Loading...

Five Best Android Phones

Sunday, April 29, 2012 // by Saurabh // Labels: , , , , , // No comments:


There are dozens—probably hundreds—of Android phones on the market today. Some of them are exclusive to specific carriers, some of them are available around the world, but only a few of them are at the head of their class. This week we wanted to know which Android phones you thought were the best available, not just because they round out a checklist of features or high-end hardware, but because you think they offer a great overall experience. Here's a look at the top five Android phones.
There are plenty of sites willing to tell you which phones are the best based on the chips inside, the camera, the storage, or the version of Android pre-installed, but those things don't always add up to a great user experience. and here's the Highlight to our Top 5 Hive Five android phones:





Samsung Galaxy Note


Often referred to as a "phablet" because of its included stylus and massive 5.3" Super AMOLED display, the Samsung Galaxy Note (AT&T, $299 w/contract) is huge, but many of you praised it for blending the portability of a phone with some desperately needed tablet-like real estate. The 8MP and 2MP rear and front-side cameras and 1.4GHz dual core processor don't hurt matters either, and while it's definitely not the right size for everyone, those of you who have one love it, and others are looking forward to its release on other carriers. Plus, even though the Galaxy Note ships with Android 2.3 Gingerbread pre-installed, there are plenty of ROMs available to bring it up to Android 4.0 Ice Cream Sandwich, or just replace Samsung's TouchWiz interface entirely.









HTC One X/S


The HTC One series is HTC's most recent attempt to recreate itself, not that the company really needed to—most people who have used HTC devices love them, and the HTC One X and One S are no exceptions to the rule. The One X (AT&T, $199 w/contract) is HTC's new flagship phone, sporting a 4.7" screen, a quad-core NVidia Tegra 3 (internationally) or a dual-core Qualcomm Snapdragon (US/Canada) processor, Android 4.0 Ice Cream Sandwich (with HTC's Sense UI on top), built-in Beats Audio, and an 8MP rear camera with a 1.3MP front-facing camera. The HTC One S (T-Mobile, $189 w/contract) on the other hand is a slightly smaller 4.3" screen, a 1.5Ghz dual core processor, 8MP rear and VGA front cameras, Beats audio, and Ice Cream Sandwich. Both devices are slim, powerhouse devices designed to bring Android lovers' focus back to a select group of high-end HTC devices, instead of the dozen-plus ones HTC has released in the past. So far, it's working.





Samsung Galaxy S/S II


The Samsung Galaxy S series of devices are some of the most popular smartphones in the world, and even though Samsung and Apple are embroiled in a patent lawsuit over exactly how similar the Galaxy S is to the iPhone (and vice versa), that hasn't stopped the Galaxy S and the Galaxy S II from selling millions of units worldwide. The Galaxy S was one of the first dual-core Android smartphones, and definitely one of the first to feature Samsung's new (at the time) Super AMOLED display, offering bright and crisp colors even in bright light. It's still available for a song depending on the carrier you pick it up from (in the US, it was sold under the name Vibrant (T-Mobile), Captivate (AT&T), Fascinate (Verizon Wireless), and Epic (Sprint) in both 3G and 4G variants.) History aside, the Samsung Galaxy S II is the company's current model and features a 4.3" Super AMOLED display, a 1.2GHz dual core processor, and while it shipped with Android 2.3, most carriers have been slowly rolling out updates to bring the device up to Android 4.0. Pricing varies depending on the carrier and variant you pick up, but one thing is certain: when it was launched, most people considered the Galaxy S II the best Android smartphone—if not the best smartphone—available on the market, which makes the furor over the upcoming Samsung Galaxy S III that much louder.





Droid Series by Motorola


The Droid by Motorola (Motorola Milestone, internationally) series was one of the earliest Android phones on the market to really bring Android to the masses—and definitely the first Android phone available on Verizon Wireless at the time. It was a tough call to group the Droid series together, but it's worth noting that those of you who nominated the Droid line in large numbers specifically mentioned the slider models, not the candybar models like the Droid Razr, Razr Maxx, or the Bionic (although they all got strong nominations as well)-all available on Verizon Wireless in the US. The Motorola Droid 4 (VZW, $199 w/contract) is the current iteration of the phone, featuring a 4" qHD display, a 1.2GHz dual core processor, 8MP rear and 1.3MP front-facing cameras, and most notably, a slide-out backlit keyboard that allows the phone to be used in both portrait and landscape modes without sacrificing screen real estate. The Droid line is still one of the few high-end Android devices to feature a physical keyboard, making it popular for both portability, and with people who prefer physical keyboards to on-screen ones. The Droid 4 sports Android Gingerbread, and rides Verizon Wireless' 4G network.





Samsung Galaxy Nexus


The Samsung Galaxy Nexus (VZW, Sprint, $199/w contract, $399 unlocked) is the current official "Google Phone," having launched with Android 4.0 Ice Cream Sandwich and currently serves as the flagship Android device. It sports a 4.6" Super AMOLED display, a curved contour screen, a 1.2GHz dual core processor, and 5MP and 1.3MP rear and front-facing cameras. It's a pure Google experience, meaning the phone is (largely) free of bloatware and other apps pre-installed by carriers and manufacturers, and is notably missing Samsung's TouchWiz UI layer in favor of a clean version of Ice Cream Sandwich. The phone also sports Google's NFC payment system, Google Wallet. The camera boasts zero shutter lag, and it was the first phone to launch with Ice Cream Sandwich pre-installed, and it's still one of the few devices you can get that already has it. If you want the more true and pure Android experience possible, or want an Android phone that's officially supported by Google, this is it.





Remember, the top five are based on your most popular nominations from the reviews based on different sites. If there's something you want to add, Share your thoughts in the comments below.

It's Official: Google Has Lost Control of the Android Tablet Market

Saturday, April 28, 2012 // by Saurabh // Labels: , , , , // No comments:

News
More bad news for Google and Android.


Amazon's Kindle Fire now has 54.4% of the Android tablet market in the U.S., according to comScore.


This means Google has lost control of the Android tablet market to one of its newest mobile rivals after just a few months.


Amazon used the base layer of Android to build its own operating system. Google doesn't have its app store or any of its services on the Kindle Fire.


Amazon isn't the last company to do this. Phone makers are planning on forking Android, making it more fragmented and ultimately cutting Google out of the loop.


The success of the Kindle Fire is proof that you don't need Google to make a popular Android-based device.

Apple is 10 years behind Microsoft on security, expert says

// by Saurabh // Labels: , , , , // No comments:


Articles
Apple may be the most valuable company in the world, but when it comes to security, the Cupertino-based company doesn’t hold a candle to Microsoft. Kaspersky Lab co-founder and chief executive Eugene Kaspersky on Wednesday told CBR that Apple is a decade behind Microsoft in terms of computer security. 
"I think they are ten years behind Microsoft in terms of security,"
 Kaspersky said. 
"For many years I’ve been saying that from a security point of view there is no big difference between Mac and Windows. It’s always been possible to develop Mac malware, but [Flashback] was a bit different. For example it was asking questions about being installed on the system and, using vulnerabilities, it was able to get to the user mode without any alarms.”
More than 600,000 Macs were infected by the Flashback trojan virus before it was discovered earlier this month and the exploit it used to infect OS X PCs was patched. 
“Apple will understand very soon that they have the same problems Microsoft had ten or 12 years ago,” Kaspersky said. ”They will have to make changes in terms of the cycle of updates and so on and will be forced to invest more into their security audits for the software.”

First Look at Ubuntu Linux 12.04 "Precise Pangolin"

Thursday, April 26, 2012 // by Saurabh // Labels: , , , // No comments:



News
Ubuntu 12.04 "Precise Pangolin" is out today, bringing lots of improvements to your favorite Linux distribution. It has a new quick search feature called the HUD, some new privacy settings, a few tweaks to the Unity interface, and more.
This release is another "Long Term Support" release, meaning Canonical will support it for longer than other versions—five years, to be exact. It also usually means lots of new features, though this time around it seems to be more polish than anything—though the HUD alone is reason enough to upgrade. Here's a look at everything that's new.


The HUD Makes Finding Menu Items Super Easy


Have you ever been in a situation where you're using a program, and want to do something specific that you know is in the menus, but you just don't know where? The new HUD solves that problem. Just hit Alt, and a search bar will pop up in the upper left-hand corner of your screen. From there you can type in what you're looking for, and it will return any menu items that match your query. If you've ever used a Mac, it's almost exactly like the Spotlight bar you get under the "Help" menu of individual applications, and it is a lifesaver.


New Privacy Options Keep Your Information to Yourself


One great thing about Unity's Dash is that you can search for recently used files, folders, and programs easily. However, if you'd rather some of your activity not be logged, Precise has a new set of Privacy options to let you tweak that. By going to System Settings > Privacy, you can now ignore certain types of files, ignore activity in certain folders, or ignore activity with certain applications. You can even turn activity recording off altogether if you'd rather not have the feature at all. In an age where everyone's having privacy gaffes left and right, it's nice that Canonical has added this easily accessible preference pane for anyone to tweak.


Miscellaneous Improvements in the Unity Interface


Love it or hate it, Unity is here to stay, and the newest version has a few tweaks that make it a bit more appetizing to those of us on the fence. At the top of the list is a new Video lens in the Dash (remember lenses?), which searches not only videos on your computer but videos online. That means you no longer need to head to Amazon, Vimeo, or TED Talks in your browser to start searching for videos—just hit the Super key, click on the video lens, and start typing. Sadly, it doesn't search all of YouTube yet, just YouTube Movies and YouTube Shows, but hopefully this will change or someone will create an add-on in the future.


You'll also find that Nautilus now has a pretty beefy right-click menu in the Unity dock, which is nice, plus some nice color-matching effects if you have a powerful enough machine. The "Appearance" settings pane also has a few Unity-specific preferences, like auto-hiding the launcher.


Touchpads With Built-In Buttons Work a Tiny Bit Better


For a long time, Ubuntu has had trouble with ClickPad devices, where the touchpad itself is the mouse button (like those found on MacBook laptops). In Precise, ClickPad devices are now fully supported. Finally, you can click the button, but still move the cursor around with a second finger on the trackpad. In previous versions of Ubuntu, it had trouble recognizing the second finger. Unfortunately, trackpad support still really isn't there. While clicking and dragging mostly works, Canonical seems to have completely ignored regular mouse movement. If you have your thumb on the bottom of the trackpad, you can't move the mouse with a second finger. The whole thing still feels unnatural and unfinished. Here's hoping this will improve soon—at least we know they're now looking into it. Photo by Ryan Bailey.


Rhythmbox Is the Default Music Player Again


We really dug Banshee as the default music player in Ubuntu, but with version 12.04 they've defaulted back to the stable, popular Rhythmbox. The biggest change here is that the Ubuntu One Music Store is once again available in Rhythmbox, so Ubuntu One users are the only ones really affected—everyone else can continue using whatever music player they want.


Ubuntu One has a Few More Options


Lastly, Ubuntu One users will also find that the Ubuntu One client interface has changed a bit, and is now more similar to its Windows counterpart. You also have the option to choose which folders you want synced to your machine, which is nice.


Despite its being an LTS release, there aren't a ton of huge changes in Ubuntu 12.04, though the HUD is easily enough to get us upgrading as soon as possible. Check out Canonical's changelog for the full list of changes, or just download the new version now and try it out for yourself. 


If you stumble on any new features you love, be sure to let us know about them in the comments.

Google launches Google Drive & upgrades Gmail to 10 GB for all users

// by Saurabh // Labels: , , , , , // No comments:



News
Google has launched Google Drive, a cloud storage service where users can upload and access all of their files, including videos, photos, Google Docs, PDFs and beyond. The service is offering new users 5GB of storage for free with upgrades starting at 25GB for $2.49/month, 100GB for $4.99/month or even 1TB for $49.99/month. Google also increased the free storage in Gmail from the existing 7.5 GB to 10 GB to all users.








“Drive is built to work seamlessly with your overall Google experience. You can attach photos from Drive to posts in Google+, and soon you’ll be able to attach stuff from Drive directly to emails in Gmail. Drive is also an open platform, so we’re working with many third-party developers so you can do things like send faxes, edit videos and create website mockups directly from Drive. To install these apps, visit the Chrome Web Store—and look out for even more useful apps in the future,” Sundar Pichai, SVP, Chrome and Apps, Google has said in a blog post:



Today, we’re introducing Google Drive—a place where you can create, share, collaborate, and keep all of your stuff. Whether you’re working with a friend on a joint research project, planning a wedding with your fiancé or tracking a budget with roommates, you can do it in Drive. You can upload and access all of your files, including videos, photos, Google Docs, PDFs and beyond.
With Google Drive, you can:
Create and collaborate. Google Docs is built right into Google Drive, so you can work with others in real time on documents, spreadsheets and presentations. Once you choose to share content with others, you can add and reply to comments on anything (PDF, image, video file, etc.) and receive notifications when other people comment on shared items.
Store everything safely and access it anywhere (especially while on the go). All your stuff is just... there. You can access your stuff from anywhere—on the web, in your home, at the office, while running errands and from all of your devices. You can install Drive on your Mac or PC and can download the Drive app to your Android phone or tablet. We’re also working hard on a Drive app for your iOS devices. And regardless of platform, blind users can access Drive with a screen reader.
Search everything. Search by keyword and filter by file type, owner and more. Drive can even recognize text in scanned documents using Optical Character Recognition (OCR) technology. Let’s say you upload a scanned image of an old newspaper clipping. You can search for a word from the text of the actual article. We also use image recognition so that if you drag and drop photos from your Grand Canyon trip into Drive, you can later search for [grand canyon] and photos of its gorges should pop up. This technology is still in its early stages, and we expect it to get better over time.
You can get started with 5GB of storage for free—that’s enough to store the high-res photos of your trip to the Mt. Everest, scanned copies of your grandparents’ love letters or a career’s worth of business proposals, and still have space for the novel you’re working on. You can choose to upgrade to 25GB for $2.49/month, 100GB for $4.99/month or even 1TB for $49.99/month. When you upgrade to a paid account, your Gmail account storage will also expand to 25GB.


Drive is built to work seamlessly with your overall Google experience. You can attach photos from Drive to posts in Google+, and soon you’ll be able to attach stuff from Drive directly to emails in Gmail. Drive is also an open platform, so we’re working with many third-party developers so you can do things like send faxes, edit videos and create website mockups directly from Drive. To install these apps, visit the Chrome Web Store—and look out for even more useful apps in the future.
This is just the beginning for Google Drive; there’s a lot more to come.
Get started with Drive today at drive.google.com/start




How Google Searches the Entire Web in Half a Second

Tuesday, April 24, 2012 // by Saurabh // Labels: , // No comments:



Articles
It only takes half a second for Google to return a search based on keywords you type in, but there’s a whole lot more happening behind the scenes to give you the results you need. Google on Monday launched a video that explains the science behind how the massive search engine actually works.
Matt Cutts, software engineer head of Google’s webspam team, details in a YouTube video how the search engine giant thoroughly scours the web on a daily basis to provide the most up-to-date results to users.
“There are three things you need to do to be the best search engine in the world. First, you need to crawl the web comprehensively and deeply, then you want to rank or serve those pages and return the most relevant ones first,” Cutts said.
Although Google crawls the web on a daily basis, that wasn’t always the case.
“We used to crawl for 30 days… and then index for about a week and push that data out — and that would take about a week,” Cutts said. “Sometimes you would hit a data center with new data and sometimes you would hit a data center with old data.”
But this method wasn’t optimized since a lot of the information would be out of date. In 2003, Google switched to crawling a significant amount of the Internet each day. By scouring the web each day for new content, it incrementally updated its index.
“We have gotten even better over time, and at this point, we can keep it very fresh,” Cutts said.
To do so, page rank is the key deciding factor as to how likely you are to see a link: “We basically take page rank as the primary determinant and the more page rank you have — that is, the more people that link to you and the more reputable those people are — the more likely it is that we will discover your page relatively early in the crawl,” Cutts said.
Google also places a lot of emphasis on word order. For example, a search for pop singer “Katy Perry” will look for results with those two words next to each other, rather than having “Katy” and the word “Perry” show up in different parts of the content.
Finding the right balance between word proximity, page reputation and links pointing to it is the key.
“That’s kind of the secret sauce,” Cutt added.
Google then sends that query out to hundreds of different machines all at once, which look through their fraction of the web that has been indexed to find the best match.
“We say, ‘what’s the best page that matches this query across our entire index?” Cutts said. “We take that page and we try to show it with a useful snippet, so we show the keywords in the context of the document and get it all back in under half a second.”
How do you think companies can use this information to better show up in Google search results? Let us know your thoughts in the comments.


Source: Mashable

If MAC was the most popular OS in the world, Hackers would have bankrupted Apple!

Thursday, April 19, 2012 // by Saurabh // Labels: , , , , // No comments:
 "If MAC was the most popular OS in the world hackers would have bankrupted apple!"
More than half a million Apple computers have been infected with the Flashback Trojan, according to a Russian anti-virus firm.



The report claims that about 600,000 Macs have installed the malware - potentially allowing them to be hijacked and used as a "botnet".


The firm, Dr Web, says that more than half that number are based in the US.

Apple has released a security update, but users who have not installed the patch remain exposed.

Flashback was first detected last September when anti-virus researchers flagged up software masquerading itself as a Flash Player update. Once downloaded it deactivated some of the computer's security software.

Later versions of the malware exploited weaknesses in the Java programming language to allow the code to be installed from bogus sites without the user's permission.

Remote control
Dr Web said that once the Trojan was installed it sent a message to the intruder's control server with a unique ID to identify the infected machine.

"By introducing the code criminals are potentially able to control the machine," the firm's chief executive Boris Sharov told the BBC.

"We stress the word potential as we have never seen any malicious activity since we hijacked the botnet to take it out of criminals' hands. However, we know people create viruses to get money.

"The largest amounts of bots - based on the IP addresses we identified - are in the US, Canada, UK and Australia, so it appears to have targeted English-speaking people."

Dr Web also notes that 274 of the infected computers it detected appeared to be located in Cupertino, California - home to Apple's headquarters.

Update wait
Java's developer, Oracle, issued a fix to the vulnerability on 14 February, but this did not work on Macintoshes as Apple manages Java updates to its computers.

Apple released its own "security update" on Wednesday - more than eight weeks later. It can be triggered by clicking on the software update icon in the computer's system preferences panel.

The security firm F-Secure has also posted detailed instructions about how to confirm if a machine is infected and how to remove the Trojan.

Although Apple's system software limits the actions its computers can take without requesting their users' permission, some security analysts suggest this latest incident highlights the fact that the machines are not invulnerable.

"People used to say that Apple computers, unlike Windows PCs, can't ever be infected - but it's a myth," said Timur Tsoriev, an analyst at Kaspersky Lab.

Apple could not provide a statement at this time

Source: BBC News

Microsoft Translator for Windows Phone updated to version 2.0

Monday, April 16, 2012 // by Saurabh // Labels: , , , , // No comments:

News 
Microsoft has recently updated the official Bing Translator app for Windows Phone, which reportedly adds functionality enabling users to translate from speech, via the camera or through keyboard input. With the camera, Translator allows users to simply capture a sign, menu, newspaper or any printed text on their Windows Phone for instant translations.
Language and phrase books can be downloaded within the app for offline usage, especially handy for when traveling abroad in supported countries (voice translations still require data connectivity). A variety of languages are available and results are fairly accurate. The in-app translators can be pinned to the home screen for convenient access when requiring fast results.


The interface is straight forward and functions are available straight from the main menu, there's little clutter in the Translator app. We've not touched on the Translator offering from Microsoft since the Windows Mobile days, but overall, it's not too shabby for a free app.
You can download Microsoft's Translator from the Marketplace for free.

Google unveils a 'more beautiful' Google+

Thursday, April 12, 2012 // by Saurabh // Labels: , , // No comments:


Articles & News


Google has taken the wrapper off of its redesign of Google+, which the search giant reckons makes the social network easier to use.
In a blog post, Google explained its reasoning behind the redesign, which is all part of Google's change throughout its whole portfolio – a change it hopes offers up more of a seamless experience for its users.
"Today we're introducing a more functional and flexible version of Google+. We think you'll find it easier to use and nicer to look at, but most importantly, it accelerates our efforts to create a simpler, more beautiful Google,"
said Vic Gundotra, Senior Vice President, Google.
The main changes to the site include a dedicated section to Hangouts, better photo and video integration and a new 'navigation ribbon' on the left-hand side of the screen.


Not Just a Place to Hangout


"Today's Google+ update extends beyond navigation, the stream and hangouts," said Gundotra,
"For instance: there's a new Explore page that shows what's interesting and trending across the network. And a new profile with much bigger photos. And a new chat list that puts your friends front and center. And a whole lot more."





The updates will be rolling out to all Google+'s 75 million members in the next few days. But if you want to see what you will be getting, then check out the video below.



IIT responsible for Aakash (i)'s failure: Datawind

Friday, April 6, 2012 // by Saurabh // Labels: , , , // No comments:




NEW DELHI: Six months after ministry of human resource development launched the Aakash tablet, barely a few hundred units have reached students. The manufacturing of the device has been stopped and now the ministry and Datawind, the company responsible for supplying the tablet, are focusing on Aakash 2, an upgraded version of the device.


Datawind concedes Aakash, which is supposed to digitize the way students study in India, has not been a success in its first version. But the company squarely blames IIT-Rajasthan, the nodal agency overseeing the project, for the fiasco. It says the concerns over the tablet's quality and functionality are overblown by the institute in a bid to "favour other firms".


Datawind's CEO, Suneet Singh Tuli, says that after winning the bid to manufacture Aakash, the company supplied 10,000 tablets to IIT-Rajasthan. They were part of an initial order of 1,00,000 tablets that Datawind was supposed to supply to the government at a price of $49.98 per unit. But after a few hundred tablets reached students as part of the pilot project, IIT-Rajasthan started rejecting Aakash tablet, allegedly after reports that the device was failing during pilot testing and did not meet the quality criteria set by the institute.


Tuli, however, disagrees. "IIT-Rajasthan was simply trying to defame us by saying that we could not meet the quality required by it," he says. "When we were awarded the contract, there was only a specification sheet. But when we started supplying the tablets, IIT-Rajasthan started rejecting the tablet based on biased and unscientific testing methodology. "


"IIT Rajasthan put up roadblocks. It jeopardized the whole project. I can say the dirty tricks by the institute put us around six months behind on the project ... they did it because they were favouring other firms... Even now, the institute is trying to sabotage the project," he adds.


There are reports that IIT-Rajasthan has been issued a showcause notice by MHRD last month over the Aakash failure. The notice asks institute to explain why it did not set up a tablet testing facility and procedure in time and why it failed to resolve its dispute with Datawind. Reportedly, the institute also worked with Wishtel, a company that launched a low-cost tablet called Ira last week. TOI tried contacting Prem K Kalra, director of IIT Rajasthan, over the email and phone but he wasn't available.


Datawind says that after the fiasco, it took back the tablets supplied to IIT-Rajasthan. "We have not been paid for a single one of them. But mission is more important to us... we believe in Aakash project," says Tuli.


The company is now working on Aakash 2, an updated version of the original tablet. It will have a capacitive screen instead of resistive and hence support multitouch. It will also have a better processor - based on Cortex A8.


"We are working with IIT Mumbai for Aakash 2 and will start supplying the tablet to government this month. Our original order for 100000 units has been transferred for Aakash 2 now. After the order of 100000 units is met, MHRD will invite bids for more tablets. We will bid again," says Tuli. Kapil Sibal, minister of human resources and development, on Tuesday said that Aakash 2 will be available in May.


Datawind also sells a commercial version of Aakash tablet called Ubislate. Tuli claims the firm has received over 3 million pre-bookings for Ubislate. However, this tablet too has not reached customers. "We are aware of the delay and trying to sort it out. We hope to ship Ubislate to consumer in next 10 days. To compensate for the delay, we will now give them Ubislate+, an upgraded version of the tablet at the same price," says Tuli.


Source: The Times of India

The Stupid Things You Do Online (and How to Fix Them)

Thursday, April 5, 2012 // by Saurabh // Labels: , , , , , // No comments:



Articles
The internet can bring you a lot of joy, but it can also turn into a world of pain the moment you make one stupid mistake. Perhaps you've been feeding the trolls, using "password" as your password, or selling your soul for access to a "free" web app. Your dumb mistakes can come back to bite you in the ass if you aren't careful. Here's how you can save yourself from yourself online.


Title image remixed from an original by Konstantin Maslak (Shutterstock).


Stupid Thing #1: You Undervalue Your Personal Data


Most of the web has the appearance of being free, but when you sign up for Google services or a Facebook account you're potentially handing over a much more valuable commodity: your personal information. Companies want this information because it can be used to target more relevant ads to you. The more relevant the ads, the more likely you're going to buy. Although advertisements aren't necessarily all bad, because it's often preferable to see ads for things we actually want, it can be a little disconcerting and embarrassing when you do a search for herpes treatments and see nothing but Valtrex ads for a week. You shouldn't stop using the services you love just because they have a hidden cost, but it's important to understand that free services aren't really free. You are paying with your right to privacy, and that can feel a little invasive.


Fortunately, you can have your cake and eat it too. If you don't like targeted ads based on your search history, you can just utilize your browser's Do Not Track options. Facebook now offers lots of ways to set the level of privacy you want to maintain, which is great, but with all the options it can be tough to learn and get just the way you want. Our always up-to-date guide to managing your Facebook privacy can get you up to speed. One of the first things you should do with Facebook is prevent apps from using your personal data as much as possible. Signing up for an app can provide the developers with much more information than you may realize as the apps will take information they don't necessarily need. To find out what each app is doing and limit its reach, just click the downward-facing triangle in the upper-right hand corner of your Facebook page and choose "Account Settings." From there click the Apps tab and click the "Edit" link next to any app. You'll see a list of what it is allowed to do plus the information it can access. Some stuff will be required for the app to function, but you'll almost always find something that isn't. Click the "Remove" link to revoke the app's permission to access that information.


Stupid Thing #2: You Submit Sensitive Information Over an Insecure Connection


When you submit sensitive information—like, say, your credit card number or login credentials—over an insecure connection, it's not necessarily your fault. Web sites worth their salt need to use HTTPS, rather than HTTP, in order to transfer data securely between your computer and their servers. That said, you have to be diligent and look for https:// in the URL bar in your browser (see the image to the right for an example). If you don't see this, chances are you're just using standard HTTP.


This isn't a big deal if you're just reading or watching something, but if you don't see https:// you should avoid sending sensitive information like your credit card number or address. Also, the insecurity of HTTP isn't as big of a deal when you're on your password-protected home network, but when you're on a public Wi-Fi connection, anyone can snoop on what you're doing.


Stupid Thing #3: You Feed the Trolls


When you feed the trolls—that is, the moment when you engage a malicious idiot in their hateful, annoying, and pointless discourse—you do everyone a disservice. You not only involve yourself in an almost endless, useless, and anger-filled debate, but you pollute the internet with hateful threads of garbage along with the trolls who start them. The internet is never going to vomit rainbows (at least not all of the time), but we can attempt to create happier, more pleasant communities by avoiding unwarranted fights and flame wars. Unfortunately, it's tough for a lot of people to get past a statement that incites anger but there are a few things that can help.


First, it's important to remember that trolls are not attacking you—they're attacking boredom. They have nothing better to do than say something mean so that's how they've unfortunately chosen to spend their time. If what they're saying isn't going to have much of an impact on anyone, just remember that they're bored, loathsome people and let it go. On the other hand, if they're promoting hate speech and potentially causing harm to others, it's best to avoid engaging them and instead report them to the site's administrator. Many sites offer a means of flagging harmful posts, and commenting systems offer ways for an administrator to ban problematic users. A simple email is often sufficient to take care of a bad person. Engaging with a troll-ish thread is just going to make you angry and potentially get you in trouble, too. If you do fall into the trap of feeding a troll, however, using the principles of cognitive therapy can be a worthy solution. This means responding positively and calmly, while accepting their different opinion. The trolls will likely find it frustrating and even condescending, but it's hard to argue with someone who is accepting your point of view (or even agreeing with you).


Stupid Thing #4: You Leave Private Information in Your Web Browser


Nowadays we spend a lot of time in our web browser and that makes it a potential source for embarrassing personal information. If you keep yourself logged into accounts on your computer, anyone casually borrowing your browser for a quick search can stumble onto some pretty personal stuff without even trying. For anyone actually interested in snooping, your web browsing history is a prime target. Even a visit to Amazon can dig up weird products you looked at or even bought.


Keeping your browser activity private can be a lot of work, but there are a couple of things you can do to take the pain out of it. First of all, if you're doing anything particularly private on your computer you can just log out or lock people out with a password. Enabling a guest account can be very useful so when anyone wants to use your computer they won't be entrenched in your embarrassing web activity. If you don't want to password-protect anything, the next best thing you can do is just quit your browser whenever you're done using it and set it to clear your history when you do. On top of that, make sure you log yourself out of any accounts or your browser handles that for you. For the super paranoid, clear your cookies as well. One of our favorite tools for the job is CCleaner (the first 'C' stands for Crap), available for Windows and Mac.


CCleaner will give you a good start, but the fact of the matter is that a determined snoop has a ton of ways to spy on your browsing behavior.


Stupid Thing #5: You Don't Keep a Backup of Online Data


You know backing up your computer is important because it's been hammered into your head by us and virtually everyone who knows a thing or two about computers, but somehow we tend to ignore the importance of online backup. Web services go offline all the time. Most recently, MegaUpload was seized by the U.S. government and now many people have lost their uploaded files. They may be filing a lawsuit to regain access, but the reality is they no longer have their data. You never know what's going to happen to your data, especially when it's out of your possession, so always keep at least one backup.


Some data, like photos and videos, can simply remain backed up on a local hard drive. If you lose your content online, you can always access a local copy and upload it elsewhere. That's all well and good if you create your content locally on your computer, but there is plenty you create online as well and that data is only saved on the server. In the case of Facebook, you can simply download all of your data in one big chunk. All you have to do is go into your account settings and look for the "Download a copy of your Facebook data" link at the bottom of the page. Not all web apps allow a full data download like Facebook, however, and you'll need to employ other services. InSync will handle your Google Docs. Backupify can back up multiple web services like Google Apps, Twitter, Facebook, and more. If you keep any vital data online, be sure you use something to back it up. If you don't, it could be gone tomorrow with no way to get it back.


Stupid Thing #6: Assuming Your Posts and Comments Are Anonymous


What you say online is going to be around for a long time, and when you do as much as post a comment on a popular site it's likely going to surface when someone does a web search for your name. I've commented on an article maybe three or four times in my life and this Steve Ballmer hate rant has managed to stick to my name since the day I was apparently so offended (which was over seven years ago).


It's not that it's impossible to comment anonymously online—and we've offered some tips for doing just that—but most of us don't follow a strict enough set of rules to remain anonymous. Even if you don't use your real name, comments stick. You'll probably use that pseudonym down the line and it will gain its own reputation. Your name may be tied to that pseudonym on as little as one web site and people will be able to find out who you are with a simple search. Additionally, you may post a comment on a blog or other page without realizing that you're already logged in via your Facebook account. There are a lot of ways your name can be tied to what you say online, so it's important to remember that your reputation is riding on every post to some extent. Remember to think about what you're going to say before you say it or it may follow you around for much longer than you expect.


Stupid Thing #7: You Let People Track Your Whereabouts


Checking in to sites like Foursquare, Gowalla, and Facebook is all fun and games until somebody loses an eye—or, well, any personal belongings that a thief can snatch while s/he knows you're out of the house. A web app called Please Rob Me demonstrates (with humor) how your check-ins can provide too much information regarding your whereabouts when you share publicly. All you really have to do to solve this problems is share privately. Most check-in sites have this option. Follow these instructions for Foursquare, simply become a private user on Gowalla, and if you're using Facebook you can just tag yourself at a location after the fact so your location isn't disclosed in real-time. That's really all there is to it. Be careful who you share your location with and you've fixed the potential damage.


Stupid Thing #8: You Use an Insecure Password That You Rarely (or Never) Change


If you read Tech. In Total. with any regularity you know we love a good, strong password. That said, most people seem pretty reluctant to let go of their simple passwords in favor of something more complex. But you can have strong yet memorable passwords or just use a multiword phrase to decrease the chances of anyone ever hacking your password. Or better, yet, you can let a password manager like LastPass pick and remember your complex password for you. But anyone who's using a weak password at this point is likely doing it because they don't want to bother changing every password for every online service they've ever used. While that's understandable, you really just have to get off your butt and take care of it. Using a service like LastPass is a good option because it can save your existing passwords and automatically detect updates when your passwords change. This way you can change them at your leisure, whenever you log into a site with an old password, and make sure everything is still up-to-date and remembered by a password manager. (Consult this infographic for a condensed look at nearly every tip and method we've posted.)


Want to leave your suggestions? Drop them in the comment section below:

Use This Infographic to Pick a Good, Strong Password

// by Saurabh // Labels: , // No comments:


We always enjoy a useful infographic, and there are few things quite as important as choosing a strong password—at least in the area of online security. If you're looking to beef up your passwords, here are plenty of great tips consolidated into one great image.
Over the years we've suggested plenty of strong password tips, such as using a multi-word passphrase, only using passwords you can't remember, utilizing a password manager, and more. We thought it would be great to have all those tips in a single, easy-to-read format, so Killer Infographics put one together for us. If you're looking to strengthen your existing passwords or change a recently compromised password, be sure to check it out in its entirety by either clicking the thumbnail below to see the entire image or clicking the link at the end to post to view the infographic all by itself. 
CLICK ON THE IMAGE TO ENLARGE:


Cyber Security Infographics - Click to Enlarge

Popular Posts

Advertisement