Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Brain-reading Devices

A highly recommended ‘food for thought’ article for you today..

Think Internet Data Mining Goes Too Far? Then You Won’t Like This

These days, you can hop on the Internet and buy yourself a consumer-grade brain scanning device for just a few hundred dollars. Technically, they’re called brain computer interfaces, or BCIs. As these devices develop, researchers are thinking a few steps ahead — they’re worried about how to keep marketers from scanning our brains.Read more..

[ Share that one with your friends/family..]

Sorta related: Yesterday, while watching an educational seminar posted to YouTube, I experienced for the first time YouTube’s “InVideo” ’embedded’ ads – ads that actually interrupt the video, and you have to wait/watch for 5 seconds before you can click on “skip ad” – which was made worse by incessant ‘ghost overlay’ (semi-transparent) ads which I had to keep closing.

Almost exactly 5 years ago I wrote Good-bye YouTube. Enjoy Your Ads., and I guess it’s finally come to fruit. I am muttering expletives like the proverbial Chief Bosons Mate, here folks. Has advertising gotten SO invasive/pervasive that I must cut out all forms of media (besides books)? Seems to me we have reached that point. (I’d like to paraphrase Shakespeare here: “And the second thing we do is..”)

If anyone knows of an ad blocker (or other trick) that can strip those out, please let me know. (Yes, I looked at this one.)
Update: Found an easy one. I added ||2mdn.net^ as a custom filter to my AdBlock Plus extension. Yay!

Today’s quotable quote:Advertising is the art of convincing people to spend money they don’t have for something they don’t need.” ~ Will Rogers

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 30, 2014 Posted by | advice, consumer electronics, how to, News, privacy, tech | , , , , , , , , , , , , , , , | Leave a comment

Everlong

Rather strange.. but it fits my mood. (And I think I read it is David Letterman’s fave song..)

Hope everyone is having a pleasant enough day.

Update: Your MasterCard Suspended for Fraud? It’s a Scam.

Scammers are calling unsuspecting consumers on the telephone to steal credit card numbers. If you get such a call, just hang up. Do not engage.Read more..

Where’s the tech, Paul? A decent resource for online reputation management tips and advice can be found here.

Today’s quote:Learning is the beginning of wealth. Learning is the beginning of health. Learning is the beginning of spirituality. Searching and learning is where the miracle process all begins.” ~ Jim Rohn

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 28, 2014 Posted by | advice, digital music, digital Video, Internet, privacy, tech | , , , , , , , , , | Leave a comment

Net Nuetrality, and other tidbits

Feels like Monday…

The FCC’s Net neutrality plan is much worse than it looks

Under the new proposal, ISPs will be slower to upgrade their networks and will find it easier to exploit customers on both ends.Read more..

I hope you’re not surprised… * China accuses Cisco of supporting US cyberwar efforts

China is attacking secret surveillance programs of the U.S. government with harsh words from its state-controlled press, accusing Cisco of helping the U.S. in cyber espionage.Read more..

* IE8 zero-day vulnerability unpatched for months, possibly millions at risk

An unpatched zero-day use-after-free remote code execution vulnerability affecting Internet Explorer 8 (IE8) was publicly disclosed on Wednesday by the Zero Day Initiative (ZDI) because it has been more than six months since the flaw was initially reported and Microsoft has yet to issue a fix.Read more..

[Please understand, one shouldn’t get too sore at MS for this, as a better question is, “why is someone using an obsolete version?”] (Some might argue a better question is, “why is someone using Internet Explorer at all?)

Follow up: The eBay data compromise: What you need to know

eBay has joined the elite list of companies that have lost members’ personal information. Learn how that affects you personally.Read more..

Bah. That’s enough for today.

Today’s quotable quote:If you don’t design your own life plan, chances are you’ll fall into someone else’s plan. And guess what they have planned for you? Not much.” ~ Jim Rohn

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 27, 2014 Posted by | computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, Microsoft, privacy, security, tech | , , , , , , , , | Leave a comment

Time to Remember

Memorial Day is a United States federal holiday observed on the last Monday of May. Formerly known as Decoration Day, it commemorates U.S. men and women who died while in the military service. First enacted to honor Union soldiers of the American Civil War, it was expanded after World War I to include American casualties of any war or military action.

A national moment of remembrance takes place at 3 p.m. Eastern Time. Another tradition is to fly the flag of the United States at half-staff from dawn until noon local time. Many people observe this holiday by visiting cemeteries and memorials.

Some Americans view Memorial Day as the unofficial beginning of Summer, and the holiday is also used as a time for picnics, barbecues, family gatherings, and sporting events. One of the longest-standing traditions is the running of the Indianapolis 500 motor race.

tomb-unknown-soldier-pictureInscription: “HERE RESTS IN HONORED GLORY AN AMERICAN SOLDIER KNOWN BUT TO GOD”

Please have a safe Holiday. (And, yaaaaaaaaaaaaaaaaaaay!!! Summer!)

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 26, 2014 Posted by | advice | , | Leave a comment

Wrapping up the week

(And a fun video, for balance)

Here are a few interesting headlines, for your consideration.

The 'Nemanja' POS malware is being used to steal payment cards in a worldwide campaign.

The ‘Nemanja’ POS malware is being used to steal payment cards in a worldwide campaign.

* ‘Nemanja’ POS malware compromises 1,500 devices, half a million payment cards, worldwide

As many as half a million payment cards used in hotels, grocery stores and other business around the world – including in the U.S. – have been compromised by ‘Nemanja,’ a recently discovered piece of malware that has infected nearly 1,500 point-of-sale (POS) devices.Read more..

* For sale: alleged dump of 145M eBay user records

An alleged dump of eBay user records has been made available for purchase, a day after officials at the popular auction and shopping website made the announcement that a breach occurred sometime between late February and early March.Read more..

Apparently, a copy of such a list is worth $700.

* HP To Eliminate Up To 16,000 More Positions

The additional cutbacks come on top of the 34,000 positions that HP was eliminating in connection with a multiyear restructuring plan that was outlined in May 2012.Read more..

.. so.. you want a career in tech?

* Surface Pro 3: The tablet that can replace your laptop

Microsoft has had some problems framing the marketing for the Surface tablets, but “The tablet that can replace your laptop” tagline nails it.Read more..

[Just one problem.. it’s not exactly true. {More true than with an iPad, tho.}]

* State-Owned Chinese Firms Hired Military Hackers for IT Services

“The DOJ’s historic indictment provides some rare insight into China’s cyber espionage operations.Read more..

Saving the best for last department: How to lie, cheat and steal like Snapchat — all the way to the bank

Two weeks ago the Federal Trade Commission announced a settlement agreement with Snapchat, formally acknowledging the app lied about user privacy and security, and took user data without consent.
The great thing about users is that you can do anything you want to them, and they can’t refuse. ¹

Snapchat collected the contents of user address books without their consent, and its privacy policy flat-out lied about collecting a user’s location information. Snapchat secretly collected the private user information and shared it with unknown parties. Snapchat promised users their photos disappeared “forever” — an impossible promise that exploits a populace not fully educated about mobile technology’s functions and implementations.Read more..

Saddest part is (it sure seems to me), the people who use Snapchat couldn’t care less about such things.

¹ Anyone using, or thinking of switching to, a “subscription service” should think about that fact …

Today’s quote:Be kind whenever possible. It is always possible.” ~ Tenzin Gyatso, 14th Dalai Lama

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 23, 2014 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, Microsoft, mobile, News, privacy, tablet PC, tech | , , , , , , | Leave a comment

Welcome to the New Cold War

Folks, this article not only should be read by everyone, but ‘forwarded’ to all your friends and family. The news is that big. This is definitely something to be aware of, and to pay attention to.

lapel-pin-US-flag

* U.S. charges Chinese military group with cyber espionage

The U.S. made a rare move to pursue foreign government employees by charging five Chinese nationals with committing economic espionage against Westinghouse, Alcoa , the U.S. Steelworkers’ Union and other large U.S. companies and organizations, in a move that serves as a warning and a wakeup call for both state-sponsored hackers and the companies that they attack.Read more..

This is a monumental change. It has been patently obvious – to those who pay attention to such things – that for years China has not been “playing nice” (some would say, has been waging cyber war, if not mere cyber espionage/theft), but that they’ve enjoyed a kind of tacit immunity, because they own all our money, and build all our devices.. and we (think we) want access to that vast market.

Why is this so important? “It’s possible this could cause a Virtual Cold War between the world’s biggest economies, with wide-ranging impact on the entire planet.

Again, read the article, here.

Maybe… we’ll have to start making our own stuff again…

A wee bit of good news: Historic global cyber crime bust takes down ‘BlackShades’ users

An FBI-led investigation involving law enforcement agencies in 17 countries has led to one of the biggest cyber crime busts in recent history.Read more..

Yes. History is being made …

Today’s quote:The few who do are the envy of the many who only watch.” ~ Jim Rohn

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 21, 2014 Posted by | cyber crime, Cyberwarfare, hackers, News, security, tech | , , , , , , , , , , , , | 4 Comments

Serious Threat Now Hits Android, and a SB

Howdy folks.

I have mixed emotions about this recent news item. PC Porn Ransomware Comes to Android

A new strain of Android malware is posing as a premium porn-viewing tool. Once loaded, this ransomware displays a screen claiming that the user has violated laws and the device has been encrypted pending an untraceable payment. Is your Android really locked?Read more..

On one side of the coin, I’m glad for the article because too many people simply do not understand the risks, or even know there are “mobile threats’ (and malware). On the other side of the coin.. you play with fire..

And of course, there’s always Iran: Anatomy Of The New Iranian APT

A newly unearthed attack campaign out of Iran targeting US defense contractors and Iranian dissidents confirms that Iran has expanded its cyberoffense capability and strategy far beyond its signature politically themed website defacements — into a full-blown cyber espionage operation.Read more..

Interesting times.

Today’s Pretty Picture:

ocean sunrise

Click on image to see more by this artist

Today’s quote:Life is ten percent what happens to you and ninety percent how you respond to it.” ~ Lou Holtz

Today’s free idea: Have you been sitting and looking at your screen for longer than 20 minutes? Stop it. Stand up stretch! Better yet, get outdoors, take a walk. Get your body moving! Then come back and feed your addiction (screen staring). Doing too much sitting can kill you, you know.

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

May 18, 2014 Posted by | advice, Android, computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, Internet, mobile, security, tech | , , , , , , , , , , , | Leave a comment