If you still use Windows XP and your antivirus program is Microsoft Security Essentials, my recommendation is to uninstall Microsoft Security Essentials and install Avast in its place before April 2014. This is because Microsoft is reportedly not going to support Microsoft Security Essentials updates for XP after that date.
Avast is free and is now actually ranked better than MSE by some as of mid-2013.
Warning: Your child’s location right down to his/her bedroom or favorite park may be tracked simply through the pictures you post. If your smartphone has location services turned on for the photos you take, the location of the photo is embedded with it.
You should double check your smartphone settings to verify that you are not embedding location information into the pictures you post online.
How to turn tracking information off:
Settings -> General -> Location Services -> Camera : turn off
To turn tracking information off on an iPod touch:
Settings -> Privacy -> Location Services -> Camera : turn off
Turn tracking off for Android:
If you’re taking pictures with a camera app: In the camera app go into settings, under camera options uncheck geo-tag photos. Other apps that can take pictures (like Facebook) will have their own geo-tagging settings, but they can be turned off, too.
You should also verify your privacy settings for social networking such as Twitter, Facebook, and Google+, to make sure that you are only sharing information with your friends, not with everyone (including search engines).
For Facebook specific privacy information, visit this post.
I don’t have experience with Parental Control features, but a little searching online reveals that iOS (Apple) and Windows 7 have parental controls built in but Android does not.
Here are a few links that might help:
For Android/mobile users:
- Android Parental Control Apps – Disable apps and filter content
- Kids Place Parental Control App from Amazon.com
- Internet Filtering Browser by K9 Web Protection
Android / iOS:
- Monitor Child Activity by Norton
- Windows 7 Parental Controls
- Note: Internet filtering is not available with Windows 7 parental controls.
- Note for Windows 8 users: there are reports that Family Safety for Windows 8 does not offer proper protection
- Magic Desktop
Please share what works best for you.
If you have precious data on your computer, you need a way to make sure you have it backed up in case of fire, computer failure, theft, etc. If your hard drive goes bad, you will either have to pay a LOT of money to get the data back, or you just lose the data. (Hard drive failure is common, even with new computers.)
Here are some easy backup options:
Microsoft SyncToy is a free Windows program that allows you to back up files quickly and easily to an external drive or flash drive. You can get small flash drives that are at least 32 GB in size for a very reasonable price. You click the sync option and only the files since the last sync operation are copied over to your backup.
Online Syncing: If you have less than 5-10 GB of data and a good Internet connection, there are a number of online sync options available that automatically back up your user data. See this article.
Make sure you keep installation CDs for any purchased programs you use.
If you can’t read the product key on your Microsoft Windows registration sticker or CD, you should record the key somewhere in case you need to re-install Windows.
Windows 8 users should already have Windows Defender installed, which gives the same level of protection as Microsoft Security Essentials. But make sure it is activated. If your computer comes with an alternative, trial antivirus program, if you don’t renew the program, you will need to activate Windows Defender. I suggest uninstalling the trial and activating Windows Defender; it does a decent job and you don’t have to pay for it.
For users before Windows 8, if you never installed an antivirus program, you likely need to do that. As far as I know, Windows Defender before Windows 8 is not sufficient protection. Use Microsoft Security Essentials (Avast or Avira are also OK options at the time of this writing).
Presently, MAC users don’t have to worry so much about this kind of thing, since I think MAC programs have to be approved by Apple.
- Don’t install more than one antivirus program. It will slow down your computer dramatically.
- You can install anti-spamware and anti-malware software along with antivirus programs. I generally do not use them for real-time scanning, but just run them every so often. MalwareBytes (free version) is a good software to use for this.
This also can happen as a result of clicking on a bad link in an email. (See “tips for detecting spam” below.)
Spam and PhishingView
Tips for detecting spam and phishing schemes:
- Links go to an address that is different from what it should be
- Words are commonly misspelled are don’t make sense
- The sender’s email address isn’t what you expect it to be (some have faked PayPal by changing one letter)
- The email contains gibberish
- The email contains a link that doesn’t make sense or is not explained, even if it is signed by someone you know and looks real! (Hover over links and look at the place it is going to, shown in the lower left of your browser, before clicking.) Clicking a link like this could cause you to send gibberish to all your contacts, too (and who knows what else).
- The email says you have money coming
- You are asked to provide personal or login information
*Question about email.
You’re Jean Doe and you have a friend John Deer. You get an email from John Deer as follows:
From: John Deer [John’s email here] To: Jean Doe, Pep Cole, Dina Winter [all are your friends] Subject: hi
* Should you check out the link or not? Why or why not? Should you reply to John Deer?
NO, don’t click on the link, because the email is NOT from John Deer. Be very careful about replying to John Deer from this email, but it’s a good idea to let John Deer know that it was sent and that he should change his email password and security questions.
The long answer:
Here are some suggestions based on my experience and education. (I don’t claim to know half of all that is involved here, though.)
1) As people above suggested, never click on a link that you don’t understand or that looks questionable, even if it seems to come from a trustworthy source. This link is obviously not taking you to a place you know is safe. Sometimes the real link location is not visible and you need to hover over the link before clicking on it and view the real link location in the lower left of your browser screen to know if it is safe. Verify questionable links with the person who sent them to you before clicking on them.
2) Verify questionable emails with the sender before assuming they come from the said source. This email is almost surely not actually from John Deer, even though it comes from his real email address, is sent to real friends, and is signed by his real name. Hackers or robot-computers can get all of this information and use it to trick unsuspecting people. We know it is fake because it makes no sense and contains gibberish. Spam often has misspelled words and gibberish. This email also has a link to a strange place, and links are one of the means hackers use to do damage by taking you somewhere where they can try to steal your passwords and information or perhaps install a program to spy on you while you use your computer. I’m not positive that clicking on a link like this could make you the next sender of a similar email to some of your contacts, but I’m guessing that’s possible.
3) I don’t know how someone was able to get the friends from John Deer’s address book. Maybe John Deer clicked on a bad link from someone else’s email that looked just like this! Maybe his email has been hacked. Maybe he added a bad app on Facebook which had access to his email contacts and the rest is history. Did you know that someone can send an email and make it say it comes from whatever email address they wish? Just because you get an email from John Deer does not prove he sent it.
4) Maybe John Deer was hacked. Maybe he uses the same password for Hallmark Cards as he uses for his email account. Hackers unleash their computer password crackers on insecure sites and then use those same passwords on more secure sites like banks or Dropbox- or your email. That’s why it is a good idea not to reuse passwords, especially for important things like email and banking.
5) So at this point John Deer has no idea he has sent out this email. Do him a favor and let him know, but be careful about replying to the hoax email unless you’re absolutely sure that the email is his exact address. It’s much better to email him directly in a separate email.
6) What should John Deer do? At a minimum, he should change his email password and the security questions used to reset his password. This many times will stop the incident from happening again. He should make the password at least 8 characters long, and add a capital letter with a special symbol. (Adding just one capital letter and one asterisk would change the hacker’s processing time to figure out an 8 character password from 2.4 days to 2.1 centuries [very generally, according to lifehacker.com]) He might want to check the validity of Facebook apps and change his Facebook password as well. He also might want to change the settings in his email to always use a secure SSL connection if he uses email through public wireless networks.
Your data is important. Prey is a useful tool that helps you find that mobile device back if it is lost or stolen. Most effective when you pray!
Update: Some reviewers say it depletes your battery.
No matter where we go, we will run into things that are defiling to us. Yet we should do what we can to protect ourselves and our loved ones from those things we CAN prevent.
- K9 Web Protection is a good, free tool to protect the content you and your family come into contact with on the web. Add time restrictions, make exceptions, force safe search and monitor user activity. It also has an app option. This is only one program of many. Be aware! There is no perfect solution. Programs can’t look at pictures and tell you if they are bad or not. They can only filter out sites that are known to contain bad material. This includes sites like YouTube that could be used legitimately (although we believe no young child should be allowed to use YouTube unsupervised, especially for long periods of time). The program enables the parent to give temporary access to sites (for instance, 15 minutes) that may contain objectionable material.
- YouTube allows you to turn on safety mode at the bottom of the screen. Check the box to lock safety mode for this browser and repeat for all of your computer’s browsers.
- Chrome and Firefox browsers have a plugin/extension called Adblock Plus which filters out many advertisements, some of which I would rather not see.
- Though I’m not a proponent of movies, if you choose to watch them, pluggedinonline.com gives detailed video reviews that give the type of inappropriate content, how much is present, and how intense it is.
I do not recommend the use of chat rooms. Chatting with strangers over the computer is not a safe practice.