LET'S MEET ONLINE

LET'S MEET ONLINE! Call (512)560-2609 or email helpimnotageek@gmail.com and set up a time for a session. It works really well. We talk on the phone while I see your screen.

Saturday, September 18, 2021

Finding Copyright Free Images on the Web

 

Where Do I Get the Images I use?

Last week I did a training session and mentioned to the participants that there were places on the web where you could get copyright free images to use on flyers. Since I was talking about that I decided to look up some of the websites that I use and make a list that I could give them. Wow!! What a surprise! There are LOTS of places to get beautiful copyright free images on the Internet. It used to be that there were only a few and they were hard to find. Most images were from sites only had copyrighted images and charged by the picture, or you could subscribe to the site that provided them.

Now there are quite a few places to find images that are shared. I even wrote one of them asking how they made money when they were providing all of the pictures for free. They said that people donated images. The people who donated the images got notoriety by getting their pictures online and shared There is always a link where you can Paypal directly to the artist. The site made income from having links to Stock Photography Websites which were paid money to be included! The photo above is from Pexels and is by Andy Vu.

Here is a list of the sites that I found!

Copyright Free Image Sources

Wikimedia Commons- Like Wikipedia a collection of images that are free to use. Some very beautiful images.

https://commons.wikimedia.org/wiki/Main_Page

Flickr Commons-Images taken by people who are willing to share them

https://www.flickr.com/

Google Images – search and then choose TOOLS-USAGE RIGHTS to set it to images that are free to use.

Free Range – Requires registration

https://freerangestock.com/

Unsplash

https://unsplash.com/

Pexels

https://www.pexels.com/

The Life of Pix

https://www.lifeofpix.com/

Stock Snap

https://stocksnap.io/

Pixabay

https://pixabay.com/

Wednesday, September 8, 2021

The Best Ways to Secure Your PC

Thanks to The Tech Fools for the article about Macs which I followed and translated into an article for PCs.

The Best Ways to Secure your PC Last week I sent you an article on the best ways to secure your Mac. I have had a request for the best ways to secure your PC. I know that most of you who get this newsletter use a PC. I hope this is helpful.

Here are some of the risks PC users face: ● Phishing Phishing is common across all operating software and is an attempt by hackers to steal your confidential information. This is because phishing scams do not target operating systems (Windows or Mac) but the users. Phishing scams fall into social engineering types of scams. They usually come in the form of links or email attachments. The message in the email is designed to manipulate your emotions and force you to act. Often these emails make you feel worried that your bank is overdrawn or that you have ordered something online and you cannot remember doing it. They also can make you feel lucky like maybe you won some sort amount of money and you just need to claim it. Once you click on the link or download the attachment, you are redirected to a fake website that solicits your info, such as password and bank details. Really watch out for these because they often have the correct logo or look like the real thing. If you feel worried or doubtful be sure not to click and instead call your bank or Amazon or whoever for information first. Most companies are aware of this and do NOT use email for important things like this. Malware Malware is software that can do damaging things to your computer. You may notice that all of a sudden you have a lot of pop up ads even when you are not on the Internet. Also, your computer might be running very slowly all of a sudden. Sometimes it comes from software that you have downloaded from the Internet. Most of the time it comes to your machine because you clicked on something in your email that automatically downloaded the software to your computer. This happens in the background, so you don’t notice it. It is highly recommended that you keep an up to date copy of Malwarebytes Software on your computer. ● Man in the Middle Attacks Man-in-the-Middle attacks happen when you are browsing on unsecured connections like public Wi-Fi. It is really important to always be aware that public Wi-Fi can allow others to access your computer. The hacker intercepts your communication with another person and alters or modifies your messages. You will think you are communicating with someone, yet you are both communicating with the hacker. How to stay safe 1. Install a VPN VPN means Virtual Private Network. When you are home anyone who uses your network must put in a password. When you have a VPN set up you have your own network with a password wherever you use your computer. Even in public spaces people cannot get into your computer. This makes you completely anonymous while online. A VPN also encrypts your communication and protects you from various attacks such as man-in-the-middle attacks. 2. Keep your PC and Programs updated. When developers roll out software updates, they patch up security vulnerabilities in the previous versions. If you do not update your Operating System, (https://support.apple.com/en-ke/HT201541) the hackers already know which security loopholes to use. Set up your Operating System to auto-update every time there is an update. Even though we have had Windows 10 for several years they are regularly coming up with updates that improve how it works. 3. Use a PC Anti-virus software There are numerous anti-virus software in the market. Windows 10 has its own security built in and for many people that is sufficient. Just to be sure though I always recommend that installing a known Virus Protection program like Norton or McAfee. This article from PC Magazine has detailed information on which of the Virus Protection programs is the best. https://www.pcmag.com/picks/the-best-antivirus-protection Conclusion Many of the things that were in the article on Macs apply equally to PCs. The weakest link is always the user. If you do not use good passwords, think about what you are clicking on twice before doing it, or allow anything on the computer to motivate you to fear or doing things you are not sure about you are in danger of getting a virus! Be careful and confident of yourself and you and your computer will be fine!

The Best Ways to Secure Your Mac

Thanks to The Tech Fools for this article. I highly recommend their website!

The macOS has a reputation as one of two very secure operating systems, the other one being Linux. This is true to a certain extent, but no operating system can call itself 100% invulnerable. However, due to its high level of security, more people are turning to macOS. Unfortunately, with popularity comes risks. Despite all the security efforts by Apple, the amount and sophistication of risks are growing. 

Here are some of the risks macOS users face: 
  • Phishing Phishing is common across all operating software and is an attempt by hackers to steal your confidential information. This is because phishing scams do not target operating systems (Windows or Mac) but the users. Phishing scams fall into social engineering types of scams. They usually come in the form of links or email attachments. The message in the email is designed to manipulate your emotions and force you to act. Often these emails make you feel worried that your bank is overdrawn or that you have ordered something online and you cannot remember doing it. They also can make you feel lucky like maybe you won some sort amount of money and you just need to claim it. Once you click on the link or download the attachment, you are redirected to a fake website that solicits your info, such as password and bank details. Really watch out for these because they often have the correct logo or look like the real thing. If you feel worried or doubtful be sure not to click and instead call your bank or Amazon or whoever for information first. Most companies are aware of this and do NOT use email for important things like this.
  • Malware MacOS does not allow its users to download any third-party apps or programs. However, that does not mean there is no malware or malicious software that attacks macOS. According to statistics, most of the US attacks were Trojans such as the Shlayer and Adware, which primarily target users with adverts.
  • Man in the Middle Attacks Man-in-the-Middle attacks happen when you are browsing on unsecured connections like public Wi-Fi. The hacker intercepts your communication with another person and alters or modifies your messages. You will think you are communicating with someone, yet you are both communicating with the hacker. 
How to stay safe 
  1. Install a VPN A VPN is like having your computer connected to a private network that only you can access. When you are home that is true anyway, but a Virtual Private Network sets up your computer to work like that anywhere. Use a Mac VPN to hide your IP address and prevent hackers from tracing your connection and actual location. This makes you completely anonymous while online. A VPN also encrypts your communication and protects you from various attacks such as man-in-the-middle attacks. 
  2. Keep your macOS and Programs updated. When developers roll out software updates, they patch up security vulnerabilities in the previous versions. If you do not update your OS, the hackers already know which security loopholes to use. Set up your OS to auto-update every time there is an update. 
  3. Use a Mac Anti-virus software There are numerous anti-virus software in the market, but few are suitable for software specifically targeting macOS. Apple’s inbuilt security features cannot do the job sufficiently, so you need to boost your security. Conclusion Most Mac users wrongly assume their devices are 100% foolproof. Hackers have become increasingly sophisticated and are designing macOS-specific malware. It is highly recommended you boost your Mac’s security to protect your data from theft.

Monday, April 5, 2021

CONTROLLING YOUR MEMORY ON GOOGLE

I am doing work for my church and using Google Docs a great deal. I am saving videos and images and it is taking up lots of space. Recently I am getting the message "You have used 81% if you run out of storage, you won't be able to upload new files. They want me to pay 99 cents a month for more storage.  Actually that is not bad. If I was doing something that was continuing and really wanted more space (my husband pays for more space because he has tons of pictures of Archaeological sites that he uses for teaching) I would sign up.
I don't and I always forget how to clear it out so I am writing here- to help others and myself!

  1. Go to Google Drive. 
  2. In the message click on "learn more"
  3. This will take you to instructions about using your storage in Google Drive. 
  4. Next I chose to go to This showed me a list of files that I am saving and here I was able to make decisions about what to delete.




Monday, January 25, 2021

How to Stay Private on Facebook

This is another blog entry from The Tech Fools. This one is about Keeping Private on the Internet. This is more important than ever. I used to think that I was not doing anything I wanted hidden, so privacy was not a big issue. Things have changed and with technology EVERYTHING is available somewhere. One thing can be linked to another and eventually your bank account is out there. It is worth a careful read


Facebook is no stranger to privacy issues.

In fact, put the company’s name in any search engine online against privacy-breach keywords and you will come up with a lot of content.
If Facebook is doing it, many other companies are also putting your privacy at risk. The sheer size of the social media giant could explain why it’s the one most people are going after.
That said, this is the time to take your online privacy seriously. The following tips are aimed at doing just that.

Change your Search Engine

Google is yet another company that feeds massively off user data. 
They are so connected that there is almost no part of human life (especially for Android OS users) that they cannot get data from. Add that to the fact that they have the largest search engine
It is thus little wonder why they can afford to pay Apple billions just to keep iOS users using the search engine.
If you want more privacy for your data while looking up things online, you might want to consider the move to more privacy-focused search engines. DuckDuckGo is a fine example here, and they even have a browser of their own to match.

Install a VPN

Most VPN apps might have become popular for helping users change their IP address at will. These days, though, using a VPN app for privacy is a no-brainer.
This feature is made possible by the unique ability of VPNs to tunnel data through numerous secure servers in different parts of the world. Should a hacker or unauthorized person be tracking such user data, they are bound to get lost in all the twists and turns they will encounter.
VPNs also come in handy when browsing the internet over unsecured/ public/ free Wi-Fi networks, considering the dangers that such connections pose to the user.

Restrict Third-Party Apps

Device manufacturers are constantly trying to meet every need of their consumers out of the box. They know the price paid for third-party apps – both directly and indirectly – and they would prefer to improve the experience.
In this case, the indirect price could be the data that these apps take from you in return for letting you use their services.
We know that your OEM cannot always have the best-looking apps installed right off the bat. When you have factory-fitted alternatives, though, resist the urge to go for third-party apps.

Check your Browser

Would it be surprising if we said that Google Chrome is one of the least preferred browsers when it comes to privacy? Overall, though, it happens to be the most widely used browser.
When privacy is your top concern, you are better off with the likes of the Tor browser, Brave browser, Mozilla Firefox, and Chromium, among others. 

Stay Safer

The world is changing with ever-emerging technology. With that change comes more shreds into the already tiny fabric of privacy that we have. It is left to the consumer to fight back in any way they can lest all of their privacy be ripped away from them.
Applying the above recommendations, you start clawing back your privacy too.