15.8 C
New York
Thursday, February 26, 2026
Home Blog Page 20

Samsung Note 7 Recall (USA)

0

Seems the Samsung Note 7 is a HOT phone.  No, I mean like really hot, catching on fire hot. It seems of the 2.5 million Note 7 phones that have been sold there have been (something like) 35 reports of phones catching fire or smoking worldwide.  That doesn’t seem like a lot but if you are one of the people who had a burning or smoking phone, 1 is too many.  So the Samsung Note 7 is in recall worldwide, with Samsung looking into what is causing the issue.  The suspicion is that the phone battery while charging just gets too hot, and if you leave your phone connected after it’s fully charged, the battery just gets too hot and BOOM (no pun intended).

Samsung Note 7 Recall

What Can You Do With Your Existing Note 7

So you have a Note 7, and you obviously can’t go without a phone while you wait for it to be replaced.  This poses the question, what can you do??? Here are a couple of things you can do in the meantime

  • Turn off your phone if you want to fast charge or charge in general.
  • Do NOT leave your phone plugged in while you run your errands, go to bed, or do anything else where you aren’t paying attention to your phone.
  • Once your phone reaches 100% charge, remove it from the charger.  I know I’m guilty of leaving the phone on the charger after it was 100% charged.
  • Don’t use the phone or play games while it’s plugged in.
  • Place it in a cool (not hot) place during the charge. Just pay attention to where it is when you plug it in.  I’ve many people charge their devices on window ledges while the HOT sun is baking the unit.  The issue here is overheating, you don’t need to help the phone along by putting it in a hot place.
  • Take off those third-party cases.  In some cases just don’t let the phone “breath” as it was designed. So remove any covers, or cases while charging.
  • Use the original charger and cable.  Just because your significant other or your kid’s charger for their S6 or Nexus phone is right there doesn’t mean you should use it.  Each charger is designed for a specific device, so you should use what came with your device.

I know you are thinking, I just paid thru the nose for this thing, why do I have to now hop thru so many hoops? You are right in thinking that way, but until Samsung officially explains something more than they have so far and you can get your device replaced, it is better to be safe than sorry.

How Do You Get Your Note 7 Exchanged 

cell phone comp usa

All the major US carriers have for the time being stopped selling the Note 7 and Samsung with their recall is offering 2 options for those who already have a Note 7.  Per Samsung in a news release this week

The U.S. Product Exchange Program will offer consumers the following choices:

1. Exchange current Galaxy Note7 device with a new Galaxy Note7 (available next week)
2. Exchange current Galaxy Note7 for a Galaxy S7 or Galaxy S7 edge and replacement of any Note7 specific accessories with a refund of the price difference between devices.

As a gesture of appreciation, consumers will receive a $25 gift card or bill credit from select carrier retail outlets when choosing a Galaxy S7 family device or the Galaxy Note 7 within the exchange program.

The 4 major cell phone providers in the US have the following

Sprint is working closely with Samsung to ensure those customers who already have purchased the device are taken care of. For those customers that previously purchased the Samsung Note7 we will offer them a similar device until the issue is resolved.

Samsung announced a voluntary recall of the Galaxy Note7 in response to an issue with the device’s battery. Because customer safety is our top priority, Verizon has stopped selling the Galaxy Note7. Additionally, through September 30, 2016, we are waiving the restocking fee for any customers who purchased a Galaxy Note7 and wish to return or exchange it.

As our customer, your safety is our number one priority. Due to the recall we recommend that you take advantage of our exchange program. We’re making it easy for you to exchange your Galaxy Note7 for free.

Because safety is our top priority, customers are strongly encouraged to exchange the Galaxy Note7 for a new device. Customers with a Note7 may select a Galaxy S7, Galaxy S7 edge, Galaxy S7 active, a new Galaxy Note7, or any other smartphone, and may also return any Note7 accessories. If a customer chooses another Samsung device, he or she will receive a bill credit of $25 per device.

So at this point, the best thing you can do is either take extra precautions until Samsung can make and send out replacement units to all the carriers worldwide (which should take a few weeks) if you wish to keep your Note 7, or you can as all the carriers have listed choose another model to move to.  Reach out to your individual carrier to get specifics on the procedure they are using.

 

Source(s) 

Xbox One – Forza Motorsports 6 Free This Weekend

0

If you are an Xbox One owner that also has an Xbox Live Gold account, then you can play Forza Motorsports 6 Free this weekend.

Fortenza

As posted on the Forza Motorsports page

As we get ready for Forza Horizon 3 on September 27th, we’re excited to announce that all Xbox Live Gold members can enjoy Forza Motorsport 6 for free this entire upcoming weekend. Beginning at 12:01 a.m. PDT, Thursday, August 25th, through 11:59 p.m. PDT, Sunday, August 28th, Gold members in Xbox One markets can try the latest entry in the best-selling racing franchise on any platform this generation, Forza Motorsport 6, in entirety and for free.

You can get the deal for Forza Motorsports 6 by visiting the Xbox Store and searching for Forza Motorsport 6. Download the title and put your racing skill to the test.

Source

Disney Movies Anywhere Is Offering MONSTERS,INC FREE

Almost anyone with small children, or how thinks they themselves as a child, is familiar with Mike Wazowski, Sullivan (Truck if you didn’t know his last name), Boo, and all the characters from the Disney Pixar Movie, MONSTERS, INC. If you are a Disney fan, and would like to get a digital copy of MONSTERS, INC. for free, now is your chance. Disney Movies Anywhere is offering MONSTERS, INC. Free.

Disney Movie Anywhere Logo

To get the offer, it’s actually pretty simple. You need to have an account with one of the following services, iTunes, Amazon Video, VUDU, Google Play, Microsoft Movies & TV, or with the Verizon Fios ISP and register with Disney Movies Anywhere. The following steps will take you through the process  (will use Google Play for the example, but all the services essentially will have the same steps)

image

To Get the Free Digital Movie Offer

image

  • Once you are logged in to the Disney service you should be automatically redirected to the Settings section (if you are not automatically redirected, click on the little spoke on the top right of the page and select Account). From this page select the service you wish to link to your account.

image

  • Once selected you should see a small window pop open asking you about opening the page for whatever service you selected.  Just click on continue for this pop up message.

image

  • After selecting continue, you will be directed to a page that will explain that Disney Movies Anywhere would like to –Know who you are, –view your email address, –receive info about any Disney purchases or rentals you get from the service you are linking to. On this page, just click Allow or Authorize (depending on your service)

image

  • Finally, you can check the service you linked and you will find MONSTERS, INC on your list, ready to be enjoyed.

image

Note: You will also get an email informing you that MONSTERS, INC is now in your digital collection (as confirmation).

image

Source(s)

Securing Your Wireless Network (Via OnGuardOnline.gov)

Today’s home network may include a wide range of wireless devices, from computers and phones to IP Cameras, smart TVs, and connected appliances. Taking basic steps to secure your home network will help protect your devices – and your information – from compromise.

Understand How a Wireless Network Works

Going wireless generally requires connecting an internet “access point” – like a cable or DSL modem – to a wireless router, which sends a signal through the air, sometimes as far as several hundred feet. Any device within range can pull the signal from the air and access the internet.

Unless you take certain precautions, anyone nearby can use your network. That means your neighbors – or any hacker nearby – could “piggyback” on your network or access information on your device. If an unauthorized person uses your network to commit a crime or send spam, the activity could be traced back to your account.

Use Encryption on Your Wireless Network

Once you go wireless, you should encrypt the information you send over your wireless network, so that nearby attacker can’t eavesdrop on these communications. Encryption scrambles the information you send into a code so that it’s not accessible to others. Using encryption is the most effective way to secure your network from intruders.

Two main types of encryption are available for this purpose: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). Your computer, router, and other equipment must use the same encryption. WPA2 is the strongest; use it if you have a choice. It should protect you against most hackers. Some older routers use only WEP encryption, which likely won’t protect you from some common hacking programs. Consider buying a new router with WPA2 capability.

Wireless routers often come with the encryption feature turned off. You must turn it on. The directions that come with your router should explain how. If they don’t, check the company’s website.

Tutorials for Turning Your Router’s Encryption On:

Limit Access to Your Network

Allow only specific devices to access your wireless network. Every device that is able to communicate with a network is assigned a unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses to access the network. Some hackers have mimicked MAC addresses, so don’t rely on this step alone.

Secure Your Router

It’s also important to protect your network from attacks over the internet by keeping your router secure. Your router directs traffic between your local network and the internet. So, it’s your first line of defense for guarding against such attacks. If you don’t take steps to secure your router, strangers could gain access to sensitive personal or financial information on your device. Strangers also could seize control of your router, to direct you to fraudulent websites.

Change the name of your router from the default. The name of your router (often called the service set identifier or SSID) is likely to be a standard, default ID assigned by the manufacturer. Change the name to something unique that only you know.

Change your router’s pre-set password(s). The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router, as its “administrator.” Hackers know these default passwords, so change it to something only you know.  The same goes for any default “user” passwords. Use long and complex passwords – think of at least 12 characters, with a mix of numbers, symbols, and upper and lower case letters. Visit the company’s website to learn how to change the password.

Turn off any “Remote Management” features. Some routers offer an option to allow remote access to your router’s controls, such as to enable the manufacturer to provide technical support.  Never leave this feature enabled. Hackers can use them to get into your home network.

Log out as Administrator: Once you’ve set up your router, log out as administrator, to lessen the risk that someone can piggyback on your session to gain control of your device.

Keep your router up-to-date: To be secure and effective, the software that comes with your router needs occasional updates. Before you set up a new router and periodically thereafter, visit the manufacturer’s website to see if there’s a new version of the software available for download. To make sure you hear about the latest version, register your router with the manufacturer and sign up to get updates.

And when you secure your router, don’t forget to secure your computer too. Use the same basic computer security practices that you would for any computer connected to the internet. For example, use protections like antivirus, antispyware, and a firewall — and keep these protections up-to-date.

Protect Your Network during Mobile Access

Apps now allow you to access your home network from a mobile device. Before you do, be sure that some security features are in place.

Use a strong password on any app that accesses your network. Log out of the app when you’re not using it.  That way, no one else can access the app if your phone is lost or stolen.

Password protect your phone or other mobile devices. Even if your app has a strong password, it’s best to protect your device with one, too.

Source

Samsung Shutting Down Milk Music

0

image

If your an owner of a Samsung device you have seen Milk Music app, which when launched in early 2014, was supposed to take on Apple’s iTunes Radio, Pandora, Spotify, and a number of other streaming music services. Well it seems that eventually the Milk had to spoil, and for Samsung the Milk spoils on September 22, 2016. Samsung Shutting Down Milk Music

image

According to a press release posted on the Samsung (US) Newsroom site, Samsung says that “…working with partners will accelerate innovation, enhance device sales and provide amazing new experiences for our customers”. That leads most to believe that Milk Music will be replaced with one of the existing music services for Samsung device users, however as posted on the release, “We have no additional details to share at this time”, means they aren’t saying who that will be.

Source

How To: Reset Browser Settings

0

How To Reset Browser Settings For Internet Explorer, Firefox, and Chrome. There are many reasons why you would need to reset your browser. Anything from random errors while browsing, to malware infections causing fake pages to appear, resetting the browser is one of the steps you can take to get your system stable again. The following steps will show you how to reset the 3 major browsers, Internet Explorer, Firefox, and Chrome.

Internet Explorer
  • Click on either the cog on the top right of the browser and select Internet Options

image_thumb10

  • or Tools from the Menu Bar and select Internet Options

image_thumb11

  • Once the Internet Options window opens –> Click on the Advance Tab –> Followed by clicking Reset (on the bottom) and confirm the reset.

reset-IE

Mozilla Firefox
  • Open Firefox –> In the address box type About:Support

image_thumb12

  • When the support window opens –> Click Reset Firefox (toward the right side of the page)

image_thumb13

Google Chrome
  • Open Chrome –> In the address box Type chrome://settings

image_thumb14

  • Scroll to the bottom –> Click on Show Advanced Settings

image_thumb15

  • Scroll to the bottom –> Click Reset Browser Settings

reset-chrome

 

Do NOT Fall For Fake Pop Up Messages

The fake pop-up message telling you something is wrong with your pc is not a new scam, but I have seen an increase in calls reporting such a message recently.  The message that appears to randomly pop up says something along the lines of “Windows has detected some suspicious activity from your IP address…..” (it can also say pc, computer, or device) and directs you to call a toll-free number to correct the issue. The message comes from compromised websites in what is known as malvertising, and messages like that don’t just happen to small sites or sites on the dark side of the web (Porn). Major websites like the LA Times, NY Times, Washington Post, and the Huffington Post have all been compromised at some point previously. Fake Pop Up Messages

Review Of Fake Message

The following screenshot is one of the messages that was received recently.

Fake Pop Up Messages

Let’s review some of the key details of the message.

  • No matter what the message specifically says, the message always starts by trying to get your attention and hopefully scare you. In this case “Windows has detected some suspicious activity”, and “caused a security breach”.
  • The message will always reference a major software or hardware maker that everyone knows, like Adobe, Google, or as shown in this case Microsoft. This is done so that you start to think there could be some legitimacy in the message.
  • The message will then give you directions for the fix, from clicking on a link to download something to calling a phone number and getting assistance with your issue. Of course, if you have a phone number, the message will give you the comfort of knowing that the person you are calling will be a “certified tech”.
  • Lastly, and usually in all CAPITOL LETTERS, as shown in the screenshot, a final warning is that if you don’t do what the message says you may lose your data or worse.

Of course, this is all a mind game. If they can play with your mind, they hope they can then trick you into doing something really dumb. The dumb is opening the virtual front door of your computer to actually give them access.

If you have this message, you are NOT really infected with anything more than malvertising. However, once you call the fake techs (the bad guys), they will give you instructions on how to give them access to your pc.  Once they connect to your pc, it will only take them minutes and your computer will actually be compromised by the people who you think are supposed to be helping you.

What To Do If You See A Message Saying You Are Compromised

The following are things you should do when you see a message like this pop-up.

  • DON’T PANIC.  This is the most IMPORTANT advice I can give. JUST DON’T PANIC.
  • Open a new webpage and go to Google, Bing, Yahoo, or 800notes whatever search engine you prefer to use. Run a search for the phone number listed on the pop-up. The following screenshot shows the results from the site 800notes site, as I find it an excellent site to see if a number is a telemarketer or a scam, but you can use any search engine to do your research.

Fake Pop Up Messages

  • At this point, I recommend running a full scan on your pc with 3 programs, Malwarebytes, SuperAntiSpyware, and whatever Antivirus program you have installed on your pc. Remember before starting the scan to make sure each program is updated to the latest database or definition files. As shown in the screenshot below for SuperAntispyware, each program will have a spot that will list how old the database or definition files are and give you an opportunity to update them.

image

What if you don’t have Malwarebytes, SuperAntispyware or an Antivirus program installed on your pc.  The first question is, WHAT ARE YOU THINKING!!!! OK I know it happens, so here is what I recommend, and there is no excuse because the following steps are all FREE.

Go to the NINITE site, where you can download what you need, legitimately and for FREE. Just put a check next to each one that you need and then click on Get Installer.  The Ninite site will download and install each program, or tell you that it’s already installed if it finds it on the machine.

image

  • Once you have installed or updated each program, run a full scan on all your drives, and select to clean to whatever each program finds. The screenshot below shows what SuperAntiSpyware found on one of the computers that reported this issue.

image

That should be it.  With a little caution and no panic, you should be able to work past a situation like this fairly quickly and painlessly.

 

Source(s)

  • Compromised websites info – PC Mag
  • Phone Number Search – 800notes
  • Software Download – Ninite

How To Stop Phone Use At The Table (via IKEA)

0

IKEA-1-600x400

I remember as a kid meal time was for talking to each other and eating. In this fast pace generation, we live in meal time is for everything from making calls to checking email to surfing social media, and oh yes talking and eating are 4th or 5th priority. Seems that mega-retailer IKEA thinks that needs to change.

IKEA in Taiwan has developed a table that has a hot plate in the middle, to make the hot plate work people have to put their cell phones under it.  The more phones under the hot plate, the hotter the hot plate gets. If someone takes a phone away, the hot plate temp goes lower.  Great way to get people to focus on talking to each other and eating.

  • Video and Logo picture – IKEA (via YouTube)

Update Status For Tech Geek and More

0

Unfortunately, about a month ago, Tech Geek and More suffered a major hacking attack.  It has taken the past couple of weeks to get things cleaned up. We are now starting to slowly restore the site. We hope to have the site restored over the next couple of days.

tech geek and more

If you are visiting us for tech assistance, and you cant find what you are looking for, please post a message here or email techgeekandmore@gmail.com and let us know what you need assistance with.  We will do our best to help.

Thank you for your loyalty to Tech Geek and More

Alex (Head of Tech Geek and More)

Getting the Iomega USB floppy drive working on newer Windows OS

In this day and age, with the fact that most new pc’s do not have floppy drives anymore, as a tech, I still find times where bring out an old reliable floppy is my best way to resolve a problem.  Many people still have some “classic” tools that are on floppy, or documents or pictures saved on floppy (Before CDRW/DVDRW drives became the norm, floppy disks were the way to store and transfer files). Today’s post will cover Getting the Iomega USB floppy drive working on newer Windows OS

Problems With Iomega Floppy On Newer Windows 

The problem is that many of the Floppy drives do not have drivers or “official” support for Windows Vista or later.  This post covers just such an issue.  I use an Iomega USB drive, and whenever I plug it into my Windows 7 pc’s, I get a message that Windows can’t find a driver for my device.

Steps To Get Iomega working with Windows

Here are some simple steps to get your drive to work with Windows Vista, 7, 8, or 10

1) When you install the drive you will get the message that your drive needs to find drivers. Just hit Cancel

Getting the Iomega USB floppy drive working on newer Windows OS

2A) For Windows Vista, Windows 7, or Windows 8 – Go to start –> Control Panel –> System –> Device Manager.

(Example from Windows 7, Vista may look a little different)

2B) For Windows 10 – In the “Search the web and Windows” box type Control Panel. When the choice for control panel comes up, select it. This will open the control panel. Once in control panel, select Device Manager.

3) When the Device Manager opens you will see a listing for X1DE-USB with a Yellow triangle next to it under Other Devices.  On that line item right mouse click (NOTE IM SAYING RIGHT MOUSE) and then select Update Driver software and left mouse click (NOTE THAT I SAID LEFT)

4) Now select Browse my computer for driver software

5) Now select Let me pick from a list of device drivers on my computer and click on Next

6) Now you will get a box to select your device type from list, click on “Show All Devices” and click on Next

7) In the following window, for the box on the left select NEC Systems, and then on the right select NEC USB Floppy then click on Next

8 ) You will be told by Windows that “Installing this device driver is not recommended…..” its ok just click on Yes to continue.

9) Lastly you will be told that Windows has successfully updated your driver software.

Now if you look at the Device Manager you will see the listing for Floppy disk drive – Citizen X1DE.

Finally if you look in the My Computer icon, you will see the A: drive listed for your floppy drive

With that you now have a working Floppy USB drive.

Get Classic Start Menu On Windows 10

For those that do NOT like the look of the Windows 10 Start Menu. Here is what you need to do to get the classic start menu on your Windows 10 machine.

I’ve installed Windows 10 on all my machines at home.  I don’t have any complaints about how Windows 10 operates. Like everything else in life, sometimes you have to adjust to new things. However, I know that isn’t however everyone else feels, especially about their computer equipment.  I’ve heard everything from “If it ain’t broken why fix it”, to “I want what I’m used to”.  So for those who have now installed Windows 10 but want to make it feel like what you were used to with Windows XP or Windows 7, here is what you need to do, for FREE I might add, to give your Windows 10 install that Classic feel.

image-2

Currently when you install Windows 10, you will find a completely redesigned Start Menu.  A mix of menu items and “live tiles”, basically a hybrid of Windows 7 and Windows 8 Start Menu’s.  So for those who would like to go completely back to the old Start Menu (the what you are used to menu) here is what you need to do.  Install the Classic Shell update. Classic Shell started as a small utility in 2008 by someone who did not like how the start menu in Windows Vista worked.  Classic Shell update is open source and free (if you like it, they would appreciate a donation to support the project).

Installing The Classic Shell Start Menu

Start by visiting the website for Classic Shell.  On the home page you will find 2 primary download links.  The one that says Download now is the main download for Classic Shell, this will download the latest stable version of the update.  For those looking to be on the cutting edge, Download Beta will let you download the latest version which is still being developed. In addition, on the main page you will also see links for translated versions of Classic Shell.

image-3

If you need a translated version, Classic Shell is available in Italian, French, German, Chinese, Russian, Polish, and Spanish (among other languages).

image-4

  • Once you have downloaded the installer and launched it, here is the order of install. First you will get the set up wizard page, just click next here

image-5

  • Next you will get the End User License Agreement. Here you put a check in the “I accept the terms” box and then hit next

image-6

  • Now you will see a custom set up window.  You don’t have to touch anything here.  Just hit next.

image-7

  • On the window that follows, the ready to install windows, hit the install button.

image-8

  • The screen that follows is the “Installing” window. This screen may sit there for a minute or 2 not doing anything before installing.  DONT PANIC

image-9

  • Once the installation screen is done you will get the install is complete screen. Uncheck the “View Readme file” box (unless you like to read such things) and click finish.

image-10

Configuring The Classic Shell Once Installed

Once its installed, the settings window for classic shell will open. If you are looking at keeping the basic old school start menu design, all you need to do is select which type you want

  • Classic Style
  • Classic Style with Two Columns
  • Windows 7 Style

and you can also select to replace the start menu button with one of the buttons listed at the button.

image-11

If you want to be Geeky, you can put a check in the box that says “Show All Settings” and you will get a multitude of customization options. There are to many options to mention all of them, you will just need to go through them and see, the good news is most of the custom choices are easy to understand. Just remember if you do make custom changes, make a note of each change, so that if it isn’t the desired effect you can change it back.

image-12

Either way once you have made your selection, you will have a new (classic looking) start menu.

image-13

And this is one of the ways you can make Windows 10 feel more like what you are used to. The advantage of Classic Shell is that in the Class Start menu they list the Apps area, so you still have easy access to your apps, and they also list Start Menu (Windows) on the top of the classic shell list that will open the original Windows 10 start menu should you find something missing from the Classic Shell menu.  Hope this helps those who are looking to get the benefits of Windows 10 while staying with what they are used to.  This post was for those on Windows 10, but the Classic Shell works with the following

Classic Shell works on Windows 7, Windows 8, Windows 8.1, Windows 10 and their server counterparts (Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016). Both 32 and 64-bit versions are supported. The same installer works for all versions.

Source:

OS X Error – An error occurred while preparing the install

Trying to reinstall OS X, getting an error message “An error occurred while preparing the installation

Alert: Major Credit Card Data Breach

0

Landry’s Inc., which owns or operates some very well-known brands is reporting that they have been the victim of a data breach at some of its locations.  According to the information released by Landry’s Inc. the breach occurred during 2 different periods from May 4, 2014, through March 15, 2015, and from May 5, 2015, through December 3, 2015, depending on the location Landry’s reports that during their investigation they find that criminal attackers were able to install a program on payment card processing devices that was designed to search for data from the credit card magnetic stripe (cardholder name, card number, expiration date and internal verification code).

Some of the brands affected in the breach include

  • Bubba Gump Shrimp
  • Claim Jumpers
  • Gold Nugget Hotels in NJ / MS / LA / NV
  • Landry’s Seafood
  • Mastro’s
  • McCormick & Schmick’s
  • Morton’s
  • Rain Forest Café

According to Landry’s Inc.

“If you used a payment card at an affected location during its at-risk window, we recommend that you remain vigilant to the possibility of fraud by reviewing your payment card statements for any unauthorized activity. You should immediately report any unauthorized charges to your card issuer because payment card rules generally provide that cardholders are not responsible for unauthorized charges reported in a timely manner. The phone number to call is usually on the back of your payment card”.

To see the complete list of all affected brands and locations click here

Source

College Admissions Officers Check Social Media

0

If you’re a parent of teenagers and are having discussions with your kids about life after high school, also known as the college talk, you may want to include the warning that what your kids post on social media could possibly affect their ability to college admission. College Admissions Officers Check Social Media

Survey Of College Admissions Officers 

Kaplan Test Prep recently did a survey of nearly 400 college admissions officers and found that 40% of the admissions officers admitted to visiting applicants’ social media pages to learn more details about the applicant. According to Kaplan, the following reasons are mentioned as to why college admissions officers turn to social media

social-media

  • Interest in Talents: Some admissions officers say they will visit an applicant’s social media page — often by the applicant’s own invitation — if the applicant mentions a special talent, for example, as being a musician, artist, poet, writer, or model. In fact, 42% of admissions officers reported an increase in such invitations compared to two years ago.
  • Verification of Awards: Citation of particularly distinguished or noteworthy awards can sometimes trigger an admissions officer’s online search for independent verification; as one officer noted, something “out of the norm.”
  • Criminal Records or Disciplinary Action: Some admissions officers say that if an applicant mentions they have a criminal background or a record of disciplinary action, they will do some online digging to get more details.
  • Scholarships: Students applying for special scholarships can come under greater scrutiny, as schools want to ensure those receiving the scholarships are fully deserving; extra due diligence can come in the form of online checking.
  • Admissions Sabotage: Anecdotally, admissions officers say they occasionally get anonymous tips about prospective students pointing them towards inappropriate behavior. They’ll sometimes dig online to see if it has merit.

Yariv Alpher, executive director of research, at Kaplan Test Prep said “The growth of social media hasn’t made the college admissions process a whole new ballgame, but it’s definitely changed the rules. What you post online can and may be used in your favor or against you, so it’s important to think about what you share. When in doubt, the best strategy may be to keep it to yourself.”

 

Source(s)