Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

And today it’s Linux’s turn .. (sigh)

I gotta stop paying attention to the tech news… :(

* Linux rootkit, named for Pokémon’s Umbreon, targets Linux

A new rootkit family, dubbed Umbreon after a character in the popular Pokémon game who hides in the night, has been detected targeting Linux users, according to a Monday post by Trend Micro researchers.” Read more..

[ Don’t know what a “rootkit” is? You really should by now. No excuse, actually. Go to Wikipedia right now! ]

* * *

Today’s quote:Since our society equates happiness with youth, we often assume that sorrow, quiet desperation, and hopelessness go hand in hand with getting older. They don’t. Emotional pain or numbness are symptoms of living the wrong life, not a long life.” ~ Martha Beck

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 7, 2016 Posted by | advice, computers, consumer electronics, cyber crime, hackers, Linux, News, PC, security | , , , , , , , , , , | Leave a comment

Things Change (And Heartbleed)

The fact that “tech” has changed our lives is patently obvious. And talking with people, it’s pretty clear that the rate of that change has not always been .. a comfortable thing.
(The “Average Joe” really doesn’t understand geometric growth, and/or Moore’s Law.)

I came of age back in the days when there were only 4 – 6 television stations (which were tuned in by moving “rabbit ears” antennas); before there were ATM machines or cell phones, and a bicycle with TEN speeds was kinda a new idea, so, yeah, I know. Things change.

So the following items do not surprise me, really.

Aereo signals cloudy future for broadcast TV

Whether the New York-based streaming remote DVR service lives or dies at the hand of the Supreme Court, the future for television programming is firmly seated in the Cloud.Read more..

No more (free) over-the-air TV?

Maybe not a bad thing.. they’re called “idiot boxes” for a reason.

The price of popularity: Cloud security threats near on-premise levels

Hackers are now targeting cloud-based apps and systems almost as much as on-premise environments, particularly with so-called brute force attacks and vulnerability scans.Read more..

[The line I found most interesting.. “found that 14 percent of malware collected through the honeypots was considered “undetectable” by 51 percent of the leading antivirus software providers“.. Not good.]

What can you do about Heartbleed? By now, the Poindexters in the basement should have ‘patched’ their ‘servers’. So we can now do the one thing to try to protect our ‘identities’ – change our login passwords at the sites that collect PII (Social networking sites, ecommerce sites, and online banking sites, for example.)
But first, verify the patches have been applied by visiting safeweb.norton.com/heartbleed and enter the URL of the website in question.

Today’s quote:We make a living by what we get, but we make a life by what we give.” ~ Winston Churchill

Copyright 2007-2014 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
And please, never forget – one person can make a difference.
Find a way to make someone’s day today.
(Best advice I ever heard? Don’t sweat the small stuff.)

April 23, 2014 Posted by | advice, cloud computing, computers, consumer electronics, hackers, Internet, News, tech | , , , , , , , , , , , , , | 4 Comments

Topics Of Interest

Busy day here, but I found some good articles whose topics I hope you will find interesting, and the info provided, valuable. Some “recommended reading”, if you will.

How The New ‘Protecting Children’ Bill Puts You At Risk

A bill now makes the online activity of every American available to authorities upon request under the guise of protecting children from pornography..

“Protecting Children” forces ISPs to retain customer names, addresses, phone numbers, credit card numbers, bank account numbers, and dynamic IP addresses..

It’s like having your wallet plus the web sites you visit tracked and handed over on request. These logs are now going to be retained for the scope of one and a half years.Read more..

(Those of you with a brain might wanna make a point of reading this one.. This is just plain wrong [IMHO]. The article contains a link for voicing your opposition.)

• 10 ways to safeguard your college-bound student’s computer

You protect your corporate systems, but what about that back-to-school laptop you just bought your kid? Here are some things you can do to keep your student safe from cyber dangers.Read more..

Five reasons Android is superior to the iPhone

While on vacation, I was reminded (yet again) how superior the Android platform is to the iPhone.Read more..

Creating Shortcuts to Google’s Gmail, Docs, Tasks, Calendar and Contacts

I am a big Gmail user and have come to depend on Google’s Gmail and many of the other Google apps as an online personal information manager.Read more..

Three things Chromebooks need to fix to win buyers

While Chromebooks have the potential to win corporate customers, I still think three things need to happen before Chromebooks will attract consumers and businesses in large numbers.Read more..

The 10 Best Apps Of July From The Daily App

From Google+ for iPhone to Firefox for Android, here’s a glimpse at the best mobile apps we’ve featured in July on The Daily App blog.Read more..

10 things you should still do to every Windows PC

There are at least 10 things you should take a few minutes to do to every new Windows PC to get it ready for daily use. Don’t let your back-to-school PC drag your first semester down. Read more..

10 Cool Security Features In Mac OS X Lion

No doubt, when it comes to security, Apple’s new Mac OS X Lion is shedding its spots and is ready to roar. As the dust has settled on the release of Apple’s Mac OS X Lion, unveiled July 20, experts have started asking, “Yes, but is it secure?”Read more..

And for the super-Geeky.. (Here at T4E Headquarters, “geek” is a compliment.)

i-NVMM: Securing non-volatile memory on the fly

Computer memory is a treasure of unencrypted information. Fortunately, power off and it disappears. That’s not the case with next-generation memory.Read more..

10 Biggest Cyber Attacks Of July

The lazy days of summer were anything but for hackers this month. If anything, hackers were ramping up their efforts under increased pressure from international and domestic law enforcement agencies.Read more..

(Hmmm.. maybe you all should look at this one also..)

Today’s quote:I never had a policy; I have just tried to do my very best each and every day.”  ~ Abraham Lincoln

Have a great day, everybody. And what do you say, let’s do the right thing.

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


August 2, 2011 Posted by | advice, Android, Apple, computers, cyber crime, Google, Internet, Microsoft, mobile, News, security, tech | , , , , , , , , , , , , , , , , , , , , , , , | 11 Comments

Cybercriminals Target Clueless Vacationers

laptop_beach “This guy doesn’t know it, but he’s putty in the hands of cybercriminals. The newest trend in Internet fraud is “vacation hacking,” a sinister sort of tourist trap.

Cybercriminals are targeting travelers by creating phony Wi-Fi hot spots in airports, in hotels, and even aboard airliners.

Vacationers on their way to fun in the sun, or already there, think they’re using designated Wi-Fi access points. But instead, they’re signing on to fraudulent networks and hand-delivering everything on their laptops to the crooks*.”

Please click here to read the rest of this story, and find out what you need to know before you use public “hotspots”.

* emphasis mine.

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

July 20, 2009 Posted by | advice, computers, cyber crime, Internet, News, Portable Computing, security, tech | , , , , , , , , , , , , , , | 3 Comments