Tag Archives: computer

The New Predators – The Silent Call

That silence at the end of the line

A-black-phone-and-handset-008

The phone rings, you pick it up and say “Hello”  and no one is on the other line.

This is a new type of robo-Call – an automated computer system making tens of thousands of calls to “build a list of humans  target for theft”.

According to the Financial Fraud research center it is the first step in opening you up to many of the phone-based scams.

Vijay Balasubramaniyan, CEO of Pindrop Security, a company in Atlanta that detects phone fraud, says that in any number of ways, the criminal ring gets your 10 digits and loads them into an automated system.

According to the Federal Trade Commission, these robocalls are on the rise because Internet-powered phones make it cheap and easy for scammers to make illegal calls from anywhere in the world.

The next step is gathering information about your bank or credit card account. You get a call with a prerecorded voice that tells you, for example, “[we’re] calling with an important message about your debit card. If you are the cardholder please stay on the line and press 1. Otherwise please have the cardholder call us at 1-877…”

If you’re thinking about ignoring it, the message tries to scare you into paying attention with a warning: “A temporary hold may have been placed on your account and will be removed upon verification of activity.”

That number leads to another automated system that prompts you to share personal details like your date of birth, your card number and secure PIN, the expiration date, your Social Security number.

It can be tricky because many real banks have a similar system. And, Balasubramaniyan says, fear does kick in. He recalls a big scam in 2014 in which criminals pretended to be the IRS calling to collect back taxes. (The agency says the scam is still going on.) If you wanted to call back or have time to talk to your spouse before paying over the phone, the fraudster wouldn’t let you go.

Solution – If you have not already done so, ask your phone company top put caller ID on your landline. Then simply screen your calls and don’t pick up if the number is unfamiliar.

Do not  engage in any way with robocallers a lot of times when you get a robocall you have the option of pressing 1 for more information or pressing 2 to ask to be removed from the list. And in either case, pressing 1 or 2 basically lets the robocaller know that it’s a live person on the other line who’s willing to engage and that could lead to additional robocalls.

More information on this mattersilent_call

 

Leave a comment

Filed under Articles

Saving Tip today

Unknown

You don’t have to buy a thumb drive again.

Dropbox is a free service that gives you online store to share files and sync your files online. That way you don’t need a thumb drive to transfer information from computer to computer.

source

Leave a comment

Filed under Articles

Did You Know – 01/05/2015

 

Unknown

1. Sandflies are attracted to dark colors? To keep bites at bay this summer wear light colored clothing, avoid sweet smelling body products and use insect repellent – especially around the ankles as they sart their attack at ground level.
2. Massoud Hassani, a product designer from Afghanistan, built (by hand) a wind-powered device that trips land mines as it rolls across the ground. It is made using bamboo and biodegradable products.
Many of these mines are active and near populated areas in countries like Afghanistan and are hard to remove. The UN says that one mine clearance specialist is killed, and two injured, for every 5,000 mines cleared.

Hassani’s cheap and easy to make method has been achieving great results.

tumblr_nal6ieexVc1rdredko1_500 tumblr_nal6ieexVc1rdredko2_500 tumblr_nal6ieexVc1rdredko3_500

 

 

 

 

shutterstock_172134821

3. If you use a tiny dab of hand sanitiser on a tissue or make up remover pad it will clean all your electronic screens – phone, IPad, and computor

 

Unknown

4. There are two levels of Organic – 95% organic ingredients are identified by the words ‘Certified Organic’ and 70% organic ingredients is identified by the words ‘Made with organic ingredients’

 

Screenshot2010-11-19at103209AM

5. If your mobile phone is practically glued to your hand beware of ‘Text neck’ . Looking down at a screen for long periods can cause postural changes that affect the neck and spine, which can lead to nerve damage, muscle spasms and pain.

 

 

images

6. To get garlic smells off your hands, rub the with a stainless steel spoon under cold running water.

tumblr_n33orj6i6K1t61epqo1_1280

Leave a comment

Filed under Articles

Oh! That Is So Me

Oops the rice!!

tumblr_ndljq94lMT1rrqglzo1_500

Leave a comment

Filed under Articles

Learn For Free

freestuff
Here is a chance to learn something for free – No excuses now

Here is a list of websites that have ‘Free’ online courses

Alison
Coursera
FutureLearn
open2study
Khan Academy
edX
P2P U
Academic Earth
iversity
Stanford Online
MIT Open Courseware
Open Yale Courses
BBC Learning
OpenLearn
Carnegie Mellon University OLI
University of Reddit
Saylor

IDEAS, INSPIRATION & NEWS (websites which deliver educational content meant to entertain you and stimulate your brain)

TED
FORA
Big Think
99u
BBC Future
Seriously Amazing
How Stuff Works
Discovery News
National Geographic
Science News
Popular Science
IFLScience
YouTube Edu

DIY & HOW-TO’S (Don’t know how to do that? Want to learn how to do it yourself? Here are some great websites.)

wikiHow
Wonder How To
instructables
eHow
Howcast
MAKE
Do it yourself

FREE TEXTBOOKS & E-BOOKS

OpenStax CNX
Open Textbooks
Bookboon
Textbook Revolution
E-books Directory
FullBooks
Books Should Be Free
Classic Reader
Read Print
Project Gutenberg
AudioBooks For Free
LibriVox
Poem Hunter
Bartleby
MIT Classics
Many Books
Open Textbooks BCcampus
Open Textbook Library
WikiBooks

SCIENTIFIC ARTICLES & JOURNALS

Directory of Open Access Journals
Scitable
PLOS
Wiley Open Access
Springer Open
Oxford Open
Elsevier Open Access
ArXiv
Open Access Library
LEARN:

1. LANGUAGES

Duolingo
BBC Languages
Learn A Language
101languages
Memrise
Livemocha
Foreign Services Institute
My Languages
Surface Languages
Lingualia
OmniGlot
OpenCulture’s Language links

2. COMPUTER SCIENCE & PROGRAMMING

Codecademy
Programmr
GA Dash
CodeHS
w3schools
Code Avengers
Codelearn
The Code Player
Code School
Code.org
Programming Motherf*?$%#
Bento
Bucky’s room
WiBit
Learn Code the Hard Way
Mozilla Developer Network
Microsoft Virtual Academy

3. YOGA & MEDITATION

Learning Yoga
Learn Meditation
Yome
Free Meditation
Online Meditation
Do Yoga With Me
Yoga Learning Center

4. PHOTOGRAPHY & FILMMAKING

Exposure Guide
The Bastards Book of Photography
Cambridge in Color
Best Photo Lessons
Photography Course
Production Now
nyvs
Learn About Film
Film School Online

5. DRAWING & PAINTING

Enliighten
Ctrl+Paint
ArtGraphica
Google Cultural Institute
Drawspace
DragoArt
WetCanvas

6. INSTRUMENTS & MUSIC THEORY

Music Theory
Teoria
Music Theory Videos
Furmanczyk Academy of Music
Dave Conservatoire
Petrucci Music Library
Justin Guitar
Guitar Lessons
Piano Lessons
Zebra Keys
Play Bass Now

7. OTHER UNCATEGORIZED SKILLS

Investopedia
The Chess Website
Chesscademy
Chess.com
Spreeder
ReadSpeeder
First Aid for Free
First Aid Web
Wolfram Demonstrations Project

SOURCE

Leave a comment

Filed under Articles

5 ways hackers attack you (and how to counter them)

tumblr_mbw0rjljJJ1rzdozgo1_400

I saw this article on Fox News this weekend and thought it very interesting and rather scary actually. The thing that amazed me most was that for $3,000 you are able to buy a fully operational kit to start your hacking career. unbelievable, well not really I suppose, nothing should surprise us these days.

1. Phishing scams
Received an email from the Queen of Nigeria or some official sounding lawyer offering you a million dollars to be transferred into your account once you send your details? I don’t think so. You are probably thinking who would fall for that. Well believe it thousands a year get sucked in.

2. Trojan horse
One of the most popular ways to deliver a Trojan is a variation of the phishing email scams.

An example of this(and I get one at least twice a week) is an email from a well-known shipping company saying you have a delivery (mine always seem to be DHL at the moment). Just click on the URL address and they have slipped their slimy little hands into your computer.
An alarm bell should go off if the company does not address the content of the email with your name. For example if they use Dear customer, or Dear resident. “DO NOT OPEN”. I often get one from the bank saying my ATM card is blocked. I rang the company the first time it happen just to make sure then forwarded it to their fraud department.
Similar scams appear on Facebook and Twitter. You think you’re going to watch a funny video your friend posted. Instead, a pop-up tells you to update your video player. The “update” file it provides is really a Trojan.

3. Drive-by downloads
Hackers set up websites with a virus attached. It can be found on popular search engines and look very genuine.
Hackers can also sneak on to anyones website after finding some security weakness on your site and embed their virus in your website. This then requires a very good security to detect this. You may need to contact the security software company for them to run through your site. Often you can be alerted by a person whose own website security has picked it up.
You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.
All my computers are ‘Apple’ and although I do not have the same problems as a PC owner we apple owners are not impenetrable so we need to be careful.

4. Bypassing passwords
Hackers don’t waste time trying to guess your password these days.
They might get your password from a data breach at a company or website you use. That happens often as you hear on the news.
You need to change your password every now and then and also the security questions.
Give an answer to the security question that has nothing to do with the questions.
That would be confusing for them.

5. Using open Wi-fi
Just don’t do it.
Hackers or neighbors can hack your computer from outside your building or at Starbucks or wherever you are sitting innocently working on your computer.
I think most people know this now but just in case check your security system to make sure.

This is a very good article and worth reading in full
Another good site

1 Comment

Filed under Articles

Did You Know – 04/03/2013

whisper_music

1. Can’t sing in key? It may be that no amount of music lessons can help: Your ability to sing in tune is genetic? According to english researchers, about one in 20 of us can not even recognize off-key notes.

insomnia

2. 95% is the percentage of people who use a computer just before bedtime . Did you know that the light from the computer screen slows the release of sleep-promoting melatonin, so try to dim, the lights a full hour before bed instead.

2013-03-28T221406Z_1_CBRE92R1PRN00_RTROPTP_2_HEALTH-INCENTIVES
3. 6.3 kilos the average cruise passenger [puts on during a two-week holiday, according to a study by BONVOYAGE

47b3e9f90c57d5b3418a0effa89ae96b

4. Did you know there are more barrels of bourbon in Kentucky than people
source

2047100015_norml_remember_prohibition__answer_5_xlarge-300x300
5. Did you know that during the prohibition the US government poisoned alcohol Killing as many as 10,000 people.
Source

Leave a comment

Filed under Articles