Trails End Computer Club

Bulletin for the week of DECEMBER 7, 2014

WEEKLY MEETINGS
EACH Wednesday 

Program or Lesson 9:30 - 10:30 AM
One on One Help 10:30-?
In the Library


SPECIAL INTEREST GROUPS:

If you would like to meet in a small group to discuss special computer related subjects or form a Special Interest Group lets discuss it.

Our bulletin is also available on line by visiting tecc.apcug.org and clicking on bulletin.

Our weekly program or lesson is intended
to be of interest to all computer users.
Following the program an allotment of time will
be available for one on one help to those
who want a better understanding of something done
 during the presentation.

Upcoming Events

Wednesday DECEMBER 10, 2014 Meeting
 9:15 AM Set up your computer
 9:30 AM Presentation
10:30 AM One on One help

How Safe Are Wi-Fi Hotspots?

By Larry McJunkin

The Retired Geek Technical Tips for the Non-Technical “Over 50” Crowd    http://retiredgeek.net/    http://retiredgeek.net/contact-me/


wifiMany of us travel a lot, whether in business or just to visit our families and friends. We use our computers, smartphones and tablets in hotels, restaurants, and other places, but are these Wi-Fi “Hot Spots safe?

We all assume it’s safe to connect to the Wi-Fi network at our local Starbucks, airport, waiting area where we have our cars serviced, hospital, or even at a relative’s home. But it is a really bad idea…a very bad idea! There are many reasons you wouldn’t want to do this. Let’s look at the various types of Wi-Fi network.

Ad-hoc Networks & Access Point Networks

Basically, there are two types of Wi-Fi networks accessible by your computer: ad-hoc networks and traditional access point networks. Ad-hoc networks are getting a little outdated, but they still exist. They connect devices directly to each other, while access point networks connect devices to a central router. For example, you could connect two laptops or your laptop and your phone together without the need for a router or any other networking hardware. This would create an ad-hoc network. This is different from a traditional access point network where each device connects to a router, like you most likely have in your house.

Unsecured Network

A network is deemed unsecured just by virtue of the fact there is no password required to access it. If you’re able to click on a network in your smartphone or tablet and connect to it without a password, you are connecting to an unsecured network, and that makes the device you’re using susceptible to hacking…plain and simple.

So, that “free public Wi-Fi” network you encounter at the airport is nothing more than an ad-hoc network that was probably started long ago as a service to travelers, but still persists to this day. Basically, when you connect to this type of network, you are most likely connecting to another computer. And when you connect to that other computer, your computer “could” also be set up to broadcast the “free public Wi-Fi” network to other devices around you, essentially allowing access to all your private data to anyone within range. This is not good!

Why You Shouldn’t Connect to Unsecured Networks

HackLet’s say you’re sitting in a coffee shop and decide you want to check your email to kill some time. You scan the available networks and find one that’s open and doesn’t require a password. You connect and start surfing. Coffee and free Wi-Fi, how good does it get…right? Wrong! A hacker who is also fond of coffee shops and could be located within range of the router you connected to. He’s waiting for someone just like you to connect to the network so he can start a middleman attack. Within a few minutes, he could easily gain access to all your passwords, including bank accounts, email, and anything else he wants. You may not think this is possible…but with today’s software and technology, it is!

How to Stop Wi-Fi Crime

So how can you help prevent all this from happening? For starters, you can use *only* a secured network that encrypts all of your data. This will ensure your data is safe and scrambled as it travels between you and its destination”. Now, if a hacker were to intercept your message, they would see nothing but a bunch of scrambled garbage. Of course, no security measure is 100% safe, but at least good encryption will help a lot.

Tips for connecting to unfamiliar wireless networks…if you must do so:

1. Save the really important tasks, such as online banking and other finances, for home.

2. Try not to connect to any “public” or “unsecured” networks. If you absolutely need access to the internet, pay a few bucks for the secure option...

3. When on a Wi-Fi network, look for websites that begin with “https” in the address bar, then try to use only these secure sites.

4. If you really want maximum security, use a VPN.

Lastly, tell all your friends and family to follow these Wi-Fi safety tips. You just may save someone from a major financial or identity theft disaster.


Free Speech” on the Internet, and More

By Diane Fahlbusch, President, ICON PC User Group (ICONPCUG), Long Island, NY

June 2014 issue, The ICONPCUG Graphic       www.iconcpug.org        Editor (at) iconcpug.org

spSocial networking has allowed people to express themselves to either select people or to the public. Unfortunately, many posters do not exercise restraint, claiming it is their “right.” Freedom of Speech is a highly treasured right granted to Americans. However, it is also the most misunderstood and abused rights granted under the First Amendment to the Constitution of the United States. To quote it directly, “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

But does this give one the complete freedom to say whatever, whenever and however one wants?

The original purpose of Freedom of Speech was to allow for religious freedom and different political views to be expressed. When the USSR started making some changes, it was jokingly phrased that citizens still had the same long lines to wait in, but were now allowed to complain about them. This is something Americans take for granted. The Constitution also allowed the press to publish verified facts and editorials without recrimination. (The key here is VERIFIED facts. The Watergate scandal was actually exposed to by two reporters, which then led to criminal investigations.) However, that does not give one carte blanche to say whatever one wants. This is evidenced by the existence of cease and desist orders, gag orders, restraining orders, retractions and the like emanating from defamation and harassment cases.

Defamation is defined as “the action of damaging the good reputation of someone”, and encompasses both slander and libel. Slander is SPOKEN defamation or false statements. Libel is “WRITTEN, PRINTED or PICTORIAL representation which unjustly damages an individual’s reputation, OR the act of presenting such a statement to the public.” Harassment is “disturbing or irritating persistently.” All of these actions may land one in court.

The fastest growing concern in police departments is Cyber-bullying. Perhaps part of the problem is that the parents are really not supervising what their children are doing on. As one Suffolk County Police officer stated, “Would you just drop your kid off at Times Square at 10:00am and go back at 5:00pm to pick them up? Well, what do you think you’re doing when you hand them an I-Pad and never look at what they’re doing?!” Additionally, there is a marked increase in pedophile crimes due to internet communications.

Some recent evidence of statements being curtailed involves Twitter and Facebook postings. Some are blatant stupidity, as in the March 29th Facebook posting by Colleen Chudney that she did drink but did not get caught by the breathalyzer test by her parole officer. The 22 year old was on probation for a 2012 drunk driving offense, and part of her parole was that she refrained from consuming any alcohol. Her parole officer saw the posting and called her. She hung up on him, which is another parole violation. He insisted on a urine test to check for drinking within the previous 80 hours. She was granted another 93 days in jail instead of her parole ending just a few weeks later.

Face

A recent case involved a man who posted a public message about his estranged wife on Facebook. On November 23, 2011 Mark Byron posted the hate filled rant. It sparked great debate on the online circles while the case was pending. Of course most of the commentators ignored the fact that a court order of protection had already been issued to his wife and son after he was convicted of civil domestic violence against her last year. On February 23, 2012, a judge ruled that he had to post a lengthy apology and corrections to his previous inaccuracies on his Facebook page for 30 days or face 60 days in prison and $500 fine.



twitMusician Courtney Love’s 2010 public Twitter posting to reporter Alan Cross about an unnamed attorney who was “bought off” is another recent example. The attorney, Rhonda Holmes, brought a defamation case against Love. Surprisingly, the case was decided in Love’s favor on January 25, 2014, since the attorney was not named, the posting was quickly removed once Love realized she had marked it “public” instead of “private,” and, although the statement was false and injurious to Holmes’s reputation, the case itself restored that reputation. (Each state’s laws have nuances to them.)

However, Love had to pay $430,000 in damages when she was sued in 2011 over statements posted on Twitter and Myspace regarding fashion designer Dawn Simorangkir. There is currently another case still pending, brought by Simorangkir against Love, based on accusations of theft on the Howard Stern's radio show and “taunting” on the social media site Pinterest.


pressThe press has also become one of the greatest violators in the past few decades. They do not always verify their facts before reporting a story, and news stories are really editorials rather than reporting. The best example is the man accused of setting off a home-made pipe bomb at the Atlanta Olympics in 1996. Almost everyone remembers his name, Richard Jewell, because for 10 days the news stations kept flashing his picture and name and basically stating that he did it. Numerous newspapers also made the same claim. They could have chosen to say that this man was a key to the investigation. They also selectively exposed facts about his personal life to present an unsavory character. And even when he was cleared by the police a few weeks later, no one bothered to repeatedly show his picture and state that he was actually a hero. (He was a temporarily employed security guard making little more than minimum wage, yet he risked his life to help others.) And of course, most people cannot name the actual bomber. For the record, it was Eric Rudolf. He first became a suspect in 1998 and pleaded guilty in 2005 after eluding arrest for five years.

As an immediate aftermath of this “Freedom of Speech,” Richard Jewell found that he was unemployable after all of the press coverage. Not only would potential employers rip up his resume and/or job application when they saw his name, but he was cursed at, thrown out of potential employers’ offices and sometimes had things thrown at him. Even strangers on the streets of Atlanta and other towns bombarded him with verbal and physical abuse (spitting, punching and kicking). He had no choice but to sue those who had maligned him. The NY Post, NBC, and CNN just settled quickly, although they maintained there was no wrongdoing. But Cox network, owners of a string of news stations and publication, took the case to court and dragged it through the appeals court. Sadly on both accounts, the case was dismissed in August, 2007 after Richard Jewell’s death because there was no plaintiff. However, law enforcement agencies reevaluated how, when and what information to release to the public to prevent what they now call “The Richard Jewell Syndrome.”

ManDevices come with instruction manuals and warning labels. Unfortunately speech does not come with this message: WARNING - Engage brain before engaging mouth. People also seem to have lost their common sense and consideration. Why would you discuss your life publically on your social media page – or someone else’s? That is part of the problem with social media – very few think before they post. The other problem is that the postings can be marked either “public” or “private”, but most people do not pay attention to this. Furthermore, that private post you just sent can in turn be resent and made public by your “friend.” Another interesting point is that even emails that are sent across a public network (otherwise known as the internet) are considered “public” messages, according to copyright law.

So, no, one DOES NOT have the RIGHT to say whatever pops into one’s head – especially on social media, or any other media. And remember, the first four letters of Twitter spell “TWI.T. Act responsibly and don’t be one!


Submit Your article; deadline for next bulletin is Tuesday noon each week. Only what you write may be published. We cannot publish other peoples work without written permission. Simply click here EDITOR AT TECC and paste your write-up to submit it.
Share your computer experiences with other members. We need articles to publish in the TECC Bulletin each week.

UPDATE YOUR MEMBERSHIP INFORMATION Change your e-mail address, unsubscribe to this bulletin, etc.  Use link below.
UPDATE YOUR MEMBERSHIP