Archive for December, 2012

Techie Tip of the Week: Facebook’s New Privacy Policy

Friday, December 28th, 2012

Recently, Facebook updated its privacy policy (again). As reported in the blog bostinno.com, here are the top 3 new policy changes you should be aware of:

By default:

  1. Facebook now shares your data with advertisers and affiliates. These include all your Likes, comments, and data provided when registering for a Facebook account. Facebook notes in its Data Use Policy that this info may include sensitive subjects like “religion, health status, or political views.”
  2. Anyone on Facebook can now send you a message and anyone on a message thread can reply to it.
  3. Almost everything you post is visible. Anyone, not just friends, can tag you and link to your Facebook content. Even Randi Zuckerberg, Facebook CEO Mark Zuckerberg’s sister, who had a photo she thought was private broadcast to the world.

For more information, or to comment on the new privacy settings, visit Facebook’s Site Governance at https://www.facebook.com/fbsitegovernance.

To view or update your personal Facebook privacy settings, go to https://www.facebook.com/settings/?tab=privacy.

 

 

Techie Tip of the Week: Forwarding Calls (Cisco VoIP Phones)

Friday, December 21st, 2012

As the University prepares to shut down for the holidays, this week’s tip will show you how to forward calls you might receive to another phone (e.g., your cell phone).

To Forward All Calls:

  1. Press the CfwdALL or Forward All Softkey.
  2. Enter the full telephone number of the target phone: 9 + 1 + Area Code + seven digits.
  3. A flashing right arrow appears next to your telephone number on the LCD screen  to indicate that all incoming calls are being forwarded.

    The target number appears in the status line (near the bottom of the screen).

    Note: CfwdAll doesn’t remember the last number to which all calls were forwarded.

    To cancel, press the CfwdALL/Forward Off  Softkey.

Happy Holidays!

Techie Tip of the Week: Don’t Click that Link!

Friday, December 14th, 2012

Staying safe on the Internet is challenging. It is technologically easy for nefarious hackers to create emails, web pages, and other documents that look like they are from real, trustworthy entities (e.g., banks, e-commerce sites,  or universities).

Be wary of emails or web pages that ask for your username, password, social security number, home address, or other personal information.  Check to make sure these requests for information are from legitimate businesses or sources before responding.

Here are some tips for protecting yourself from phishing scams:

  1. Pay attention to the headers in the email (the to field, the from field, the subject field, etc.). Make sure the email is coming from legitimate locations.  Recently, a phishing scam attacked Stanford University – in the header,  here was the From: “Computing Services” <bskgoprh@stanford.edu>. If this were a legitimate email, it would have likely come from “security@stanford.edu” or “helpsu@stanford.edu” or from Matthew Ricks, head of Computing Services personally.
  2. Never click on a link from within an email.  Always open a web browser and manually type in (or copy and paste) the URL yourself.  It is easy for “phishers” to make links appear to go one place, but really go someplace else.  Just because a link says it’s going to PayPal or some other legitimate location  doesn’t necessarily mean it will actually take you there.For example, in the phishing attack that hit Stanford, the phishers used a link that contained part of the real URL (http://axess.stanford.edu), but also contained a number of extra letters and numbers at the end (.student.3hf.be). Pay attention to the URLs in an email and never simply click the link.
  3. Realize that it is easy to create legitimate-looking websites. Victims of the phishing scam that hit Stanford were sent to a website that looked exactly like the real site that people would have gone to if it were legit. Simply because the site LOOKS real doesn’t mean that it is.Pay attention to the URL in the address bar. Does it contain extra letters or substitutions (e.g., 1 for l) that shouldn’t be there?

    For example, these are fake:
    http://www.paypal.com.someplace.ru
    http://www.paypa1.com

    This is the real address:
    http://www.paypal.com

For more tips on protecting yourself from phishing, visit the Federal Trade Commission’s Anti-Phishing tips site:
http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm

Techie Tip of the Week: Mac Users – Change the Order of Icons in the Menu Bar

Friday, December 7th, 2012

Mac users – ever want to change the order of the icons of the applications in the menu bar? Want, for example, to move the date/time toolbar menu item to a different spot?

Here’s how!

  1. Log into your computer.
  2. Command-click and drag the icon from its current position to the desired position.

The icon will now be in the new spot!