Hi Net Neighbors!
Mr John here with a message of oops. This week I started a new job and things have been rather hectic. I should be back next week with a new installment.
Author: Mr John
Hi Net Neighbors!
Mr John here with a message of oops. This week I started a new job and things have been rather hectic. I should be back next week with a new installment.
By John Carter
Hi Net Neighbors! Welcome to Tech Tuesday, where we take deep dives into the issues plaguing you. This week we continue our Basic Computer Troubleshooting series with a common issue…
Sometimes a piece of your equipment, a peripheral device to actual computer, will stop working. Maybe your keyboard doesn’t work right. Maybe your mouse won’t click properly. And don’t get me started on printers!
Many of these problems have very banal solutions and they start with a simple question; “Have you reset your computer?”
This seems like an overly simple solution for what would be a complex problem, but it often works. Think of a computer like a person. Imagine being tasked with multiple objectives that all need to be done at the same time. Some of those tasks can be run simultaneously while others are going to need contradictory skills or tools. If you get too many contradictions everything starts to fail, and you have to stop. With people, we often tell them to go lay down, rest, and start fresh in the morning.
Computers are the same way. Only their rest and start fresh is called rebooting.
When you ask a computer to do too many things at once, metaphoric wires can get crossed and the system becomes too entangled in itself to figure out what to do. This is often when we see mice and keyboards cease functioning. Turning off your computer and turning it back on again can ‘uncross’ those wires. This occurs because the startup sequence in your computer has as part of its function a checker that runs through the systems and ensures everything is working properly.
Another potential cause of peripheral malfunction has a connection to a question we addressed last week, “Is it plugged in?”
Depending on your computer and how you use it peripheral connections can become loose over time, thermal expansion and contraction pulling things apart ever so slightly. If something isn’t working, then try unplugging the faulty device and plugging it back in. You may have to restart the computer after doing this.
Laptops are especially susceptible to loose connections. As we move our laptops around, plugging in peripherals and unplugging them, the connections in our devices expand. Think about how hard it was to plug in your mouse two years ago and think about how hard it is now. It’s easier now because the USB connection is looser than it was. You could try gently squeezing the metal on that connector to make the fit a little tighter or get another device. Either way, if you must have the wire ‘just right’ to get it to work you’re probably looking at a loose connector.
Although this tip is primarily for keyboards it can apply to mice too. Is it just dirty? With keyboards this can be an especially important question. Over time hair, crumbs, dust, and more can accumulate in the hollows of our keyboards. Thankfully, this is a relatively easy fix. One way to do this, and remember this is only for traditional desktop computers, is to take the keyboard, flip it upside down, and shake it. Shake it and watch the debris rain out. I will say, from personal experience, this can be rather cathartic. If you don’t want to shake it out, or you have a laptop, you can always purchase a can of compressed air and blow the crumbs away. Remember to not look at the nozzle while you are doing this.
Whatever you do though, DO NOT put your keyboard in the wash!
This is the most technical part of this week’s post, but it is something you should know about. In your computer there are series upon series of instructions on how to do things known as drivers. Think about drivers the way you might think about tying your shoes. After years of doing it you just tie them, right? You don’t need to think about it. That would be a driver. Some automatic thing you had to be taught then it becomes wrote.
Well sometimes in people those automatic things can become corrupted. Imagine getting hit in the head and forgetting how to tie your shoes. You would have to be trained in it again. The same is true for computers.
Drivers can fail all the time for a host of reasons. Sometimes drivers from one device get confused with drivers from another. This can, as was stated earlier, be fixed by restarting your computer. Other times drivers are erased or corrupted during a system update. This usually happens to printers, high-end video cards, and other items that might not be an across-the-board standard.
To find out if your drivers are faulty is an easy proposition. Tech Junkie has a decent write up that I will link here: https://www.techjunkie.com/check-if-drivers-up-to-date/#:~:text=%20How%20To%20Check%20If%20your%20Drivers%20Are,reported%20cases%20of%20updating%20drivers%20being…%20More%20
The crux of it is this, go to your Windows Device Manager and make sure none of the items have a small yellow triangle. If they do, then that device definitely has a problem.
Once you know what device is having a problem go to the manufacturer’s website directly, not a 3rd party site, and download the drivers from there. Most manufacturers make downloading and installing drivers easy, even going so far as to provide downloadable checkers designed to always keep their drivers up to date. Whether you use it is up to you, but it can be handy.
Why yes, I’m glad you asked. Sometimes stuff just wears out. If you think this has happened to you, try a friend’s device on your computer. If their mouse works and yours doesn’t then go get yourself a new one.
Also, try a different port. Sometimes one USB port on your computer can fail while the others still work. So even if the mouse is fine if it is plugged into a faulty port it still won’t work.
Indeed it does. While there is more I could go on about, I will leave you here. These are good things to check out if your peripherals fail on you. Next time we will be looking at why your computer may be constantly resetting on its own.
Until then, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome to another episode of Tech Tuesday, where we explore the issues affecting you. Today we are going to start on a series focusing on Basic Computer Troubleshooting. We are not going super deep here, you will not need to know how to hack or anything. Instead we are going to look at some common issues and how to easily fix them. I view these tricks as vital since they can potentially save you a lot of time and money avoiding taking your computer to a specialist such as the Geek Squad.
So let’s dig down with today’s issue
Believe it or not, this is a common problem I’ve addressed over the years. The solution is often a simple one and it starts with one question. “Is it plugged in?”
We both share a laugh and then I look at them and say, “Seriously, is it plugged in?”
When it comes to something like this never assume the answer is yes. Check all the plugs. Make sure they are firmly secured to your device. Make sure they are firmly plugged in to the wall.
Is it plugged into a power strip? If the answer is no, plug it into a power strip. Power strips have fuses inside that help protect your devices in the event of a power surge.
If the answer is yes, then there are other things you need to check. Is the strip plugged in? Is the strip active? You can usually tell by a light in the switch. If the strip is on, and your device is firmly plugged in, it can still be the strip. Unplug the device and move it to a socket on the strip closer to the switch. Depending on the power strip, sockets lower on the strip can fail while those further up still work.
Also, if you have just plugged the device into a wall socket and it stopped working, check the wall socket. Many houses have one or two outlets tied to light switches. It can be an easy mistake to make and is a simple one to fix.
Once you have checked these factors, another question I would have is, “Are we dealing with a laptop or desktop?”
Although both work the same, the power situation for one is slightly different from the other. Laptops have a power inverter and supply external to the device, that big brick you have to lug around. The external power brick is often a point of failure. If the wires are frayed that can interfere with power flow. If you did not have it plugged into a surge protecting power strip, then the inverter might have blown in a surge to save the computer itself. Thankfully, if the power brick fails you can often buy a third-party version at a decent price, usually well under a hundred dollars.
Meanwhile desktops have all the power stuff inside the metal case. In my long experience with computers, the power supply on a desktop tower is one of the least likely parts of the computer to fail, especially if you keep it vacuumed out and free of debris. Still, it can fail and if this is ultimately the culprit then, I’m sorry, you will have to seek out official help. Thankfully, as I said, they rarely fail.
Anything else?
When it comes to fixing common computer problems, the answer is an unequivocal yes. On this topic though we have reached our end. Anything beyond this requires money or technical expertise greater than the scope of our program. Still, this is a good start. Look forward to more Basic Troubleshooting tips in the future, with the next being: My Mouse/Keyboard/Device is Not Working.
An ominous omen or an interesting discussion. Find out next time.
Until then, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome to Tech Tuesday, where we do deep dives on the topics you want to learn more about. Today we are going to look at App Stores. What are they? And how do You use them?
At its most basic, App Stores are where you go to ‘purchase’ an app for your device. Notice I put them into the literary equivalent of air quotes? This is because purchasing does not mean the same thing to you and me as it does to Google or Apple. To most people the act of purchasing something is you trading money for goods or services. To these companies though, purchasing is any time you acquire a good or service from them. Free or paid, it does not matter, you are purchasing it. Thankfully, most apps people ‘purchase’ these days are free.
Good question. I get this confusion often. People in the tech space talk about them and programs without really explaining. So let’s take a quick moment to talk about apps. Apps are programs. Ever open Word or Photoshop on your computer? Well, you are opening an application we just call them programs. Basically, the substitution of app for program was a marketing thing. They could have kept calling them programs and today we’d all be talking about the Prog Store. But we aren’t, we are talking about the App Store.
Are you sure about that? Because I bet you do have it, you just aren’t seeing the name App Store. App Store as a named location tends to be the main purview of Apple. If you have an iPhone or iPad you have an icon named App Store. If you aren’t on Apple though, that’s okay. You still have an App Store, they just call it something else. For Android devices the App Store is named Google Play or Google Play Store, or just Play Store.
Yes actually, glad you asked. I would like to take a moment and circle back to the free part of apps. Now don’t worry, I’m not about to go and reverse free but I do want to issue a warning or two. Many, many apps are as free as their price tag say. Google Maps, Photos, Mail, Docs, Slides, and more, they are all free. However, there are other free apps that are more likely to be called freemium. A freemium app is one you pay nothing for to download but there may be hidden costs down the road. Such costs might include: powerups in games, removal of ads, increased features, extra storage space, or other conveniences. You don’t have to pay for these things. Most apps are designed to still be usable without them. However, these add-on micro transactions are there to trickle money out of you. Instead of charging 20 dollars up front, they give the app away for free then charge you .99 cents here and there and, before you know it, you have suddenly paid much more than the 20 you could have.
This is not to say avoid all apps, just go in understanding that sometimes free doesn’t always come without a cost. Which, I think, is good advice in general.
Not to be super spooky but, is anyone’s stuff safe? But in all seriousness, yes probably. It’s about as safe from attack as your information on Amazon or any other. And if you are really worried about someone getting your credit card information there are ways around that. Legal ways I might add.
Right. Companies know you don’t want to give them your information. Because of this, the big names in the business, Amazon, Google, and Apple, have prepaid cards you can purchase at most stores. Just buy the card for your particular service, Google Play for instance, then follow the instructions on the card to load your ‘money’ on the account. Now, any purchase requiring money will instead use the pre-set amount on the card you added. This is a great way to limit yourself or your loved ones. After all, many of these services, especially the games, are designed to draw you in and lay down far more money than you might have otherwise. The card puts a quick and easy limit on that and keeps your information safe.
No, not really. At this point the wonders of the App Store are open to you. Although, if I were you, I would make sure one of my first ‘purchases’ was for an anti-virus, especially if I was on an Android device. Malwarebytes is pretty good, but there are other free ones out there too. Other than that, remember…
Have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome to Tech Tuesday, where we do deep dives on the issues you are having with technology. Today we are going to take a look at Google Photos, a popular online photo service.
First, a little background. For the longest time any picture you took with your cell phone, if you had Google Drive on your phone, would automatically back up to the Drive. While pictures would be seen in Google Photos and Drive, they really were in the latter while the former was just a convenient interface. Then, in 2019, Google decoupled the two platforms and now all your pictures are solely in Google Photos.
Believe it or not, Google thought this would be an improvement. According to them, they had complaints that things were too complicated. Therefore, in their mind, disconnecting Photos from the standard Google Drive experience is their way of ‘Making things easier’. The issue with this change is that all your new pictures are going to Google Photos while the others are in Drive.
Yes, yes you do. If you were using Google Photos before the changeover you will have all your old pictures in Google Drive and all the post-change items in Photos exclusively. You can, if you want, merge the old with the new but that is the direction it will go, Old to New. Everything is in Photos now, not Drive.
Although, you could, I guess, move all the pictures manually into Google Drive. I wouldn’t though because of the hit to your storage you’ll take.
Good question. Well according to their site, if you store your pictures at their original quality then you have whatever storage is in your Google Drive. This means, unless you are paying, you will max out at 15 GB. As with most things in life though, the storage number comes with a caveat. If you choose to lower the quality of your pictures from Max Quality to High Quality your storage cap rises from 15 GB to Infinity. Meaning that you can store as many pictures as you want forever. So long as you keep them in Google Photos.
If you choose the High-Quality option that means your pictures will be reduced in file size to 16 MB per picture. Now that may not seem like a lot, but a picture taken on my iPhone 8 Plus, with its 12 mega pixel camera, clocks in at 3.2 MB. With these numbers I would never hit the max size limit and my pictures would never be reduced. Even in pictures whose quality has been reduced, most of the compression is hard to impossible to detect with the naked eye unless you zoom in to 500% or more. So even under the new system you shouldn’t run into any problems with storage limits.
You have a couple of options. One, you live with the changes and merge the Drive pictures with Photos. Not ideal but it is an option. If you continue this way, if you just look at your pictures while they are in Albums and ignore the master list it will seem as if things were somewhat normal. Two, you can stop using Photos and move to another system such as OneDrive, where you can absolutely use the most complicated folder system you can devise. With OneDrive you will have, by default, 5GB worth of storage with the option of upgrading to more expensive solutions. If you pay yearly or monthly for Office 365 you have 1TB of storage; that’s 1000 gigabytes! Just download the OneDrive app, set it to your account and to backup photos, and sit back.
There is another option out there if you don’t mind dealing with Albums of a sort, and that is Amazon Photos. If you have an Amazon Prime account, you have unlimited picture storage as one of the million other hidden benefits. The real restriction here is that you cannot use the service to store pictures you are using for a business, as that is a separate account. If you want to go this route, just download the Amazon Photos app, set it to your account and to backup photos, and sit back.
Really? Just take your photos. If you have decided to use another of the apps then use those. If you are staying with Google Photos, then keep taking pictures. Either way, don’t let the varying machinations of a distant corporate machine keep you from enjoying your day.
And remember, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome to another installment of Tech Tuesday, where we do deep dives into the issues that concern you. This week we are going to look at an issue that can often mess people up, the difference between Email and Texting.
We spent a long time in a previous episode discussing the finer points of Email, so we shall not rehash them all there. Suffice it to say, Email is a similar form of communication to physically writing out a letter, on paper, with a pen. Because of this deep similarity it is common, and expected, to use similar rules when writing an Email. Emails tend to be long form, with proper punctuation and grammar.
If Email is the digital equivalent of hand-writing a letter then Texting, at least among the younger generations, is more akin to a verbal conversation. Also different is how Texting is accessed. Normally, meaning without any workarounds, Texts are tied to a phone number not a set email domain. What this means is that, if you want to Text someone you are not going to use USERNAME@DOMAIN.COM but instead, 9045555555. Though if someone gives you that phone number, they probably do not want to talk to you.
That is a good question. A lot of parents look at their children’s Texts and wonder what the heck happened. These are kids and adults whose prose is spectacular, yet their Texts read like a third grader’s failed report. The grammar is wrong. There is no punctuation. Heck, they don’t even use whole words! If you had a hand in shaping this young mind your frustration makes complete sense. But instead of despairing, try rethinking the kind of communication the person is engaging in. Remember, Texting is writing, it’s a stand-in for verbal communication. Think of how the person talks then read the Texts from that perspective.
Now, do me a favor, look at your Texts and read them as if you were speaking. Do they sound like a conversation between two people in a coffee shop or do they sound like a speech?
This Texting = Speaking dynamic also explains something else that many people find irritating, shorthand. If you have ever seen something like 4u and found your teeth grinding, try reading it out loud. If Texting is just Speaking then it does not matter what the information looks like, it is how the communication is being processed that is important.
At the same time, while you may be pulling your hair out at their poor grammar or syntax, they may be worried about you. Some conventions that the written world takes for granted, such as the ellipses aka …, sound very different to those speakreading the Text. Instead of a pause like you probably mean it, the person speakreading it ‘hears’ something far more sarcastic or angry than was intended. Formalized writing in a Texting environment also comes across as angry. Ever hear someone get so angry they start talking slowly and enunciating every word? That is what it can sound like when you bring Email style writing into the texting field.
No…just, no. Nothing says I am completely out of touch like someone older than you trying to use the same slang and verbiage as you. But what you CAN do is shake your shoulders a little, break out of the writing mode and move into a more speakerly style. Leave a comma off. Instead of long paragraphs sent as one block, send shorter messages that are easier to digest. And always be aware of how what you are ‘saying’ is going to ‘sound’ to the person speakreading it. Other than that, you be you.
Oh, and this is really important, just because someone is sending you a text doesn’t mean they are expecting an immediate response.
Yes. When someone you know texts you at 3am they are not expecting you to send a response right then. They know you are asleep. Heck, they may have been asleep too and suddenly was woken up by something and they needed to tell you. What they don’t want though is for you to wake up and text back. Leave that stuff for the morning when you can deal with it appropriately. Usually the only time someone wants you to respond right that second is when they say, “Txt me now! Something’s up.” Unless it is something like that, it can probably wait. Most people who Text are doing so between other things in their life. They can’t get into a sustained conversation right now and they are not expecting you to drop everything either.
If you have someone in your life who is Texting you during times when you are asleep or unable to answer, you can always turn on your phone’s Do Not Disturb function. When this is on you should not receive notifications of the Texts you are getting.
At this point? Just go out and start Texting your loved ones. And if you have something you want to say a tad longer than a quick sentence or two then send it via an email.
And while you’re doing that remember, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome to another Tech Tuesday, where we do deep dives into the technology issues plaguing you. Today we are going to look at something many of you probably live in fear of, Viruses and Malware. Depending on who you are talking to, they have the potential to ruin your life and steal your cat. Now they aren’t out to do the latter and the former…well that is less about your life and more about knowing information about you allows the ‘bad guys’ more access to the world.
Okay, now hold onto your hats because I am about to blow your mind. A Virus is a form of Malware. Boom! More specifically, a Virus is a computer program designed to spread from program to program in your computer. Once it has infected a host machine, the Virus will then seek ways of jumping to other systems to infect them as well. Viruses are made by people with varying goals in mind. Some do it for benign reasons such as creating tools to break into computers to better figure out ways to protect those same computers. Others use Viruses as a way of making a political statement, such as programming a computer so that, every time you press CTRL and ALT at the same time a screen opens and types whatever statement they had in mind.
Those are good to somewhat annoying actors on the stage though. What about the really bad guys? Well Viruses made by these people are out to steal information or deny you access to services until an amount of money is paid.
Malware, or malicious software, is a catch all term for all sorts of nasty computer bugs. Bugs such as Trojan Horses, Ransomware, Adware, Keyloggers, Browser Hijackers, and yes, Viruses. We’ll go through all these but know that they all are problematic and can really be a pain to remove. They are usually created to cause pain in others and extract information and funds from people/institutions.
Like the historical horse from which they draw their name, Trojan Horses, aka Trojans, are Malware designed to appear legitimate. They use this seemingly legitimate face to convince you to interact with it and when you do the real Malware hidden inside is free to attack. Some common places for Trojans to pop up are pictures people send you. While the image appears normal, inside Malware may be lurking. It is because of this that many email services include a scanner to check incoming mail for these sorts of attacks.
This kind of Malware either locks you out of your computer or threatens to distribute the contents of your computer. Either way, the chief goal of Ransomware is for you to pay the bad guys. They block access to your files by encoding them with a key that only they have. So long as you are not given the key there is no real way of accessing your information. Trojans are a common vector for getting Ransomware onto your computer
This might be the one you are most familiar with because of how it presents, pop-ups. Adware is designed to create windows filled with ads for you to click on. The most important thing to remember when it comes to Adware is to not click on any of the buttons. For one, you cannot be sure you are going to legitimate sites through these links. Also, you cannot be sure the button isn’t a trigger to release a far more dangerous Malware into your system.
Again, usually, hidden within Trojans, Keyloggers are pieces of Malware designed to make a record of every key you press on your keyboard. The purpose of this is to capture important information such as usernames, passwords, and bank account numbers and then transmit that information to the one behind the Malware. Once they have this information it is much easier to break into your accounts.
These are very sophisticated pieces of Malware designed to take over some, if not all, the functions of your browser. Common features are a changing of your browser’s search engine to a bad actor’s site. These sites are either Malware-laden traps, filled with ads designed to take you to worse sites, or both. Browser Hijackers can be some of the hardest Malware to remove though some aspects of them, such as changing default search engines and browsers, requires user permission making them less powerful on Windows 10 machines.
Well the good news is that is fairly easy to protect yourself against the kinds of threats. If you have Windows 10 then your computer comes with Windows Security which is more than up to the task of keeping your computer free of viruses. Just make sure to run regular updates and occasionally pop into the Windows Security, accessible through the Update and Security area of the Settings app.
Malware, on the other hand, will probably require a bit more power than a simple virus scanner has at its disposal. To combat them you are going to want to download an anti-Malware program. As of 2020 one the most respected anti-Malware programs is Malwarebytes which you can download for free from Malwarebytes.com. It will give you a free 14-day trial of their Premium services but you can use the basic package with no problem.
Between your free anti-virus and your free anti-Malware, you can use the internet in relative safety. This does not mean there are no threats out there, that’s not how life works. But for the most part you are safe, just like in life. Just remember a few things: don’t download from sites not familiar to you, if a friend sends a picture from the wrong email address don’t open it, run your anti-virus and anti-Malware at least once a month depending on your usage.
Next time we are going to talk about Texting and how it compares to Email and how to get the most out of both.
Until then, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome to another installment of Tech Tuesday, where we do deep dives into the technology we have all around us. Today we are going to look at something that, if you use the internet, you’ve heard mentioned before; Cookies
Mmm, Cookies. Who doesn’t love an ooey, gooey chocolate chip cookie?
Wait, no, not those Cookies, sorry. Today we are going to talk about Cookies in your computer. If you have been anywhere on the internet these days, you have probably encountered something mentioning Cookies and asking your permission to use them. So, let’s do a deep dive into them.
At its most simple, a Cookie is a tiny piece of information placed on your computer by someone else’s computer. Now let’s talk about that, because it sounds scary.
Let’s take a step away from the digital world and back into the real one. Imagine for a moment you have a business card. It has your name, address, phone number, and anything else you would like people to know about you. Easy enough, eh? Even if you have never had one yourself, you’ve seen them on tv and in the movies. Now the purpose of a business card is, when you meet someone or visit a place, you can leave a reminder of who you are, that way people can find you again. Sometimes those people and places that have your card will add additional information to make it easier for them to remember you. This is very similar to how Cookies work.
When you visit a website, it will often ask you if they can place a Cookie on your computer. This is their ‘business card’ so, the next time you visit, they can remember who you are. Depending on the site, this Cookie will take different forms. Most are just a long string of numbers and letters that correspond to your account on their systems.
The kinds of things using Cookies though are integral to the internet. Ever go shopping online and the ‘Shopping Cart’ remembers what you put in it? That information is being stored on your machine via a Cookie. Ever go to your email and you don’t have to sign in? Well the login authentication was done via a Cookie. Ever go back to YouTube and they remember where you left off in a video? That was a Cookie too.
To then answer the question, what is a cookie? One must conclude Cookies are one of the most essential parts of the modern internet.
This depends. Cookies are used both to track your purchases and reduce the number of times you must sign-in to a site. There was a key word there though, track. Along with being helpful, Cookies are recording what you are doing on your computer so someone else can have access to that information. Most of the time this access is benign but not always. If you are someone who objects to the way modern companies track you and then use the data they gather to advertise to you, then Cookies are not as friendly as they might have been intended.
Great question, glad you asked. Although not completely, this notion of deleting Cookies and clearing the cache stems from earlier generations of computers. Being a simple text file, Cookies do not occupy a huge amount of space on your computer. However, what is a small amount of real estate now was a much larger amount of space in the comparatively smaller hard drives and processors of twenty years ago. Back then, when your computer ran slow it made absolute sense to jettison every little bit of stuff clogging up storage and Cookies were an easy place to cut some metaphorical calories. These days, with as powerful and robust as modern computers are it is less necessary to remove them. Additionally, your computer’s browser automatically deletes Cookies that are too old.
Largely you can ignore them. These days Cookies manage themselves. There are options in your browser you can activate to minimize the use of Cookies on your computer. However, if you choose to use the internet without ever using a Cookie your experience will be less robust than intended.
You can thank the European Union for these notifications. The EU Cookies Directive states that any site owned by EU citizens or directed to EU citizens must inform users of the Cookies they use and gain consent for operation. It can be annoying to be sure, but at least you are being informed.
Have fun on the internet knowing why the browser keeps mentions Cookies. There are things other than Cookies to be worried about these days, Viruses and Malware. We’ll get to those next time.
Until then, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome back to Tech Tuesday, where we do deep dives into the technology powering our lives. Today we look at something you may have never heard of but can be a powerful tool for keeping yourself safe online. Although called several different things depending on the browser, today we are going to stick with Incognito Mode. While the name may sound ominous, it really isn’t. In fact, it could save you a great deal of headaches down the road.
Also, sorry about the lateness of this.
As we discussed in a previous post, your Browser—Chrome, Firefox, Edge, Safari—can be thought of as a car driving down the road that is the Internet. Well as you are moving through the Internet you are seen by every site you visit and your Browser keeps records of everywhere you go, in case you want to quickly get back. Your Browser will even remember your passwords and log-in information if you let it. All of this is handy when you are talking about your own computer, most people would love to not be required to remember their password. But what about a friend’s computer? Or when you’re at the library? You probably don’t want those computers remembering you. That’s where Incognito Mode comes in
When you are using your Browser’s Incognito Mode the Browser behaves as if no one had ever used it. Sites you go to will ask for your passwords and will require any additional proof of identity you may normally bypass on your home machine. What’s great about this lack of remembrance on the Browser’s part is it also protects the normal user of that computer from you accessing their information. Even better news is that, when you are done with Incognito Mode and you close the Browser window it will forget everything you typed inside, so your accounts are not compromised.
Good question, humble readers. If you are using Chrome then you will find Incognito Mode by clicking on the three dots in the upper right-hand corner of the screen. When you do so it should be the third option down from the top.
You probably have it, it might just be called something different. Some alternative names for Incognito Mode are Edge’s InPrivate Window, Firefox’s Private Window, and Safari’s Private Browsing. No matter the name though, you can still use this valuable feature and keep yourself safe on the internet.
Now, it’s time to take the internet into your own hands and make the most out of this valuable tool. We did mention something important in here, Cookies, and with websites always mentioning that they are using Cookies we should probably have a discussion about them. That is for next time though.
Until then, have fun, find adventure, and stay safe.
By John Carter
Hi Net Neighbors! Welcome back to this, another Tech Tuesday. If you remember last week, we talked about Address Bars in our browsers, a key way to search for information and go directly to websites as needed. Now on that Tech Tuesday we discussed searching only in the broadest strokes. Why don’t we add some detail to those strokes, eh? So today we are going to look at how you search for things on the internet and for that we are going to look at Search Engines.
At its broadest definition, a Search Engine is a tool you can use to find information in a database. Ever look for a word in a dictionary? If so, at that moment you were the Search Engine, and the dictionary was the database you were accessing. Computer-based ones do the same thing, looking through a large set of information for keywords and phrases. Only the size of these dictionaries is so unfathomably huge I cannot properly put them into words.
There are more out there than you may thing. In fact, there are so many it can be very hard to keep track of them all. Here are a few you may have heard of: AOL, Yahoo, Bing, and Google. Google is THE premier name when it comes to searching for information on the internet, so much so that the act of searching is now called googling it. Now just because Google has placed themselves at center-stage does not mean it is the best, it is just the most well-known. The others mentioned have their pluses and minuses depending on you the user. For me, if I am searching for high-quality, high-resolution, images I will often go to Microsoft’s Bing because I find their selection slightly better. That being said, I often will just stick with Google since its overall database has been used more and is slightly more robust.
If you don’t want to have your information used for tracking and advertising you can use a Search Engine called DuckDuckGo.
Now this will sound a little scary, but most of the internet is, in some way, tracking you. This tracking is used to learn more about you. Knowing you have searched for a certain brand of shoes, or for a cool vacation allows the companies running the Search Engine to sell the fact that you searched for those things to companies who can advertise to you. Now this can be a good thing and it can be a bad one too depending on your point of view. Thankfully, more companies are realizing customers do not appreciate their advertising practices and are changing their tactics and allowing you to opt out of their targeted advertising. Not all are, however, hence DuckDuckGo, which does not track you at all. Ads with them are based off what you searched for, as if you were at a store and staff suggested a purchase based on what you just grabbed.
Hopefully you will never encounter this, but sometimes your Search Engine will change without warning. There are a few reasons why this could happen so let’s take a look at them.
If you live with someone else, they might have changed the Search Engine on your computer. As with anything else, the choice of Search Engines can become almost cult-like. People have been known to change someone else’s Search Engine just because it was not the one they preferred. If that happens to you, simply turn it back in your browser’s settings.
While this does not happen as much anymore, sometimes when you update Windows or your browser some of the settings will be returned to factory standard. One common item to be reset is your browser’s Search Engine. Microsoft-branded browsers, Internet Explorer and Edge, can switch from Google or Yahoo back to Bing. While Google-made Chrome is likely to change back to Google. This is annoying to be sure but, as with the above, just change it in your browser’s settings.
This option is, unfortunately, as ominous as it sounds. If someone in your home hasn’t changed your Search Engine and your update hasn’t either, then a virus or malware has taken control of your browser and has switched it. When this happens, you will need to run an anti-virus and an anti-malware scan on your computer. You may have to do it multiple times depending on the infection. You will also have to remove any virus-installed products from the machine through your computer’s Uninstall Programs area and remove the rogue Search Engines from your browser.
Well there is Incognito Mode but that doesn’t have anything to do with Search Engines and we will talk more about it at a later date. So, for right now, not really. We’ve talked about Search Engines and their uses. Now it’s up to you to use them and learn more. More about Search Engines and more about the world around you.
Until then, have fun, find adventure, and stay safe.