Trails End Computer Club

Bulletin for the week of FEBRUARY 28, 2016

WEEKLY MEETINGS
EACH Wednesday 

Program or Lesson 9:00 - 10:00 AM
One on One Help 10:00-?
In the Library

SPECIAL INTEREST GROUPS:

If you would like to meet in a small group to discuss special computer related subjects or form a Special Interest Group lets discuss it.

Our bulletin is also available on line by visiting tecc.apcug.org and clicking on bulletin.


Our weekly program or lesson is intended
to be of interest to all computer users.
Following the program an allotment of time will
be available for one on one help to those
who want a better understanding of something done
 during the presentation.

Upcoming Events

Wednesday MARCH 2, 2016 Meeting in the Library
 8:45 AM Set up your computer
 9:00 AM Lesson
10:00 AM One on One help

IraWhat are Websites Doing With Your Personal Information?

by Ira Wilsker

 

WEBSITES:

http://www.govtech.com/data/How-Do-Websites-Use-Your-Data.html

https://identity.utexas.edu/privacycheck-for-google-chrome

https://identity.utexas.edu/idwise

https://identity.utexas.edu/strategic-partners

https://chrome.google.com/webstore/detail/privacycheck/poobeppenopkcbjejfjenbiepifcbclg

https://www.ghostery.com

           You have likely noticed that the banner ads and other forms of advertisements on many of the web pages visited appear to "coincidently" be for many of the same items that you have recently searched for online.  You may even notice that many of these ads are also from many of the same online sellers whose web pages you have recently visited.  In some cases, you may also see online ads for direct competitors of previously visited websites, offering many of the same or similar products that you have looked at on other websites.  It should not be surprising that the owners of many websites, as well as many third party advertisers, use a variety of tracking technologies to gather information on you, as an individual, the types of websites that you visit, and the products and services viewed.  While many users find this targeted advertising interesting and useful, and even possibly necessary in order to support "free" web sites and online services, many others consider the gathering of such personal information as a gross violation of personal privacy.

          Some of the more common methods of compiling and distributing this personal information and shopping preferences are the placement of "tracking cookies" on the user's device; web bugs or web beacons (small graphic files which transmit information when opened, often 1 pixel in size); and the dissemination (sale) of personal information entered on a website.  Cookies are small, alpha-numeric and text based pieces of data which are by default, placed on the hard drive or other storage of the device being used to view a website; while some types of cookies are benign and necessary to compile shopping carts, store passwords and other login information, and save other information that can speed the web process, some other types of cookies may not be so desirable.       The most common type of unwanted cookies is often known as "tracking cookies", which are typically placed on the hard drive or other storage medium, just as other cookies, but these cookies can also be read by other third parties as a method of gathering information about the user, mostly for targeted marketing purposes.  There are many companies that have a lucrative and highly profitable business selling access to the tracking cookies which they have previously been placed in storage, most often by simply visiting a web page.  Almost all browsers give the users the option to control which cookies can be saved and accessed, but the default is to accept all cookies.  Tracking cookies that are currently saved in the device storage can often be easily and quickly removed by most of the reputable (and often free) security scanners, such as Malwarebytes (malwarebytes.org) and SuperAntiSpyware (superantispyware.com).

          What many users might find shocking is that they unknowingly and explicitly allowed many of the websites that they visit to place tracking cookies and other marketing information on their computers and smart devices.  When I mention this to users at some of my security and privacy presentations, some of those present get very agitated, and vehemently deny that they ever gave permission for websites to place such information on their computers and other devices.  My typical response is something to the effect of "Did you ever read the privacy statement on those websites when displayed, or simply click on the "I Agree" box when first visiting them?"  Most of the honest, but still aggrieved users, acknowledge that they never fully read the privacy statements on the websites visited, with the typical response being that the privacy statement is too long to read, or it is written in "legalese" which they cannot readily understand, so they simply "agree" in order to get access to that particular website.

          Complex privacy statements, often blindly agreed to, have been a popular tool to legitimize the placement of that website's or other third party commercial tracking information on your computer, smart phone, tablet, or other device.  These tracking devices are often a significant source of revenue for the website owner, and are often utilized by some of the largest and most reputable online vendors.  In a recent article by Omar L. Gallaga, of the Austin American-Statesman, dated  May 11, 2015, and reprinted by "Government Technology", Gallaga wrote, "How Do Websites Use Your Data?  A new tool in Google Chrome puts website privacy policy language in plain English, letting you easily know whether your email address is shared or the site has access to your Social Security number, and if it tracks your location."

          This free new tool, currently only available for Google's Chrome browser, is "PrivacyCheck", a Chrome browser extension (plug-in) which was developed by the Center for Identity at the University of Texas - at Austin (identity.utexas.edu).  According to the Center for Identity, "PrivacyCheck is a browser add-on intended to provide consumers an overview of the ways in which companies use their personal data in a graphical, ‘at-a-glance’ format.  ...  PrivacyCheck surpasses existing add-ons, apps, and certifications by using a Data Mining algorithm to access the text of any webpage.  The user provides the URL for the company’s privacy policy and PrivacyCheck searches the page, returning icons that indicate the level of risk for several types of PII (Personally Identifiable Information)".  PrivacyCheck can be downloaded for Chrome from the Chrome web store at chrome.google.com/webstore, and entering "PrivacyCheck" in the search box.  The latest version of PrivacyCheck, as I am typing this, is version 1.0.5, dated May 14.  It is important to know that federal and state laws require businesses with a web presence to post their privacy policies, and there are often harsh penalties for violating those posted privacy policies.

          To use PrivacyCheck to determine the degree of privacy risk on a particular web site, download and install PrivacyCheck from the Chrome web store (chrome.google.com/webstore).    Once installed, open the selected website using the Chrome browser, and locate the privacy statement, often linked at the very bottom of the webpage; open the privacy statement page.  On the top right of the Chrome address bar is a small icon which is light brown in color, and has what appears to be a lower case "i" within a brown circle; click on that icon.  Once clicked, "Browse to a privacy policy and click Start".  Within seconds a series of 10 larger icons will appear, with an easy to comprehend green, yellow, and red coloration, indicating the degree of privacy risks associated with that privacy policy and website. 

          Moving the cursor over each of the large icons will explain what it represents: the "envelope" icon represents what the website does with the user's email address, red indicating that the website uses, sells and shares the email address to others; the second icon represents the magnetic stripe on a credit card, and indicates what the site does with credit card information; the three asterisks "***" represent what is done with the user's social security number, green indicating that it is not collected or otherwise used; the "megaphone" indicates the marketing use of your private information, red indicating that the website sells your information to others for marketing purposes; the "compass" icon indicates what the website does with detected location information, red indicating that the website sells the user's location information to third parties; the sixth icon, circular with two eyes, indicates the policy on information gathered from children; the "badge with star" icon indicates the distribution of information to law enforcement, red indicating that the site will provide information to law enforcement without a warrant or subpoena; the "open book" indicates the policy on posting privacy policy changes and giving the opportunity for users to opt-out; the "pie chart" icon indicates whether or not the user can modify his own information; the tenth icon, which looks like a cloud with directional arrows, indicates what the website does with aggregated information, yellow indicating that aggregated information is distributed, but personally identifiable information has been removed. 

          PrivacyCheck is an excellent method to determine what commercial websites are really doing with your personally identifiable information (PII), but its major weakness is that it (currently) only works with the Chrome web browser.  Users of other browsers may find some privacy utilities that provide significant privacy protection while online.

          On all of my PCs, as a browser add-on, I have been using a free, popular browser extension called "Ghostery" (www.ghostery.com), which will seamlessly run on computers using any of the major and popular browsers including Firefox, Chrome, Opera, Safari, and Internet Explorer, as well as on mobile devices running the Android and iOS operating systems.  According to its website, Ghostery claims to have, "The largest tracker database on the internet, constantly growing;  Ghostery has the largest tracker database available on the web. We meticulously select, profile and cull over 2,000 trackers and 2,300 tracking patterns."  Ghostery displays the tracking information on almost every web page opened, and gives the user the ability to allow or block trackers as desired.

          Our personal privacy should be taken very seriously.  Once third parties have access to our personal information, it is virtually impossible to get it back.  Most of the browsers offer an option or setting to control privacy, which may be called "Do Not Track", "Reject Third Party Cookies", or some similar name.  By using PrivacyTracker, Ghostery, browser privacy settings, and other utilities, our individual privacy may be better protected.


Choosing the Right Computer

By Melanie Birnbom, Webmaster, Century Village Computer Club, FL

http://cvccpp.tripod.com/        mbirnbom@hotmail.com

Choosing a computer can be a daunting task, especially with the large range available in the modern market. In this article I will try to narrow down your choices, making it easier to find a product that will best suit your needs.

The computer’s specifications are key when buying a computer, particularly when you want to get the best performance for your money.

One of the main parts of a computer is RAM, it helps with multitasking and ease of use. If you’re looking for a computer that you will only use for the most basic purposes-such as browsing the internet or typing documents-then you could probably make do with only 4gbs or RAM, two if you’re lucky. However if you want to use your computer for anything more than that,-Image editing, gaming or video development- you’ll probably need at least 8gbs, if not more.

If performance is what you’re looking for, costs are going to increase dramatically, to the point where you may start paying $1500+ for a computer. There are also many more things you must look for when trying to buy, lest your precious money be spent on what is effectively an overpriced brick. Firstly, a graphics card is integral to high performance computers, they allow you to edit high quality images or render demanding games, as well as being a huge help when using two monitors; go for something with 2gbs+ memory.

A processor is the brain of the computer, and is the most important (and thus complicated) part. Explaining how to choose one based on your inspection alone would take hours, so I recommend simply searching the processor you are looking at on Google and see what other people think of it.

Reviews

These are particularly handy if you don’t want to spend much time obsessing over the technical side of your computer. Simply type the computer’s name followed by the word “review” into Google and dozens of in-depth reviews of the computer will be right at your fingertips.

I cannot overstate the importance of reading reviews of a computer before you buy it, something can look great on paper, but break easily in use.

Research is the key to finding the best computer for your needs.


Submit Your article; deadline for next bulletin is Friday noon each week. Only what you write may be published. We cannot publish other peoples work without written permission. Simply click here EDITOR AT TECC and paste your write-up to submit it.
Share your computer experiences with other members. We need articles to publish in the TECC Bulletin each week.

UPDATE YOUR MEMBERSHIP INFORMATION Change your e-mail address, unsubscribe to this bulletin, etc.  Use link below.
UPDATE YOUR MEMBERSHIP