15.8 C
New York
Thursday, February 26, 2026
Home Blog Page 18

Tip: Connecting Bluetooth Keyboard To iPad

0

The on-screen keyboard on the iPad works well, but if you need to do a lot of typing a regular keyboard may make life easier. Keep in mind that any Bluetooth keyboard will work with an iPad, you don’t have to use the one from Apple (which is a bit overpriced, wait did I just say that out loud). You can find Bluetooth keyboards at Amazon, Best Buy, and many other places usually starting around $20. The following steps will explain how to pair (that’s what connecting Bluetooth is called) your keyboard with an iPad. Connecting Bluetooth Keyboard 

Connecting Your Keyboard

  • Go to Settings –> Click on Bluetooth

  • Tap on Bluetooth, if it’s Off, tap on it to turn it On.
  • At this point, put your Bluetooth keyboard in pairing mode. This is usually a dedicated button or holding the power button on the keyboard down for 5 seconds

  • Once you do this, your keyboard will show up under Devices and say Not Paired.

  • Tap on it, You will be prompted with a message to type a series of numbers on the Bluetooth keyboard and then press Enter on the keyboard.

  • The keyboard should be up under Devices and say Connected.

To Unpair

Go to Settings Bluetooth, Tap on the arrow on your keyboard in the list. Tap on Forget this Device

To All Our Visitors – Merry Christmas

0

To All Our Visitors – Merry Christmas

With all the issues and changes we have had in 2016, we would really like to thank all those who have visited Tech Geek and More, and would like to wish everyone a Merry Christmas, Happy Hanukkah, Happy Festivus, or Happy whatever you enjoy during this time of the year. May 2017 bring you all those things you are wishing for.

Sincerely,
Tech Geek and More

Facebook Is Introducing Group Video Chat in Messenger

0

Seems Facebook is releasing an update to the Messenger App to allow for Group Video Chats in Facebook Messenger.  According to a post in the Facebook Newsroom, the Group Video Chat will be “super easy to use”, and will allow up to 6 people

Latest Facebook Hoax

Not sure if you heard the latest Warning about Facebook. Facebook is coming after you (warning sarcasm alert ahead). If you didn’t know what Facebook has planned, read this……Latest Facebook Hoax 

That’s right, you can expect a run on Aluminum Foil the next time you go shopping. Get ready to pay extremely high prices for foil, since the foil industry will need to protect over 1 billion people.

OK, Hopefully, you are still reading so that you can read that the Warning is fake and (to the best of our knowledge) Facebook has no brain-scanning utilities. Also, you can rest assured that there should NOT be a run-on foil at the supermarket.  Unfortunately, there seems to be this idea that if the post online seems slightly legit then it must be and every few weeks a regular Facebook hoax made another round appearing on posts all over Facebook.  Maybe you’ve seen it………

That’s right, the hoax that says a News station report talked about some Facebook privacy policy change.  That if you do not repost the following information Facebook will be able to take your photos and your status updates. For starters, let’s make this very clear

– THIS IS A HOAX!!! –

Now that we have that cleared up, let’s break down the hoax.

Better Safe than sorry is right.  The first sentence in the hoax will always get you thinking.  Oh no if I don’t do this I could be the only one to not do this.  It plays on the reader’s emotions.

– Channel 13 News was just talking about this change in Facebook’s privacy policy.  Now let’s add something to make it sound legitimate and how much more legit can you get than a news report?  However, wait a minute, which channel 13, from what city, and where is the link to the story? Remember you can post links to stories in posts, and this post doesn’t have a link so we can’t actually see the store that it claims.

-The violation of privacy can be punished by law (UCC 1-308- 1 1 308- 103 and the Rome Statute).  And some specific legal speak to enforce in people’s minds that this could be legit.  However, here is what the laws mentioned actually do.

UCC 1-308- 1 1 308- 103 – Performance or Acceptance Under Reservation of Rights.

(a) A party that with explicit reservation of rights performs or promises performance or assents to performance in a manner demanded or offered by the other party does not thereby prejudice the rights reserved. Such words as “without prejudice,” “under protest,” or the like are sufficient.  (b) Subsection (a) does not apply to an accord and satisfaction.

Rome Statute – The Rome Statute established four core international crimes: genocide, crimes against humanity, war crimes, and the crime of aggression. Those crimes “shall not be subject to any statute of limitations”. Under the Rome Statute, the ICC can only investigate and prosecute the four core international crimes in situations where states are “unable” or “unwilling” to do so themselves.

Ok I admit that I have no clue what the UCC   code does or what its supposed to do, but that doesn’t sound like some kind of rule that I (a normal human, non-commercial business) could use against a business.  And as for the Rome Statute, as much as Facebook at times could be considered as “crimes against humanity”, I’m pretty sure this rule doesn’t actually fit either.

And now lastly (and thank you for reading this far)

– All members must post a note like this. If you prefer, you can copy and paste this version. If you do not publish a statement at least once it will be tactically allowing the use of your photos, as well as the information contained in the profile status updates. DO NOT SHARE. You MUST copy and paste [sic].  Wait members, what did I join?  So my Sam’s club membership is worth something or is it my library membership???  Also note, I’m not supposed to “share this”, it only counts if I go through the trouble of cutting and pasting as a status message.

So now that you have read this far, what do you think?  Just remember one key thought the next time you come across one of these “post me now” kind of messages on any social media site. You should really do some research, to confirm its validity. Blindly posting messages like this only serve to propagate the “fake news cycle”. Pictures and words together DO NOT MAKE THEM TRUE!  There are many ways that you can find out if something is true, before sharing it.  Please help STOP CONTRIBUTING TO THE IGNORANCE  (Insert PSA Music here).  Lastly, if you still believe that Facebook could use your info as claimed in the post, please feel free to Google / Bing “Facebook privacy post hoax” and see how many reports from REAL News organizations you get.

Thanks.

Source(s)

– UCC Code Info – Legal Information Institute / Cornell University Law School

– Rome Statute Info – Wikipedia

– Facebook privacy post hoax info – Google / Bing

News: Yahoo Announces New Breach

0

Yahoo has just posted information concerning a newly found breach of its systems. This hack of Yahoo systems appears to be unrelated to a previously announced breach in September 2016. Yahoo Announces New Breach

security locks meme

According To Yahoo 

This time the Yahoo breach is reportedly affecting an astronomical 1 Billion (yes that is a B in that number) user accounts, as per Yahoo –

  • Based on further analysis of this data by forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts

Per the posting by Yahoo

What happened?

Law enforcement provided Yahoo in November 2016 with data files that a third party claimed was Yahoo user data. We analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts. Yahoo has not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016. We are notifying potentially affected users and have taken steps to secure their accounts, including requiring users to change their passwords. Yahoo has also invalidated unencrypted security questions and answers so that they cannot be used to access an account.

Separately, our outside forensic experts have been investigating the creation of forged cookies that could allow an intruder to access users’ accounts without a password. Based on the ongoing investigation, the outside forensic experts have identified user accounts for which they believe forged cookies were taken or used in 2015 or 2016. The company is notifying the affected account holders, and has invalidated the forged cookies. We have connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft we disclosed on September 22, 2016.

Yahoo Announces New Breach

Yahoo reports that they are notifying affected users, and will be posting additional information on the Yahoo website, in addition to securing user accounts by requiring users to change their passwords, and invalidating security questions and answers if they were unencrypted.

What Should You Do Now If You Use Yahoo

Yahoo is advising all its users to do the following

  • Change your password and any security questions/answers you have set up for password recovery on any Yahoo accounts, (AND ALSO!!!!) on any other site that you use the same username/password or security question. So if you have the same info on Google, Social Media (Facebook, Instagram, etc.), Your Bank, or anyone else as you do for Yahoo, you need to go to all those sites and make changes to your information as well.
  • Keep an eye on all your account activity for suspicious activity. That could include emails in the sent box you didn’t write, as an example.
  • Be careful if you receive any unsolicited communications that ask for your personal information or any communications that ask you to go to links they send to update your info.  Just because the email says it’s from Yahoo with a link in it, DOES NOT MEAN ITS legitimate!
  • Avoid clicking on any links or downloading attachments from emails if you are not sure who sent them.  Even if it appears that someone you know sent you an email with a link or attachment if you were NOT expecting it, check with the sender.  Make sure they were not hacked.

If you would like to read the complete security notice post from Yahoo with additional information you can find it here – https://help.yahoo.com/kb/SLN27925.html

Source

News: Quest Diagnostics Breach

0

According to a News Release by Quest Diagnostics, it appears they have suffered a data breach. The news release states that on November 26, 2016, via a third-party app approximately 34,000 individuals had their Name, Date of Birth, lab results, and (in some cases) phone numbers compromised. Quest Diagnostics Breach

Quest Diagnostics Breach

News Released by Quest Diagnostics

Quest Diagnostics Incorporated (NYSE: DGX) announced today that it is investigating an unauthorized third-party intrusion into an internet application on its network.  The company provided notice to individuals whose accounts have been affected.

On November 26, 2016 an unauthorized third party accessed the MyQuest by Care360® internet application and obtained Protected Health Information (PHI) of approximately 34,000 individuals.

The accessed data included name, date of birth, lab results, and in some instances, telephone numbers. The information did not include Social Security numbers, credit card information, insurance or other financial information.  There is no indication that individuals’ information has been misused in any way.

When Quest Diagnostics discovered the intrusion, it immediately addressed the vulnerability.  Quest is taking steps to prevent similar incidents from happening in the future, and is working with a leading cybersecurity firm to assist in investigating and further evaluating the company’s systems.  The investigation is ongoing and the unauthorized intrusion has been reported to law enforcement.

Quest Diagnostics has notified affected individuals via mail and established a dedicated toll-free number to call with questions regarding this incident.  The number is (888) 320-9970, and can be reached Monday through Friday between 9:00 a.m. and 7:00 p.m. Eastern Time.

security locks meme

Final Thought 

As with any hacks, you should keep an eye on your personal data, and be aware (especially since they got names and phone numbers) of possible attempts to contact those affected.

Source

 

Netflix Adds Downloading Feature

0

As posted a short time ago on the Netflix Media Center page, as of now Netflix subscribers can download movies and series from Netflix to watch offline.

Get Kinect Adapter For Xbox One S Free

0

I’ll start this post by saying the Free offer from Microsoft is only good if you have can say yes to all of the following

  • I own an Original Xbox One with a Kinect
  • I now own an Xbox One S

Alert: Credit Card Breach at Madison Square Garden Company

0

According to a notice released today by The Madison Square Garden Company, they have suffered a Credit Card Breach with the on-site credit card processing. Per MSG, if you visited the following locations

  • Madison Square Garden
  • Radio City Music Hall
  • The Beacon Theatre
  • The Chicago Theater

between November 9th, 2015, and October 24th, 2016, then you were affected and your credit card data may be compromised.

Per the notification, the breach compromised on-site point-of-sale systems, where the bad guys were able to get the data located on the magnetic stripe of the cards swiped. This included credit card numbers, cardholder names, expiration dates, and internal verification codes. Not all cards were affected, but MSG has yet to specifically identify the number of cards, type of cards, or any other identifying specific information on how many cards were breached.

Additionally, the breach DID NOT affect cards used at the box office, on the MSG website, or the Ticketmaster systems. Per MSG, the malicious changes that caused the breach have been addressed. The following is a report from the local NY NBC News broadcast about the breach

 

For those with questions, they can reach out to the Madison Square Garden Company @ 844-319-9619 or at themadisonsquaregardencompany.com/customerupdate

Source:

Password Protect App Store Purchases (Google, Apple, Windows)

There have been many stores recently about parents getting shocking bills for In-App purchases made by their kids. In one of the cases, Apple had to settle with parents over In-App purchases that they claimed were not authorized. Back when I was a kid, or when my own kid was growing up, if you wanted to get your kid out of your hair you put them in front of the TV, now the norm seems to be hand your kid your tablet or smart phone when you want them out of your hair, and this seems to go to even the youngest of kids.

image

This post is not intended to argue the “what age is to young” discussion, this post is intended to assist those people (parents, aunts, uncles, etc.) who choose to give a kids their tablet or smart phone. If you choose to hand someone else your device, you are responsible for anything they do.  One of the first things you should do is add a password requirement to any app store purchases, that way someone else can’t purchase anything on your device (remember that you can purchase apps, music, movies, and books from the each App Store)

Here are the steps to add or make sure a password is required before any purchase for the 3 major app stores (Google Play, Apple iTunes, Windows Phone App)

Office Depot Deceiving Customers (via KIRO 7 Seattle)

0

In an interview with local Seattle TV station KIRO 7, an Office Depot employee has spoken out about unnecessary computer fixes that customers who brought computers into Office Depot were tricked into paying. Office Depot Deceiving Customers

Office Depot Deception 

According to the employee interviewed by KIRO, “If they actually did what they said and cared about customers they wouldn’t have started this program.” The employee being interviewed also goes on to say, “Customers are unaware they are being taken advantage of”, and that the offering at the heart of the problem, the PC Health Check, “doesn’t compute”.
To test the claims being reported by the Office Depot employee, KIRO took 6 pc’s to Office Depot locations in the states of Washington and Oregon. In 4 out of the 6 cases, the person who brought in the pc was told that the machines had “signs of malware”. The funny thing is that these 6 PC’s were straight out of the box, and the station had an independent company also check the PC’s and none of the units showed any issues (especially not malware).
When Office Depot was questioned about the situation it issues the following statement to KIRO

“Office Depot in no way condones any of the conduct that is alleged in this report. We intend to fully review the assertions and take appropriate action.”

Below is the full video of the story from KIRO

Final Thought

Just remember, because you took your pc (or any other device) to someone to get looked at, DOES NOT mean you must have any “repairs” done by that same location. It’s always good to get 2nd opinions prior to putting down your hard-earned money.

Source:

How To Use The Function Keys (Windows)

 

function-keys

One of the functions of a computer is to help us work more productively, so we can get work finished more quickly and get on to other things. Using keystroke shortcuts can save us time rather than clicking around menus with our mouse. If you haven’t tried these, here’s a few that I’ve memorized and which use the function keys along the top of the keyboard. The list isn’t comprehensive, just the ones I’ve found useful to try to memorize.

Microsoft Word

Shift-F3: Probably the keystroke combination I find most useful of them all when editing documents. With your cursor on a word or highlighted words, this combination will cycle through initial capital, all capitals or all lower case. No need to delete anything and retype as upper/lower case.

Shift-F5: Starting a new session on a document the next day? Well, this combination will take you straight to where you left off yesterday.

F2: Moves text once; just highlight the text you want to move, press F2, move the cursor to the new location for text and press Enter. Slightly quicker than cut and paste (Ctrl-X and Ctrl-V) but works just once.

Ctrl-F3: Cut to the Spike.

Ctrl-Shift-F3: Paste Spike contents into document.

Mozilla Thunderbird

Shift-F5: Download email messages for all accounts.

F8: Show/hide message pane.

Evernote

F9: Sync notes to Evernote Web.

F10: Show/hide left panel.

F11: Show/hide note list.

Ctrl-F11: Show/hide note panel.

Google Chrome

Ctrl-F4: Close current tab.

F5: Refreshes webpage.

F6: Selects your current page’s URL (and puts the cursor in the address bar).

F11: Toggle full screen/windowed mode.

Most Applications

F1: Help.

Alt-F4: Close the application.

Shutdown

Alt-F4: This one’s pretty useful if you want to bypass installing Windows updates before your PC shuts down. You can tell if there are updates to install as the Shutdown button has a yellow exclamation mark. Just press Alt-F4 instead and from the Shut Down menu you can choose Shut down rather than Install updates and shut down.

Well, those are the function key shortcuts I find most useful for the applications I use most. Do you have any great function key shortcuts for another application? Drop a comment below.