<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Open Systems Computing Corp.</title>
	<atom:link href="https://opensystemscomputing.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://opensystemscomputing.com/</link>
	<description>Smart implementation of new and emerging technology.</description>
	<lastBuildDate>Wed, 14 Aug 2013 00:57:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">235332049</site>	<item>
		<title>Stay Safe from CyberStalking: Disable Picture Geotags on your Cellphone</title>
		<link>https://opensystemscomputing.com/computer-security/stay-safe-from-cyberstalking-disable-picture-geotags-on-your-smartphone/</link>
					<comments>https://opensystemscomputing.com/computer-security/stay-safe-from-cyberstalking-disable-picture-geotags-on-your-smartphone/#comments</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Wed, 14 Aug 2013 00:57:08 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[cellphone]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybertheft]]></category>
		<category><![CDATA[cyberthieves]]></category>
		<category><![CDATA[geotags]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[mobile phone]]></category>
		<category><![CDATA[photo geotags]]></category>
		<category><![CDATA[Photos]]></category>
		<category><![CDATA[picture geotags]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=324</guid>

					<description><![CDATA[<p>Did you know: If you post pictures online from your smartphone, hackers can easily pinpoint your location.  How easy, you say? Take a look at this short video: Pretty scary, [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/computer-security/stay-safe-from-cyberstalking-disable-picture-geotags-on-your-smartphone/">Stay Safe from CyberStalking: Disable Picture Geotags on your Cellphone</a></p>
]]></description>
										<content:encoded><![CDATA[<p>Did you know: If you post pictures online from your smartphone, hackers can easily pinpoint your location.  How easy, you say? Take a look at this short video:</p>
<p><iframe src="//www.youtube.com/embed/26dsBEY4L_0" height="281" width="500" allowfullscreen="" frameborder="0"></iframe></p>
<p>Pretty scary, huh?  Thieves, child predators and other criminals can easily find where you live, where you like to eat lunch, what park you take your kids to play in, etc.</p>
<p>This is not something new, but it&#8217;s shocking how many people are unaware of this threat and expose themselves to criminals.</p>
<p>Now that I have your attention, I have some good news. There is an easy way for you to disable geotagging on your cellphone pictures, while leaving it on for applications that need it, like your phone&#8217;s GPS.</p>
<p>Here are easy-to-follow instructions for your phone.  Don&#8217;t delay &#8211; Disable picture geotags now!</p>
<p><strong>iPhone:</strong> Go to Settings, select General, then Location Services, and set the camera to off.</p>
<p><strong>Blackberry:</strong> Open the camera, select the settings, and set Geotagging to off.</p>
<p><strong>Android:</strong>  Open the camera, select the location icon, select off.</p>
<p>To get an even better idea of this threat, view the following news report, it&#8217;s eye-opening.</p>
<p><iframe src="//www.youtube.com/embed/N2vARzvWxwY" height="315" width="420" allowfullscreen="" frameborder="0"></iframe></p>
<p><a href="https://opensystemscomputing.com/computer-security/stay-safe-from-cyberstalking-disable-picture-geotags-on-your-smartphone/">Stay Safe from CyberStalking: Disable Picture Geotags on your Cellphone</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/computer-security/stay-safe-from-cyberstalking-disable-picture-geotags-on-your-smartphone/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">324</post-id>	</item>
		<item>
		<title>Five Simple And Really Useful Google Search Tips</title>
		<link>https://opensystemscomputing.com/os/five-simple-and-really-useful-google-search-tips/</link>
					<comments>https://opensystemscomputing.com/os/five-simple-and-really-useful-google-search-tips/#comments</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Mon, 10 Sep 2012 15:00:39 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[google search tips]]></category>
		<category><![CDATA[simple google search tips]]></category>
		<category><![CDATA[simple search tips]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[usefule google search tips]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=302</guid>

					<description><![CDATA[<p>Wait, I know&#8230; There is no shortage of articles about Google search tips on the web. Frankly, most give you too much information &#8211; you&#8217;re just never going to remember [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/os/five-simple-and-really-useful-google-search-tips/">Five Simple And Really Useful Google Search Tips</a></p>
]]></description>
										<content:encoded><![CDATA[<div>
<div id="attachment_313" style="width: 310px" class="wp-caption alignright"><a href="https://opensystemscomputing.com/wp-content/uploads/2012/09/google_search_2.jpg"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-313" class="size-medium wp-image-313" title="Simple and Useful Google Search Tips" src="https://opensystemscomputing.com/wp-content/uploads/2012/09/google_search_2-300x196.jpg" alt="Simple and Useful Google Search Tips" width="300" height="196" srcset="https://opensystemscomputing.com/wp-content/uploads/2012/09/google_search_2-300x196.jpg 300w, https://opensystemscomputing.com/wp-content/uploads/2012/09/google_search_2.jpg 600w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-313" class="wp-caption-text">Simple and Useful Google Search Tips</p></div>
<p>Wait, I know&#8230; There is no shortage of articles about Google search tips on the web. Frankly, most give you too much information &#8211; you&#8217;re just never going to remember it all.</p>
</div>
<p>So I decided to go through them all and come with five tips that are so simple and useful, you&#8217;re bound to remember them.</p>
<p>&nbsp;</p>
<p><strong>1) Phrases:</strong> Perhaps the most powerful tool that I&#8217;m amazed more people don&#8217;t know about is the use of double quotes around phrases. Let&#8217;s say you are searching for <strong>cars that double as boats.</strong></p>
<p>&nbsp;</p>
<p>cars that double as boats  &#8211;  Without the quotes, you&#8217;ll get a wide variety of search results &#8211; most not what you&#8217;re looking for.</p>
<p>&nbsp;</p>
<p>&#8220;cars that double as boats&#8221;  &#8211; With the quotes, you get the results you want.</p>
<p>&nbsp;</p>
<div>
<p><strong>2) Definitions:</strong>  If you need to quickly look up the definition of a word or phrase, simply use the &#8220;define:&#8221; command.</p>
<p>define: plethora</p>
<p>define: passive aggressive behavior</p>
<p>&nbsp;</p>
<p><strong>3) Calculator:</strong> No need to search for your calculator or open up the calculator program on your computer. Just use the google search box like a calculator:</p>
<p>Type in 24/3+2=</p>
<p>and you get  back: 24/3+2=10</p>
<p>&nbsp;</p>
<p><strong>4) Flight Status Finder:</strong> Enter the airline and flight number into the Google search box and get back the arrival and departure times right inside Google&#8217;s search results.</p>
<p>delta flight 1223 status</p>
<p>&nbsp;</p>
<p><strong>5) Conversions:</strong> Quickly convert just about anything:</p>
<p>24 teaspoons in cups</p>
<p>100 dollars in euros</p>
<p>1255000 megabytes in bytes</p>
<p>&nbsp;</p>
</div>
<div>Have some of your own Google search tips? Let&#8217;s hear them!</div>
<p><a href="https://opensystemscomputing.com/os/five-simple-and-really-useful-google-search-tips/">Five Simple And Really Useful Google Search Tips</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/os/five-simple-and-really-useful-google-search-tips/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">302</post-id>	</item>
		<item>
		<title>Hackers &#038; Cyberthieves Continue to Target the Under-Protected: Small Businesses</title>
		<link>https://opensystemscomputing.com/computer-security/hackers-cyberthieves-continue-to-target-the-under-protected-small-businesses/</link>
					<comments>https://opensystemscomputing.com/computer-security/hackers-cyberthieves-continue-to-target-the-under-protected-small-businesses/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Mon, 23 Jul 2012 12:00:15 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybertheft]]></category>
		<category><![CDATA[cyberthieves]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Small Business]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=281</guid>

					<description><![CDATA[<p>As a small business owner, most state laws will put the responsibility completely on you if you are a victim of cybertheft. If your company bank account is hacked and [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/computer-security/hackers-cyberthieves-continue-to-target-the-under-protected-small-businesses/">Hackers &#038; Cyberthieves Continue to Target the Under-Protected: Small Businesses</a></p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_285" style="width: 310px" class="wp-caption alignright"><a href="https://opensystemscomputing.com/wp-content/uploads/2012/07/cyber.theft_.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-285" class="size-medium wp-image-285 " title="Hackers, Cyberthieves, Cybertheft and Cyber Security" src="https://opensystemscomputing.com/wp-content/uploads/2012/07/cyber.theft_-300x300.jpg" alt="Hackers, Cyberthieves, Cybertheft and Cyber Security" width="300" height="300" srcset="https://opensystemscomputing.com/wp-content/uploads/2012/07/cyber.theft_-300x300.jpg 300w, https://opensystemscomputing.com/wp-content/uploads/2012/07/cyber.theft_-150x150.jpg 150w, https://opensystemscomputing.com/wp-content/uploads/2012/07/cyber.theft_-50x50.jpg 50w, https://opensystemscomputing.com/wp-content/uploads/2012/07/cyber.theft_.jpg 380w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-285" class="wp-caption-text">Prime Target: Small Businesses</p></div>
<p>As a small business owner, most state laws will put the responsibility completely on you if you are a victim of cybertheft. If your company bank account is hacked and your money is stolen, tough luck &#8211; you should have had better controls in place. Surprised?</p>
<p>Conversely, if your personal account suffers a similar fate, most state laws will hold the banks responsible.</p>
<p>The general reasoning here is that companies should be more sophisticated and knowledgeable than individuals and should have the proper controls and security measure in place.  Of course, we all know the reality of the situation is that there is a big difference between a large company with it&#8217;s own I.T. staff and a small business. Hackers and cybethieves know this as well and are exploiting the vulnerability of small businesses with fervor. Small businesses have proven to be &#8220;soft targets&#8221; for cybercriminals.</p>
<p>The Wall Street Journal has been all over this this topic lately and I encourage any small business owner to read the following articles referenced. The knowledge and awareness you gain could very well save you from experiencing a major cybertheft incident.</p>
<p>First came an article about the general problem of <a title="Cybercriminals Sniff Out Vulnerable Firms" href="http://online.wsj.com/article/SB10001424052702303933404577504790964060610.html" target="_blank">hackers targeting small businesses</a>.  Standing out in that article is this quote:</p>
<p>About 72% of the 855 data breaches world-wide analyzed last year by Verizon&#8217;s forensic analysis unit were at companies with 100 or fewer employees.&#8221;</p>
<p>Are you looking over your shoulder yet? Are you wondering how this can happen?  Here is a case study of a company that had <a title="How Hackers Attack" href="http://online.wsj.com/article/SB10001424052702303962304577509210831518418.html?KEYWORDS=hackers#articleTabs%3Darticle" target="_blank">1.2million wiped from it&#8217;s accounts by cyberthieves</a> in the course of several hours. They thought they had protections in place (firewall and anti-virus), but the systems were not all current and they had no controls on their online banking accounts that would restrict such large withdrawals.  (Call your bank NOW and discuss what controls can be implemented)</p>
<p>As we mentioned in the beginning of this article, historically small businesses have been left to fully bear the burden of cybertheft committed upon them. But there is some good news. Two recent court rulings went in favor of small businesses<a title="Cyberthieves Hit Owners" href="http://online.wsj.com/article/SB10001424052702303612804577533503876570164.html?KEYWORDS=hackers#articleTabs%3Darticle" target="_blank"> suing their banks to recover funds lost due to cybertheft</a>.</p>
<p>From that article is this quote that sums up the problem small businesses face: &#8220;The truth is there are millions of small businesses that have no clue of the sophistication of the threat that is out to get them,&#8221; says Brian Krebs, author of Krebs on Security, a blog that covers cybercrime and Internet security. &#8220;You&#8217;ve got one lady who&#8217;s in charge of payroll, and she works nine to five and…God bless her, she&#8217;s up against the Russian mob.&#8221;</p>
<p>So what can small businesses do? I&#8217;ll tackle that topic fully in my next post, but in the meantime, call your bank and put some controls in place that would limit your exposure to theft.</p>
<p>&nbsp;</p>
<h4>Cyberthieves Hit Owners:</h4>
<p><iframe loading="lazy" src="http://live.wsj.com/public/page/embed-B285F533_8B1C_4884_9910_E77865C53A8D.html" frameborder="0" scrolling="no" width="512" height="288"></iframe></p>
<p><a href="https://opensystemscomputing.com/computer-security/hackers-cyberthieves-continue-to-target-the-under-protected-small-businesses/">Hackers &#038; Cyberthieves Continue to Target the Under-Protected: Small Businesses</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/computer-security/hackers-cyberthieves-continue-to-target-the-under-protected-small-businesses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">281</post-id>	</item>
		<item>
		<title>Cut IT Spending in Tough Times? Not so fast.</title>
		<link>https://opensystemscomputing.com/news/cut-it-spending-in-tough-times-not-so-fast/</link>
					<comments>https://opensystemscomputing.com/news/cut-it-spending-in-tough-times-not-so-fast/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Wed, 29 Feb 2012 14:00:15 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[IT Spending]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=270</guid>

					<description><![CDATA[<p>Information technology spending has always been an easy target for CFOs when budget-crunching time comes around. Delaying projects or doing without the latest technology can offer significant savings. But what [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/news/cut-it-spending-in-tough-times-not-so-fast/">Cut IT Spending in Tough Times? Not so fast.</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2012/02/techspending.jpg"><img loading="lazy" decoding="async" class="alignright size-full wp-image-271" title="techspending" src="https://opensystemscomputing.com/wp-content/uploads/2012/02/techspending.jpg" alt="Information Technology Spending" width="294" height="171" /></a>Information technology spending has always been an easy target for CFOs when budget-crunching time comes around. Delaying projects or doing without the latest technology can offer significant savings. But what will cutting IT Spending do to your business?</p>
<p>In today&#8217;s hyper-competitive marketplace, the companies that are thriving are the ones that are truly technology-driven. Investments in technology boost productivity and profits. Falling behind in use of technology has been the final tipping point for many failed companies.</p>
<p>While this could certainly be considered a self-serving position, that doesn&#8217;t mean it&#8217;s without value. What brought this topic to mind was <a title="Cut Those Costs! (But NotTech.)" href="&lt;iframe src=&quot;//www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2FAllGreenBayPackers&amp;amp;send=false&amp;amp;layout=standard&amp;amp;width=300&amp;amp;show_faces=true&amp;amp;action=like&amp;amp;colorscheme=light&amp;amp;font&amp;amp;height=80&quot; scrolling=&quot;no&quot; frameborder=&quot;0&quot; style=&quot;border:none; overflow:hidden; width:300px; height:80px;&quot; allowTransparency=&quot;true&quot;&gt;&lt;/iframe&gt;">an article in today&#8217;s Wall Street Journal, called &#8220;Cut Those Costs! (But Not Tech)</a>.&#8221;</p>
<p>The article lays out the new landscape that companies are presented with; how to cut costs without losing your competitive edge and hurting the business. One example given is an Engineering firm in Colorado, CH2M Hill. From the article:</p>
<p style="padding-left: 30px;"><em> The Englewood, Colo., engineering firm is cutting back on expenses like corporate events and bonuses for employees, yet it plans to boost its $100 million-a-year information-technology budget by as much as 20% this year. In part, the money will go to fund new systems that will make it easier for workers to use a variety of mobile devices on the job.</em></p>
<p style="padding-left: 30px;"><em>&#8220;We&#8217;re very concerned about the economy and trying to take some measures to cut costs,&#8221; says Mike Lucki, CH2M&#8217;s chief financial officer. &#8220;But this is an investment that we need to make to stay competitive. If you don&#8217;t do it, you&#8217;re not in the game.&#8221;</em></p>
<p>Mr. Lucki is not alone. A recent survey by Baruch College&#8217;s Zicklin School of Business found that CFO&#8217;s are planning to increase IT spending on average by 10% in 2012. Compare this to 2008, when plans were to hold even or decrease spending. Needless to say, the tech explosion has opened more than a few eyes of financial decision-makers who were once quick to make technology their sacrificial lamb.</p>
<p>That doesn&#8217;t mean it&#8217;s easy or fool-proof. Increasing IT spending in tough times requires careful planning and even more careful evaluation of specific technologies and the potential returns to the business. But if you&#8217;re not thinking this way now, as Mr. Lucki says in the article, you&#8217;ll never make it to your 2015 plan. I recommend you read the whole article (link above). It&#8217;s a worthwhile 5 minutes out of your day.</p>
<p><a href="https://opensystemscomputing.com/news/cut-it-spending-in-tough-times-not-so-fast/">Cut IT Spending in Tough Times? Not so fast.</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/news/cut-it-spending-in-tough-times-not-so-fast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">270</post-id>	</item>
		<item>
		<title>Online Holiday Shopping Security Tips &#8211; Beware of Cyber Crooks and Scams</title>
		<link>https://opensystemscomputing.com/computer-security/online-holiday-shopping-security-tips-beware-of-cyber-crooks-and-scams/</link>
					<comments>https://opensystemscomputing.com/computer-security/online-holiday-shopping-security-tips-beware-of-cyber-crooks-and-scams/#comments</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Mon, 28 Nov 2011 00:48:29 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Computer Security Tips]]></category>
		<category><![CDATA[e-commerce]]></category>
		<category><![CDATA[Holiday Online Shopping Tips]]></category>
		<category><![CDATA[Online Shopping]]></category>
		<category><![CDATA[Online Shopping Tips]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=251</guid>

					<description><![CDATA[<p>Cyber Monday marks the unofficial beginning of the Online Holiday Shopping season. As I write this on the eve of  Cyber Monday, you can be sure that cyber crooks are [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/computer-security/online-holiday-shopping-security-tips-beware-of-cyber-crooks-and-scams/">Online Holiday Shopping Security Tips &#8211; Beware of Cyber Crooks and Scams</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2011/11/e-commerce1-300x225.jpg"><img loading="lazy" decoding="async" class="alignright size-full wp-image-253" title="e-commerce1-300x225" src="https://opensystemscomputing.com/wp-content/uploads/2011/11/e-commerce1-300x225.jpg" alt="" width="300" height="225" /></a>Cyber Monday marks the unofficial beginning of the Online Holiday Shopping season. As I write this on the eve of  Cyber Monday, you can be sure that cyber crooks are ready to unleash a  variety of scams intended to separate you from your hard-earned money.</p>
<p>The odds are very good that every  of us will come across such a scam over the next few weeks. How we handle the situation could make the difference between a joyous holiday season and a sad one. Here are some tips to help keep your Holidays happy ones:</p>
<h4>1) Learn to identify fake web sites in emails.</h4>
<p>You get an email from &#8220;Amazon.com&#8221; that says you can get a free Apple ipad if you spend $1000 on Amazon. Or they are selling them for $100 below the regular price. First thing to do is STOP and THINK. What are the odds Amazon is giving away ipads? zero. What are the odds they are selling them at $100 below normal price? zero. Apple controls pricing and their products are not discounted. These are just some simple examples, but the point is, just a little common sense is often all it takes to smell a  scam.</p>
<p>But suppose the offer you get is thoroughly believable  or you don&#8217;t know enough about the items to know what is reasonable. Before you click on the link in that email that says &#8220;Buy on Amazon.com,&#8221; just put your mouse cursor on the link without clicking. Somewhere on your screen (depends on which email program you use), the actual URL of the link will appear. Sometimes it will be an obvious fake, ( like usamza.com). But many times, they will includes words in the URL that can fool you. (amazon.com.ipad.store.usamza.com/online_store).  Look carefully at what the last .com (or .net, .biz, .info, etc.) says. That will tell you the real domain name for the link you are about to click on. In this case, it&#8217;s usamza.com. The &#8220;amazon.com.ipad.store&#8221; at the beginning is just there to trick you.</p>
<p>Note: This is also a very common tactic when it comes to online payment sites, like PayPal. You are bound to get emails saying they are from PayPal and you need to login to your account to fix a problem.  Two things: First, remember to closely inspect the link and second, the real PayPal will probably never send you such an email.</p>
<h4>2) Beware of  store emails with attachments.</h4>
<p>Chances are good you are on some mailing lists from legitimate stores and shopping sites.  Chances are just as good that they will never send you an email with an attachment. For example, you get an email claiming to be from Macys.com, and it tells you to open the attached PDF file for details on a specials friends and family sale &#8211; STOP right there and immediately delete the email. Legitimate retailers do not send emails with attachments.</p>
<p>Keep in mind that often times the emails look quite authentic. They&#8217;ll have the Macy&#8217;s logo, and links to legitimate pages on the real Macy&#8217;s site, all designed to make you believe the email is legitimate. It is not.</p>
<h4>3) Don&#8217;t use store links from search engines.</h4>
<p>A favorite tactic of cyber crooks is creating entire fake web sites that are mirror images of a real site. This has been done with banking sites, hoping you will enter your real BankofAmerica username/password on a fake BankofAmerica site they have created that looks just like the real thing. The same tactic is used with shopping sites. If they can create a fake &#8220;buy.com&#8221; and get you to go there and put in your real buy.com password, they can then go to buy.com and buy things using your account.</p>
<p>The problem for cyber crooks is, how to get you to go to the fake site? One way is with faked emails, as described in #1 above. Another is through search engine results. Let&#8217;s say you are looking for a special cooking utensil as a gift for a friend. You do a google search, and one of the first matches is a link for &#8220;cooking.com&#8221;. You click on the link and are taken to a web site that says Cooking.com&#8221; all over the page. You probably wouldn&#8217;t notice that the actual URL says &#8220;cookingz.com&#8221;. It&#8217;s a complete fake. Once you are on the fake, they can try to gather personal information or just install malicious software on your computer.</p>
<p>What should you have done? When a search result for cooking.com came up, instead of clicking on the link in the search results, you should open another browser tab or window and manually type in cooking.com. Now you know you are at the real cooking.com. Then, once you&#8217;ve used a web site and you know it&#8217;s legitimate, add it to your favorites and only use the favorite link to go there in the future.</p>
<h4>4) Only enter your credit card info on a secure web site.</h4>
<p>The Better Business Bureau online shopping division highly recommends that you ALWAYS use credit cards when purchasing online (built-in fraud protection) and ONLY use web sites that use SSL (Secure Sockets Layer) on their payment page. You&#8217;ll know you are on a secure page if the page URL starts with &#8220;HTTPS://&#8221;  instead of &#8220;HTTP://.&#8221;  The data transfers on secure pages are encrypted, which protects your confidential  information, even if the data is intercepted by a malicious program on your PC that is &#8220;listening in&#8221; on the transaction.</p>
<h4>5)  Use internet security software.</h4>
<p>This may seem kind of obvious to some of you, yet you wouldn&#8217;t believe how many home PCs we see  that either have no security software installed or have an old, un-updated version that has expired. Seriously folks, it&#8217;s almost 2012. You&#8217;re being seriously irresponsible if you are not running some type of security software. Here are 3 I recommend for home use. Two even have basic FREE versions, so you have NO excuse. However, I highly recommend you spend some $$ on the more comprehensive paid versions.</p>
<p>Avast (my favorite free program): <a href="http://www.avast.com/free-antivirus-download">http://www.avast.com/free-antivirus-download</a></p>
<p>AVG: <a href="http://free.avg.com/us-en/free-antivirus-download">http://free.avg.com/us-en/free-antivirus-download</a></p>
<p>F-Secure (what I use at home): <a href="http://www.f-secure.com/en/web/home_us/protection/internet-security/trial">http://www.f-secure.com/en/web/home_us/protection/internet-security/trial</a></p>
<p>Be SMART and be SAFE.</p>
<p><a href="https://opensystemscomputing.com/computer-security/online-holiday-shopping-security-tips-beware-of-cyber-crooks-and-scams/">Online Holiday Shopping Security Tips &#8211; Beware of Cyber Crooks and Scams</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/computer-security/online-holiday-shopping-security-tips-beware-of-cyber-crooks-and-scams/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">251</post-id>	</item>
		<item>
		<title>Smartphone Security:  It&#8217;s Time to be Smart About It</title>
		<link>https://opensystemscomputing.com/computer-security/smartphone-security-its-time-to-be-smart-about-it/</link>
					<comments>https://opensystemscomputing.com/computer-security/smartphone-security-its-time-to-be-smart-about-it/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Tue, 06 Sep 2011 15:00:02 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Security Tips]]></category>
		<category><![CDATA[Smartphone Security]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=238</guid>

					<description><![CDATA[<p>As the News International (Rupert Murdoch) phone hacking scandal proved, hacking into cell phone voice mails systems is not particularly difficult. Many people never change the default password or use [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/computer-security/smartphone-security-its-time-to-be-smart-about-it/">Smartphone Security:  It&#8217;s Time to be Smart About It</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2011/09/mobile-security-3601.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-246" title="mobile-security-360" src="https://opensystemscomputing.com/wp-content/uploads/2011/09/mobile-security-3601-300x187.jpg" alt="Smartphone Security" width="300" height="187" srcset="https://opensystemscomputing.com/wp-content/uploads/2011/09/mobile-security-3601-300x187.jpg 300w, https://opensystemscomputing.com/wp-content/uploads/2011/09/mobile-security-3601.jpg 360w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>As the News International (Rupert Murdoch) phone hacking scandal proved, hacking into cell phone voice mails systems is not particularly difficult. Many people never change the default password or use easy-to-guess passwords. Unless you&#8217;re a celebrity, though, voice-mail hacking shouldn&#8217;t be a great concern. But that doesn&#8217;t mean there aren&#8217;t other Smartphone Security issues to worry about.</p>
<p>First, there&#8217;s the issue of privacy. Just last April, <a title="Apple iphones send your location history to Apple twice a day." href="http://www.f-secure.com/weblog/archives/00002145.html" target="_blank">a security researcher revealed </a>that Apple iPhones were tracking user&#8217;s locations and transmitting the information back to Apple. Apple called it a &#8220;bug&#8221; and quickly fixed it in their next update and gave users the option to opt out of location services. This however, gave pause to many as they were left to wonder what other information is being collected by their cellphone providers. Government officials are wondering also, having opened a federal grand jury investigation looking into mobile apps and whether they are illegally collecting users&#8217; private information.</p>
<p>Secondly, there is the growing concern over the appearance of mobile trojans and malware. Many business professionals use their mobile devices like portable PCs, yet they take few if any of the security measures they use on their PCs.  Apps containing trojans have appeared in several online marketplaces, including Android&#8217;s own.  Google had to remotely remove these rogue apps from user&#8217;s phones using Android&#8217;s &#8220;kill switch.&#8221;</p>
<p>Just as millions of smartphone owners have begun to regularly use their devices for business and banking, criminals are finding cracks in mobile security practices. The primary targets are online banking accounts, credit card numbers, email communications that may contain confidential information, even photographs.</p>
<p>What can you do? Here are some tips from F-Secure, a well-respected international security research and software firm:</p>
<h4>1. Keep your system updated</h4>
<p>Don&#8217;t take this for granted. Keeping your mobile operating system updated not only allow you to enjoy the latest offerings, but also helps to protect your security. Similar to a good practice with your personal computer, having your system up-to-date could prevent malicious attacks that take advantage of unpatched security holes or vulnerabilities.</p>
<h4>2. Install a security application in your phone</h4>
<p>As your mobile device functioning more like a mini computer, it becomes an increasingly attractive target for attacks or theft. And that situation calls for a need to protect your physical device and the data it contains. <a href="http://www.f-secure.com/en/web/home_global/protection/mobile-security/features-benefits">Our Mobile Security application</a> for instance, offer features that help to safeguard your data, protect against threats and locate your lost or stolen phone.</p>
<p><span class="Apple-style-span" style="font-weight: bold;">3. Watch where you click and land</span></p>
<p>We anticipate that scams and phishing to obtain personal or credit card information will be the most active attacks on mobile users. Social engineering methods would be used to lure users into clicking on malicious links or to trick them into surrendering valuable information. So, check out if a website starts with &#8220;https&#8221; before you enter sensitive information.</p>
<h4>4. Refrain from doing transactions on a public network</h4>
<p>A public network is useful and may help you save on data charges. However, keep in mind that the public Wi-Fi that your phone is connected to might not be secure. Just to stay on the safe side, limit your activity to browsing and avoid committing any important transactions.</p>
<p><span class="Apple-style-span" style="font-weight: bold;">5. Install or obtain applications from trusted source</span></p>
<p>Part of the fun (and convenience) in having a smartphone is making use of various applications which let you do a lot of things. There are plenty of applications out there, and some are offered through independent, unmonitored channel. Be careful of what you installed and watch out for the source. Some of the sources may contain repackaged apps that contain malicious content.</p>
<p><span class="Apple-style-span" style="font-weight: bold;">6. Make it a habit to check each applications&#8217; data access on your phone</span></p>
<p>Some applications may have access to your data or personal information. Be wary of the access that is outside of the scope or purpose of the applications. For example, a game application that has the access to SMS (read, write and send), calling, phonebook entries, and system files should trigger your suspicion for why it requires such access. If you have any doubt about an application, do not install it.</p>
<p>&nbsp;</p>
<p>The days of worry-free mobile phone use are over. You are most vulnerable when connected to unsecured wireless networks. I highly recommend against doing any online banking or making credit card purchases under those conditions.</p>
<p><a href="https://opensystemscomputing.com/computer-security/smartphone-security-its-time-to-be-smart-about-it/">Smartphone Security:  It&#8217;s Time to be Smart About It</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/computer-security/smartphone-security-its-time-to-be-smart-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">238</post-id>	</item>
		<item>
		<title>Don&#8217;t Think Hackers Target Small Business? Think Again&#8230;</title>
		<link>https://opensystemscomputing.com/computer-security/dont-think-hackers-target-small-business-think-again/</link>
					<comments>https://opensystemscomputing.com/computer-security/dont-think-hackers-target-small-business-think-again/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Mon, 22 Aug 2011 14:00:34 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Computer Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Tips]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=207</guid>

					<description><![CDATA[<p>There&#8217;s a dirty little secret in the hacking community. While the &#8220;big score&#8221; can be had by going after Fortune 500 and multi-national companies, the odds of success without getting [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/computer-security/dont-think-hackers-target-small-business-think-again/">Don&#8217;t Think Hackers Target Small Business? Think Again&#8230;</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2011/08/cyberattack.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-213 alignright" title="cyberattack" src="https://opensystemscomputing.com/wp-content/uploads/2011/08/cyberattack.jpg" alt="Don't Think Hackers Target Small Business? Think Again..." width="240" height="178" /></a>There&#8217;s a dirty little secret in the hacking community. While the &#8220;big score&#8221; can be had by going after Fortune 500 and multi-national companies, the odds of success without getting caught are slim. The easy money is had by going after small businesses.</p>
<h4>Hackers Target Small Business:</h4>
<p>Hackers know that small businesses often don&#8217;t have the resources or expertise to properly secure their systems. Whether it&#8217;s  your own network or your hosted website, they are being scanned non-stop by potential thieves looking for weak passwords or security holes. Once they gain access, they will often install difficult to detect software that will intercept all data being transmitted and forward it on to their own site.</p>
<p>Stealing credit card information that can be re-sold or used to make purchases is the primary goal. Identity theft and gaining access to online bank accounts are  close behind.</p>
<p>A 2010 survey by the National Retail Federation and First Data Corp. of small- and medium-size retailers in the U.S. found that 64% believed their businesses weren&#8217;t vulnerable to card data theft and only 49% had assessed their security safeguards. Talk about nice, ripe low-hanging fruit for the hackers&#8230;</p>
<p>On the web site front, current statistics estimate that every .65 seconds, a web page is infected with malware.</p>
<p>An agent in the FBI&#8217;s cyber division says that hackers targeting small businesses are a &#8220;prolific problem.&#8221; And, &#8220;It&#8217;s going to get much worse before it gets better.&#8221;</p>
<p>Proper security is all about creating multiple levels that have to be broken through. Think of a burgler approaching two houses. One is protected by a ten foot wall. The other has a ten foot wall, a ten foot barbed wire fence and a moat with man-eating piranha swimming in it. Which house will he try to break in to?</p>
<p>So, if you own or manage a small business, what do you do?</p>
<p>1) First priority should be installing a proper firewall, which does not mean a $99 home firewall you bought in the local office supply store. It also means hiring a professional IT technician to install and configure it. This is NOT a do-it-yourself job.</p>
<p>2) Don&#8217;t be lazy with passwords. Use strong passwords that are combinations of letters, numbers and special characters.</p>
<p>3) Every system needs to be running anti-virus and anti-malware software. While no one program is perfect, running without it is the equivalent of a hole in your barbed-wire fence.</p>
<p>4) Don&#8217;t skimp on backups &#8211; back up your systems daily at the minimum. And that includes your web site. Is your site being backed up? How often? Look into a free service from <a title="CodeGuard web site backups" href="http://codeguard.com" target="_blank">CodeGuard</a>.</p>
<p>5) Talk to an IT security professional. In this technology crazed, always-connected world we live in, many people feel they know enough to  &#8220;do it themselves and save money.&#8221;  There are many areas where that may be true, but this isn&#8217;t one of them.</p>
<p>For the most part, you&#8217;ll only hear about computer security breaches when they involve large companies and thousands of potential &#8220;victims.&#8221; There may only be a handful of these every year. But every day, smaller businesses are being hacked and in many cases, enough damage is inflicted to close down the business. Don&#8217;t let that happen to you.</p>
<p>If you would like to read some more about this topic, including some real world examples of small businesses under siege, here are some good articles to check out:</p>
<h4><a title="Hackers Shift Attacks to Small Firms" href="http://online.wsj.com/article/SB10001424052702304567604576454173706460768.html?mod=ITP_pageone_0#articleTabs%3Darticle" target="_blank">Hackers Shift Attacks to Small Firms &#8211; Wall Street Journal</a></h4>
<h4><a title="New cyberattacks target small businesses" href="http://www.usatoday.com/tech/news/2011-07-04-small-business-cyber-attackss_n.htm" target="_blank">New Cyberattacks Target Small Businesses &#8211; USA Today</a></h4>
<p>&nbsp;</p>
<p><a href="https://opensystemscomputing.com/computer-security/dont-think-hackers-target-small-business-think-again/">Don&#8217;t Think Hackers Target Small Business? Think Again&#8230;</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/computer-security/dont-think-hackers-target-small-business-think-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">207</post-id>	</item>
		<item>
		<title>How to secure your Facebook and Twitter Accounts</title>
		<link>https://opensystemscomputing.com/software/how-to-secure-your-facebook-and-twitter-accounts/</link>
					<comments>https://opensystemscomputing.com/software/how-to-secure-your-facebook-and-twitter-accounts/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Fri, 17 Jun 2011 02:11:57 +0000</pubDate>
				<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Browsing]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Secure Browsing]]></category>
		<category><![CDATA[Secure Facebook]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=149</guid>

					<description><![CDATA[<p>You&#8217;ll be disappointed to know it&#8217;s surprisingly easy for malicious computer users to get access to your Facebook and Twitter accounts. It&#8217;s especially easy if you ever use unsecured wireless [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/software/how-to-secure-your-facebook-and-twitter-accounts/">How to secure your Facebook and Twitter Accounts</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2011/06/facebook.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-150 alignright" title="facebook" src="https://opensystemscomputing.com/wp-content/uploads/2011/06/facebook.jpg" alt="" width="240" height="210" /></a>You&#8217;ll be disappointed to know it&#8217;s surprisingly easy for malicious computer users to get access to your Facebook and Twitter accounts. It&#8217;s especially easy if you ever use unsecured wireless networks.</p>
<p>With the help of a program called Firesheep, (<a title="How to hijack Facebook using Firesheep" href="http://www.pcworld.com/article/209333/how_to_hijack_facebook_using_firesheep.html" target="_blank">details here</a>) anyone on the same wireless network can take over your accounts and cause mayhem. They can send profane messages as you, send links to virus-infected web pages to your friends and business associates, or just make you look like a fool.</p>
<p>While Firesheep requires the hackers be using acomputer, there is now a program for Android phones called FaceNiff (<a title="Hack facebook with FaceNiff" href="http://prohackingtricks.blogspot.com/2011/06/hack-facebook-and-twitter-accounts-in.html" target="_blank">details here</a>)  that will allow a hacker to do the same things right from his mobile device.</p>
<p>Fortunately, there is something very simple you can do to prevent this from ever happening: Turn on secure browsing.</p>
<p>&nbsp;</p>
<p><strong>How to turn on secure browsing in Facebook:</strong></p>
<p>(Warning: This feature may slow your Facebook browsing experience. So you may not want to use it if you are in a secured network or use a VPN. )<br />
Go to Account.<br />
Go to Account Settings.<br />
To the right of  &#8220;Account Security&#8221; click on “Change”.<br />
Under “Secure Browsing (https)”, click the box that says “Browse Facebook on a secure connection (https) whenever possible”.</p>
<p>Note that if you use Facebook apps (a bad idea, in my opinion), they do not support secure browsing. So, when you use an app, you&#8217;ll see this message:</p>
<p>&#8220;WARNING: If you click continue, you are no longer in secured browsing. Whoops.&#8221;</p>
<p>When you are done using the app, you&#8217;ll have to repeat this process.</p>
<p>&nbsp;</p>
<p><strong>How to turn on secure browsing in Twitter:</strong></p>
<p>While logged in to Twitter via a web browser, go to settings.<br />
Next to “HTTPS Only ” click the box that says “Always use HTTPS. ”<br />
Click “Save”.</p>
<p><a href="https://opensystemscomputing.com/software/how-to-secure-your-facebook-and-twitter-accounts/">How to secure your Facebook and Twitter Accounts</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/software/how-to-secure-your-facebook-and-twitter-accounts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">149</post-id>	</item>
		<item>
		<title>Handy Computer Security Tips From People Who Should Know &#8211; the NSA</title>
		<link>https://opensystemscomputing.com/os/handy-computer-security-tips-from-people-who-should-know-the-nsa/</link>
					<comments>https://opensystemscomputing.com/os/handy-computer-security-tips-from-people-who-should-know-the-nsa/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Mon, 23 May 2011 01:27:46 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Computer Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Computer Security Tips]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Security Guides]]></category>
		<category><![CDATA[Security Tips]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=133</guid>

					<description><![CDATA[<p>When it comes to our computer systems, it&#8217;s pretty safe to say that everyone recognizes the need to be security-conscious. But how many of us really know what to do [&#8230;]</p>
<p><a href="https://opensystemscomputing.com/os/handy-computer-security-tips-from-people-who-should-know-the-nsa/">Handy Computer Security Tips From People Who Should Know &#8211; the NSA</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2011/05/nsa_sign.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-136 alignright" title="nsa_sign" src="https://opensystemscomputing.com/wp-content/uploads/2011/05/nsa_sign-300x214.jpg" alt="" width="300" height="214" srcset="https://opensystemscomputing.com/wp-content/uploads/2011/05/nsa_sign-300x214.jpg 300w, https://opensystemscomputing.com/wp-content/uploads/2011/05/nsa_sign-1024x732.jpg 1024w, https://opensystemscomputing.com/wp-content/uploads/2011/05/nsa_sign.jpg 1364w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>When it comes to our computer systems, it&#8217;s pretty safe to say that everyone recognizes the need to be security-conscious. But how many of us really know what to do beyond setting passwords?</p>
<p>If you work in information security, you don&#8217;t need our help. For the rest of you, where do you begin? The task can seem daunting to the average user.</p>
<p>Fortunately, there are plenty of resources to help you, even too many, probably. So where do you start?</p>
<p>Well, how about from the people responsible for securing the nation&#8217;s information &#8211; the National Security Agency (NSA).</p>
<p>From the NSA Mission Statement:</p>
<p><em>The <a href="http://www.nsa.gov/ia/index.shtml">Information Assurance</a> mission confronts the formidable challenge of preventing foreign  adversaries from gaining access to sensitive or classified national  security information. The <a href="http://www.nsa.gov/sigint/index.shtml">Signals Intelligence</a> mission collects, processes, and disseminates intelligence information  from foreign signals for intelligence and counterintelligence purposes  and to support military operations. This Agency also enables Network  Warfare operations to defeat terrorists and their organizations at home  and abroad, consistent with U.S. laws and the protection of privacy and  civil liberties.</em></p>
<p>Surprisingly enough, this agency that lives and breathes secrecy, publishes a wide range of security guides that are completely yours to use for free.</p>
<p>Whether you are an Apple, Windows or Linux user, there are two guides specifically for you at these links:</p>
<p><a title="NSA Security Guide - Operating Systems" href="http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml" target="_blank">Operating Systems.</a></p>
<p><a title="Best Practices for Securing a Home Network" href="http://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdf" target="_blank">Best Practices for Securing a Home Network</a></p>
<p>For the main page where you can browse all of the guides (categories on the left), go to:</p>
<p><a title="Security Configuration Guides" href="http://www.nsa.gov/ia/guidance/security_configuration_guides/index.shtml" target="_blank">Security Configuration Guides</a></p>
<p>These guides are good starting points. Be proactive &#8211; don&#8217;t wait for something bad to happen.</p>
<p>&nbsp;</p>
<p><a href="https://opensystemscomputing.com/os/handy-computer-security-tips-from-people-who-should-know-the-nsa/">Handy Computer Security Tips From People Who Should Know &#8211; the NSA</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/os/handy-computer-security-tips-from-people-who-should-know-the-nsa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">133</post-id>	</item>
		<item>
		<title>Creating Private Folders in Microsoft Windows XP</title>
		<link>https://opensystemscomputing.com/news/creating-private-folders-in-microsoft-windows-xp/</link>
					<comments>https://opensystemscomputing.com/news/creating-private-folders-in-microsoft-windows-xp/#respond</comments>
		
		<dc:creator><![CDATA[Al Bracco]]></dc:creator>
		<pubDate>Mon, 06 Dec 2010 00:43:13 +0000</pubDate>
				<category><![CDATA[Company News]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[Password Protect Folders]]></category>
		<category><![CDATA[Windows XP]]></category>
		<category><![CDATA[Windows XP Private Folders]]></category>
		<guid isPermaLink="false">https://opensystemscomputing.com/?p=126</guid>

					<description><![CDATA[<p>Creating private folders in Microsoft Windows XP is a simple, if somewhat limited process. Here is a quick how-to on how to accomplish this.</p>
<p><a href="https://opensystemscomputing.com/news/creating-private-folders-in-microsoft-windows-xp/">Creating Private Folders in Microsoft Windows XP</a></p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://opensystemscomputing.com/wp-content/uploads/2010/12/set-private-folder.jpg"><img loading="lazy" decoding="async" class="alignright size-medium wp-image-128" title="set-private-folder" src="https://opensystemscomputing.com/wp-content/uploads/2010/12/set-private-folder-240x300.jpg" alt="" width="240" height="300" srcset="https://opensystemscomputing.com/wp-content/uploads/2010/12/set-private-folder-240x300.jpg 240w, https://opensystemscomputing.com/wp-content/uploads/2010/12/set-private-folder.jpg 314w" sizes="auto, (max-width: 240px) 100vw, 240px" /></a>Creating private folders in Microsoft Windows XP is a simple, if somewhat limited process. Here is a quick how-to on how to accomplish this.</p>
<p>There are two possible scenarios.</p>
<p>1) You want to make some folders accessible only when you are logged on with your user account.</p>
<p>2) You want to make some folders inaccessible to anyone without a password, including administrator.</p>
<p>Scenario 1:<br />
•Open My Computer<br />
•Double-click the drive where Windows is installed (usually drive (C:), unless you have more than one drive on your computer).<br />
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.<br />
•Double-click the Documents and Settings folder.<br />
•Double-click your user folder.<br />
•Right-click any folder in your user profile, and then click Properties.<br />
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.</p>
<p>Note</p>
<p>•This option is only available for folders included in your user profile. Folders in your user profile include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you do not make these folders private, they are available to everyone who uses your computer.<br />
•When you make a folder private, all of its subfolders are private as well. For example, when you make My Documents private, you also make My Music and My Pictures private. When you share a folder, you also share all of its subfolders unless you make them private.<br />
•You cannot make your folders private if your drive is not formatted as NTFS. For information about converting your drive to NTFS, check <a href="http://support.microsoft.com/kb/307881">here</a>.</p>
<p>Scenario 2:</p>
<p>My Private Folder is a free Microsoft utility that can be used to password protect one folder per user (profile) applying encryption without resorting to full fledged EFS Windows Encrypting File System.</p>
<p>My Private Folder can be downloaded <a href="http://www.softpedia.com/get/Security/Lockdown/Microsoft-Private-Folder.shtml">here</a>, and the install is straightforward. The utility places a shortcut to the password protected folder in C:\Documents and Settings\ on your desktop.</p>
<p><a href="https://opensystemscomputing.com/news/creating-private-folders-in-microsoft-windows-xp/">Creating Private Folders in Microsoft Windows XP</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://opensystemscomputing.com/news/creating-private-folders-in-microsoft-windows-xp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">126</post-id>	</item>
	</channel>
</rss>
