Monday, October 22, 2012

Antivirus For Your Mac - Yes!





So, do you need antivirus for your Macbook?  YES, Yes, Yes! I mean, probably.

You see, there are a few viruses "out there" that can conceivably infect your machine. There have even been a few reports of such infestations.

Are you in danger? Not so much as your Windows-using friends, but the danger still exists. And, as Mac's become more and more popular, more virus creators will target them.

Symantec has been in the anti-virus business for many years, so I suspect that their iAntivirus for Macbooks will be pretty good.
 http://www.iantivirus.com/product/

So is Avast's offering. So, protect yourselves!
http://www.avast.com/free-antivirus-mac


Wednesday, October 10, 2012

Saving YouTube Videos



When you find a video on YouTube that you want to save, copy the URL from the address bar.
Paste the YouTube url into the obvious field, then click the DOWNLOAD button indicated below:




WAIT, while the site processes your request.
IF it is successful then click on one of the links provided:
It should download the video in .flv format, which can be played by VLC Media player, which should be on your computer. If it isn’t, download it from www.filehippo.com (Yup, that is the real name of the site).

Not all videos can be downloaded from YouTube. 

There is another program, Freecorder, that may also be helpful, but the above has been working well for me the last several months.

Thursday, October 4, 2012

What do YOU Want to know?


What topics would you like to see discussed in these spaces? 

We can cover the whole universe of technological subjects, if that is what folks request.

Just let me know!

Parents: It's Time For THAT Talk!



Web Safety is the New Sex Talk

May 31st, 2012 by Beth Blecherman, TechMama  

When I was a teenager, my parents dreaded the “birds and the bees” discussion, a tacit reminder that I was getting older and needed guidance and warning of the adult road ahead. Fast forward to 2012. Kids have access to multiple devices with browsers, providing access to the Internet, where they are establishing permanent digital identities. Facebook updates, Google+ postings and comments they make on YouTube and other sites are all easily added together to form your child’s growing (and morphing) presence in the digital world. And that information isn’t just made available to advertisers, colleges and employees, but also to would-be predators.
Guiding preteens and teens as they leave footprints in the digital jungle can make a birds and bees conversation seem easy by comparison. And because a child’s social media presence today contributes directly to their face-to-face social life, it’s a necessary talk. So, what should a parent say when delivering that “Internet Safety talk”?
Unfortunately, simply buying a book and giving it to your child (as my parents and my in-laws did) to explain the birds and bees is not going to do it. Today’s “Internet safety” talk needs to start the moment their kid touches a device with a browser, and must extend past the time they leave the house and live on their own. Central to this discussion are three not-so-simple, but very important, steps.
Step 1: Get Educated
As a parent, the most important part of helping your child with Internet safety is to spend the time to understand it yourself. It’s just like the airplane safety card says: Parents are supposed to put the oxygen masks on themselves first and then their kids. And regular re-education is necessary because technology changes so quickly—and so does Internet safety.
In just the last year, the tech parenting game has changed, thanks to the growing ubiquity of the cloud. Personal information is moving off the PC or smartphone and onto the Web, with Apple, Amazon, Microsoft and Google all pushing their own services. (Do your kids do homework assignments on Google docs? Bingo!) That means kids (and parents) are working, storing, viewing and sharing more personal, education and work-related information online.
Because of this, parents should review all the cloud services their family are using for the following:
1) User authentication so only authorized users can access stored media
2) Is account information, such as credit card number for paid services, kept “masked” or hidden from online viewing?
3) Is there a backup plan included in the services—or do you need to back up your own cloud files? The next step is to remind your children that truly “private” conversations and media needs to stay offline—no matter what service they are using (and especially any online service).
To make your education more challenging, the technology a parent needs to understand varies with the age of the child and a child’s propensity to be “socially active.” The age of social networking may start with texting, near age 13 (younger for many), then lead to such social networks as Facebook and Google+. Parents claiming “I will never permit my kid to be on a social network” are ostriches sticking their heads in the sand. Starting in middle School, socializing goes online and kids will find a way to join in, with or without their parents’ knowledge.
Key to your parental education is learning the ever-evolving world of privacy settings. Luckily, most social networking sites have family safety centers—such as Google Family safety, Facebook Family Safety, Microsoft Safety and Security Center. Similarly, many cellphone carriers (AT&T and Verizon Wireless) have child safety and privacy centers. There are also general sites that help educate parents and their kids on Internet safety, including ESRB, Common Sense Media, NetSmartz.org, i-Safe.org and ConnectSafely.org.
Step 2: Have an Ongoing Dialogue
After parents educate themselves, it’s time to start Internet safety discussions with your children. Then, make that talk a regular habit.
Until recently, it has been relatively easy to set up automated Internet controls and keep your kids safe without directly involving the kids. But with today’s cloud trend, the best Internet controls are educating the kids and having regular open dialogue. This includes honest conversations about cyberbullying, online etiquette, virus prevention and even browser safety. Don’t leave out the uncomfortable details, because every kid, at one point or another, will be faced with these difficult situations.
In our house, we follow a philosophy to discuss real-life situations before they happen. One way or another, we believe our children will be on the receiving end of inappropriate online behavior and need to have the awareness and skills to deal with it.
When my tween son starting using his first smartphone, we explained the conduct and online etiquette we expected him to demonstrate in great detail and the consequences if these rules were broken. Together, we discussed a recent news story of a girl “sexting” a topless picture of herself to one friend who then forwarded the photo to other friends. The picture was soon all around the school. No one intended to cause harm, but sadly, the young girl ended up committing suicide and the boys who shared that picture were arrested for distributing child pornography.
From these talks, my tween understands the serious nature of taking and sharing pictures. He also views every picture, video and comment as something his future college recruiter, future boss or the police may see.
Step 3: Be Open to Feedback
Ultimately, kids need to be educated, but also should participate in setting family online rules and etiquette. Have an open system where you and your child are included in each other’s social networks to help monitor and educate. And, yes, pick your battles. Bite your lip and stay out of “commenting” or “parenting” on the social stream where your kid’s friends can see. Parenting is best done privately and offline. A friend who responded negatively online to her niece’s proud Facebook post of her new lip tattoo was quickly “defriended.”
Be open to feedback from your kids, because even Mom and Dad may need to be reminded sometimes to not share that silly picture of your child on Facebook, no matter how cute it may be. Discuss with your kids (offline, of course) the addicting nature of the Internet so they can eventually self-police their online social life. We tried telling our tween to wait until marriage, or at least college, to post pictures of himself with girls. He didn’t buy it.
 Guest columnist Beth Blecherman covers family technology at TechMamas.com and @TechMama on Twitter.

Monday, April 9, 2012

Latest Mac Virus (Actually a Trojan Horse) Info

See this link at CBS News:

http://www.cbsnews.com/8301-501465_162-57411237-501465/mac-virus-what-you-need-to-know-how-to-remove-it/

Thursday, April 5, 2012

Macbooks CAN Get Infected! Protect Thyself!


According to the BBC News, as well as many other computer news sites, over "Half a million Mac computers [are] 'infected with malware'.

Yes, we knew the day would come and it looks like it may be here.

FIRST, make sure your Macbook has the latest software updates:

Getting updates immediately

  1. From the Apple () menu, choose Software Update.

    Apple menu
    Apple menu in Mac OS X v10.6.6 and later

  2. Software Update checks for available updates. In the Software Update window, select the items you want to install, then click Install. Usually, you should install all available updates.
  3. Enter an administrator account name and password.
  4. After installation is complete, restart the computer if required.

You can repeat these steps to see if more updates are now available. Because some software updates are prerequisites for others, you may need to repeat these steps several times to complete the software update sequence. Note: Mac OS X v10.5 and later can automatically run Software Update checks in the background and let you know when an update is available for your computer.

After you do that, then:

Grab the latest Java update from Apple:

Snow Leopard: Java for Mac OS X 10.6 Update 7

OR

Lion Java for OS X Lion 2012-001"

depending on which OS you have.

Check these articles for more information:

http://www.bbc.co.uk/news/science-environment-17623422

http://news.cnet.com/8301-1009_3-57409619-83/more-than-600000-macs-infected-with-flashback-botnet/

It is always a great idea to make a Time Machine backup of your Macbook before doing any type of updating or maintenance. Remember that you need a dedicated external drive that is big enough (at least 500GB).

The question you always have to ask yourself is" What will I lose if my computer crashes"? Backups are always are really, REALLY good idea.


See my earlier post titled "Save Those Puppies".


Mr. V


Tuesday, March 27, 2012

Does My Macbook Need Protection?


Apple has bragged for years that their computers were unlikely to be hacked and that it was even less likely that they could get viruses.

Check this out:

"a new security vulnerability in MacBook batteries means that it’s possible that future hackers won’t just try to steal your credit card numbers, but might actually cause your computer to meltdown instead.

The vulnerability was discovered by Accuvant security researcher Charlie Miller, who says that Apple’s MacBook batteries use default passwords on their MacBooks.

Why’s that a problem? Well, because the batteries use default passwords, the battery controller can be compromised by any malicious hacker who knows the password, giving him access to the low level hardware. This security hole can then be exploited in various ways, from just causing the battery to stop functioning to auto-installing malware. It can even cause full on overheating.

Miller got the passwords by backwards engineering one of Apple’s 2009 battery update.

The good news is that right now, this isn’t a major security threat. To get remote access to the battery of your MacBook, a malware developer would first have to figure out a way to bypass OS X’s security measures, which isn’t an easy task."

http://www.cultofmac.com/105843/hacker-your-macbooks-battery-is-vulnerable-to-viruses-malware-and-meltdown/

And there is more to come.

What can you do?

Well, DO NOT use Mac Defender! It's bad. see this:

http://en.wikipedia.org/wiki/Mac_Defender

Also, I do not trust MacKeeper. There is a lot of contradictory information about it on the Net. Many praise it, but others are not as kind. I have had a certified Apple technician tell me that a possible cause of a recent Macbook meltsdown "could" have been caused by MacKeeper. My thought: Why take the chance?

One that I like is

Sophos Anti-Virus for Mac Home Edition

It seems to do very well at catching malware, because Mac's CAN get Trojan malware, especially if they connect to other computing devices.

Read reviews of the program and see what you think and ask me questions!



Protect Your Phones!


Your phones are full of your personal information. If you lose it, what will you do? I spoke with a parent yesterday whose iPhone plunged into the ocean last week. She has always kept a notebook with her contacts listed, but do the rest of us? Some people are using iCloud to synchronize their iPhones, but is that enough? What if you don’t use an iPhone but one of the Android or Blackberrys? These are questions you probably should figure out answers to.

And, now that you can use a phone for mobile banking, the dangers just keep increasing. Here is an excerpt from a recent article:

“…study released this month by computer security firm Symantec.

The study began with Symantec personnel "losing" 50 smartphones in New York City; Washington, D.C.; Los Angeles; and the San Francisco Bay area. The smartphones were equipped with special tracking software that allowed researchers to find out what the people who found the phones attempted to do with them. They monitored what apps the finders attempted to open, what websites they attempted to access, and where they took the phone physically.

The results can't be comforting for those who keep and access sensitive financial information and conduct financial business on their smartphones. Here are some points from the study.

  • An attempt to access an online banking app was observed on 43 percent of the devices.
  • A "Saved Passwords" file was accessed on 57 percent of the phones.
  • Sixty-six percent of the devices showed attempts to click through the login or password reset screens (where a login page was presented with username and password fields that were prefilled, suggesting that the account could be accessed by simply clicking on the "login" button).
  • Of the 50 devices, the owner only received 25 offers to help, despite the fact that the owner's phone number and email address were clearly marked in the contacts app.

While the sample size of the study was relatively small, it does suggest that if you're using technologies like mobile banking, mobile payments and person-to-person payment apps and you lose your smartphone, it's very possible the person who finds it will attempt to use them to steal from you.”

Go to this link if you want more information.

http://www.bankrate.com/financing/banking/lost-smartphones-a-target-for-thieves/?ec_id=cmct_01_comm_PF_image_headline