NEW!!! GET HELP FROM A DISTANCE! Call (512)560-2609 or email and set up a time for a session.

Tuesday, December 30, 2014

End of the Year - most Popular Posts

As I go into the new year I thought I would do a little research and remind myself about what works on this blog. I have written posts to this blog 22 times this year. That is a lot less than I was thinking. I mean to write once a week which would be 53 times. 

2011  17 (5 months starting in September) 
2012  19
2013  37
2014  22

It looks like I should try to increase my frequency of writing this year if possible. 

The most popular post of all time with 75,717 hits is:
Freeing up Memory on your iPhone 

The top 5 for this year
1. Should I use 2 Step Authentication?  402 hits
2. The End of Windows XP 211 hits
3. Password Management and the Heartbleed Bug 195 hits
4. Arranging the Icons on your iPhone or iPad 190 hits
5. 5 Things You Can do to Make Being Online Meaningful (3-5) 178 hits

It is interesting to look at these statistics. What I am seeing is that most people are finding this blog by searching for help on something. I think this makes great sense. It is exactly what I do when I want to find something out. I "google" whatever I want to find out and learn from other people online. The other thing I see is that people continue to find the post on Freeing up Memory on your iPhone helpful. In my statistics I can see that even just today the page has 90 hits. A hit means that someone clicked on the page. 

If there is anything you are interested in having me research and write up let me know. I am always open to new ideas!

Friday, November 21, 2014

How does Apple Pay work?

If you are like me you watch with interest whenever Apple introduces something new. That is not because I want to buy every new thing, but lately it seems like their new products and ideas change how things are done everywhere.

So, I have been curious about Apple Pay. I keep reading articles and seeing things on it, but none of them tell me how it really works. I want a down to earth, Not A Geek, explanation. 

Here is what I have found out and want to share with you in the way I understand it best.

  1. There are a lot of details, but basically, if you have the right equipment and are in the right store you can just take out your phone at the cash register and instead of swiping your card and entering your pin you can hold your iPhone up to the machine and put your finger on the finger print reader on your phone.
  2. The machine will register the purchase and charge your credit card just like it did when you swiped the card through the machine. 

If you have a new iPhone 6 or 6 Plus, first you have to download OS version 8.1. If you have a phone older than 6 you cannot do Apple Pay. It will also work with the Apple Watch when it comes out in 2015.

You have to set up your credit card information in your Passbook application on your phone. If you want to use the credit card that is already associated with your iTunes account you can do that by just setting up a 4 digit pin. You can take a picture of the card and the phone will fill in the information!

It only uses cards like Visa, MasterCard, American Express, and Discover. You cannot use your Macy's card. The information about payments made using Apple Pay can be found in the Passbook App.

The cash register that you pay at must be Apple Pay Enabled. You can look for that sign before you begin standing in line planning to pay that way.

It might be good to have a back up way to pay ready. Even though you hope to pay with your phone it is a pretty new technology and so the store may not be set up. 


Near Field Communication Symbol
A bit more "geeky" way to explain it is that Apple Pay uses NFC or Near Field
Contactless Payment Symbol
Communication to connect to the Apple Pay enabled device at the store. Look for the contact-less payment symbol. You may have seen these before because Google Wallet and some credit cards work this way already.

It will also work with the Apple Watch which is due out in January 2015

It is surprising that Apple will not make a bunch of money from this. The company will take a small cut from each transaction. Their goal is to sell phones and watches.


So, why use it?  Right now it is mainly a novelty. It might save a little time over swiping a card. Maybe you can carry a lighter wallet. We will only see in the future what it can really do.


Security - Your credit card number is only entered once during setup. After that your phone sends a different number that is tied to your device when it makes a transaction. The cashier will NEVER see your credit card number and it is not stored anywhere but on your phone. If you lose your phone you can use the app "find my iPhone" to put your phone in LOST MODE so that no one else can get your info. Unlike when you lose your cards you will not have to cancel your credit card and get a new one because your card number was never stored.

Privacy - Apple does not transmit any information about you to the store. In this time when all of our information seems so public Apple Pay is actually anonymous. Some retailers are not happy about that because it does not help them to collect information about you. You will need to provide them with a loyalty card separately, rather than having that information transferred automatically.

Friday, October 31, 2014

How do I know that email sent to me is safe?

Have you ever gotten an email message that looked exactly like it came from your bank or eBay asking you to click on something? Often it is written in a way that makes you think it is an urgent problem. DON'T click. These messages are called "phishing". They are sent out fraudulently to learn information from you. They are NOT sent from your bank or eBay. If you click on the link you may be allowing a virus to have access to your computer. These messages also sometimes ask for private information (like bank account numbers).  

One common problem is that some virus steals all of the email addresses in your friend's contacts. The virus then sends a message to ALL of those people (including you) with a link to click on. It may say that it is from your best friend. It might say something generic in the subject line like "this is funny" or "you will like this". Even the URL may look innocent. Any mail that comes from your friend with only a link do not click on it is probably a scam. 

How can you be sure that it is not really your bank? 
Here are some steps to take that will protect you from accidentally giving away information or access to your computer.

1.  Read ALL email skeptically. Even if it says it is from your friend do not assume it is valid if it seems suspicious. Do NOT automatically, without thinking, click on anything.

2. Before you click call your friend, the airline, your bank or whoever it says it is from to be sure it is authentic. 

3.  Know that companies and banks are aware of these problems and will never ask for personnel information through email. Most of them have links on their websites where you can report any phishing attacks you have received.

4.  You can usually run your mouse over a link or an email address and in the bottom left hand corner of the screen a box will appear that shows what code is underneath the words you are seeing. The code should match the words you see if it is legitimate.

5. Look at the email address it was sent from. Often the email address is very close to the one that the company uses, but not quite the same. For example it might say that it is from which would lead you to think it is from American Airlines, but their address is 

Most email is legitimate. It is a good way to communicate, but it is wise to be skeptical. Don't let someone who is phishing catch you!

Wednesday, October 15, 2014

ICYMI (In Case You Missed It)

If you are like me you do not use short cuts like LOL when you are texting or writing email. I am old enough that I still spell everything out. Now and then though someone sends me a message with one of these in it and I am not sure what it means. I found the list below online and thought I would share it with my readers.

1. LOL: Laugh out loud
2. OMG: Oh my god
3. ILY: I love you

4. LMAO: Laughing my a** off 

WTF: What the f***?
6. PPL: People

PPL people

7. IDK: I don't know?
8. TBH: To be honest

9. BTW: By the way

10. THX: Thanks

11. SMH: Shaking my head

12. FFS: For f***'s  sake

13. AMA: Ask me anything

14. FML: F*** my life

15. TBT: Throwback Thursday (this is usually used with a photo that someone posts from the past.)

16. JK: Just kidding

17. IMO: In my opinion

18. YOLO: You only live once

19. ROFL: Rolling on the floor laughing

MCM: Mancrush Monday
21. IKR: I know right?

22. FYI: For your information

23. BRB: Be right back

24. GG: Good game

 IDC: I don't care
26. TGIF: Thank God it's Friday

27. NSFW: Not safe for work

28. ICYMI: In case you missed it

29. STFU: Shut the f***  up

30. WCW: Womancrush Wednesday

31. IRL: In real life

32. BFF: Best friends forever
33. OOTD: Outfit of the day
34. FTW: For the win

35. Txt: Text

36. HMU: Hit me up

37. HBD: Happy birthday

38. TMI: Too much information

39. NM: Not much

40. GTFO: Get the f***  out

41. NVM: Nevermind

42. DGAF: Don't give a f*** 

43. FBF: Flashback Friday

44. DTF: Down to f*** 

45. FOMO: Fear of missing out

46. SMFH: Shaking my f***ing head

47. OMW: On my way

48. POTD: Photo of the day

49. LMS: Like my status

50. GTG: Got to go

51. ROFLMAO: Rolling on floor laughing my a*** off

52. TTYL: Talk to you later

53. AFAIK: As far as I know

54. LMK: Let me know

55. PTFO: Passed the f*** out

56. SFW: Safe for work

57. HMB: Hit me back

58. TTYS: Talk to you soon

59. FBO: Facebook Official

60. TTYN: Talk to you never
*Provided by

Sixty seems like it would be enough, but there are actually a lot more. The following website has the largest list of chat acronyms:

Thursday, October 2, 2014

Putting a Facebook or Twitter Icon on your Website

We have all seen the row of icons that lead to Twitter, Facebook, Pinterest, Instagram, YouTube, Foursquare, etc... They are found on sites where the company or owner of the site has accounts with social media platforms and they want you to go to them.

If you have a website and communicate on social media you may want to add these icons to your site.

There are two types. One will lead you to the Facebook page of the company on the website and the other is a share button that takes you to your own Facebook profile and creates a link back to their site so that you can share it with your friends.

These buttons can be added manually to your site and then linked where you want them to go. There are lots of sites that have free graphics of the buttons where you can go and download the ones that you want to use.

These are two examples, but there are many more. In most website programs the steps for adding linked graphics are similar.
  1. You upload the image to the page and then insert it where you want it to appear.
  2. The program allows you choose the size and location (Right, Left or centered) of the image.
  3. When the icon is where you want it to be select it by clicking on it and look for the words add link or click on the picture of a chain at the top of the program. In a second tab on your browser open the website that you want to link and copy the URL. Go back to the tab where you are working on your web page and paste in the link. 
If you are using Blogger, Weebly, Wix, SquareSpace or one of many other websites where you can make your website the directions for doing this are part of the page. Here in Blogger it is one of the Widgets that I can add to the page. If you scroll down to the bottom of the page you will see it. 


The other way to make it easy for someone to share your page is to use a widget or gadget that creates code which can be put into your site. One of these sites is

After you sign up on this website for free you are able to choose between various looks for your buttons. When you are done a code is created and you can paste that code into your webpage.

You can go to Google and search for 'plugin', 'social media', and the name of the software that you would like to put it into (wordpress, blogger, etc...) You will be given many choices and hopefully find one you like!

Thursday, September 4, 2014

What is a Hashtag and Why do People use Them?

A hashtag is just a search term. Most people are familiar with using search terms in Google to find things that they are interested in. Hashtags are just search terms that people make up for certain situations. 

Here are some reasons that people use hashtags:

1. To find other people that have the same interests. You can go to Twitter or Facebook and type #yoga to find people who are interested in Yoga. In Facebook if I type yoga in the search terms it takes me directly to's Facebook page. If I type #yoga it takes me to a list of status posts of people who are talking about yoga. 

2. To keep up with what others are saying about a news story.  Type #Fergason or #Fergasonshooting to catch up with what is going on in St. Louis after the Mike Brown shooting. Stories like this often disappear from the news, but are not gone. Hashtags in Twitter are a way of keeping up after it has disappeared from the front page. Another interesting one is #ISIS

3. Keep up with a political campaign. I have not heard much about Wendy Davis lately (most likely I have not been reading the paper carefully enough) so I was interested to see what was going on right now. I typed in #WendyDavis and was taken to a page in Twitter that updated me on some things, but also pointed out articles in various sources that I might want to read.

4.  To connect with people and learn about a health condition that you are experiencing. Try typing in #multipleschlerosis into Twitter and Facebook to see what you get back. I think this may be a good way to find others who are experiencing what you are and also to access current information on the disease.

5. To follow along with a conference that you are unable to attend. Many people "tweet" as they listen to a conference presentation including pictures and links to what is happening. You can go to that # and participate in a small way without being there. Try #iste2014. Some of the posts lead to actual recordings of sessions so that you can listen to the whole thing. 

6. To do a group or family chat. If you have a group that is interested in talking together about the same thing, but are geographically separated you can send out information to everyone about a Twitter Chat.  You tell them what the hashtag will be and also what time you all plan to be online. This makes it more like a conversation than a list of people commenting on something. Also people who cannot be there at that time can go back and participate later. Try #4thChat which is a weekly chat for 4th Grade Teachers. People post in between chats, but you can see that many of the posts are clustered around one date. Look at August 4, 11, 18, and 25!

7. To amuse yourself. If you like cats you can try #cats, or maybe #jokes to see what you can find!  I tried #chocolate. You could lose a lot of time this way.

Hashtags can also be codes for something. Here are a few that are interesting.
#chirped = got caught
#420 = marijuana
#livingdangerously = taking selfies while driving or some other unsafe behavior (actually pretty funny)
#selfie = taking a picture of self
#ootd = outfit of the day

I noticed that sometimes when I searched for something the first thing on the page did not fit in with my search. There are paid 'tweets' that go to the top of a search and so often when you go to a search you can skip the first few. They are marked as ads. Hashtags worked best on Twitter. They are used on Facebook, but not as often.

Friday, August 29, 2014

My Phone is full of Pictures, Now What?

Recently several of my clients have had the same problem. All of them had iPhones, loved taking pictures and video and had gotten to the point where they could not update the operating system or add apps because they kept getting the message from their phone that there was not enough memory. They did not want to delete any of their pictures. 

You can check the memory of your phone this way: 

  1. From the start page choose settings
  2. Open General
  3. Slide down until you see Usage and click on it.
  4. Your phone will tell you how many GB are available and how many you have used. Then it lists the apps on your phone in order of how much space they are taking. From here you can see what is taking the most space on your phone and decide what you might want to remove.
If you are sure that it is pictures and videos that are taking up too much space you may want to find another space to save them. On your computer you probably have a built in software for storing and editing your photos. iPhoto is the main one for Mac, but there is also Picasa. PCs come with Windows Photo Gallery. Each of these programs allows you to organize your pictures in different ways so that they are easy to find. 

First you will need a USB connector that goes from your phone (or camera) to the computer. Once you have plugged in your iPhone (or other SMART phone) to your computer and turned it on your compute should notice it and a screen should pop up asking what you want to do with the files that are on the device you just plugged in. You want to MOVE them to your computer from the iPhone. When you have chosen to do this a window will pop up and there will be a place to check that you want them to be deleted from your phone when they are transferred to the computer. Your computer should show you the process of transferring the pictures and then the process of deleting them from your iPhone. 

Now your iPhone has new space and your photos are all in a place where you can edit them and sort them in different ways easily. 

Having a program that will store your photos online as well as on your computer is really helpful. If something happens to your computer you will not lose all of your photos. iPhoto, Picasa and Windows Photo Gallery all have ways that you can sign up to have your photos stored online. They usually give you a bit of space free (3-5 GB) and then charge you for space beyond that. 


On your phone you can delete photos and video without downloading them. You can also delete them if you have already downloaded them to your computer and didn't want to erase all of them from your phone. 
Start by going to the Photos button on your phone. When you click on it your collection of photos shows up. You can see them in many different ways. For this you want to choose "photos". 

In this view they are organized by date. The first view is to see them by year. 

If you choose one of the years it will open to something called Collections. These are organized by date or place. 

If you click on one of those they are now organized as Moments. When the are in this arrangement you can see the word SELECT on the top right corner. 

If you click it the word SELECT appears at the top right of each of the groups of pictures. You will also see that there is a trashcan at the bottom right of the screen. You can select whole groups of photos or only the ones you want to delete. When you have selected more than one you will see the trashcan become blue. Now when you click it the pictures are gone.

Thursday, July 24, 2014

Avoiding a Virus

Malware and Viruses are constant problems when using a computer. Because everything seems so invisible when using a computer a virus really seems impossible to predict or to find. So, the result is that many of us are always fearful that we might get a virus and are not even clear how it happens. 

The best defense against viruses is to be prepared and to not get them in the first place. There are a few things that you can regularly do in order to prevent getting viruses.

1. Most Importantly make sure that you have installed on your computer effective virus protection software. The most common ones are McAfee and Norton, which both have an annual fee. They are both very good. A free one is called AVG. If you go to the first link after you search for AVG you will come to the paid version which costs approx. $40/year. Keep looking until you find the actual free version. It is not as powerful as the paid version, but it does what you need it to do.

2. Back up, back up, back up!!!  I cannot emphasize this enough. Unless you do not care about anything on your computer and don't mind losing all of it you need to back it up on a regular basis. The frequency of your back ups depends on you. If you use your computer a lot once a week is good. If you just use it now and then maybe once a month is OK. If you have a business and depend on that data daily every day backups are good. There are online programs that you can purchase for around $40 a year that will do a regular back up to a server somewhere (in the cloud). Those servers are also backed up on a regular basis. This type of software is a simple solution. 

Another solution is to get a back up drive. There are drives on sale at Office Depot, Staples and many other places. They usually plug in using a USB plug. If you have a Mac you can use Timeline with an external drive to back up your files. If you do not have a Mac you can use any of the back up softwares with a removable drive rather than the cloud. This is so important that if you don't understand what is written here you should find someone to help you. 

There are two types of back ups.  One is a data back up. This is what most back up software does.  It will make a copy of all of your files and data (information saved on the computer), but it doesn't save programs. This type is the most common. Many people keep the original disks from the software they purchase or have paid for them and know that they can download the software again. The other type is an image back up. This is much more extensive and will copy all of the programs on the computer as well as the data/files. If you use a data back up you still need to make sure that you have copies of all of the programs you have added to your computer. 

3. NEVER click on a link or an attachment that you are not sure about. There are many negative hackers who can even make your email message look legitimate and put a link into it that opens a virus on your computer. If I get a message with a link from someone I know, I open a new message put in their address (never reply) and ask if they sent it to me. Most likely they did not and will let you know that. If they did send it you can ask them to send it again. People I know would not send a link without explanation and so often without asking I just delete the message.

4. If you are not sure about a link and it looks legitimate you can hover your mouse arrow over the link. Usually in the bottom left corner of your screen you will see the actual URL that your computer will take you to. If you do not recognize the link or it doesn't seem to be related to the sender do NOT click on it. Any legitimate company will send you a link with their company name in it (like 


You can go to a Geek (look online for computer repair in your area) and ask for help or call the 800 number of your computer maker. If you have backed up your data or have an image of your computer they can help you restore it. If you don't care about what was on your computer before you can reset it back to the way it was when it was new. One big problem with viruses is that they multiply, so it is possible that people in your contact list will get email that looks like it is from you with a link they should not click on. For this reason if you know your computer has a virus immediately take it off the network. For wired computers unplug them from the ethernet cord. For WiFi computers go to the set up and end all of your Internet connections.  

Computer viruses are changing and getting stronger all of the time. One recent malware is called Cryptolocker. It will scan a hard drive and then encrypt files so that they can no longer be opened. The only way to get them back is to pay anywhere from $100-$300 to de-encrypt them. That is why it is so important to follow the prevention tips above. 

If you do click on something and get a CryptoLocker message or something like that immediatly disconnect from the network. This is one thing you can do to keep from using your contact list to send out other messages that may infect other machines. 

Friday, July 4, 2014

How can I figure things out on my own?

It is likely that many of the people who read this blog already know this or already think this way, but I thought it was worth mentioning. It took me a long time to think of the Internet as the FIRST place to look when I needed something. This is one of those things that I think is a brain changing thing that technology can do. (good or bad?  I don't know)

Searching the Internet is an amazing way to find out what you need to know about ANYTHING!

I do this often. I go to Google and put in almost any words that apply to my situation. At the end of this article are links to other search engines that are very helpful. Google is not the only search engine, but it is the one that is most commonly used. The best way is to put in ALL of the words that describe it and depending on what you find take out words one by one. 

I am telling you this at the risk of losing business!  However, I am in business to help people to be successful using technology and there are always people who learn best from other people. 

One Example:

My iPad, my iPhone and my Computer are not syncing.

I first try typing in all of the main words of the sentence above and before I have even typed in all of the words the suggestion comes up:

On the first page most of the choices are from Apple Support. I know this because below the title of the page on the first line is the URL of the website.  Most of them start '' or '' The first page listed may answer your questions. Sometimes the text below the URL will be enough to let you know if this answers your question or not. Apple includes some screenshots and also links to other articles that might answer questions. 

All of the other Apple sites lead to other Apple help pages. They might have the answer to your problem. There is one that says Discussion in the URL. I find these particularly helpful because other people often have the same issue and in the discussion it is solved. 

Finally below the first 7 responses is one from '' and then one from YouTube. I usually go then to the YouTube answer because they are often helpful.  Here is the YouTube for this question. 

As I listened to this one I realized that it could be confusing or helpful depending on your prior knowledge and if you use a Mac or PC. 

It does take patience to look through the sites and try things and then keep searching, but you are often able to find a solution this way. It works for me!

Specialized Search Engines - Travel - Travel - a search for holidays returns Jewish holidays only! - a Christian search engine Returned "Should Christians celebrate holidays" and "Are Christian Holidays Pagan in origin?" among others. - people search - search yourself and see what you find... 

Tuesday, July 1, 2014

Downloading Books from the Library

It is time for vacation and this year we took a REAL one! We spent two weeks on the Greek Islands!  We went to Rhodes, Kos, Patmos and Samos. If you want to read more about that or look at more pictures you can look at my trip blog

Since I knew that there would be plenty of relaxing time and definitely lots of time on airplanes I downloaded a bunch of books from the Public Library.  It was GREAT!  I think that most public libraries have a Virtual Library where you can check out books and download them to a Kindle, iPad or even your computer. At my library there is a huge collection of text and audio books. On my iPad I have a free Kindle app. It compares pretty well to reading books directly on a Kindle. I have compared the two and the Kindle does really have clear text, but in general I don't notice a difference.

First of all, you have to have a library card. They are free for anyone. You just go to the library and show them something that proves you are a resident. I think that even an energy bill with your name and address on it works. You might want to check with your library first though.

Next you need to go to their website and create a web account. I have been using Dashlane to keep track of my passwords and it is great for the library account. For my library I have to put in my library card number as the username and it is about 10 digits. It is nice to have it automatically filled in by Dashlane.

Now just go to the Virtual library and look for a book you want. When you find one click "Borrow". If you want it in Kindle form it takes you to Amazon where I click on Check out the book now and it appears on my iPad!  Just like the physical library and physical books there is a date when the book is due, but unlike physical books where you can forget to get them back and incur a fine, the book just disappears from your device. You can renew books if you know that you will not finish them by the due date.

I checked out 4 books and finished 3.5!


Each time I have checked out a book I learn more about how this works. At times it can be confusing, but I have found it worthwhile!

Friday, May 23, 2014

What is an avatar?

An Avatar is a picture that you can use to represent yourself on a website. Many websites now ask for a picture when you complete your profile. Most people just use pictures of themselves, their families or something that they like. You will see some that are actually avatars. Here are some sites where you can make your own avatars for free. I have tried each one out and put it into the blog so that you can see what they are like.

10 Websites to Create your own Avatar

For Children especially
Avatars are especially good for children. It is best for them not to put their own photos online. This site has tons of choices.

List of Avatar Makers

Doppel Me

Voki-Voki avatars can move and even talk.

Monday, May 12, 2014

Help!! I have a bunch of files to rename!

When I connect my camera to my computer and download the pictures they are all files named DMG001, DMG002, etc... Usually I don't have time to rename each of the pictures one by one. It helps me to remember what they are if I name them something more meaningful.  So, I searched and found some software that would do that for me.

This is often called a “batch” process because you are changing a batch of files at the same time. To find some software I did a search for 'software to rename files mac' You could do the same for 'software to rename files PC' and add the word free if you want to be sure that you get a free option.

I chose NameChanger because it was free. 


    picture of NameChanger window
Open NameChanger and find the files that you want to change. Set the program up to change parts of the name or the whole name. Notice that there is a pull down menu that gives you several choices. You can choose to give them all the same name with a numeral at the end that changes (1,2,3)

  1. Find the files that you want to change. This may mean opening a folder and clicking COMMAND-A to select all of the files.
  2. Drag the files into the first column showing on the NameChanger window.
  3. Click the RENAME button on the top.

On the left side you will see the result and automatically you will also see that the file names have changed in your computer.

There are free options to do the same thing on a PC. 


Click on the file one time to highlight it. Count to 10 and then click just the name of the file one time and wait for a second or two. You will see the name highlight in a way that allows you to type whatever name you want it to be.

Right Click on a file (Remember right click always gives you another menu). In the menu that pops up you will see the word “rename”. Click on it and you will be able to give the file a new name.

Thanks to Glee for having this problem so that I could figure it out and write it up here!

Friday, April 25, 2014

What is encryption?

Since there has been so much news lately about the Heartbleed bug and other viruses I thought it would be a good time to talk a bit about encryption.

Illustration from
Encryption is an important part of Internet Safety although it is something that you do not see or do anything about. It takes what you type on the computer (input) and puts it into a code so that while it is traveling over the wires no one can intercept it and steal that information. When your message arrives at the other end it is decrypted so that it can be read.

At this time most Banks, PayPal, and other Websites that involve money or information that needs to stay secure use strong encryption. It is also a major concern of Doctors and Hospitals as they put patient information online. 

Unlike most posts this does not end with something that you should do. Encryption is good to know about. It is automatically done at many sites.

Good security is an important part of doing business online. The good thing for us users is that the companies are possibly more concerned with safety than we are. They know that if they are unable to provide secure transmissions on their site they will lose customers. 

Encription according to