Share content with your friends and fans!

Tuesday, August 5, 2014

TechnogGrannyTalks, Texting in the Good Ol' Days!



Remember when?  And you still got busted for it?

Thanks to 

http://yougottobekidding.wordpress.com/author/yougottobekidding/

Great blog to get you through a humorless, crazy day, 

subscribe to get your daily funny.


Sunday, August 3, 2014

TechnoGranny Show, 7/22/13 Twenty Things You Should Know Before Downloading Free Software.


TechnoGranny Show,  7/22/13 Twenty Things You Should Know Before Downloading Free Software.

Listen to the Show Here

Is downloading free software safe? You get a pop up on your computer that says, "Safe Software to Store Your Passwords, " No, you idiot, it's probably not. Beware before you click, you may just be inviting a wolf into your home, computer, records. ..........Answers to questions like What is freeware?........Where can I find freeware?.........Suggestions for safe places and curated lists to find and review software that can be helpful and tips for safe downloading.

How easy is it to fall victim to a scam on the internet?  The correct response is, too easy.   Most of us are probably aware of the hazards which could accompany opening a suspicious email.  Now we need to be mindful of downloading software that could potentially damage our computer, sabotage personal files or rob us of our identity.  This segment's subject delves into the lure of free software, or freeware, as it is often called.  

What is freeware and how can you avoid putting your computer into harm’s way? 
Techno Granny will guide you through the topic of free software and unveil the truth behind downloading programs that are often promoted to help when in reality they perform the exact opposite.  Hopefully, with the research and advice of Techno Granny, we all will be more thoughtful before falling prey to the lure of ‘free’ software.

Is Downloading Free Software Safe?
In her article, Is downloading free software safe, http://computer.howstuffworks.com/downloading-free-computer-software-safe.htm
published on How Stuff Works, Kate Kershner simplifies the matter of using free software; if it comes from a
reputable source, such as Microsoft, and your are searching for the programs on their direct site it is probably safe. Downloading a pop-up or an advertisement from a little known company with an unfamiliar program may not be a wise choice. No matter how alluring the ‘free’ portion of the deal may sound, Kershner advises doing an internet search of the company offering the system before downloading or installing any software.  You can read the full article here http://computer.howstuffworks.com/downloading-free-computer-software-safe.htm

Why Free Software Downloads Aren’t Always Safe.
Norton is a company whose name is synonymous with privacy, anti- theft and antivirus.   They span a significant corner of the internet security market for PC’s, MACs and mobile devices. The official Norton site, offers consumers insight into managing the market of freeware.  On the Your Security Resource page, general questions about freeware are answered by expert Elizabeth Wasserman.  The first question:  
What is freeware?  

The answer, “freeware is software that you install on your computer knowingly or not”.  One popular example of freeware is games and may also be referred to by the phrase widget.   Freeware can come from
a cd or directly from a website download.    It’s important to note, not all freeware is dangerous to your computer.  It depends on the source of the program.
The second question: Where can I find freeware? 
Wasserman’s answer encompasses safe downloads as well as those we should be guarded against. Well-known companies, shareware makers and widgets alike all offer freeware, therefore weeding out trustworthy and verifiable sources may seem like a daunting task.  Rest assured, there are some simple tactics which can be applied to your investigation before downloading iffy applications.  Most notably, well- known companies will often require consumers agree to a licensing agreement upon installation. Corporations such as Microsoft and Adobe Acrobat are household names in this arena.  In addition, searching for a company through the Association of Software Professionals is another good source for gauging the legitimacy of a company.  http://asp-software.org/www/
The third question what are the risks of freeware? 
The response is severe.  Some free software can have spyware or malicious adware attached to the code.  If this is the case, viruses, worms and other detrimental file management systems can become inserted into your computer wreaking havoc on your files, and putting you at risk of identity theft. 
The last and most important question, how can I protect myself from risky freeware? 
The answer outlines 4 essential steps anyone can easily take to ensure their computers protection. 
1.     Step one, do your homework.  In other words, before downloading take a few extra minutes to do a Google search of the program.  Alternatively, visit a software site like CNET or ZDNET to read freeware reviews. 
2.     Step two; look for a seal of approval.  A TRUSTe logo signals a secure site. 
3.     Step three, always keep security programs up to date.  This may seems like a no brainer but complementary to running an antivirus program is the recommendation to patch any holes in current software. Malicious software may make use of outdated programs, so keeping abreast to any updates and new versions as they are released is helpful. 

4.     Step four, be wary of social network freeware.  Many social media sites offer applications, free from cost, downloadable directly from the site onto a computer or other device.  Despite the popularity of these widgets, they cannot always be verified.  Furthermore, social networks are quick to renounce any responsibility related to the security and safety of these applications.  Knowing this alone should be a red flag. 

It can’t be said enough, if it sounds too good to be true, it probably is.  Some software companies test their software for bugs while others are simply trying to trick you into allowing them to place a virus or spyware on your device.  Read the complete Norton article  Here

For your protection and the defense of your computer and your files stored on it, please take advantage of ZDNet, the web’s largest library of software downloads.  This site has complied lists of software for Windows, Mac, and mobile systems.  Searches can be conducted by price, category or most popular downloads.  ZDNet offers a basic description of the program such as Avast Free Antivirus 2014, AVG Antivirus Free 2014, Java Runtime Environment  and also provides a link viewers can use to access the program right from their site.  ZDNet is a strong safety net for consumers.  View their home page here 



Cnet.com is another reliable site which offers freeware resources such as software and app reviews, news, how to’s and downloads for Windows, Mac, iOS and Android.  Covering a vast array of electronic and computerized devices any person would find helpful, including but not limited to appliances, car tech and cameras in addition to the expected laptops, mobile devices and PC’s.  This site is an invaluable resource for today’s consumer. You can access their site here http://www.cnet.com/.  Windows users may find http://www.filehippo.com/ helpful.  Filehippo contains a directory of downloads including freeware, shareware and software.  Aside from software downloads from trusted sites, Filehippo offers their own software called FileHippo Update Checker. This is a cost- free program that scans your computer then generates a report listing any out of date software.  The report suggests the installation of the most current versions, including links to the appropriate sites. Commonly available on Filehippo are browser and plugin software, anti- malware, audio and video, file sharing, firewall and security, messaging and chat and system tuning programs. Connect with the valuable resources available through Filehippo here http://www.filehippo.com/.

If you are feeling concerned about how to safely navigate the freeware circuit, Chris Hoffman offers some good advice in his article, How To Do Your Research Before You Download Free Software.  In a nutshell, research first, download later.  The type of device you have will also dictate where you seek out security information needed for reassurance purposes.  Hoffman offers 7 tips for guiding Windows users toward a safe download experience. 
·       Find a curated list of the best free software available for download.  Hoffman directs consumers to his site, http://www.makeuseof.com/pages/the-best-of.  Here individuals can take advantage of research that has already been gathered. 

·
Make sure you trust the developer.  A company like Microsoft or Google is well known and safe but if the company is lesser known, it would be best to visit a site like http://www.Cnet.com/ and research the program and company before putting your computer at risk for a potentially harmful download.
·       Only download from a trusted site.  Many third- party sites like Cnet give consumers an opportunity to download directly from their page.  These sites are typically safer to use because they are monitored for security flaws. Try to steer clear from downloading from someone’s personal site because there are no telltale signs they are safe. 
·       Read reviews.  To increase your chances of finding an unbiased review begin with a Google search using the program name.  Social networks are another good source for reviews. 
·       Use an antivirus.  It doesn’t matter how careful you are, an antivirus will offer your computer another layer of protection. Many of the antivirus programs available can be downloaded for free.  This is a prime example of freeware.  There are many well-known corporations that offer free, or free on trial basis, antivirus software.   Just be sure the name is one you can trust or that you have researched the company before downloading or installing software.

·       Install an app in a sandbox.  This is typically something more experienced tech users are accustomed to.  The process would require Sandboxie to run a questionable program in a sandbox.  This would allow the program to be tried in an isolated area of your computer where it cannot do damage to the rest of your system. A knowledgeable computer user may also be acquainted with virtual machines which would allow you to test the program in the same manner. 
·       Pay attention during the installation process.  Despite the legitimacy of many freeware programs, even the trusted sites will include software you do not want, such as adware or default search engine changes.  Java and Adobe are notorious for this, so it is critical that you pay attention during the install so you can decline any unwanted additions to the software as they occur. 

You can read the complete article here 

What are some of the ways you research freeware?  What do you look for to ensure it won’t mess up your
computer?  We are always looking for comments and tips to share.
Imperatives for safe download.
1.     Use common sense.  Be suspicious of flashy ad or popup windows that contain unsolicited invitations to download, or that stress an urgent need for you to download immediately.
2.     Never download a file unless you know and trust the source. 
3.     Do not download a file from BitTorrent or any other file sharing program; ever.
4.     Google the product you are considering downloading.
5.     Always read the program description before installing.  This will allow you to verify its’ compatibility with your computer. 
6.     Always backup your files before you install any new software.
7.     Although scanning programs for viruses, worms, malware and the like is never a guarantee, it can’t hurt.  Any extra steps applied to ensure the safety of your files and hardware is a good idea.

Safe places to download software from.
Further Research has led us to uncover Site Advisor, a service browser plug- in from one of the most trusted names in online security, McAfee.  This free software adds safety ratings to web sites and offers a secure search box.  In addition, I have prepared an inventory of major download sources which have received the
Techno Granny ‘seal of approval’.  Often their ratings are provided by the supplier so comparing a few different sites is advised.  The list includes Tucows, MajorGeeks.com, WebAttack, NoNags, Pricelessware, WinPlanet, ZDNetDownloads and CNET.  Also I will offer a plug for our very own community based Gizmo.  Gizmo selects the best of the best freeware options and displays them for your use.  I have taken the liberty of generating some special search engines available.  Please take advantage of the work I have done to find the specific type of programs you are seeking.
Microsoft’s Free Download Center provides links to over 5,000 programs, including games.  Furthermore, The Ultimate List of Windows Software from Microsoft may make finding what you are looking for a little simpler.

 Listen to the Show Here

Techno Granny Show Hosted By:
Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOG


This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show™ 2014  All rights reserved.
Dreamweaver Marketing Associates  |  (412) 444-5197
Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemag
Additional blog posts at: http://technogrannyshow.com





Monday, July 21, 2014

TechnoGrannyTalks, 7-14, 2014 Techno Granny, Attention Parents, Risks and Fixes for Teens on Facebook.



Title: Techno Granny, Attention Parents, Risks and Fixes for Teens on Facebook.

Listen to Show Here

In October 2013 Facebook announced teenagers ages 13-17 will be permitted to post publicly.   This means anyone on the social networking site could have access to information provided by your child.  Learning to navigate the world of social networking is not easy, compounding the learning curve are conventional parental responsibilities. This raises a novel host of questions and concerns for parents, guardians and caregivers of teens and tweens. 
In todays show Joanne Quinn- Smith, Techno Granny, investigates several risks related to Facebook and social media.  She introduces her listeners to multiple studies conducted by leading experts in the field of technology which address not just the problems surrounding teens and social media, but fixes; ways to avoid or solve the troubles teens experience in cyberspace.
Help Your Teens Play it Safe.
They love the computer but how safe are they?
Accessibility to technology has changed aspects of everyone’s life.  Today’s youth have grown up immersed in a cyber-culture. For most, computers allow near instantaneous communication and are usually packaged small enough to fit into the palm of our hand.  This type of high tech telecommunication is all youth know.  On the same hand, parents have striven to teach and guide their children through life’s most difficult moments; this includes the trials and errors of learning to become independent and productive adults.  The basic instructions parents need to instill upon their children have not changed because technology has changed.  If anything, the influx of new communication devices requires parents to become more diligent than ever in monitoring and understanding how kids manage their participation on social media sites. 
            Teens use Facebook for the same purpose as adults; they
·      
  connect with friends,
·        send messages,
·        share photos and videos and
·        Plan social events. 
It all seems harmless until you stop to think about who your children are associating with on social networking sites.  Who are your teen’s friends on Facebook?  Now that Facebook enables individuals to manage their own audience, the Activity Log is a means for users to review and watch over what has been posted. The Activity Log is private to everyone but the user.  From here, users can manage who is capable of seeing their content.  
A Simple inquiry such as, “why is Facebook important to you?’ opens a window into more in depth conversation about appropriate online behaviors.  reviewing your child’s privacy settings with them is a good way to set social media ground rules as well as enforce them. 
The frequently evolving realm of social media is a lot for adults to keep tabs on, but for youth who have
grown up with social media as an integral part of their lives, there is a good chance they know more than you.  A straightforward way to learn the basics is to ask your child to teach you. 
Conversations with your child about online predators and privacy are no brainers, but equally important are chats about the Golden Rule.  A gentle reminder that anything posted online can be misconstrued or taken out of context can be of great consequence.  Online communication lacks additional clues (tone of voice, body language) therefore; comments and posts are not always interpreted in the way the sender intends.  The Golden Rule states ‘treat others as you would want to be treated’.  Practicing self-respect and respect for others when communicating, specifically online,  is one way teens can safely connect with friends and peers on social media. In other words, think before you post.  This idea applies to parents as well.  If you have friended your child on Facebook it is recommended that you apply the same boundaries you have offline to your online relationship.  Parents need to create a healthy balance between their teens developing independence and any safety concerns that may arise due to the use of social networking.  It is equally important for adults to learn the language of social networking.  These sites often have their own set of acronyms and terms which describe various online activities and characteristics.  Familiarizing yourself with the correct terminology may take away your suspicions of social media. 
How Can I Help My Teen Use Facebook Wisely?
          Parents can always opt to assist their tween or teen in setting and managing their Facebook page’s
Learn as much as you can about Facebook.
security and privacy.  Ongoing conversations regarding Facebook usage and responsible online behavior are a parent’s obligation.  Beginning basic education at a young age will help ensure your child grasps the concepts of internet safety.  Some fundamental online safety rules to instill in children include never share a password, think before you post, accept friend requests only from people you know offline and report anything that appears suspicious. 
7 Facebook Risks You Should Discuss With Your Teen.
According to Victoria Kempf, blogger for Teenlife.com, many parents worry about what their teens are doing on Facebook. There are many documented benefits to participating in social networking, but there are risks that accompany the advantages.  Parents must be aware of these risks in order to keep their children safe. The 7 risks parents should be prepared to address with their tweens and teens as they cultivate a digitally social life are as follows:
1)     Facebook Postings Are Not Private.
2)     Facebook Postings Can Impact Your Teen’s Future.
3)     Friending On Facebook Equates To a Badge of Popularity.
4)     Online predators are Real.
5)     Cyberbullying Is Real.
6)     Poking is Sharing. It Can Also Be Sexting.
7)     Identity Theft Can Happen To Teens Too.
Each of these risks has the potential to lead to harm of child.  Luckily there is a fix to accompany each risk.
Posts are not private.  In a nut shell, anything posted on line has the capability of being copy and pasted elsewhere by anyone with access to your child’s Facebook account.  This includes videos and photos.  In order to render this problem parents should assist their children with programming their Facebook privacy settings. 

Related to privacy is the trend of Tagging.  Tagging can create a lot of issues regarding privacy, or lack thereof.  When someone is tagged in a Facebook photo, their identity is publicized and linked to their Facebook Timeline.  When looking over your child’s settings consider applying review tags, so that your teen must approve any photos before they are displayed for the world to view.


When someone posts on a social media site they are in an essence creating their own brand. 
This is also referred to as a digital footprint.  Many teens still view social networking as an anonymous way to explore certain topics and socialize with people they wouldn’t necessarily mingle with offline.  As people increase their cyber citizenship many colleges, scholarship providers and employers view the Facebook profiles of potential candidates before making a selection.  This process is done to verify any students or employees chosen to represent an organization are the type of individual who will have a positive reflection upon the association.  The best way to combat this problem is to have on going conversations with your children concerning appropriate behavior.  On or offline, tweens and teens need to consider what the consequences of their actions may be.

Many children assume more friends on Facebook mean they are popular.

Often kids accept a ‘friend’ request from anyone, even if they do not know the person offline.  How does a parent manage their child’s friends?  If your child agrees to ‘friend’ you on Facebook, you will then have access to their personal friend list.  From this vantage point you can monitor the exchanges that go on between your child and their ‘friends’.
Sometimes children post messages and status updates that unintentionally attract online predators.  Just as teens have become tech savvy, so have predators. To avoid this potentially dangerous situation parents should present their teen with a list of things that should never be posted on Facebook or anywhere on line.  For example, birthdays, phone numbers, addresses or any other identifying location, school name, parents first and last names should never be made public on line. 

Cyberbullying is real.  This is a behavior which tends to intensify on line behind a shield of presumed anonymity.  As stated earlier, nothing is truly private on line; this includes mean or degrading and harassing comments.  Socializing on line is not all that different from life offline.  Teaching your child to respect themselves as well as the opinions and differences of others will help minimize the risk factors of cyberbullying.  Furthermore, having access to your teens Activity Log will let you monitor their behavior on Facebook.

Get Additional Information on Cyberbullying Here

For those familiar with Facebook, you have probably been poked or have poked someone. 
The new App Facebook Poke automatically destructs photos and videos posted to the site within a few seconds.  This activity leads children to believe their posts are completely erased.  These presumptions often lead to risky behaviors that child would otherwise not conduct if they felt the consequences to their actions would be noticed.   According to Facebook a loop hole was recently discovered and the photos and videos on Facebook Poke are not as private as teens thought. Apparently Facebook is working to repair this problem but ultimately parents need to reiterate to their children the idea of not putting anything on line that they would be embarrassed by or later regret. 

Great blog post on Poking

Facebook Information on Poking


Identity theft can happen to children.  If details are posted on line that contains identifying information cybercriminals will try and find a way to access it.  It is easy to click on a link or download an attachment that appears to be harmless only to realize you have jeopardized your computer with malware.  As part of a child’s technology education, instruction on identifying phishing scams should be taught.  Teens and tweens should be told to never click on unusual or unfamiliar links even if they come from someone they know.  In addition, teens should be told to never reveal personal information over the computer.

 Pennsylvania Laws on Identity Theft

Arkansas Police on Identity Theft


In summary, to help ensure your child is safe while navigating the social side of the cyber world make sure they understand each of the risks addressed above and the various ways to avoid them.

 Tell your teens how in appropriate behavior on social network sites can affect their future.  Lastly, teach your children internet safety, from a young age.  Review the codes of conduct.  Don’t just assume children know what is appropriate and what isn’t. Remember the goal is to teach our children to be good cyber citizens.
Aside from any legal risks associated with social media use, a child’s emotional state could be at risks as well. 

According to Everydayhealth.com, Facebook depression is a newly debated phenomenon.  Experts report that teens who spend a great deal of time on Facebook reading status updates may feel their social lives are unfulfilled and fall into a depression.  Symptoms of Facebook depression mirror classic depression symptoms; skipping meals or activities, weight loss or gain, drop in grades.  Parents should be aware that this condition exists and know when to seek help for their child. 

Cyberbullying is another topic which receives a lot of attention from the media. 

Cyberbullying is bullying through electronic devices and can include texting, emails, instant messaging, unapproved posting of videos, photos or links and general harassment through an electronic communication device.  Often cyberbullying leads to depression, anxiety, severe isolation and sometimes even suicide.  Parents should make themselves aware of the warning signs of bullying, including depression, avoiding school and peers, spending excessive time online.

Sexting is another online specific behavior that has the potential to ruin your child’s reputation and devastate their emotional health. 

Sexting is the act of sending, receiving or forwarding sexually explicit messages, photographs or images on electronic devices.  Although the American Academy of Pediatrics reports most sexts are not shared beyond a small group of friends, the potential for these images to be shared with hundreds if not thousands of people does exist.  Furthermore, the possibility of teens being charged with felony child pornography and various misdemeanors exists depending on the circumstances and the state where the sexting occurred. 

In order to help your teen maintain an unpolluted digital footprint parents and kids must understand what a digital footprint actually is. 




This phrase is used to describe the trail of online activity that develops as a person uses electronic media.  Parents can help their children by monitoring their privacy settings and reinforcing the idea that anything posted online is there- someplace, forever. 

Informational Blog on Protecting Your Digital Footprint




Parents have a duty to help their children safely participate in social media.  The American Academy of Pediatrics suggests, chatting about Facebook and how your child is using it.  Also, consider ‘friending’ your child.  If your child does not want you as a friend on their Facebook page parents should automatically consider this a red flag.  Be aware of news headlines depicting the good and bad aspects of Facebook and other social media sites.  Share these with your teen.  Finally, make the computer accessible in a central location of the home; this will give parents a clearer sense of who is on line and how often.

Techno Granny Show Hosted By:
Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOG


This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show™ 2014  All rights reserved.
Dreamweaver Marketing Associates  |  (412) 444-5197
Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemag
Additional blog posts at: http://technogrannyshow.com