Archives for Advice

Emily Hay: Rent the Runway

Our social media expert Emily Hay recently had a wonderful experience renting a designer dress for a special occasion for a fraction of the cost.  Here is the full story from Emily’s homepage.


Read More

Parents Rules for Internet: Sheri Kam

As promised here is a great graphic that Sheri Kam, a recent guest (8/25/12 podcast) put together to help her young daughters be prepared to deal with the Internet. Feel free to copy for  your family.  Thanks Sheri, great tips!


Read More

Saving Face for Parents of Teens

We are supposed to be leading our children but by the time they get to middle school, we are a couple of generations of social media behind.  (Remember My Space?) Emily Hay, CEO of Hay There Social Media and Sheri Watkins developed Saving Face for Parents, a 7 video series to help parents understand and guide their children through these choppy digital waters.


Read More

College Internet Hook Up Tips

Getting junior ready for college is not just about getting new computer devices and software; you have to understand and be ready for the whole university Internet security experience.

  1. Have good security in place before you hook up to the university system.
  2. Image (clone/completely copy) your student’s hard drive and keep a copy at home
  3. As an extra precaution install a special “tech” user account on the computer that only the family tech expert ( you ) have the password to and/or…
  4. Install a remote desktop application that allows you to enter, diagnose, back up and fix your student’s computer without driving 5 hours across the state! ;-D
  5. Be prepared to have your system scanned by university IT
  6. Understand having a good password ready for the university system
  7. Lock your screen/device when not in use
  8. Securing your equipment with locks, good solid covers and good bags
  9. Use your Common Sense Filter (often unused or underused)
  10. Find my iPad/iPhone/LoJack your computer/tablet/phone.  People steal stuff in the wide open environment of a university.
  11. Buy fake vomit or cigarette butts at a novelty store and glue it onto the cover of the laptop (This really worked for a friend of ours.  

Read More

Back-to-School Computer Buying Guide

One of the most frequently asked questions on our show is “How should I go about buying a new computer?”  This week Mark Kyrnin, at About.com posted an excellent checklist for parents and students alike that we reproduce here in part. For all the links attached to the story see the original article at about.com

Back to School Computer Guide

Tips for Buying an Educational Computer

By Mark Kyrnin , About.com Guide

Introduction

Computers play a large role in the education of students today. With the rise of word processing, computers began to make inroads into the education environment but today it goes far beyond that. Students use computers to do research, communicate with teachers and colleagues, and create multimedia presentations to name just a few. This makes purchasing a computer for the home or college student much more important, but how does one know what type of computer to buy?

Before shopping for a computer, check with the school regarding any recommendations, requirements or restrictions there may be on student computers. Often times colleges will have recommended minimum computer specifications that can be helpful in narrowing down your search. Similarly, they may have a list of necessary applications that …


Read More

Encouraging Tech Savvy Tween Girls through Social Media!

 

With the emergence of social media girls have an “in” to the world of tech starting from their comfort zone of social media! The two worlds are really blending and now it’s cool to be geeky, in fact “geeky” is old school terminology. Now it’s COOL to be tech savvy. Here is a special article Emly Hay has written on the subject.

Real life example: A girl named Tori Molnar starting an eCommerce “franchise” business at age 15:

Mission: “Where Teenage and College Girls Learn about Business and Make Money!”

Hay There Social Media is launching a new program called, “Saving Face for Parents of Tweens,” to help parents get up to speed on what their tech savvy tweens are doing online and in social media. We are a proud team of women helping to lead the way and advance the social relevance of tech savvy women.


Read More

How to Recycle Your Household Electronics in Michigan

Personal media players and data assistants, laptops, notebooks, computers, televisions, cell phones and the list goes on and on.  These wonders of modern technology are filling our lives and our garbage cans. Many of these products are still usable; others have reached the end of their useful lives.  All have components that may be reusable, recyclable or a concern if released to the environment.
  • Televisions and computer equipment
  • Cell Phones
  • Other Resources

What can you do with your unwanted television or computer equipment?

If you have unwanted computer equipment, you may want to make sure that there is no confidential information on it before it leaves your hands. See the U.S. EPA fact sheet, “Do the PC Thing” to find free and low cost software to wipe data off your electronics.

Although it is still legal for households to throw their old electronics in the trash, several landfills are no longer accepting certain electronics such as older televisions and computer monitors that contain cathode ray tubes (CRTs). More and more communities, manufacturers and retailers are sponsoring takeback programs. Many are free. To find out if there is a community collection program available, contact your local recycling or household


Read More

How to Check and Disinfect Your Mac

The first really nasty Trojan to hits Macs slithered onto 600,000 Apple computers worldwide.  F-Secure, a world leader in security, has posted a way to check and see if your Mac is infected and if so how to clean it up.

Please note that this is meant for experienced users and needs to be done carefully.  Earlier this week Apple released a security update for all Macs. Please check to see that you have that update.

If you prefer, you can download and print the instructions here.

Disinfection

Manual Removal

Caution: Manual disinfection is a risky process; it is recommended only for advanced users. Otherwise, please seek professional technical assistance. F-Secure customers may also contact our Support.

 

Manual Removal Instructions

  • 1. Run the following command in Terminal:defaults read /Applications/Safari.app/Contents/Info LSEnvironment
  • 2. Take note of the value, DYLD_INSERT_LIBRARIES
  • 3. Proceed to step 8 if you got the following error message:”The domain/default pair of (/Applications/Safari.app/Contents/Info, LSEnvironment) does not exist”
  • 4. Otherwise, run the following command in Terminal:grep -a -o ‘__ldpath__[ -~]*’ %path_obtained_in_step2%
  • 5. Take note of the value after “__ldpath__”
  • 6. Run the following commands in Terminal (first make sure there is only one entry, from step 2):sudo defaults delete

Read More

Nasty People on the Internet: a Guide to Knowing Your Digital Enemies

Originally published in netforbeginners.com March 28, 2012
Yes, unsavory people are everywhere on the Web. These people will sucker you into embarrassing yourself, convince you to trust them with your passwords, infect your machine with remote-control software viruses, cause you emotional grief, and even make you feel personally attacked and threatened. Here is the Wanted List of the Top Internet Bad Guys, 2012.

1. Internet Trolls: the Mosquitoes of Online Culture

Trolls are arguably the most common form of online bad guys. These individuals take pleasure in sowing conflict and bringing out the worst in others. If you use Facebook, participate in forums, or read Reddit and news comments, you’re bound to find trolls. About.com explains internet trolls, and the psychology of dealing with them…

2. Cyberstalkers: Now More Common Than Physical Stalkers

Cyberstalking is now more common than physical harassment. Disturbed individuals express their pathological obsessions by using email, sexting, instant messaging, Facebook comments, and even smartphone gps tracking. While cyberstalkers are still a very small minority of society, they are a sad reality that must be acknowledged by all modern users of the Internet. About.com explains cyberstalkers, and how to defend against them…

3. 


Read More

Adobe's latest critical security update pushes scareware

Adobe’s latest critical security update pushes scareware

By Ed Bott | March 29, 2012, 10:38am PDT

Summary: Adobe just released a critical Flash Player security update. Good news: it includes a new automatic updater for Windows. Bad news: Adobe’s download page pushes a misleading “system optimizer” designed to scare users into paying for unneeded repairs.

Update: Even on a completely clean installation of Windows 7, the “system optimizer” utility I discuss in this post found hundreds of “critical errors” that could only be fixed after paying for the repair. See Update 2 at the end of this post for details.

March 30: I’ve captured a video of the entire process and uploaded it to YouTube. The unedited video (approximately 10 minutes) is here .

Adobe did something good this week, releasing a new version of its Flash Player software with automatic updating capabilities.

They also did something truly awful—using their update page to push a third-party scareware program designed to separate naïve PC users from their cash.

I’ve criticized Adobe in the past for pushing foistware —browser toolbars and free virus scanners, usually—as part of the Flash download process. But this latest episode is far worse.

First, the good news.


Read More