go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: April 2019

Go to Homepage [0], contents or to navigation menu



In The Future, Will Your Kids Be Able To Sue You For Oversharing Online?

This article is quite lengthy, but well worth the read. I saw it on twitter today, and its a great read. It has several sides of a particular prediciment that parents get in to, and that is the sharing of their children’s lives. Some parents share everything, others share little or none. I think, that the parent needs to decide if it is something they want to do. According to the article, a French child was able to say something that got their parent in to trouble, but yet, no successful case in the U.S. has come to the courts in regards to children verses child. Will it happen? Maybe. How should we teach parents to make the right choice on what they share?

In The Future, Will Your Kids Be Able To Sue You For Oversharing Online?

Comments (3)

Windows Defender, does it do a good job?

Hello folks,

I had a very interesting issue with my computer. For some reason, a system scan yielded some potential severe threats which Windows Defender only found on a full system scan, not the default scan. After that scan, I ran an offline scan to determine if there was anything else. After the reboot, I was still having the issue of not being able to open anything from the start menu.

To solve this, I went over to Trend Micro’s House call page and decided to download and run it. It can be run in conjunction with other software already installed. After several minutes even though it only went through as far as the users temp directory, it seemed to have cleared up whatever issue I was having. I even did a couple of reboots to make sure and things are OK.

I’m thinking that something got picked up that was removed, although no threats were found from the scan, or it fixed an error with the drive itself when scanning things. I just found this weird. Do you think Windows Defender is still good? Its the only accessible piece of software besides house call that is accessible to us. Trend Micro also has an app within house call called Ransomware buster which can protect files in directories. Don’t know how accessible that is, but that was very interesting. Thoughts?

Comments (3)

tech podcast 312

Tech podcast 312 is now up on RSS and Mixcloud. Transcription software, a woman getting caught with malware, and email signatures are the topics today. I hope you all enjoy!

Comments (0)

Bug Allows HIPAA-Protected Malware to Hide Behind Medical Images

OK, here we go. This aught to get interesting. This is strange.

The ubiquitous nature of the flaw opens the door for rapidly spreading, crippling cyberattacks.

Source: Bug Allows HIPAA-Protected Malware to Hide Behind Medical Images

Comments (0)

new dropbox rules

This is a coppy of a post I put on lists about dropbox, I will replicate it on my blog to.

From march this year, all basic accounts are limited to 3
devices.

What does that mean?

Nothing, except that dropbox remembers every device and session
ever made.

So you reformat your computer or change your account name, or
get another computer and don’t unlink first, your device becomes
a ghost device same with app programs, and brouser sessions.

1.  sign into dropbox.

The easiest way to do this is to login with your own client,
click the tray icon and launch dropbox.

Now near the top of the page is a menu called my account hit
space on that, scroll down to settings, hit shift space to exit
forms mode then hit enter.

Don’t move about else things will just not work right.

Now dropbox settings load.

hit control home for the top of the page then h.

2.  select security tab, in the same way, enter forms mode once
you scroll down to the list of tabs, and locate security.

get out of forms mode and hit enter.

Next control home again.

then hit t.

3.  The next thing to do is locate every session in the first
table which has an end session button it and hit the space bar
till they are all gone.

Next  locate the device tree which is directly below the brouser
treeview.

The first device in the list is your device.

scroll to the end of that list.

Every device you have ever linked including every ghost device
linked in the past will exist, I had 6, my dad had 2.

Hit unlink button on all the devices bar the one that says its
been modified in the last hour.

Every other device will have a time when it was last valid.

Finally go through the steps of going to my account, then
settingss however next select the connected apps view.

Then disconnect every app you don’t use and service.

If you need to link devices take note of the devices you want to
connect.

A basic user can connect up to 3 devices.

Those can be a computer, a phone and one other device or 3
computers.

You can buy, but to be honest, if you get this warning and are
only using 1 device, then you probably have a lot of ghost
devices.

I’d also update your password at this time if you have forgotten
it if you havn’t allready.

I’d also check to see if you know what all the devices you have
are, if you find something you don’t know, then chances are
someone has hacked your account or you linked to a device
somewhere else.

In a way this while annoying is good in a way.

I had no idea dropbox kept all devices from all reformats and
all times I had changed dropbox.

I had 6 devices, 1 is my device I had.

The next one before that was my old win7 device which I may
relink later.

The rest were my win7 and xp devices and their reformats
including profile changes etc.

My apps were not needed ones and I clobbered them.

As for my brouser sessions including the current one there were
19 others which were still signed in from devices that were no
longer active.

In the case of my dad’s system, there were 2 devices, the
current one, and an older instance of the same device which
existed before it, its good to know that I was able to kill
things.

Now I know about this, if I need to reformat my first thing
after I get back in is to kill the ghost devices that linger
inactive after the fact.

This actually is a good reason to check security on my account
if anything else.

Its worth noting that if you need more space and upgrade you
won’t have to bother with this though even if you do knowing
what I had, its worth looking at the site anyway.

I didn’t need all those 20 sessions logged in at once, nore did
I need the 6 devices 4 of which were ghosts of old linked
devices and one which is not on the network.

I guess knowing that I could link that one but even so I will be
carefull to check every linked system I service to make     sure
its all clear of stuff that shouldn’t be on it.

Comments (0)

Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years – Motherboard

This is quite interesting. I’m looking at twitter and found this. I never knew who was behind the 2nd part of the silk road, but knew there was a second version of it Very interesting.

Source: Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years – Motherboard

Comments (0)

Tech podcast 311 is now out!

Hi all, the RSS, Mixcloud, and telephone options have the podcast. I’m slow in regards to updating this blog, and for that, I’m sorry.

If you need links and or a phone number, contact me.


Welcome to the technology podcast, podcast 311. We’ve got a very interesting braille transcription update which makes me very excited to push forward in this course. Besides that, a transit update, and we start with several articles in discussion. The articles will be linked, and the podcast runs 82 minutes. I hope you enjoy the program!

Thanks so much for listening! That completes the article listings and do feel free to read them if the discussion interests you. See you next podcast!

Comments (0)

go to sections menu


navigation menu

go to sections menu