ThreeTen.iNFo
  • Home
  • About
  • Contact
  • fuRRy cOmpaniOns
    • Feast
    • Frigid
    • Monji Mayhem >
      • MM-Main
      • MM-Page2
      • MM-Page3
    • Odd Couple >
      • OC-Main
      • OC-Page2
      • OC-Page3
      • OC-Page4
      • OC-Page5
      • OC-Page6
      • OC-Page7
      • OC-HappyHowl
      • VadersPast >
        • VadersPast-Pg2
  • TT.iNFo
  • We Use
    • HostGator
    • LastPass
    • MagicJack Plus
    • VPN

Facebook Can Indeed Use Your Photos

10/11/2015

0 Comments

 

➤ You’ve Been Hoaxed: Facebook Can Still Use Your Photos #TTiNFo http://t.co/WLog51MG3K

— ThreeTen (@Three_Ten) October 11, 2015
0 Comments

5 Tools For Editing The PDF Format

10/10/2015

0 Comments

 

➤ 5 Tools to Convert and Edit The PDF Format #TTiNFo http://t.co/5lFvfMTNwP

— ThreeTen (@Three_Ten) October 10, 2015
0 Comments

How To Root Your Galaxy S6 or Edge on 5.1.1

8/1/2015

0 Comments

 
Read Full Article
0 Comments

Failproof Method to Install Custom ROM Using TWRP

12/29/2014

0 Comments

 
Read Full Article
0 Comments

Heartwarming Holiday Feast

12/18/2014

0 Comments

 
Watch 13 dogs and 1 cat eat a holiday feast with their human hands.

You may have to watch the video more than once to catch all the subtle nuances (eg: the dog who steals silverware).


Behind The Scenes

Watch how they created above video with several shelter companions.
0 Comments

Think Twice Before Using Your USB Flash Drive

10/6/2014

0 Comments

 
Picture
Be aware that a new malware threat can infect your USB flash drive, which in turn can cause catastrophic destruction to your computers and network.

A new threat called, "BadUSB" can be executed from any USB device, not just flash or backup drives (eg: USB keyboards).

To make matters worse, currently there is no way to defend yourself against the potential threat other than not to use USB devices.

Sure, you can use cloud storage for your non-sensitive data instead of USB backup drives. However, I don't trust storing my sensitive data where other people have access to it. Nor do I want to find out the place I chose to use ended up being the next place to be breached leaving your data vulnerable.

Even worse, BadUSB remains imperceptible to antivirus software and mobile security apps, and lives on even after the contents of the drive and devices have been deleted and reformatted. -Sara Angeles
Read Sara's Full Article on Discovery >
0 Comments

Flashlight Apps That Install Malware on Your Smartphone

10/1/2014

0 Comments

 
There are many apps on Google's Play Store that can be dangerous to use, which is why you should scrutinize the permissions that each app requires before installing it.

Some apps cross the line by installing malware on your smartphone that can compromise all of your personal data (including username and passwords you enter on your phone). A good example of this type of infiltration is through a simple flashlight app used by hundreds of millions of unsuspecting people.

Brightest Flashlight Free and Super-Bright LED Flashlight are just two of the many flashlight apps available on Google's Play Store that require too many permissions and installs malware.

If you'd like more proof, read the "FTC Approves Final Order Settling Charges Against Flashlight App Creator".
Picture
Click on images to enlarge.
Picture


Requiring Unnecessary Permissions

Click on a picture below to enlarge and read the captions (hover your mouse over the enlarged picture to view the arrow to advance).


Special Report


What Flashlight App Do I Use?

I use the Privacy Flashlight app which only requires access to your camera/mic. Some will argue that it could turn on your microphone, but then it would need access to your WiFi to gain control.

It needs access to your camera because it uses it's flash bulb, nothing more.

There are other flashlight apps that you can use but be mindful of the permissions that they require.
Click on a picture above to enlarge and read the captions (hover your mouse over the enlarged picture to view the arrow to advance).
Install the Privacy Flashlight App from Google's Play Store...
Read Our Facebook Posts >
Do You Use A VPN?
Read Our Tracking Posts >
0 Comments

Malware is Only 1 Click Away When Using Facebook

9/2/2014

0 Comments

 
PictureDon't let curiosity get the best of you.
Unfortunately, for our customers, we see dozens of computers every year that were infected when they unsuspectingly clicked on a link while using Facebook.

I've been telling our customers for years, "Have you heard the saying, curiosity killed the cat"? Well, it's true. Don't click on links just because you're curious, it's better to be safe than sorry.

Ultimately, we are responsible for infecting our computers because we're the person clicking on a potential threat. And, don't be fooled to think that antivirus software will protect you, even if you've spent $100.00 or more on it. The simple truth is, it won't. As far as the antivirus software is concerned, you said it was okay to click on a link or download a file.

The best way to protect yourself, is to know where the threats come from when using Facebook.


There's a terrific article on MakeUseOf by Kihara Kimachia.

He'll show you 5 places on Facebook where potential danger can lurk and how to avoid them.
  • Clickjacking Threats
  • Phishing Exploits
  • The "Facebook Team"
  • Rogue Facebook Applications
  • Malware Attacks

Do you remember how life was without Facebook? Probably not. The site has pervaded our lives and it is no surprise that Facebook is now prime hunting ground for anyone with nefarious intentions. -Kihara Kimachia
Read Kihara's Full Article on MakeUseOf >
View Other Facebook Posts >
0 Comments

Don't Let Facebook Consume Your Life

8/17/2014

0 Comments

 
Picture"Hi, My name is Jane and I'm a FB addict."
I like social media but I was never that addicted to it that I felt compelled to know everything that was going on in everyone's lives. No, that doesn't mean that I didn't care, it merely implies that there are more productive ways to spend your time.

I created a Facebook account in February 2006 but I haven't logged-in since March 10, 2010 (they haven't deleted in spite of my long absence). And, surprisingly, I'm still able to breathe and function in my day-to-day life. I found things to do long before Facebook was known, heck... before the internet was available.

I found a good article by Audra Rundle in The Huffington Post regarding her journey away from Facebook.

Two months ago, I was sitting in front of my computer one evening when I finally lifted my eyes away from the screen. I had logged onto Facebook to space out and relax 'for a few minutes', yet somehow nearly 20 had already passed. I looked over at my husband cooking and listening to music in the kitchen, and all I could think was, "I could have been talking with him these past 20 minutes." Instead, I'd spent that time 'catching up' with real-life strangers and fulfilling self-imposed social obligations. -Audra Rundle
Read Audra's Full Article on The Huffington Post >
View Other Facebook Posts >
0 Comments

Can You Relate to Any of These 7 Facebook Facts?

7/26/2014

0 Comments

 
Picture
Can you relate to any of the signs mentioned in the video or is someone that you know entranced by Facebook's hypnotic spell (eg: spouse)?

How many of them pertain to me? I can honestly answer, none. I haven't logged-in to my Facebook account since March 10, 2010.

View Other Facebook Posts >
0 Comments

Facebook is Selling Your Browsing History to Advertisers

7/23/2014

0 Comments

 
PictureI logged out March 10, 2010.
Do you really want Facebook to share your browsing history with advertisers? I for one, do not wish to share anything with Facebook, nor do I feel compelled to use it.

If you want to learn how to stop them from selling your browsing information to advertisers, read Angela's article.

Given that Facebook recently announced they would listen in using microphones to find out what you’re listening to or watching on TV, and that they recently had a debacle when the public found out they’d been running psych experiments on their users. -Angela Alcorn
Read Full Article on MakeUseOf >
More Facebook Posts >
More Tracking Posts >
0 Comments

Job Explorer By Glassdoor Goes Beyond Finding Employment

7/22/2014

0 Comments

 
PictureGoogle Images.
If you've never tried using Glassdoor's Job Explorer to find a job, you may want to give it a whirl. It goes beyond finding employment for you, it can actually determine other jobs that you're qualified to hold.

Features:
  • City by city breakdown of where your job title is located.
  • Hover over a city name to find out how many jobs are available.
  • Level of opportunities per county.
  • Add your partner's job title to discover where your combined skills are needed.
  • Suggests other jobs that you're qualified to consider.
  • Percentage indicating number of people who've transitioned into a newly discovered position.

Click on a picture above to enlarge and read the captions (hover
your mouse over the enlarged picture to view the arrow to advance).

The 88 second video below covers all the key points of using their Job Explorer website.



Download Glassdoor's Android or Apple App

Click on a picture to enlarge (hover your mouse over the enlarged picture to view the arrow to advance).
Picture
Picture
0 Comments

Be Mindful Of The Dangers Using Public Computers

7/17/2014

0 Comments

 
PictureGoogle Images
When you're using a public computer at the library or a hotel, there are hidden dangers that you should be mindful of such as key-logging software. That type of malicious software can capture your sensitive log-in information without your knowledge.

I make it a point never to use public computers; I travel with a used laptop with a VPN installed.

I came across a good article entitled, "You Should Treat Public Computers Like Public Bathrooms". It shows you what to be mindful of if you have no choice but to use a public computer.

"When I was in college, the main campus library had several computers set up on the first floor for public use, and invariably, whenever I used one, a previous user had not logged out of her Gmail account. So when I tried to load my account, I would instead find myself staring at the entire contents of someone else’s inbox. Of course, I would then log that person out and sign myself in—but those brief moments when I had complete access to another person’s email were terrifying nonetheless. How could people be so careless with something as valuable as their email account?" -Josephine Wolff
Read Full Article >
VPN >
Security When Traveling >
0 Comments

Weird Al's Video Reminds Us To Use Words Correctly

7/16/2014

2 Comments

 
"Weird Al" Yankovic creativity shines through once again with his latest video, "Word Crimes", reminding us that it's not cool to misuse words online.

I thought of a few other words that he didn't mention in his video:
  1. There, their and they're (they are).
  2. Your and you're (you are).

There are times that I use abbreviations of words when typing on Twitter or sending texts since there are character limitations (140 and 160 respectively). However, I still use contractions correctly and the proper form of a word (eg: red or read).

Abbreviation Examples:
  • any1 = anyone | every1 = everyone
  • b = be
  • b4 = before
  • c = see
  • pls or plz = please
  • r = are
  • u = you | ur = your | u're = you're
  • 2 = to | 2day = today | 2morro = tomorrow | 2B = to be
  • 4 = for | 4ward = forward

When I write contracts for our business or content for our websites and blogs, I'm vigilant about making sure that the words are spelled correctly. In addition, I make sure that the proper use of grammar is followed to ensure that what I write 'reads' as I intend it to be.

Enjoy the video.

Weird Al's eBay Parody >
2 Comments

Facebook Likes & Shares Have a Hidden Agenda

6/4/2014

0 Comments

 
Jennifer Golbeck studies how people use social media. She explains what clicking on those not-so-innocent buttons are actually telling Facebook about yourself.

View Other Facebook Posts >
0 Comments

Crucial Security Settings to Implement on Your Router

5/11/2014

0 Comments

 
PictureGoogle Images
It's important to make a few security changes to your router, so that you can better protect yourself from attacks.

Crucial Changes to Implement:
  1. The router administrator password and username should be changed from their default settings.
  2. The name of your wireless network (SSID) should be altered from: Actiontec, Linksys, etc.
  3. Change the wireless security mode to WPA2 and utilize a long password.

"Your router is the first line of defense against hackers trying to access all the internet-connected devices in your home. Sadly, many of the top Wi-Fi routers are easy to hack. You should be concerned—and also make sure your router is set up properly."  -Melanie Pinola
Read The Full Article on Lifehacker >
0 Comments

10 + 3 Ideas To Keep Your Laptop Secure While Traveling

5/9/2014

0 Comments

 
Our twitter friend, Deia wrote an article on WiseBread, listing "10 Helpful Ways to Keep Your Laptop Safe While Traveling".
"Leaving your laptop at home is supposedly going to help you relax, but what if you're more anxious without your laptop? You may not be working during the trip, but there could be possible emergencies to handle. And let's not forget that a laptop can function as a travel agent, a guidebook, and an entertainment center, too." -Deia
Number 3 mentions using a laptop security cable. I've purchased and have used this brand from Amazon for several years. It's inexpensive, easy to use and built to last.

I'm a strong advocate of Deia's #6 idea to use a VPN. I've used a VPN since 2009 for daily home/office use and especially while traveling (more VPN articles).


Plus 3 Additional Tips That I Use:

  1. Enable an admin and user password in your BIOS settings, usually found under the Security tab. This gives you an added layer of security before Windows is loaded. I've done this for all of my customers over the years and I use them on our PCs/laptops (this is not a cure-all for theft but it can prove to be an effective deterrent).
  2. Instead of giving your old laptop away, keep it for traveling purposes. Format the hard drive, perform a clean-install of the operating system and drivers. Afterwards, I never put any sensitive data on it, maybe a few bookmarks. Now, if it's lost or stolen, it won't bother you as much because it wasn't your main laptop.
  3. When logging into your online bank or credit card accounts, don't have either recognize the laptop that you're using. Also, don't check the box that asks to keep you logged-in, if applicable. I always select the option that 'this is not my laptop', or similarly worded. Two things happen when you choose that option: [1] It will always ask to send a 2-step verification code to your phone, if utilized (which may be a pain, but it helps to keep your laptop a bit safer if it's stolen). [2] It will help prevent being automatically logged into your account without your having entered any credentials (which is a good thing if your laptop ends up in the wrong hands).
Picture
Click on images to enlarge
Picture
Booting-up Laptop
Picture
This is NOT my laptop
Read Deia's Full Article on WiseBread >
View Our VPN Choice >
0 Comments

Bring Your Keurig Coffee Maker Back From The Dead

4/18/2014

0 Comments

 
You can find quite a few help videos on Keurig's website showing you how to clean your coffee maker.

However, Katie B. has a slight twist when cleaning your brewing system that might bring it back from the dead.
I wonder how many people have thrown away their coffee makers because they didn’t know how to clean a Keurig, particularly one that doesn’t pump water any more? -Katie B.
Picture
Google Images
Read Full Article on Housewife How-To's >


0 Comments

Laser Keyboard For Your Android Smartphone

3/31/2014

0 Comments

 
PictureGoogle Images
I was reading this article today and it reminded me of the Celluon Epic laser keyboard I looked at last year. When it was first released it had a price tag of $169.99 but now you can buy them for less than $125.00 from Amazon.

I had a foldout keyboard for my Motorola i85 cell phone back in 2000 (remember Y2K?).  There wasn't any public place that I could use it that didn't attract attention to myself.  It was a good conversation starter because it was the newest technology at that time.

As the video below shows, the laser keyboard will definitely make the people around you look twice.


Order From Amazon

0 Comments

Five VPN Services You Should Consider

3/24/2014

0 Comments

 
A VPN, or a Virtual Private Network, is a great tool to protect your privacy and security while you use the internet. Whether you're at home or using public Wi-Fi while traveling, the best combine great pricing with security features and privacy guarantees that make them worth your trust. -Alan Henry
Picture
Read Alan's Full Article on Lifehacker >
View My VPN Choice >
0 Comments
<<Previous

    Picture
    Inexpensive Peace-of-Mind
    $39.95 Annually
    Encrypted WiFi
    5-Devices Simultaneously
    Unlimited Bandwidth
    No Traffic Logs

    Picture
    Receive 1 Month of
    Premium Service for Free

    Picture

    ThreeTen

    Always looking for new experiences, cultures and ideas to share with my friends and family.  I'm a gruBBy huBBy, Dad, Grandpa x5, business owner and fuRRy cOmpaniOn chAmpiOn.

    Picture

    Tweets by @Three_Ten

    Archives

    October 2015
    August 2015
    December 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    November 2013
    October 2013
    July 2013
    June 2013
    May 2013
    April 2013
    November 2012
    September 2012
    August 2012
    July 2012
    May 2012
    February 2012
    January 2012
    October 2011
    September 2011
    August 2011
    June 2011
    January 2011
    January 2010
    November 2009
    October 2009
    August 2009
    July 2009
    June 2009
    May 2009
    March 2009
    August 2008
    May 2008
    February 2007

    Categories

    All
    Advice
    Airport
    Amazon Prime
    Android
    App
    Backup
    Baseball
    Bluetooth
    Cartoons
    Cleaning
    Coffee
    Computer
    Custom ROM
    Drones
    Ebay
    Email Humor
    Employment
    Facebook
    Family
    Flashlight
    Friends
    Furry Companions
    GatoR
    Google Play Store
    Hoax
    Home
    Hotels
    Hot Spot
    How To
    HTC EVO 3D
    HTC EVO 4G
    Hulu
    Humor
    Ice
    Internet
    Jobs
    Keurigreg Coffee Brewersc05f6cd828
    Landline
    Laptop
    Love
    Mac
    Magicjackgo
    Magicjack-plus
    MakeUseOf
    Malware
    Mii
    Music
    Netflix
    Parenthood
    Pc
    PDF
    Photography
    Photos
    Privacy
    Review
    Roku
    Root
    Router
    Safety
    Samsung-galaxy-s3
    Samsung-galaxy-s3
    Samsung-galaxy-s4
    Samsung Galaxy S6
    Samsung Galaxy S6 Edge
    Search
    Security
    Shopping
    Smartphone
    Snow
    Snowblower
    Social-media
    Star-trek
    Streaming
    Technology
    Ted-talks
    Tethering
    Tracking
    Travel
    Twitter
    TWRP Recovery
    Usb
    Videos
    Vpn
    Wifi
    Wii
    Wisconsin
    Youtube

    RSS Feed

Picture
Only 1 Password To Remember
Picture
©2000-2021 | All Rights Reserved | ThreeTen.info