vfjpK4lzd6wLZCJG55QZ0YJaCkyJcVmqGVc0M-7ou4PYiulZyzEUirx2-3ZKWTKFSNA5m6_FkO7zC1Yiv1OPbm2sDwsIAgK8PTIynGPeKV-_6MQOpPofQPePeBHqT7gA541bAeQGkng/s1600/cryingwoman.jpg&quot; height=&quot;211&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
It&#39;s no big secret we live in a digital age. We store thousands of digital pictures of our loved ones, documents, tax returns, and videos on our computers. But what if your computer was destroyed today? That very nightmare is a harsh reality for many hit by Hurricane Sandy. This is just one of many scenarios that could take away years of memories in an instant.&lt;br /&gt;
&lt;br /&gt;
Well before you beat yourself up for your digital&amp;nbsp;dependence,&amp;nbsp; let&#39;s take a look at&amp;nbsp;some easy back up solutions to ensure you have a happy ending in any tragic computer mishap.&lt;br /&gt;
&lt;br /&gt;
How you back up your data is really dependent on how much data you have. For those fortunate to have small amounts of data, there are plenty of free online backup solutions. But if you are like me, you have amassed enough data to rival the National Archives! So let&#39;s take a look at three options we can utilize for peace of mind.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Online Free Solutions&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Like I mentioned earlier, this is a great option for those of you fortunate enough to only need small amounts of data backed up.&amp;nbsp;&lt;span style=&quot;background-color: white; color: blue; font-family: Georgia, Times, &#39;Times New Roman&#39;, serif; font-size: 14px; line-height: 22.450000762939453px; text-decoration: initial;&quot;&gt;&lt;a href=&quot;https://us.lrd.yahoo.com/_ylt=ApyU.HrM35gbY0L0r2RAJG41y8F_;_ylu=X3oDMTFqaWd2Ymg3BG1pdANBcnRpY2xlIEJvZHkEcG9zAzIEc2VjA01lZGlhQXJ0aWNsZUJvZHlBc3NlbWJseQ--;_ylg=X3oDMTM5aHJoNTlqBGludGwDdXMEbGFuZwNlbi11cwRwc3RhaWQDNDY4NGFlODgtZWJhYS0zMjlmLWFlMjYtZTA1Y2QwMDJlYjAyBHBzdGNhdAN1LXN8Y29udHJpYnV0b3JuZXR3b3JrBHB0A3N0b3J5cGFnZQ--;_ylv=0/SIG=11ck296la/EXP=1354475030/**https%3A//www.dropbox.com/&quot; id=&quot;yui_3_5_1_24_1353266491004_249&quot; rel=&quot;nofollow&quot; style=&quot;background-color: white; font-family: Georgia, Times, &#39;Times New Roman&#39;, serif; font-size: 14px; line-height: 22.450000762939453px; text-decoration: initial;&quot;&gt;Dropbox&lt;/a&gt;&amp;nbsp;&lt;/span&gt;is one such product that will give you 2 GB of storage.&amp;nbsp;&lt;span style=&quot;background-color: white; color: blue; font-family: Georgia, Times, &#39;Times New Roman&#39;, serif; font-size: 14px; line-height: 22.450000762939453px; text-decoration: initial;&quot;&gt;&lt;a href=&quot;https://drive.google.com/&quot; id=&quot;yui_3_5_1_24_1353266491004_253&quot; rel=&quot;nofollow&quot; style=&quot;background-color: white; font-family: Georgia, Times, &#39;Times New Roman&#39;, serif; font-size: 14px; line-height: 22.450000762939453px; text-decoration: initial;&quot;&gt;Google Drive&lt;/a&gt;&amp;nbsp;&lt;/span&gt;offers storage up to 5 GB.&amp;nbsp;Both services give you an easy to install client that syncs your critical data.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;Online Fee Based Solutions&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
For a nominal fee there are an abundant amount of choices for backing up your data. Here a few of the most popular ones.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.carbonite.com/en/v2/index&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;Carbonite&lt;/b&gt;&lt;/span&gt;&lt;/a&gt; - Offers an unlimited storage plan for $59 a year.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.idrive.com/index.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;IDrive&lt;/b&gt;&lt;/span&gt;&lt;/a&gt; - Offers a very affordable 150 GB storage plan for $49.99 a year.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.sosonlinebackup.com/lp/pcmag/microsite/index-video.htm?utm_source=pcmag&amp;amp;utm_medium=banner&amp;amp;utm_term=&amp;amp;utm_content=recommendedby25pctoff&amp;amp;utm_campaign=pcmagreview&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;SOS Online Backup&lt;/b&gt;&lt;/span&gt;&lt;/a&gt; - A little more expensive at $79.99 a year but you can do&amp;nbsp;multiple&amp;nbsp;systems including mobile devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b&gt;&lt;u&gt;External Hard Drive Solution&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
This method involves using an external hard drive or pen drive to back up your data. Many hard drive manufacturers install their own brand of backup software to simplify the process. I have to admit this is my least favorite option. Don&#39;t get me wrong, backing up your important files to an external hard drive or pen drive is better than doing nothing, it&#39;s just not the best solution in a disaster recovery scenario. Unless you take that hard drive to an offsite location or lock it up in a data rated lock box, you are not truly prepared for all disasters. Plus, it makes it difficult to keep your data always current.&lt;br /&gt;
&lt;br /&gt;
So as we are bombarded with the next vampire-werewolf-zombie tragic love story, you can breathe a little easier knowing your data doesn&#39;t have to be one of them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2012/11/dont-let-your-data-be-next-tragic-love.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7vfjpK4lzd6wLZCJG55QZ0YJaCkyJcVmqGVc0M-7ou4PYiulZyzEUirx2-3ZKWTKFSNA5m6_FkO7zC1Yiv1OPbm2sDwsIAgK8PTIynGPeKV-_6MQOpPofQPePeBHqT7gA541bAeQGkng/s72-c/cryingwoman.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-5577213965098535738</guid><pubDate>Sat, 10 Nov 2012 03:19:00 +0000</pubDate><atom:updated>2012-12-19T15:20:27.286-06:00</atom:updated><title>Spyware Protection and Garden Gnomes</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoRAOUAiaB0exuODAow5_MBQmhgSlkHAOdrTv-Geeuh4n9TVjVhuELU0fNatdj6Amhcgswp-WwIVb-yETNaO1xQIr4-qKJckQxw5fjHqRxQ7HSOVnSkz7STvzUy1iTRkkqmWhGefbe4GM/s1600/gnomes.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoRAOUAiaB0exuODAow5_MBQmhgSlkHAOdrTv-Geeuh4n9TVjVhuELU0fNatdj6Amhcgswp-WwIVb-yETNaO1xQIr4-qKJckQxw5fjHqRxQ7HSOVnSkz7STvzUy1iTRkkqmWhGefbe4GM/s1600/gnomes.jpg&quot; height=&quot;212&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Have you ever been surfing the Internet only to feel like you are being watched? It&#39;s like that creepy feeling you get from the neighbor&#39;s garden gnomes because you just &lt;b&gt;know&lt;/b&gt; they are watching you? Now, I do share your conspiracy theory about the garden gnomes but I can only help you with your computer suspicions. In most cases, you probably are being tracked in one form or another, but that doesn&#39;t mean it&#39;s always malicious. A lot of our Internet surfing activity is tracked for trend data, marketing, and research. And that&#39;s to be expected. What I want to address today is &lt;b&gt;Spyware&lt;/b&gt;. &lt;br /&gt;
&lt;br /&gt;
Many of us have heard this term, but what does it really mean?&amp;nbsp;&lt;b&gt;Spyware&lt;/b&gt; is a type of &lt;a href=&quot;http://www.techterms.com/definition/malware&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;malware&lt;/span&gt;&lt;/a&gt; (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden and can be tricky to detect. Spyware can collect almost any type of data, including personal information like user logins to bank or credit card accounts&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.200000762939453px;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Now, before you go ripping out all your computer cables and start planning your move to a remote Alaskan retreat, let me put your mind at ease. With a few simple applications and precautions, you too can create a happy and secure Internet experience!&lt;br /&gt;
&lt;br /&gt;
We are going to use two steps to accomplish this . . .&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step one:&lt;/b&gt; First, we need to install anti-spyware software. This will accomplish two things. One, it will clean up any existing infections. Two, it will give you a new barrier of protection against future attacks. There are plenty of great free and commercial software options out there. By far, the most used program is&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;OneLinkNoTx&quot; style=&quot;background-color: white; border: 0px; cursor: pointer; font-family: inherit; font-size: inherit; font-style: inherit; line-height: 19.983333587646484px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html&quot; style=&quot;background-color: white; border: 0px; cursor: pointer; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.983333587646484px; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Malwarebytes Anti-Malware&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #2964bf;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;OneLinkNoTx&quot; style=&quot;background-color: white; border: 0px; cursor: pointer; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-style: inherit; line-height: 19.983333587646484px;&quot;&gt;Both the free and commercial version do a&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 19.983333587646484px;&quot;&gt;phenomenal job.&amp;nbsp;&lt;a href=&quot;http://download.cnet.com/Ad-Aware-Free-Antivirus/3000-8022_4-10045910.html?tag=contentBody;pop&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Ad-Aware&lt;/span&gt;&lt;/a&gt; and&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://download.cnet.com/Spybot-Search-Destroy/3000-8022_4-10122137.html&quot; style=&quot;border: 0px; cursor: pointer; font-family: Helvetica, Arial, sans-serif; font-size: 15px; line-height: 19.983333587646484px; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;OneLinkNoTx&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Spybot - Search &amp;amp; Destroy&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;line-height: 19.983333587646484px;&quot;&gt;&amp;nbsp;are also widely used for the same purpose.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;OneLinkNoTx&quot; style=&quot;background-color: white; border: 0px; cursor: pointer; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 19.983333587646484px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;OneLinkNoTx&quot; style=&quot;background-color: white; border: 0px; cursor: pointer; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 19.983333587646484px;&quot;&gt;&lt;b&gt;Step two:&lt;/b&gt;&amp;nbsp;We need to get that browser of yours secure. There are a few things you can do to ensure your web browser is not giving away your information like a politician giving away campaign promises.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;OneLinkNoTx&quot; style=&quot;background-color: white; border: 0px; cursor: pointer; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 19.983333587646484px;&quot;&gt;Here are a few items to consider:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;Password remember function&lt;/b&gt; – Web browsers usually contain some kind of password manager. From the point of personal security and online account security, do not automatically save your passwords and user names for your important accounts where you have personal information.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Keep your browser updated&lt;/b&gt; – Developers release fixes for issues found in your browser, and it is the same for security bugs.  So have automatic updates enabled.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Clear browsing data&lt;/b&gt;&amp;nbsp;–&amp;nbsp;This data includes your browsing download history, cache, cookies, passwords, and saved form data. Clearing this regularly will ensure your data is secure and keep tracking cookies off your system.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
With these few simple steps you can now surf the Internet more securely and safely. In the near future, I will talk about taking it to the next level with anonymous surfing techniques. If only garden gnomes were that easy to deal with!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Have a computer topic you would like see covered? Leave a comment below or send me an email.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://srichardsonhf233.blogspot.com/2012/11/spyware-protection-and-garden-gnomes.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoRAOUAiaB0exuODAow5_MBQmhgSlkHAOdrTv-Geeuh4n9TVjVhuELU0fNatdj6Amhcgswp-WwIVb-yETNaO1xQIr4-qKJckQxw5fjHqRxQ7HSOVnSkz7STvzUy1iTRkkqmWhGefbe4GM/s72-c/gnomes.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4744842068877935962.post-621867759786915005</guid><pubDate>Tue, 30 Oct 2012 20:56:00 +0000</pubDate><atom:updated>2012-11-13T10:26:02.029-06:00</atom:updated><title>My Digital Inauguration . . . </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPCNcoH6S63gv8jAQyJZsKuWxKu9agS-qL4QOilnYYM5HPhi50e5jJAddt5cFyJdIrFkITWRP3ZCRlyiNOklJNEPOzaU4dQCjlcfAwA-22PaK5yepTnRiaOnpLDoMQjA38uVSgBY25XdM/s1600/73085_163251657040756_4344757_n.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPCNcoH6S63gv8jAQyJZsKuWxKu9agS-qL4QOilnYYM5HPhi50e5jJAddt5cFyJdIrFkITWRP3ZCRlyiNOklJNEPOzaU4dQCjlcfAwA-22PaK5yepTnRiaOnpLDoMQjA38uVSgBY25XdM/s1600/73085_163251657040756_4344757_n.jpg&quot; width=&quot;185&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I guess before I throw my hat into the&amp;nbsp;proverbial blog writing ring, I should introduce myself. My name is Steve Richardson. A 20+ year veteran in the computer security field with a focus on education. I am a proud husband, father, grandfather, class clown, and motorcycle&amp;nbsp;enthusiast.&lt;br /&gt;
&lt;br /&gt;
What I&#39;m looking to create here is a technology resource for the community, staff, students, and general public. I want to submit weekly blog posts that empower the reader with useful information that relates to:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Safe computing practices&lt;/li&gt;
&lt;li&gt;Latest tech gadgets&lt;/li&gt;
&lt;li&gt;Useful software&lt;/li&gt;
&lt;li&gt;Open source and free resources&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
I know. . .blah blah blah another boring tech blog. There are so many already! And most are as exciting as reading a gastrointestinal medical journal. &amp;nbsp;I really want to do something different though. The articles will be easy to understand and actually apply to what people use everyday The content will be entertaining, fun to read and just hopefully my comedic style will break the boring tech blog mold! With all that being said, I look forward to the learning adventure ahead . . .&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPuz9nZjFqKYA0zMtXc7FihC6W4CLbFlf0uFQn84ASlmUTdfclFC7KSDVq4GWBwxIF6rJDmnKvrILyovh7LUPSGAn2E6l2E5M40GM7QjRibH-wF5BxEcyR2SGwSJLLQmHRw8myQhXMNok/s1600/hello_my_name_is_steve_rectangle_sticker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;159&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPuz9nZjFqKYA0zMtXc7FihC6W4CLbFlf0uFQn84ASlmUTdfclFC7KSDVq4GWBwxIF6rJDmnKvrILyovh7LUPSGAn2E6l2E5M40GM7QjRibH-wF5BxEcyR2SGwSJLLQmHRw8myQhXMNok/s200/hello_my_name_is_steve_rectangle_sticker.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://srichardsonhf233.blogspot.com/2012/10/my-digital-inauguration.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPCNcoH6S63gv8jAQyJZsKuWxKu9agS-qL4QOilnYYM5HPhi50e5jJAddt5cFyJdIrFkITWRP3ZCRlyiNOklJNEPOzaU4dQCjlcfAwA-22PaK5yepTnRiaOnpLDoMQjA38uVSgBY25XdM/s72-c/73085_163251657040756_4344757_n.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>