As a continuation to an earlier Facebook post, and in an effort to help
those make sense and make the best decision possible for their needs, a tip
guide is forthcoming on the SimpleAssist blog (simpleassistme.blogspot.com). It will offer a roadmap to disseminate all information,
rumors, breakdown of several different recommendations
in anticipation of what to expect before and after the Windows XP April 8
deadline. The most important concern is
security and the biggest question will likely be, “do I need a new computer or
can I upgrade my own” as outlined below.
Monday, March 31, 2014
Thursday, March 20, 2014
SimpleAssist Software Spotlight: The Evernote Effect
The Evernote Effect
A Sync-harmonious Tool for Life and Business
Something for Anyone
Bringing the note and record keeping concepts of a three ring binder, document scanning, audio dictation, and organization to another level; regardless of whether you're a techie two gigabytes away from mental "hard drive" malfunction, or just attempting to GPS navigate through the unknown and sometimes overwhelming technological landscape, Evernote offers an amazingly simple respite to help keep your sanity among the day-to-day 21st century demands of staying organized as the hours and days fly by at the speed of lightA Unique Space in the Cloud
Exclusively cloud-based, and offering a brilliant "freemium" interface without much in the way of restrictions and an overall data limit, users have a more pragmatic caveat when it comes to " limitations" between free and premium, with regard to storage especially.To this end, instead of limiting cumulative data Evernote alternatively limits how much data can be uploaded per month, although the free version should be good for many - though I wouldn't recommend storing tons of large files such as movies... more like the perfect tool for writing down ideas and storing research for writing your next movie script.
Amazingly Easy to Use |
Simply put, Evernote on it's own does the job, and does it extraordinarily well. Over the past several months, they have added features that continue to bedazzle: such as the ability to not just scan a document by snapping a picture or pulling from the gallery of a device, but also the OCR recognition which makes the document searchable, and recently the business card feature. When the business card option is selected. the text from the business card "contact" fields are populated from a quick snap which then can be seamlessly saved as a new contact.
Something Special
In summarizing why Evernote is becoming more popular by the day, and finding itself in another league despite so many apps out there with similar functionality, it simply boils down to a defining characteristic that separates the good software from great software, the mediocre from the game changer: Innovative Elegance, resulting from the painstaking, seemingly impassioned strive to make the user experience seamless and intuitive, from constant innovation and improvement of the functionality. The intuitive interaction simply makes sense, and becomes an effortless symbiosis with end user; almost as if the application was designed to anticipate our next move, and giving the sense that it was designed and created specifically for the user.As someone who was using smartphones before the iPhone, as much as I almost didn't want to (I was a PC person through and through) it was that elegance which made iPhone the catalyst of the smart phone explosion.Maybe Apple could take some pointers, as their brand loyalty wanes due to their never ending desire to force you to repay for their innovation.
And so Evernote, in both their commitment to excellence and innovation with a product that starts at free and doesn't suck the customer in only to squeeze every nickel or bombard them with ads,makes it truly something special. The is not often seen in the ultra competitive "app" market, making Evernote feel like more of an open source passion product, and a mission to help us all handle the information coming at us every hour of every day.
Getting Started with Evernote
Sign up for free at www.evernote.com or get one month of their premium service for free by visiting this exclusive sign up link.Tuesday, March 4, 2014
SimpleAssist Tips - Download Danger: Protecting Against Malware as theCrooks Get Smarter
Internet Safety and Security
This tech tip includes both an anecdotal less on how I
was nearly fooled by a clever spyware delivery system, and some some
suggestions for protecting yourself.
Getting Duped: Malware Maleficence
I recently noticed a creative delivery system for
"fooling" the end-user into installing potentially malicious code onto
their computer when attempting to download install applications such as driver
packages, freeware programs, self-computer optimizers, and various other
utilities.
A few days ago, while in search of a piece of software
for diagnostic purposes, I nearly fell into a trap not unlike those I advise my
clients to be wary of. Following a quick
online search, I noticed several search results from websites with links to program
I was looking for.
After clicking the link for a site that I have trusted,
and then navigating through the page trying to find the direct download link and
avoiding the “adver-teasers”: one of my terms for integrated graphic links that
say DOWNLOAD and are made to look like legitimate download links (done using a
little trick called “Re-marketing” where cookies associated with your searches
are picked up by the code displaying the ads), I found the correct download
link and proceeded forward.
While the file included a download manager be wary of prompts to install other products, especially if it is NOT from the developer themselves) I concluded it was safe since they had proved
trustworthy in the past, and the download manager did in-fact appear to include
the freeware I was intending to use.
Upon selecting the "download and save" option (always a
good idea) , and then scanning the file with my antivirus and malware by right clicking on the file download, I believed that all seemed well and continued
to execute the installation.
IMAGE EXAMPLE 1 |
Example
of Program Adware Installer Menu Trick (See Image Example 1)
CLICK
to INSTALL:
Standard / Typical – Installs the standard options for this
program
CLICK
to INSTALL: Custom / Advanced - Warning, this is for Advanced Users only
Initially, I had selected the STANDARD option (I was
working quickly) and fortunately realized I was going against instinct and
decided to go back to CUSTOM/ADVANCED option, as I usually do.
It was here that I noticed that something I had not
run into before, and could likely cause problems for others.
(It's hard when Adobe and Flash try to get you to click on additional software options,
but at least they allow you to see t)
Shockingly, had I proceeded with the STANDARD installation, the critical mistake of not seeing the cleverly hidden and preselected
checkboxes which would have authorized the installation of the following:
·
A toolbar (Wide open
door for spyware)
·
The option reset my
browser’s my home page
·
The installation of a
completely unrelated program
In other words, although the STANDARD / TYPICAL installer
did include the software I needed,
the website where I had obtained the file was relying on something that I have
noticed in my professional experience, which is:
Most everyday users
do not consider themselves ‘Advanced” computer users, and are therefore often hesitant to choose an
option that indicates as such... for fear of doing something wrong.
While the clever approach caught me off guard, I was extremely disappointed that a site
supposedly providing legitatmate software would find a loophool to “fool”
unsuspecting users into downloading potentially malicious code that would leave them
vulernable to more adware, viruses, and problems.
Ways to Stay Safe When Installing from the Internet
1.
Protect yourself / understand what you’re up
against
While
the most important thing you can do is to protect yourself, and follow the old
instinct “if it’s too good to be true, it probably is”. Having specialized software to protect your machine is a critical component. There are plenty of great free software programs that can do the job of paid
“subscription based” tools that are legit or have free versions that will get
the job done.
First things first however... know what to look for by familiarizing yourself with these terms. [Broader definitions available by clicking link]
First things first however... know what to look for by familiarizing yourself with these terms. [Broader definitions available by clicking link]
I.
Adware – software that displays
advertisements and is integrated into another program offered at no charge or
at low cost or a type of spyware that gathers information about an Internet
user's browsing habits and displays targeted or contextual advertisements.
II.
Malware - software
intended to damage a computer, mobile device, computer system, or computer
network, or to take partial control over its operation
III. Toolbars - row or rows of
buttons on a display screen that are clicked on to select various functions in
a software application or web browser shopping-add ins, etc.
IV. Anti-Malware Software
– Antivirus, anti-virus, or AV software is computer
software used to prevent, detect and remove malicious computer
viruses. Most software described as antivirus also works against other
types of malware,
such as malicious Browser Helper Objects (BHOs), browser
hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms,
malicious LSPs, dialers, fraudtools, adware and spyware
2. Searching “safe” for Software, Driver, and other applications
When searching for software, drivers, manuals and
more, vigilance is key. When using a popular site such as Google® or Bing®, it’s
good to remember that those site’s use “crawlers” and other factors to
aggregate and order the listings. Being
as specific as possible, and starting with the name of the manufacturer (e.g.)
Microsoft
.
I.
Even
if you know exactly what you are searching for, skim the search for the other sites that appear. Check the URL (see image 1) on the search
screen to make sure the link includes the name of the developer. Note, additional sites may have altered or out of
date versions of what you are looking for, AND may even have a higher search
ranking; making them appear “safer” or, (as is more frequent) be in a
prime position up in the sponsored search area at the very top and on the
side of the screen.
II.
If
you don’t know the exact source of what you seek, what you use for querying is as important as how you search. For example, if I wanted to find legit free anintivirus software like “Top
10 free antivirus programs” , I would cross reference blogs or legitimate sites, using a systrem of elimination that points in the right direction.
III.
Usiing advanced search
methods (I hyperlinked as that is another blog itself. So in looking for a virus program, I may use Microsoft + Antivirus + Download and Do multiple searches to find
blogs, such as this one where you can find direct links to the download,
instead of having to go through some sort of download manager.
3.
Due Diligence
It is worth noting that no matter how good your
antivirus and malware protection may be, it’s not difficult for something to
get by you by making you feel as if it’s legitimate. I call it a Cyber-Con, and that’s really the
gist of it.
Again, people are infected with malicious code with
they let their guard down, having faith that if they are installing something
they trust, or from somewhere that they trust, additional options must be safe
too. It’s always keen to remember that
free software isn’t really free (unless it’s open source, but that’s a
different discussion) and it’s being supplemented by tying in advertising of
some sort.
Depending on what you are looking for, there are
potentially hundreds of sites, mirrors, etc. that have or claim to have
software application, drivers, etc. available from a central resource.
My
general rule of thumb is that if I am prompted to download something that is unsolicited
(a toolbar, a free virus program, a download manager) then I am going to strip
the options down to get only what I need
Even legit websites will have options to “Install toolbars” or other options unrelated to the primary purpose of the utility (Java® and Flash® both have check boxes that need to be unchecked prior to initial download.
Overall,
it pays to be safe. As one who is
constantly seeing the havoc created on the other end of cleaning the viruses
out, a little education always goes a long way.
I will always enjoy sharing what I have learned in order to keep other
people safe, as I’d much rather be developing strategic marketing and business
development strategies than cleaning computers. J
In
all seriousness, if you play it safe, search smart, and ask when in doubt, you
likely won’t need to buy your next computer as soon as you think you do and you’ll
find that a little homework goes a long way.
Derek
Shocklee
About the Author
Derek
Shocklee is the Founder of SimpleAssistme.com, a business technology and strategic
consulting, computer repair, and advisement firm focused on helping business
and individual leverage technology in a fast paced 21st century
landscape.
Subscribe to:
Posts (Atom)