Remember when? And you still got busted for it?

Techno Granny Show blog is an additional way for Techno Granny Talk Cast fans to keep up with Techno Granny. She is a 61 year old single grandmother who also hosts four Talk Casts on the Talk Shoe network. The Techno Granny show is designed to bring baby boomers and others up to snuff with 21st Century technology. TechnoGranny Talks is more than that, it is technology finds and opinions of a tech savvy grandmother who is a power user of technology.
Tuesday, August 5, 2014
Sunday, August 3, 2014
TechnoGranny Show, 7/22/13 Twenty Things You Should Know Before Downloading Free Software.
TechnoGranny Show, 7/22/13 Twenty Things You Should Know Before Downloading Free Software.
Listen to the Show Here
Is
downloading free software safe? You get a pop up on your computer that says,
"Safe Software to Store Your Passwords, " No, you idiot, it's
probably not. Beware before you click, you may just be inviting a wolf into
your home, computer, records. ..........Answers to questions like What is
freeware?........Where can I find freeware?.........Suggestions for safe places
and curated lists to find and review software that can be helpful and tips for
safe downloading.
How easy is it to fall
victim to a scam on the internet? The
correct response is, too easy. Most of us are probably aware of the hazards
which could accompany opening a suspicious email. Now we need to be mindful of downloading
software that could potentially damage our computer, sabotage personal files or
rob us of our identity. This segment's subject
delves into the lure of free software, or freeware, as it is often called.
What
is freeware and how can you avoid putting your computer into harm’s way?
Techno Granny will
guide you through the topic of free software and unveil the truth behind
downloading programs that are often promoted to help when in reality they
perform the exact opposite. Hopefully,
with the research and advice of Techno Granny, we all will be more thoughtful
before falling prey to the lure of ‘free’ software.
Is
Downloading Free Software Safe?
In her article, Is
downloading free software safe, http://computer.howstuffworks.com/downloading-free-computer-software-safe.htm
published on How
Stuff Works, Kate Kershner simplifies the matter of
using free software; if it comes from a
reputable source, such as Microsoft,
and your are searching for the programs on their direct site it is probably safe.
Downloading a pop-up or an advertisement from a little known company with an
unfamiliar program may not be a wise choice. No matter how alluring the ‘free’
portion of the deal may sound, Kershner advises doing an internet search of the
company offering the system before downloading or installing any software. You can read the full article here http://computer.howstuffworks.com/downloading-free-computer-software-safe.htm
Why Free Software
Downloads Aren’t Always Safe.
Norton is a company whose name
is synonymous with privacy, anti- theft and antivirus. They
span a significant corner of the internet security market for PC’s, MACs and
mobile devices. The official Norton site, offers consumers insight into
managing the market of freeware. On the Your Security Resource page, general questions
about freeware are answered by expert Elizabeth Wasserman. The first question:
What
is freeware?
The answer, “freeware
is software that you install on your computer knowingly or not”. One popular example of freeware is games and
may also be referred to by the phrase widget.
Freeware can come from
a cd or directly from a website download. It’s important
to note, not all freeware is dangerous to your computer. It depends on the source of the program.
The
second question: Where can I find freeware?
Wasserman’s answer
encompasses safe downloads as well as those we should be guarded against. Well-known
companies, shareware makers and widgets alike all offer freeware, therefore weeding
out trustworthy and verifiable sources may seem like a daunting task. Rest assured, there are some simple tactics
which can be applied to your investigation before downloading iffy applications. Most notably, well- known companies will
often require consumers agree to a licensing agreement upon installation.
Corporations such as Microsoft and Adobe Acrobat are household names in this
arena. In addition, searching for a
company through the Association of Software Professionals is another good source
for gauging the legitimacy of a company.
http://asp-software.org/www/
The
third question what are the risks of freeware?
The response is severe. Some free software can have spyware or
malicious adware attached to the code.
If this is the case, viruses, worms and other detrimental file
management systems can become inserted into your computer wreaking havoc on
your files, and putting you at risk of identity theft.
The last and most
important question, how can I protect myself from risky freeware?
The
answer outlines 4 essential steps anyone can easily take to ensure their
computers protection.
1.
Step one, do your homework. In other words, before downloading take a few
extra minutes to do a Google search of the program. Alternatively, visit a software site like
CNET or ZDNET to read freeware reviews.
3.
Step three, always keep security
programs up to date. This may seems like
a no brainer but complementary to running an antivirus program is the
recommendation to patch any holes in current software. Malicious software may
make use of outdated programs, so keeping abreast to any updates and new
versions as they are released is helpful.
4.
Step four, be wary of social network
freeware. Many social media sites offer
applications, free from cost, downloadable directly from the site onto a
computer or other device. Despite the
popularity of these widgets, they cannot always be verified. Furthermore, social networks are quick to
renounce any responsibility related to the security and safety of these
applications. Knowing this alone should be a red flag.
It can’t be said enough, if it sounds too good to be true, it probably is. Some software companies test their software for bugs while others are simply trying to trick you into allowing them to place a virus or spyware on your device. Read the complete Norton article Here
For your protection and the defense of your computer and your files stored on it, please take advantage of ZDNet, the web’s largest library of software downloads. This site has complied lists of software for Windows, Mac, and mobile systems. Searches can be conducted by price, category or most popular downloads. ZDNet offers a basic description of the program such as Avast Free Antivirus 2014, AVG Antivirus Free 2014, Java Runtime Environment and also provides a link viewers can use to access the program right from their site. ZDNet is a strong safety net for consumers. View their home page here
Cnet.com
is another reliable site which offers freeware resources such as software and
app reviews, news, how to’s and downloads for Windows, Mac, iOS and Android. Covering a vast array of electronic and
computerized devices any person would find helpful, including but not limited
to appliances, car tech and cameras in addition to the expected laptops, mobile
devices and PC’s. This site is an
invaluable resource for today’s consumer. You can access their site here http://www.cnet.com/. Windows users may find http://www.filehippo.com/
helpful. Filehippo contains a directory
of downloads including freeware, shareware and software. Aside from software downloads from trusted sites, Filehippo offers their
own software called FileHippo Update
Checker. This is a cost- free program that scans your computer then generates a
report listing any out of date software.
The report suggests the installation of the most current versions,
including links to the appropriate sites. Commonly available on Filehippo are
browser and plugin software, anti- malware, audio and video, file sharing,
firewall and security, messaging and chat and system tuning programs. Connect
with the valuable resources available through Filehippo here http://www.filehippo.com/.
If you
are feeling concerned about how to safely navigate the freeware circuit, Chris
Hoffman offers some good advice in his article, How To Do Your Research Before You Download Free Software. In a nutshell, research
first, download later. The type of
device you have will also dictate where you seek out security information needed
for reassurance purposes. Hoffman offers
7 tips for guiding Windows users toward a safe download experience.
·
Find a curated list of
the best free software available for download.
Hoffman directs consumers to his site, http://www.makeuseof.com/pages/the-best-of. Here individuals can
take advantage of research that has already been gathered.
·
Make sure you trust the developer. A company like Microsoft or Google is well known and safe but if the company is lesser known, it would be best to visit a site like http://www.Cnet.com/ and research the program and company before putting your computer at risk for a potentially harmful download.
Make sure you trust the developer. A company like Microsoft or Google is well known and safe but if the company is lesser known, it would be best to visit a site like http://www.Cnet.com/ and research the program and company before putting your computer at risk for a potentially harmful download.
·
Only download from a
trusted site. Many third- party sites
like Cnet give consumers an opportunity to download directly from their
page. These sites are typically safer to
use because they are monitored for security flaws. Try to steer clear from
downloading from someone’s personal site because there are no telltale signs
they are safe.
·
Read reviews. To increase your chances of finding an
unbiased review begin with a Google search using the program name. Social networks are another good source for
reviews.
·
Use an antivirus. It doesn’t matter how careful you are, an
antivirus will offer your computer another layer of protection. Many of the
antivirus programs available can be downloaded for free. This is a prime example of freeware. There are many well-known corporations that
offer free, or free on trial basis, antivirus software. Just be sure the name is one you can trust
or that you have researched the company before downloading or installing software.
·
Install an app in a
sandbox. This is typically something
more experienced tech users are accustomed to.
The process would require Sandboxie to run a
questionable program in a sandbox. This
would allow the program to be tried in an isolated area of your computer where
it cannot do damage to the rest of your system. A knowledgeable computer user
may also be acquainted with virtual machines which
would allow you to test the program in the same manner.
·
Pay attention during
the installation process. Despite the
legitimacy of many freeware programs, even the trusted sites will include
software you do not want, such as adware or default search engine changes. Java
and Adobe are notorious for this, so it is critical that you pay attention
during the install so you can decline any unwanted additions to the software as
they occur.
You can read the complete article here
What are some of the ways you
research freeware? What do you look for
to ensure it won’t mess up your
computer? We are always looking for comments and tips to share.
computer? We are always looking for comments and tips to share.
Imperatives for safe download.
1.
Use common sense. Be suspicious of flashy ad or popup windows
that contain unsolicited invitations to download, or that stress an urgent need
for you to download immediately.
2.
Never download a file unless you know
and trust the source.
3.
Do not download a file from BitTorrent
or any other file sharing program; ever.
4.
Google the product you are considering
downloading.
5.
Always read the program description before
installing. This will allow you to
verify its’ compatibility with your computer.
6.
Always backup your files before you
install any new software.
7.
Although scanning programs for viruses,
worms, malware and the like is never a guarantee, it can’t hurt. Any extra steps applied to ensure the safety
of your files and hardware is a good idea.
Safe
places to download software from.
Further
Research has led us to uncover
Site Advisor,
a service browser plug- in from one of the most trusted names in online
security, McAfee. This free software
adds safety ratings to web sites and offers a secure search box. In addition, I have prepared an inventory of major
download sources which have received the
Techno Granny ‘seal of approval’. Often their ratings are provided by the supplier so comparing a few different sites is advised. The list includes Tucows, MajorGeeks.com, WebAttack, NoNags, Pricelessware, WinPlanet, ZDNetDownloads and CNET. Also I will offer a plug for our very own community based Gizmo. Gizmo selects the best of the best freeware options and displays them for your use. I have taken the liberty of generating some special search engines available. Please take advantage of the work I have done to find the specific type of programs you are seeking.
Techno Granny ‘seal of approval’. Often their ratings are provided by the supplier so comparing a few different sites is advised. The list includes Tucows, MajorGeeks.com, WebAttack, NoNags, Pricelessware, WinPlanet, ZDNetDownloads and CNET. Also I will offer a plug for our very own community based Gizmo. Gizmo selects the best of the best freeware options and displays them for your use. I have taken the liberty of generating some special search engines available. Please take advantage of the work I have done to find the specific type of programs you are seeking.
Microsoft’s Free
Download Center provides links to over 5,000 programs,
including games. Furthermore, The Ultimate
List
of Windows Software from Microsoft may make finding what you are looking for a
little simpler.
Listen to the Show Here
Techno Granny Show Hosted By:
Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOG
This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show™ 2014 All rights reserved.
Dreamweaver Marketing Associates | (412) 444-5197
Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemag
Additional blog posts at: http://technogrannyshow.com
Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOG
This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show™ 2014 All rights reserved.
Dreamweaver Marketing Associates | (412) 444-5197
Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemag
Additional blog posts at: http://technogrannyshow.com
Monday, July 21, 2014
TechnoGrannyTalks, 7-14, 2014 Techno Granny, Attention Parents, Risks and Fixes for Teens on Facebook.
Title:
Techno Granny,
Attention Parents, Risks and Fixes for Teens on Facebook.
Listen to Show Here
In October 2013
Facebook announced teenagers ages 13-17 will be permitted to post publicly.
This means anyone on the social networking site could have access to
information provided by your child.
Learning to navigate the world of social networking is not easy,
compounding the learning curve are conventional parental responsibilities. This
raises a novel host of questions and concerns for parents, guardians and
caregivers of teens and tweens.
In
todays show Joanne Quinn- Smith, Techno Granny, investigates several risks
related to Facebook and social media.
She introduces her listeners to multiple studies conducted by leading
experts in the field of technology which address not just the problems
surrounding teens and social media, but fixes; ways to avoid or solve the troubles
teens experience in cyberspace.
Help
Your Teens Play it Safe.
![]() |
They love the computer but how safe are they? |
Accessibility
to technology has changed aspects of everyone’s life.
Today’s youth have grown up immersed in a cyber-culture. For most,
computers allow near instantaneous communication and are usually packaged small
enough to fit into the palm of our hand.
This type of high tech telecommunication is all youth know. On the same hand, parents have striven to
teach and guide their children through life’s most difficult moments; this
includes the trials and errors of learning to become independent and productive
adults. The basic instructions parents
need to instill upon their children have not changed because technology has
changed. If anything, the influx of new communication devices requires parents
to become more diligent than ever in monitoring and understanding how kids manage
their participation on social media sites.
Teens
use Facebook for the same purpose as adults; they
·
connect
with friends,
·
send
messages,
·
share
photos and videos and
·
Plan
social events.
It
all seems harmless until you stop to think about who your children are
associating with on social networking sites.
Who are your teen’s friends on Facebook?
Now that Facebook enables individuals to manage their own audience, the Activity Log is a means for users to review
and watch over what has been posted. The Activity Log is private to everyone
but the user. From here, users can
manage who is capable of seeing their content.
A
Simple inquiry such as, “why is Facebook important to you?’ opens a window into more in
depth conversation about appropriate online behaviors. reviewing your child’s privacy settings with
them is a good way to set social media ground rules as well as enforce
them.
The
frequently evolving realm of social media is a lot for adults to keep tabs on,
but for youth who have
grown up with social media as an integral part of their
lives, there is a good chance they know more than you. A straightforward way to learn the basics is
to ask your child to teach you.
Conversations
with your child about online predators and privacy are no brainers, but equally
important are chats about the Golden Rule. A gentle
reminder that anything posted online can be misconstrued or taken out of
context can be of great consequence. Online
communication lacks additional clues (tone of voice, body language) therefore; comments
and posts are not always interpreted in the way the sender intends. The Golden Rule states ‘treat others as you
would want to be treated’. Practicing
self-respect and respect for others when communicating, specifically online, is one way teens can safely connect with
friends and peers on social media. In other words, think before you post. This idea applies to parents as well. If you have friended your child on Facebook
it is recommended that you apply the same boundaries you have offline to your
online relationship. Parents need to
create a healthy balance between their teens developing independence and any
safety concerns that may arise due to the use of social networking. It is equally important for adults to learn
the language of social networking. These
sites often have their own set of acronyms and terms which describe various
online activities and characteristics. Familiarizing
yourself with the correct terminology may take away your suspicions of social
media.
How
Can I Help My Teen Use Facebook Wisely?
Parents can always opt to assist their tween or teen
in setting and managing their Facebook page’s
security and privacy. Ongoing conversations regarding Facebook
usage and responsible online behavior are a parent’s obligation. Beginning basic education at a young age will
help ensure your child grasps the concepts of internet safety. Some fundamental online safety rules to
instill in children include never share a password, think before you post,
accept friend requests only from people you know offline and report anything
that appears suspicious.
![]() |
Learn as much as you can about Facebook. |
7
Facebook Risks You Should Discuss With Your Teen.
According
to Victoria Kempf, blogger for Teenlife.com, many parents worry about what
their teens are doing on Facebook. There are many documented benefits to
participating in social networking, but there are risks that accompany the
advantages. Parents must be aware of
these risks in order to keep their children safe. The 7 risks parents should be
prepared to address with their tweens and teens as they cultivate a digitally social
life are as follows:
1)
Facebook Postings Are Not
Private.
2)
Facebook Postings Can Impact Your
Teen’s Future.
3)
Friending On Facebook Equates To
a Badge of Popularity.
4)
Online predators are Real.
5)
Cyberbullying Is Real.
6)
Poking is Sharing. It Can Also Be
Sexting.
7)
Identity Theft Can Happen To
Teens Too.
Each of these risks has the
potential to lead to harm of child. Luckily
there is a fix to accompany each risk.
Posts are not private. In a nut shell, anything posted on line has
the capability of being copy and pasted elsewhere by anyone with access to your
child’s Facebook account. This includes
videos and photos. In order to render
this problem parents should assist their children with programming their
Facebook privacy settings.
Related to privacy is the trend
of Tagging.
Tagging can create a lot of issues regarding privacy, or lack
thereof. When someone is tagged in a
Facebook photo, their identity is publicized and linked to their Facebook
Timeline. When looking over your child’s
settings consider applying review tags, so that your teen must approve any photos
before they are displayed for the world to view.
When someone posts on a social media site they are
in an essence creating their own brand.
This is also referred to as a
digital footprint. Many teens still view
social networking as an anonymous way to explore certain topics and socialize
with people they wouldn’t necessarily mingle with offline. As people increase their cyber citizenship
many colleges, scholarship providers and employers view the Facebook profiles
of potential candidates before making a selection. This process is done to verify any students or
employees chosen to represent an organization are the type of individual who
will have a positive reflection upon the association. The best way to combat this problem is to
have on going conversations with your children concerning appropriate
behavior. On or offline, tweens and
teens need to consider what the consequences of their actions may be.
Many children assume more friends on Facebook mean
they are popular.
Often kids accept a ‘friend’
request from anyone, even if they do not know the person offline. How does a parent manage their child’s
friends? If your child agrees to
‘friend’ you on Facebook, you will then have access to their personal friend
list. From this vantage point you can
monitor the exchanges that go on between your child and their ‘friends’.
Sometimes children post messages
and status updates that unintentionally attract online predators. Just as teens have become tech savvy, so have
predators. To avoid this potentially dangerous situation parents should present
their teen with a list of things that should never be posted on Facebook or
anywhere on line. For example, birthdays,
phone numbers, addresses or any other identifying location, school name,
parents first and last names should never be made public on line.
Cyberbullying is real.
This is a behavior which tends to intensify on line behind a shield of
presumed anonymity. As stated earlier,
nothing is truly private on line; this includes mean or degrading and harassing
comments. Socializing on line is not all
that different from life offline.
Teaching your child to respect themselves as well as the opinions and
differences of others will help minimize the risk factors of cyberbullying. Furthermore, having access to your teens
Activity Log will let you monitor their behavior on Facebook.
Get Additional Information on Cyberbullying Here
For those familiar with Facebook, you have probably
been poked or have poked someone.
The new App Facebook Poke
automatically destructs photos and videos posted to the site within a few
seconds. This activity leads children to
believe their posts are completely erased.
These presumptions often lead to risky behaviors that child would
otherwise not conduct if they felt the consequences to their actions would be
noticed. According to Facebook a loop
hole was recently discovered and the photos and videos on Facebook Poke are not
as private as teens thought. Apparently Facebook is working to repair this
problem but ultimately parents need to reiterate to their children the idea of
not putting anything on line that they would be embarrassed by or later
regret.
Great blog post on Poking
Facebook Information on Poking
Identity theft can happen to
children. If details are posted on line that contains
identifying information cybercriminals will try and find a way to access
it. It is easy to click on a link or
download an attachment that appears to be harmless only to realize you have
jeopardized your computer with malware.
As part of a child’s technology education, instruction on identifying
phishing scams should be taught. Teens
and tweens should be told to never click on unusual or unfamiliar links even if
they come from someone they know. In
addition, teens should be told to never reveal personal information over the
computer.
Pennsylvania Laws on Identity Theft
Arkansas Police on Identity Theft
In summary, to help ensure your child is safe while
navigating the social side of the cyber world make sure they understand each of
the risks addressed above and the various ways to avoid them.
Tell your teens how in appropriate behavior on
social network sites can affect their future.
Lastly, teach your children internet safety, from a young age. Review the codes of conduct. Don’t just assume children know what is
appropriate and what isn’t. Remember the goal is to teach our children to be
good cyber citizens.
Aside from any legal risks associated with social
media use, a child’s emotional state could be at risks as well.
According to Everydayhealth.com, Facebook depression is a newly
debated phenomenon. Experts report that
teens who spend a great deal of time on Facebook reading status updates may feel
their social lives are unfulfilled and fall into a depression. Symptoms of Facebook depression mirror
classic depression symptoms; skipping meals or activities, weight loss or gain,
drop in grades. Parents should be aware
that this condition exists and know when to seek help for their child.
Cyberbullying is another topic which receives a lot
of attention from the media.
Cyberbullying is bullying through
electronic devices and can include texting, emails, instant messaging,
unapproved posting of videos, photos or links and general harassment through an
electronic communication device. Often
cyberbullying leads to depression, anxiety, severe isolation and sometimes even
suicide. Parents should make themselves
aware of the warning signs of bullying, including depression, avoiding school
and peers, spending excessive time online.
Sexting is another online specific behavior that has
the potential to ruin your child’s reputation and devastate their emotional
health.
Sexting is the act of sending,
receiving or forwarding sexually explicit messages, photographs or images on
electronic devices. Although the
American Academy of Pediatrics reports most sexts are not shared beyond a small
group of friends, the potential for these images to be shared with hundreds if
not thousands of people does exist.
Furthermore, the possibility of teens being charged with felony child
pornography and various misdemeanors exists depending on the circumstances and
the state where the sexting occurred.
In order to help your teen maintain an unpolluted
digital footprint parents and kids must understand what a digital footprint
actually is.
This phrase is used to describe
the trail of online activity that develops as a person uses electronic
media. Parents can help their children
by monitoring their privacy settings and reinforcing the idea that anything
posted online is there- someplace, forever.
Informational Blog on Protecting Your Digital Footprint
Parents have a duty to help their children safely participate in social
media. The American Academy of
Pediatrics suggests, chatting about Facebook and how your child is using
it. Also, consider ‘friending’ your
child. If your child does not want you
as a friend on their Facebook page parents should automatically consider this a
red flag. Be aware of news headlines
depicting the good and bad aspects of Facebook and other social media
sites. Share these with your teen. Finally, make the computer accessible in a
central location of the home; this will give parents a clearer sense of who is
on line and how often.
Techno Granny Show Hosted By:
Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOG
This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show™ 2014 All rights reserved.
Dreamweaver Marketing Associates | (412) 444-5197
Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemag
Additional blog posts at: http://technogrannyshow.com
This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show™ 2014 All rights reserved.
Dreamweaver Marketing Associates | (412) 444-5197
Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemag
Additional blog posts at: http://technogrannyshow.com
Subscribe to:
Posts (Atom)