Wednesday, October 17, 2012

Technology Tip: Digitalize your Important Documents

Technology Tip: 

Digitalize your Important Documents 

You work so hard to pay your bills, which means the receipts are important for you, same goes with the reports, checks, card numbers etc.   If any of them goes missing when you need it for reference or discount or to fill a form, it can be such a pain to go back home and turn the house upside down to search for it.

Here is a tip to make your life easy by digitalizing every important document you want in your day today life. 

Evernote is the solution

Evernote is an App which is available on all the platforms, iOS, Android, Mac and Windows and Web version that can be accessed from any computer in the world.  Anything you add in Evernote from anywhere, will be available everywhere as it gets synced across the platform.

Saving important papers using Mobile

Install Evernote on your smartphone and Computer.  Save the picture of every important document which comes your way, to Evernote, and tag it accordingly, For example, if it is the electricity bill, tag it Electricity bill, Coupons get tagged as coupons, or many even more descriptive about them. Tags make it easier to search for them when the next time you need them. Just launch Evernote on your mobile and look for it by searching the tag.

Saving Important Documents from Computer

If you find any important things on the internet or important documents on your computer which, you feel, might be needed for reference, save it to Evernote and you can access it from mobile right on the stop when it is needed.

Shopping Lists and To Do lists

You have a shopping list or a to-do list on a paper, you can click its picture and save it in Evernote. There are many times that you misplace the paper till you reach the market. Saving it on your phone works pretty well.

Creating an Invitation List

You might be creating an invitation list of a piece of paper, or maybe on your computer. Try creating the list in Evernote.  Use either your computer or your mobile phone to create the list.  This way, you always have access to your list on your phone and can update it anytime.

The tips can be endless but the motive remains the same, to make your life easy by using simple technology like mobile phones and apps.

Have a great day!!
 

Like Us on facebook!!
Follow Us on Twitter!!
Add Us on Google+!!

This was reprinted from this article

Tuesday, October 16, 2012

Tehcnology Tip: Just how hackable are you?

Technology Tip:

Just how hackable are you? 

Are you an easy target?

According to a recent Harris Interactive poll commissioned by Dashlane, a company that manages passwords and personal data, most online Americans are concerned that their personal data might be used online without their knowledge. Approximately 88 percent of the 2208 adults surveyed cited being at least "somewhat concerned," and 29 percent claimed to be "extremely concerned." In addition, three out of five respondents were worried that they were vulnerable to being hacked. 

John Harrison, a group manager at Symantec Security and Response, says that people should be concerned, because they're sharing more than they think they are. 

Because social networks, public records, and high-profile security breaches are so prevalent, a lot of potentially sensitive information is just floating around the Internet. 

"Each piece of information adds to the puzzle," Harrison says. "We don't throw everything out there at once, but it eventually comes together. For example, you may not put your full birthday on Facebook, but it's not difficult for someone to find out what year you graduated from high school and put two and two together." 

In other words, you may not think you're sharing too much—just a snippet here and a snippet there—but to a hacker, you're building an easily harvested online profile.

Protect yourself the easy way

If you use the Internet in any meaningful way—sending email, uploading photos, frequenting social networks, shopping—your online profile is likely already floating around in the ether. And even if you haven't been online all that much, bits of your personal data may be available for online viewing via digitized public records. An interested person could readily find out if you have a mortgage, for example, or if you've recently gotten married or divorced. 

You probably know that a typical five-character, dictionary-word password is easy to hack, and perhaps you rely on something far less penetrable. But you probably don't have the time or bandwidth to memorize a complicated mix of numbers and letters. So here are a few quick, easy-to-implement security tips that will drastically reduce your hackability. 

Search for yourself. Before you start worrying, it's a good idea to get a handle on how much information about you is out there by searching for yourself. Type your name into Google—both with quotation marks and without—and with relevant keywords, such as your address, phone number, email addresses, job title, company, and alma mater. 

See what you find, and try to look at the information the way a hacker would. Is there enough data there for someone to piece together your life? If so, you need to take steps to improve your personal security. 

Use passphrases instead of passwords: Passwords are a tricky security issue. The best passwords are computer-generated mixtures of letters, numbers, and special characters (such as exclamation points and question marks). 

Unfortunately, the resulting alphanumeric strings are also extremely difficult for most people to remember. But since most passwords are hacked via brute-force methods—that is, by having a computer go through all possible combinations of characters—longer passwords are more secure simply because they take longer to discover. 

For example, an Intel Core i7 processor takes just hours to crack a five-character password, but it takes more than 10 days to crack a seven-character password. That's why security experts recommend using passphrases instead of passwords.


Stay updated: One of the easiest ways to prevent intruders from compromising your computer is to make sure that you're always running the latest version of all your PC applications—including your antivirus program. 

"Drive-by downloads—malware that downloads to your computer when you click on a malicious link—often work by exploiting known bugs in software," Harrison says. "These bugs are usually fixed in updated versions of the software, but that won't help you if you're still running the old version." 

Prioritize accounts: You may not be able to remember complex passphrases for every account you have, and that's okay. According to Doug McLean, senior director of product marketing at McAfee's Global Threat Intelligence, the average online American has more than 100 accounts, not all of which are important. 

Instead of creating different passwords for every account, create unique ones for only the important accounts—email accounts, online banking accounts, social networks, and other accounts that contain sensitive information. For relatively trivial accounts, such as message boards, it's fine to use an insecure, hackable password. 

McLean also suggests creating a "junk mail" email address for accounts that you don't really care about. You can use this junk email address to sign up for message boards, contests, and newsletters. Then, if one of the junk accounts is compromised, hackers won't have your real email address or your real passwords. 

Lie: Speaking of junk accounts, be careful about what information you give away to random websites. Sure, your bank needs to know your home address, but does a message board really need to know your zip code or your full birthday? If you can't get past a screen because the website wants you to give up too much information, Harrison suggests that you make things up. After all, he notes, message boards are notoriously hackable, and they really just want to verify that you're over a certain age. 

Protect yourself offline: According to McLean, offline identity theft is still much more common than online identity theft. The reason: Email addresses have passwords, while mailboxes, dumpsters, and lost wallets do not. To protect yourself offline, McLean suggests that you get a locking mailbox (if you don't already have one), shred all important bills and documents before you throw them away, and never carry your Social Security card with you.
Use a password manager: Though password managers require a little setting up, they're worth it if you're worried about the integrity of your passwords or passphrases. Password managers such as Dashlane, 1Password, and LastPass not only store all of your passwords in a neat little encrypted program that you can unlock with a master password; they can also create secure, computer-generated passwords that even you don't know. 

In choosing a password manager, it's important to pick one that's compatible with all of your devices, including your phone and tablet. Dashlane, 1Password, and LastPass are compatible with Windows, Mac OS X, iOS, and Android; and LastPass is also compatible with Linux, BlackBerry, Windows Phone, WebOS, and Symbian. Password managers can store form data, so you don't have to park credit card information on the Web. 

Freeze your credit report: Freezing your credit report is the single most effective way to prevent identity theft, according to McLean. If you're over 30 and you're not getting married or divorced, you probably won't be applying for new credit cards, loans, or mortgages, so you don't need your credit report to be readily available. 

To freeze your credit report, you must contact each of the three major credit bureaus (Equifax, Experian, and TransUnion), fill out a form, provide proof of identity, and pay a small fee (around $10, depending on your state). You'll then receive a PIN or password that will allow you to "thaw" your credit report (either temporarily or permanently) if you ever need to use it. Temporarily thawing your credit report usually takes less than a minute, McLean says. 

Credit report freezes are free in the United States for victims of identity theft.

Even a little security goes a long way

McLean suggests that taking minimal security precautions is like outrunning a bear: You don't have to be faster than the bear; you just have to be faster than your friend who's also being chased. 

Hackers are smart, but they're also somewhat lazy. So unless you happen to be a high-profile target, a hacker will likely give up if your data defenses prove to be too difficult to breach. Mat Honan's hackers even admitted that their attack was nothing personal—they simply wanted to break into his Twitter account because the three-character handle "@mat" signified the property of a Twitter superuser. Nothing more, and nothing less. 

Ultimately, even taking small security steps, such as creating an eight-character password instead of a five-character password, can protect your personal information just well enough to convince hackers to move on to the next digital door. 

Have a great day!

Like Us on facebook!!
Follow Us on Twitter!!
Add Us on Google+!!

This article was reprinted from this PCworld article


Wednesday, October 10, 2012

Technology Tip: How to reduce Email clutter in Gmail

Technology Tip: 

How to reduce Email clutter in Gmail

Want to have no emails in your mailbox?  Want to spend less time checking emails?   Want to Reduce email clutter in Gmail?  Then the best thing would be to follow these steps listed below:


Unsubscribe from unimportant Newsletters Manually

These days, almost ever brand has a Facebook and Twitter.  You can follow either of them and  then unsubscribe from their email newsletters (which typically adds to the email clutter). Once you are subsribed to them via facebook and twitter all the things you'd read in their newsletter you can read on their Facebook or Twitter!

Using Filter to Filter out unwanted emails.

It is not possible to unsubscribe to all the email newsletters manually, you can use the filter option to archive them so that these emails can be skipped from the Inbox and can be read later from a label created specifically for them.

Create Filters for Important Emails

Though Gmail does it is best to keep the most important messages in front of you, you can take extra measures to create a filter and label for emails that require your attention the most.

Use Dropbox to Share Files

Sending same attachments to multiple emails, then following up each and every person individually is a tough task, use Dropbox to share files in emails by sharing public link of the file in email.


Have a great day!

Like Us on facebook!!
Follow Us on Twitter!!
Add Us on Google+!!


This article was reprinted from this blog

Monday, October 8, 2012

Technology Tip: Have an apple TV? Check out the four new features!

Technology Tip: 

Have an apple TV? Check out the four new features!

Listed below are are four new features for your Apple TV
 

Rearranging icons
Finally! Up until now, Apple TV owners weren't able to move the icons around on the home screen. With the update, you can now arrange the icons however you'd like -- with one exception.

Share Apple IDs
Families can now use more than one Apple ID on an Apple TV at a time. With a few clicks, you can change between Apple IDs and access each respective purchase history, or charge an order to a different account.

Showtimes
Watching movie trailers on the Apple TV is a convenient way to get a better idea of what you want to go see in the theater. With the latest update, you can also view showtimes in local movie theaters for directly on your TV.

Shared Photo Streams
One thing I love using the Apple TV for is showing photos to friends and family members. Accessing your Photo Stream isn't new, but the option to get to your Shared Photo Streams has been added, giving you access to the same shared albums you can view on an iOS or OS X device. If you'd rather not have the photos present on your TV, you'll need to know how to disable this handy feature. 

Have a great day!! 

Like Us on facebook!!
Follow Us on Twitter!!
Add Us on Google+!!

This article was reprinted from cnet.com

Friday, October 5, 2012

Technology Tip: Updates for Windows 8!!

Technology Tip:

Updates for Windows 8!!

I am sure some of you were wondering what built-in apps you will find in Windows 8.  They have finally announced what they are and the list is below.

SkyDrive
  • Search within SkyDrive
  • Rename and move folders and files
  • New first-run experience
  • Custom sort order
Mail, Calendar, People, and Messaging
  • Conversation view of your inbox
  • Complete IMAP account support
  • Accepting and declining invitations in email
  • Capturing and updating your account picture
  • Improved search
  • Search for a contact within the Messaging app
Photos
  • Crop and rotate photos
  • New auto-curated collage slideshows
  • View photos and videos on network locations in your Pictures Library such as Windows Home Server, network shares, and HomeGroups
  • Move through photos in your Pictures Library even when you open them from the desktop
Maps
  • Bird's eye view
  • 3,000+ indoor venue maps
  • Driving directions hints
  • Improved navigation and layout
  • Improved customization, including custom pushpins and roaming options
  • Integration with Bing and Travel apps
Bing
  • Richer search results for local content and images
  • Bing rewards integration
  • Use zoom on your search results to see related queries
  • Use the file picker to select an image from Bing to use on your lock screen or in your other apps
Finance
  • Additional news and magazine content
  • More market exchanges enabled
  • Finance videos
News
  • Additional news content from partners such as The New York Times and The Wall Street Journal
  • Enhanced article reader, including font customization, zoom, pagination, and more
  • Improved offline reading experience
  • News videos
  • Slideshows
Sports
  • Additional news and magazine content
  • Sports videos
  • Slideshows
  • New soccer leagues, including MLS, J. League, and Brazilian League
Travel
  • Additional news and magazine content
  • Improved flight search and new flight progress indicator
  • Improved hotel listing page
  • Interactive 360-degree panoramas (gyroscope supported)
Weather
  • Improved default location usability
  • Hourly weather forecasts, up to 10 days
  • Day & evening high/low temperatures
Video
  • Purchasing in local currencies
  • Closed captioning
  • Search by actor or director
Music
  • Expanded music services
  • Rich "Now Playing" experience
  • Discover more music with SmartDJ
Games
  • Exciting new games
  • In-game purchasing
  • Invites and turn notifications
    Have a great weekend!!

    Like Us on facebook!!
    Follow Us on Twitter!!
    Add Us on Google+!!

Tuesday, October 2, 2012

Technology Tip: 

Download YouTube videos in their original format

Reprinted for this Cnet article

 Uploading a YouTube video causes it to be converted to the format used for streaming by the service. If you ever lose your videos, you could always grab the converted versions from the YouTube site, but what if you want the originals?


Google Takeout is now offering the ability to download the original versions of your videos, as mentioned by the Google Data Liberation blog. Takeout allows you to export data like settings, groups, or photos from Google's other Web sites and services. 


Unfortunately, you can only download all videos together at this time. There's no option to select individual ones that you need to replace on your hard drive or external storage. But if you're desperate to get an original copy of one or more of them, at least you can.


Here's how to grab the original versions of your videos:
Step 1: Open the Google Takeout Web site in your browser.
 

Step 2: Select the Choose Services tab at the top area of the page.

Step 3: Click the button labeled YouTube and then a card will pop up in the area above the buttons showing the size of your YouTube collection for download.


Step 4: Now click on Create Archive and then head to the Downloads tab.



Step 5: Once Takeout has finished building the archive, just click Download to grab your videos.


Note: You may be asked to log in to Google services again after clicking Download for security reasons.


Hopefully Google Takeout will evolve to let you select specific videos to download. When you have many uploads, say 40 or 50, the download size can become a little crazy when forced to download all of them at once.

Have a great day!

Like Us on facebook!!
Follow Us on Twitter!!
Add Us on Google+!!