Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Fridays cannot be all fun and games

People Are Talking

Oh, yes, Dear Reader. I get comments here at Tech – for Everyone. Comments and questions submitted by folks just like you. But for every one of those, I get at least 120 “spam” comments, usually posted automatically (by ‘bots’) by special “submission programs” designed by cheats and lowlifes attempting to manipulate the search engines, and/or get viewers to click links to dangerous websites.
And/or sell me crap.

acting_schools_spam

Here, a ‘bot’ posted a ‘linkback’ URL, and signed it “acting schools in indiana”.
Of all things.

What on earth for? Um.. maybe they need students? Maybe someone got paid to “optimize” the school’s “SEO”? Maybe that webpage is “poisoned” with a lurking “drive-by download” attack?
Maybe someone just has way too much time on their hands… (and not enough IQ)

Bizarre.
The Internet’s a rather bizarre place.

Today’s Friday Fun Video has been reader recommended, consistently comes in at the #1 position of YouTube’s personalized (aka “my”) “recommended for you” list, and, contains an ingredient that should appeal to approx. half the world’s population. (And the thing’s had more than 66 million views!)

And, yes, I know. There’s a bunch of tech headlines I could discuss. The New York Times was (allegedly) hacked by the Chinese; there’s a new Blackberry; iPad sales are just a little too good, maybe; Google’s trying to change the way we use passwords (more accurately, doing away with passwords); and the usual plethora of hacker break-ins/hacktivist attacks; Java’s insecurity; and Windows 8/Office 2013/Surface (tablet) hyperbole.
(For a look at those headlines, click here.)

But I’ve been “keeping my finger on the pulse” for so long now, it’s all starting to look the same as it did in 2007. (Vista, the “new Office”, and a new thing called the “iPhone” were the names in those headlines.) Which looked the same as 2003 looked.
And I’m bored.

.. Though .. headlines like this are kinda new.. Yes, U.S. authorities can spy on EU cloud data. Here’s how

EU citizens and businesses are warned against using the cloud over the risk that U.S. law enforcement and intelligence agencies can obtain your personal records. Here’s how the U.S. can acquire your data, even if you’re based in the EU.Read more..

(Love that cloud computing. [Not.]) (And if they can do it.. who else can too?) Lengthy, but important, read.

Reader submitted: Loyal readers will know that I am a fan of CCleaner (see https://techpaul.wordpress.com/2010/11/17/tutorial-using-ccleaner/). Recently, a reader mentioned another, CCleaner-like program to me, and said they really liked it. It’s called PrivaZer. I have not had time to test this yet, and doubt I’ll be switching, but here is one good, informational review (includes download link) if you’re interested: PrivaZer, Deep System Cleaner that removes traces

“I first thought that PrivaZer was just another system cleaner like CCleaner or the myriads of alternatives that are available: boy was I wrong. First thing that I liked was the option to run the program as a portable application or install it. When you then start the program you are asked what you want to do, and which device you want to scan.” Read more..

~     ~     ~

Windows 8 Users: A Free Software Utility To Edit The Windows 8 Quick Access (WinX) Menu

Recently I posted the article, A Must Learn Windows 8 Tip: How To Get To The Quick Access Menu And To The Windows 8 Start Menu. In summary, this menu appears when you place your mouse pointer in the bottom right corner of the screen and when the the Start Screen thumbnail (or tip) pops […]” Read more..

Glad the weekend’s here.. almost.

acting schools in indiana?
Really??

… 66,000,000 views. I’m in the wrong line of work!

Today’s quote:We tend to forget that happiness doesn’t come as a result of getting something we don’t have, but rather of recognizing and appreciating what we do have.” ~ Frederick Keonig

Um.. I don’t think so..

I think I see a pattern here...

I think I see a pattern here…

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

February 1, 2013 - Posted by | cloud computing, computers, consumer electronics, Internet, News, privacy, tech | , , , ,

4 Comments »

  1. I certainly will go into the registry and delete items that I’m SURE won’t cause a non-functional machine, but it doesn’t happen very often… and it’s always done for a darned good reason. I also always backup the registry before beginning such a dangerous endeavor.

    CCleaner has caused problems for me in the past by letting it choose items to delete from the registry, so I leave that function alone. It does however have some cool features that I like and will continue to use.

    Messing with the registry is a great way to find yourself reinstalling Windows and all the rest of your applications. Err on the side of caution folks…

    Like

    Comment by KsTinMan | February 1, 2013 | Reply

    • KsTinMan,
      Experience has taught me that allowing a program, even a reputable and highly-rated program, to scan your Registry for “errors” and “fix” them, should really only be done as a Method of Last Resort. And you should -absolutely – allow the app to make a backup before beginning the ‘fix’ when you do decide to use the Registry feature.

      But millions of people will try to “make their computer faster” (or “run like it was when it was new”) using such “tune-up optimizers” each and every year. It isn’t exactly snake oil, and it’s a money maker, so I see no end to companies producing such programs.

      (And, I do agree with you, and regularly use CCleaner for privacy and ‘housecleaning’ tasks — deleting “cookies”, Internet “temp files”, etc..)

      Like

      Comment by techpaul | February 1, 2013 | Reply

  2. Big Brother

    Like

    Comment by Anonymous | February 2, 2013 | Reply

    • Sir or Ms,
      I take it you are referring to the EU article.

      All I’ll say is, I have often wondered why people do not treat what they post (or “upload”) and transmit from machine to machine, as visible to the world. Because it basically is. Unless it (the “data”) is encrypted.

      Basically, treat what you post on Facebook as if your mother could read it, and your email as postcards (not sealed envelopes).

      Like

      Comment by techpaul | February 2, 2013 | Reply


Post your Comment/Question

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: