Monday, December 26, 2016

Software and Tools - Social

A large part of people being online is the various 'social' applications.  For myself the major ones I use is Twitter and Facebook.  There are others, but, the basics I will cover here should be applicable to the other sites/applications.  I use Twitter mainly to quickly comment and notify about various events and information that I find of use.  I have the account linked to my Facebook so that my friends and family can get the information at the same time.  I like Twitter as it is small enough for my low end smart phone to run without a problem.  Facebook to be blunt, is a pig on resources and when I did have it running on my phone it would take 5-10 seconds at times to do a simple action like posting an update.  Facebook runs well on my tablet and my laptop and that is the main way I socialize electronically with friends and family.  I use both to supplement my contacting friends and family and it does not replace face-2-face.  I like them both as I can quickly set up photo albums of events and quickly share them for those who could not make it to the event.

One of the first things you should do when joining is to read the terms and service.  I know they are extremely long, boring and full of legalese, but, you should be aware of the basics just-in-case there is a problem in the future.


Next up is to check the settings, especially the privacy settings to make sure you share only what you are comfortable with and turn off the rest.
Facebook Android Client Settings

Facebook Android Client Privacy Settings

Twitter Android Client Settings

Twitter Windows 10 Client Settings
Facebook Windows 10 Client Settings

As you can see above the applications have a similar look-and-feel and the web browser rendering looks very similar.  Take 15-30 minutes and navigate through the various settings and read up on what they do and then set your account to what you want people to know about you and the marketing firms gets to see.

Once you are set up then you can think about what to post.  What ever you post always assume that your employer can see all your postings so exercise some prudence on what you post!  You may have your account locked down so that only friends and family can see what you put up, but, if they re-post or share and they don't exercise good judgement on their privacy settings they can expose what you put up.  I have seen people put up photos of events that to put it kindly was less than a positive image they wanted to project socially and professionally.  When in doubt ask yourself - what would mom think if she sees it?


On the security side of things be careful on what links you click, especially in Facebook.  I have noticed a large increase in what is claimed to be news (or at least what people want to you think is news), but, is at best clickbait or trolling and at worst a link to sites that may contain scripts that can infect your machine.  Best thing I can say is to exercise caution with links to news.  If the articles come from friends and family still exercise caution, but, if it is a promoted article then be very suspicious.  Most of the clickbait sites are there to make money by showing you a lot of ads and the content at best is misleading.  For the fake news sites they tend to show to people articles written in a way to inflame them (or troll them).  Personally when I get unsolicited 'ads' I click the drop down and pick the option telling Twitter/Facebook that they are not interesting.  Before I re-post a tweet or a Facebook news story I check out the article and review it.  If it is clickbait, inflammatory or misleading I just ignore it and not give them additional views by re-posting.

When I am done with my session in Twitter and/or Facebook I log out of the account.  It is a bit of a pain, but, if for some reason some gets access to my phone, tablet of PC they don't get easy access to my accounts.  When I leave the machine I also lock it!  It takes only a few seconds to unlock the machine and then log back in, but, if someone gets access to that device they can destroy my account and credibility in a few seconds.

Another thing I strongly recommend is a good anti-virus package.  It may not stop 100% of the nasty virus/Trojans out there, but, it is another layer of defense to make it harder to get access to your device.  You can read my short blog on this topic to give you an idea of what is out there.

Adding friends/family/businesses

One of the other things I am very careful of is adding people to Twitter or Facebook when I get a request.  It does not matter who it is doing the request!  All friends/family get vetted as to who they are before I add them.  I have received requests from people claiming to be a friend or family, but, when I check with the person directly I find out they didn't make the request.  When that happens I have the friend or family member report it to Twitter or Facebook and I do the same.  On Twitter I regularly get requests to add people and I  review them very carefully before I add them.  For a while the requests were from very questionable accounts and the content and images were not the type I wanted associated with my account.  In the past several months I think Twitter has gotten better nuking the accounts quickly as it is a very rare event when I get such a questionable request.  Every couple of weeks I review who I have linked to and those who link to me and verify that the accounts are still legit and the content is what I want associated with me.  I have found that some Twitter accounts looks legit for a month or two and then the true nature shows itself.


On uploading images I try to be careful of what is uploaded, especially when someone tells me they don't want a particular photo posted.  I also resize the image to around 1024x768 or 2048x1536.  Not everyone has high speed internet and at those resolutions the image is still good enough and is small enough for them to download quickly.  I keep the originals on my machine so if they want the original image I can send them that when requested.


Twitter does have the ability to backup your posts.  The link on how to do that is here.  Facebook has a similar facility and the link on how to do that is here.  I strongly recommend that you do this now and then.  If for any reason you lose access to your account you have a backup.  When you backup your accounts you may also want to think about how to backup your phone/tablet/PC at the same time.  Machines do fail and I remember a person calling me to see if I restore their hard drive.  They had thousands of images and a lot of the pictures of their children when they were small was on the failed drive and they had NO backups.  I couldn't restore a lot of images, but, I could restore several thousand images.  They now have an external USB drive they backup their files to on a semi-regular basis now.  External USB hard drives are fairly inexpensive and capacities are in the multi-terabyte range now. 

Saturday, December 03, 2016

Software and Tools - Office suite

This is the fifth blog on software.  This time I am focusing on 'office' suite software that I am using on my Linux machine.  The Office suite you use is a personal preference, or, it is imposed on you by the company you work for.  My personal preference is the Libre Office suite.  It is free, works very well in Linux for what I need it for and so far it handles all of my files from the office when I have to make changes and I don't have access to my work laptop.  My company supplied laptop has the Microsoft Office Suite as that is the corporate standard.

Android devices

The Android phone uses only the Google docs tools installed by default due to it being a low end phone, but, that is fine for me and what I need it for.  The Android tablet also uses the Google docs tools as I don't need or use a lot of high end functions.  The times I use the Google docs tools is when I need to make a quick edit to a document or spreadsheet I have on Google Drive.


This is where I do most of my serious work when doing documents.  I am not going to go into how each package works, just a quick intro to the two main tools I use and what it looks like.  So far I have not had any problems using documents from work in the suite.  It does look a bit different when rendering the documents, but, the basics are there and I can quickly do what I have to do and get it back to work.

Libre Office came pre-installed for me so that was a bonus.  If it isn't, you can use your package manager to install the software.  The main functions are Writer, Calc, Base, Draw, Impress and Math.  I normally use Writer and Calc and I have only used Impress once. 
Office suite menu

If you launch Libre Office the package will present you a number of options and the last set of files you were working on.  From there you can pick the file you were working on, open a file or create a new file.  Clean and simple screen that allows you to quickly do what you want to do.
Libre Office, what do you want to do
An alternative is when you are working in a document is to click on the file button at the top and then select new.  It will show you a list of items you can create.  The program presents you a short and simple list of things you can do.
What type of document to create
The look and feel of the suite is very similar and is similar to the Office suite in a way.  If you are not sure what to do you can hover the mouse over the icons at the top and a quick description is shown.  I have not modified what this looks like as right now the default works very well for me.
Writer blank document screen

Other office tools

At this time I don't use much else.  The only other two tools is a character select KCharSelect that came as part of KDE and a PDF viewer Okular.  I use Okular when I export out a spreadsheet from Calc for viewing on the phone.  I do this so that I can quickly see my DVD library on the phone to see if I have already bought that video and not having to open up the spreadsheet and accidentally make a change.


Monday, November 28, 2016

Software and Tools - Email

This is the fourth blog on various tools that I use.  Email is a personal preference for what works for you.  Most people I suspect are using Outlook as that is preferred corporate email client and it comes as part of Windows.  My personal preference is actually multiple clients.  My main one is Thunderbird.  It works well in Windows and Linux.  For my Android devices I have two.  GMAIL for Google email (backup client for my Android tablet) and mailbox provided by my ISP.  The last client I use is INBOX from Google.  INBOX is only for my main GMAIL account.  I like this client it as it stays out of my way and allows me to quickly organize and process my mail.

Thunderbird, like Outlook, allows you to create mail rules to categorize (or delete) your email based on rules.  Where I work they use Outlook and I have dozens of rules based on the sender.  The screen prints further in this blog shows the screen, but, at this time my Linux client doesn't have rules as the Windows machine is my main work machine for email (mail from the boss is highest priority and flagged to action immediately, projects go into their own folder).  It doesn't matter what client you use, rules allows you to order your work and focus on what is important.  

In Thunderbird I added an extension to link to my Google Calendar.  I find that handy as I can quickly add/change/delete events when something hits my inbox.  Outlook has that built in and it is a handy option no matter what client you use.

The one thing I never do is open attachments in emails when I don't know the sender.  Even when I know the sender I don't open it up (even in Linux) until I ask if they have sent that file.  My personal preference is to create a folder in my Google Drive, give them access and ask them to upload the file there.  I also have auto-load images in Thunderbird turned off.  Most of the times I don't need to see 'pretty' images and focus just on the text of the message.

The one last client I use is the Google web-mail client.  I like this tool as I can be anywhere and as long as I have access to the internet and a browser I can pick up my mail.

For me I have multiple personal email accounts.
  • My main Google account (linked to this blog);
  • A throwaway account I use for when I am not sure the site will not spam my main Google account.  When it gets too bad I just dump it and create a new throwaway account;
  • A Yahoo account.  This is from many years ago when I didn't have Google mail.  I keep it as it is handy like my throwaway Google account;
  • A Google account for my online gaming.  Some of the sites asks you to register your email account and excluding one game (Runescape) they all use this account;
  • My ISP provides email accounts and I have one set up.  This is for notifications from the ISP and my family usually sends email to this one;

 A few suggestions for your email:

  • If you are using the email from your ISP see if they have spam filters.  If they do, turn them on and use them.  It may not be perfect, but, I find that the one I use is over 99% accurate.  The few times it isn't I flag the email as legitimate and the next time it shows up in my inbox without a problem;
  • If you have an anti-virus and it can integrate with your email client turn it on!  It is another level of defense and I don't see the impact to my client in Windows; 
  • Make use of mail filters.  I use them to categorize my mail and it allows me to focus on what I deem to be important;
  • Guard your email account.  Have a main one for friends and family and only a few others.  For everything else create a throwaway.  If the mail is important you can either forward it to your main email, or, have it as an additional account in your mail client (like Thunderbird does);
Other tools:
  • For those who want to digitally sign your email or encrypt Thunderbird has a support page for this.  At this time I haven't added one; 

Screen Shots of my mail clients

Google Inbox for Android:

My main folder, I like it clean

Google Email for Android:

Main, again clean inbox





Mail filers

Rules for mail filters

Thursday, November 24, 2016

Software and Tools - Antivirus

The next thing on the list of things to do is a good antivirus package after you install your favourite browser and before you start serious web surfing.  Again, this is a personal preference and it all depends on what you want, need and are willing to pay for.  There are those who say it is all snake oil and useless.  They are welcome to their opinion and in my not so humble opinion it is needed.  It is another level of defense for you that will stop the known nasty software out there.  Why make it easy for hackers to take over your system and use your bandwidth to take down sites, steal your identity?  Will it be 100% effective, maybe not, but if they want to get into my system they will need to work on it and not have an open door.

There are a number of sites that do reviews and I have a list five sites I know.  There are a lot more, but, I don't know them, their methodology and if they got paid to do the reviews. 

For myself I was looking for an package that works in
  • Windows (I still have a machine left running Windows 10)
  • Android for our tablets via the Google Play store.
  • Android phone.  This is a low end model with limited resources.
  • Linux.
I found one common package that works very well in Windows and Android, but, right now my distro does not offer the Linux version of that product.  It does not slow down my machines, especially the low end phone and did catch crap that tried to get installed when someone sent me an email.  Avast works well enough, has a free version that does most of what I want and need.  The version does show ads, but, they are small and unobtrusive for me and don't slow my systems down.  For Linux I am looking at ClamAV as that is available in the distro of Linux I am using.  UBUNTU community has a good small page of various packages you can check out.

The Android screens looks like the following:

The Windows screens looks like the following:

Please remember, just because you are running an antivirus program you can surf wherever you want, click on anything, install anything and open questionable emails.  Nothing is 100% and safe surfing and email practices are required.  Antivirus software just gives you another level of defense.  You also should be keeping your software up to date and making regular backups (a future blog).

Saturday, November 19, 2016

Software and Tools - Browsers

This is the second in a group of blogs on software, tools and repositories.  One of the main tools I use and I suspect the majority of people is a web browser.  There are a number of great browsers out there and the one you use and like depends on your personal preferences (and biases).  For me since I run a Windows laptop (gaming), Android (tablets and phones) and Linux (laptops and netbook) I prefer Firefox and Chrome.  They run equally well on a cell phone right up to the laptop I am composing this blog on.  The Windows laptop (Windows 10) has Edge on, but I don't run it.  I may be biased, but, I don't trust the security on it and how much it is reporting back to MS about my searches and browsing habits.  I know Chrome and Firefox does do some reporting, but, so far they haven't abused my trust there.

This won't be all inclusive, but, a quick tour of my basic setup and hopefully will give you an idea of what they look like and a couple of things I added to assist me and secure my browsing.

If you use Windows click on Firefox if you want to go to the Mozilla site,  click on Chrome if you want to go to the Chrome site.  If you are using Android it is in the Play store and for just about every distribution of Linux it is part of the repositories that you can install (for me that is Synaptic).

For the rest of this blog the screen shots are from my Linux machine, but, Android and Windows have a similar layout and look-and-feel.  For all of the screenshots I used KSnapshotGwenview is used for quick-and-dirty edits (like rotate, resize and rename).  Google Drive is used to store all of my blog images and the GRIVE tool syncs that up for me (with my writing a BASH script front-end, my previous BLOG on that).


Once you install Firefox and launch it you will get a screen something like below.

It is a rather plain and simple screen.  This is my personal preference as I don't like or want a lot of clutter.  I have turned off the menu bar, bookmark toolbar and the status bar.

I did add a few extensions (from the Mozilla site) for the status bar and for shutting down those annoying ads.

My Plugins are default to my Linux distro.  When there are bug fixes I use Synaptic to update when they are available.  I still have Flash installed, as much as I hate it for the security holes I still need it for accessing corporate materials when I log into the company site.

To see preferences click on the icon at the top right (looks like a hamburger) and click on the preferences icon (looks like a cog).  You will see a number of options that you can click on and are presented with a variety of settings.  On content I turned off the option to play DRM protected content and to block pop-up windows.  I also changed the font to Arial as I find that easier on my eyes.

For privacy I turned it up to as high as I can go.  I know sites can still snoop, but, I want them to know if they want my information they should ask me first.

For security I also have that set to maximum.

For good measure I use  uBlock Origin to shut down as much of the annoying ads and tracking when I do surf.  I turn it off for sites that respect me and don't flood me with annoying ads.  To see what the dashboard looks like you will need to keep on reading as it is in the Chrome section.

To summarize my settings:

  • Check to see if Firefox is my default browser;
  • Show blank page at start;
  • Search right now defaults to Google, I did disable Bing and Yahoo;
  • Disable play DRM;
  • Enable pop-up protection;
  • Privacy tracking on for private windows;
  • Never remember history;
  • Security, Warn & block all turned on!
  • Sync bookmarks, I have that turned on so it is easy to keep phone, tablet and laptops synced to the same set of bookmarks;
  • Downloads, ask me where to save; 
  • uBlock Origin, set up to hide as much crap as possible.  Good sites I open up;
  • Advanced I left at their defaults. 


My other browser is Chrome.  There are times that sites have problems with Firefox and I use that.  It is also set up to link to my personal Google calendar and to use Google Docs.  Part of the time I run it for Facebook to chat with family and post various updates and use Firefox for general web browsing and gaming (Runescape).   Like Firefox I have a minimal screen display, I really don't like clutter.

To go to your settings click the vertical ... on the top right side, then click on settings.

By default the advanced settings are not displayed, scroll down to the bottom and click on +Show advanced settings.  You can see your browsing history, Extensions and Settings.  For privacy you can click on content settings and it pops up a privacy setting screen.

For extensions it will show what you have installed.  At the bottom it has Get more extensions that takes you the Chrome Web Store.  I really suggest you use just that site as you know that Google has done some checks on the quality and security of the extensions.  I know nasty extensions can slip in, but, when found they get yanked PDQ.

Like in Firefox I use uBlock origin.  It is small, light and very configurable.  I used to use Ad-Block, but, when they went to white listing ad sites I dumped it.  I pick what ads are presented to me and I will retain full control of that.

To summarize my settings:

  • Show blank page on startup;
  • Google is the default search page;
  • No 'Guest' browsing;
  • Cookies, clears when I shut down Chrome and 3rd party is blocked;
  • Let me choose when to run plug-in;
  • Do not allow tracking;
  • All other content settings at default;
  • Downloads, ask me where to save;
  • Cloud print is on, I use this only for stuff that isn't sensitive;
  • uBlock Origin, set up to hide as much crap as possible.  Good sites I open up;


Hopefully this is of use and a good starting point for your using either Firefox or Chrome as your main browsers.

Wednesday, November 16, 2016

Software, tools and repositories

This will be a multi-part blog covering:
  • What software I use in Android, Windows and Linux;
    • Social Media
    • Email
    • Anti-virus
    • Cleanup
    • Backup
    • Web
    • Graphics
    • Office
  • Where I go for that software and where do I don't go;
It isn't all inclusive, but, it may give you an idea of where to go, what to do and what NOT to do.

I will start off with where I go for the software.  For Android, Windows and Linux I always go to official repositories or the play stores for the O/S (Android & Windows).  I avoid third party sites as I don't know where they get the software from and just how legit and safe it is.  I know there are good sites, but, I am paranoid on what I install.


Pick your category or do a search

I NEVER use unknown sources.

Windows 10

For O/S I use Update
Check for updates and then install
Windows store, I have a lot of updates
For new stuff you can scroll through it, or search


Synaptic is how I update Linux

Nothing fancy, no special tools.  I use what is built in to each system.  The one thing I do for all is regular updates.  Windows 10 I don't have a lot of options for the O/S, that is forced on me.  For Android and Linux I pick what to update and when.  For all three I manually review the apps I have installed to see if I really want to install them.  For too many of them they just say 'Speed and stability improvements' and that really pisses me off as I have been a developer for over 34 years and EVERY release I did had a high level description on what was changed and why.  You don't need to get fancy, but, in a few hundred words you can put in enough info to say why we should upgrade.

For Android and Windows I keep my A-V running and up-to-date.  If any package tells me to turn it off as it interferes with the install or update I dump the package ASAP.  If you can't install with the A-V running that sets off red flags for me.  For Android I also review the permissions.  Too many packages asks for rights that they don't need.  I have had games that ask to see my contact list, phone and a few other things I don't think they have the right too and I end up not installing.

For all software I don't mind if it is ad-supported, I understand you need to make money, but, please don't show the full screen ads or show ads every few minutes forcing me to watch before I can continue.  Each app that does that gets nuked from orbit as there are other apps that I can use and don't spam me.  As an example, last week I removed an Android app.  It was opening a lot (over 12) Firefox tabs and going to a group of sites with a common high level URL.  I don't know if it was mal-adware, or, they got greedy and tried to max out advertising revenue, but, it got nuked from orbit and I will install a similar app (local weather FYI).  Before that happened they had a nice ad running along the bottom and was well behaved.  Upside is AVAST didn't find a virus so I think I dodged a bullet there.

For Windows not all apps are in the windows store.  For those I go direct to the software developers and download from there.  I don't go to many aggregators as I had a bad experience with one (CNET I am looking at you for that) and it messed up my Windows 7 systems so badly with spyware I had to rebuild TWO laptops from their original install CDs.  I am fairly proficient when it comes to operating systems, tools and such, but, it was telling me I didn't have the admin rights to remove it and when I did get tools to remove it there were so many hooks elsewhere that it re-installed itself.  If you go to a third party for software, be careful, be VERY careful as even an experienced user got burned badly.  This is why I tell everyone not to use third party software sites.

Sunday, November 13, 2016

Possible ad-malware attempt

For the last several days my Android tablet was opening windows at random.  At first I thought it was me, but, yesterday the following happened and the tablet was sitting on the table untouched:

  • Multiple search windows open;
  • Over 12 tabs opened in the browser going to a number of sites with the same prefix.  I won't name it as I don't want them to get the ad revenue;
  • My BANKING app was opened up.  I don't have auto-sign-in there so no damage done.  I checked the bank account from my Linux machine and no activity to my account (yay!);
  • Multiple apps opened up.  Again these had ads so I suspect they were trying to maximize their ad revenues.  Either that or they wanted someone to pay a lot of ad money for spam clicks;
I know what the last app I installed so I suspected that app as they are ad supported.  After I removed the app and let the machine sit for 24 hours I had no more random windows opened so I may have guessed correctly.

I also run AVAST on the machine and I scanned everything and it was clean.  I know if it is very new the scanner may not detect it, but, I wanted to make as sure as possible I wasn't infected with a known virus.

I also sent Google a feedback that the app may have ad-malware and see if there is anything that they could see and do.  May not be much, but, at least I wanted to make them aware of the issue.

My guess for next gen malware encryption

I am going to make a bet that the next generation of file encryption malware is going to be a lost nastier.  Your best defence is:

  • Backups.  Keep multiple backups and not connected to any network after your backups are done.  Don't just do backups, test them!  Too many times someone approaches me saying they need help as they tried to restore files from backups and they don't work;
  • Up-to-date software.  When patches comes out for your operating system and applications install them ASAP.  Most of the time those patches are due to holes and the hackers are already using them.  It does not matter what O/S you use, Windows, Linux, OS/X all need to be up-to-date;
  • Home routers.  Keep them up-to-date also.  Sometimes your ISP will patch their routers, ASK them to keep their hardware up-to-date;
  • Good anti-virus software and keep them up-to-date;
  • Do and not opening up attachments from emails that you didn't ask for is also a good step;
  • Good web surfing habits.  Sometimes a site will pop-up 'You need to update or install this program to view'.  Don't trust any site doing this.  Most of the time it is for Flash and people think 'Oh, I am out-of-date again' and click install.  NEVER DO THAT, go directly to the source of the program and check.  If it is out-of-date install from the maker directly and not from a web site.
Unfortunately the writers of these nasty programs won't stop there.  They have been using ad-malware and then getting into legit sites serving ads and try to infect you when you view their "ads" and try to bypass asking your permission to install.

Right now when your system is infected and your files are encrypted some people recommended to turn back the system clock so time does not expire. Right now that works, but, I suspect not for very long.  The writers of these programs know that "trick" and I suspect they are working on how to counter that.  I see them saving the system clock information and the network time information at time of infection.  With that they know exactly when they installed on your system.  They also can determine the basic time differential between your system and the network.  If they then compare that information the next time it runs the program may just nuke your files if the date on system clock is less than their time-stamp.  Also, if they are really nasty they will also nuke the files if they cannot make a connection to the network to verify the time.  When they can make a connection they will use the time differential to see if you played with the system clock.  I would also be willing to bet that they will advertise what they did and why so that fact will spread around that playing with your system clock or unplugging from the network will nuke your files.  I don't know if (or when) that will happen, but, it will make your backups much more important as the only way to restore your system is to do a total wipe and restore.

Sunday, November 06, 2016

Looks like the U.S. GOP don't vet their email lists

The last few days I have been receiving emails from the Republican party (except for one who was Libertarian) looking for money.  I suspect they bought the list from somewhere and didn't check to see if the recipients is an American citizen (or a person who has a green card).  Google flagged all of them as spam so the time, effort and money was wasted.  Upside for me is that they all have unsubscribe which I used, hopefully they will take the request and remove my address.  It really doesn't matter as they are all flagged as spam by Google.

I checked the FEC (Federal Election Commission) site to confirm what I suspected.  Only U.S citizens can financially contribute (or those with a green card).  For the various emails (except the last one) they all resolved to one common URL.

I can understand getting the rare mail from a Libertarian candidate (or small 3rd parties).  Limited resources (money and people) means buying a list and do a blind mailing and hope for the best.  The Republican party being a major political party should not be doing this.  I thought it would be a well financed, well managed and well resourced operation that would run a tight scripted operation and vet all mailings going out and not buying a list and doing blind mailings.

So far nothing from the Democratic party for email.  Also, NONE of the Canadian political parties have done bulk emails to me.  That may be due to our anti-spam laws would apply to them.