January 21, 2017
Email and Forum Questions
- Email from Mike in Maryland: Hello Mr. Big Voice, I have never put my personal information on any web sites on the internet. I do not do Facebook or any other Data-farming. My concern is that perhaps 10 years down the road, our personal information will be used against us. Interested entities- such as potential Employers, Governments, Insurance Companies, or just plain bad people will use this Data-Farming to do wrongdoing against us.
- I am thinking about joining a Dating web site, but I am hesitant. Can you please have your Crack team of engineers ( Jim & Richard ) to advise us on how to tell what Dating web sites might truly work hard at protecting our personal information. If Yahoo Mail and other web sites can be Hacked, I think smaller web sites will be hacked even easier. I Love your Podcast.
- Hello Mrs. Momma Big Voice, Are you single? On the rare occasions that I get to hear your voice on the radio. It’s like music to my Ears! Is it possible, that you and I can have a nice Seafood dinner sometime? Maybe some fish sticks? Mike from Maryland
- Tech Talk Responds: Mike, assume that anything on the web will eventually be public. These sites have not been known for great security. Many have been hacked, particularly those that attract individuals for affairs. The intensity of persistent attacks has grown in recent years. So beware. As for Mrs. Momma Big Voice, all I can say is beware again.
- Email from Michael in Florida: Dear Doc and Jim. I have created a document in MS Word2016 for a friend. I do not want my identifying information to show up in the documents. I have heard that MS Word tracked the creator, last editor in the document metadata. How can I clear this metadata, so that only my friends name appears there? Love the podcast. Michael in Florida
- Tech Talk Responds: If you plan to share an electronic copy of a Microsoft Word document with clients or colleagues, it is a good idea to review the document for hidden data or personal information that might be stored in the document itself or in the document properties (metadata). Because this hidden information can reveal details about your organization or about the document itself that you might not want to share publicly, you might want to remove this hidden information before you share the document with other people. All versions of Word track the document creator and the last editor.
- The process that I will describe applies to: Word 2016, Word 2013, and Word 2010. Open the Word document that you want to inspect for hidden data and personal information. Click the File tab, and then click Info. Click Check for Issues, and then click Inspect Document. In the Document Inspector dialog box, select the check boxes to choose the types of hidden content that you want to be inspected. Review the results of the inspection in the Document Inspector dialog box. Click Remove All next to the inspection results for the types of hidden content that you want to remove from your document. If you remove hidden content from your document, you might not be able to restore it by clicking Undo.
- Email from Tuc from Fairfax: Is there a simple way to transfer pictures from my mobile phone to my PC? I use Windows and have Bluetooth on the phone. I don’t know how to get Bluetooth on the PC. Is there any other way? Love the podcast. Tuc in Fairfax
- Tech Talk Responds: I prefer techniques that are automatic. Simply install any of a number of apps associated with cloud storage, and it will offer to upload your photos automatically right after you take them. Install the corresponding app on your PC, and the photos will be automatically downloaded as well.
- For example, install Dropbox on your phone and on your PC. Even if you don’t already have a Dropbox account, a new account includes two gigabytes of free storage, which is plenty to start with. As you set up the phone application, it will ask if you want to enable “camera uploads”. Say yes, and you are done. Take a picture, and a few minutes later it’ll show up on your PC. I have used Dropbox, Microsoft OneDrive, Google Photos, and iCloud. Make certain to authorize only one of these apps to upload pictures. Otherwise, you will upload multiple copies and eat up your data plan. If you are concerned that you might use too much data uploading all these photos, you should authorize upload only when connected to Wi-Fi.
- The other common approach is to connect your phone to your computer. You can typically do this in either of two ways: via cable or Bluetooth. I only use a USB cable connection because Bluetooth tends to be finicky. Once attached, your phone should appear in Windows as if it were another disk drive on your computer, just like inserting a USB memory stick. Use Windows File Explorer to look for a top-level folder called “DCIM”. Your photographs will be in that folder; use Explorer to copy or move the picture files from your phone to wherever you would like on your PC.
- Email from Ngoc in Ohio: Dear Tech Talk. I have a problem. I can’t remember my Wi-Fi password at home. My laptop automatically logs onto the network now, but I can’t log on my new iPad because I don’t know my password. Is there a way that I can get the password from my Windows 10 laptop? BTW, my network name is “FunHouseWiFi.” Love the podcast here in Ohio. We listen to it every weekend. Ngoc in Ohio
- Tech Talk Responds: Yes, you can. Unless you explicitly tell it to forget, Windows will carefully remember all the passwords for all the wireless networks you’ve connected to in the past. Start by running the Command Prompt with Administrative privileges. In Windows 10, that means right-clicking on the Start button and clicking on Command Prompt (Admin). Then you will use the program Network Shell by typing “netsh” into the command window. Network Shell is a multi-purpose program that performs network related tasks. Type the following command into Command Prompt (followed by Enter): netsh wlan show profile “FunHouseWiFi” key=clear. This will display information about your specific wireless connection. Underneath “Security settings”, listed as the “Key Content”, will be the Wi-Fi password you’re looking for.
Profiles in IT: Demet Suzan Mutlu
- Demet Suzan Mutlu is a tech entrepreneur, founder and CEO of Trendyol group, the largest fashion e-commerce company based in Turkey.
- Demet Mutlu was born August 22, 1981, in New York and raised in London, Istanbul and Rome. Her parents were from Turkey.
- In 2001, Mutlu graduated cum laude with a BS in Economics and Finance from NYU.
- After graduating, Demet Mutlu worked for Deloitte & Touche as a consultant.
- In 2003, she was hired as Associate Brand Manager for the Altria Group, working in Turkey, Switzerland and Japan
- In 2006, she became Brand Manager for Proctor and Gamble.
- In 2007, she was hired as Senior Category Manager for Reckitt Benckiser
- In 2008, she attended Harvard Business School. She focused on starting her own business and took the entrepreneur track.
- While visiting her parents in Istanbul the summer before her second year, she found herself shopping for clothes online but could not find an outlet based in Turkey.
- She saw an opportunity. She wanted to do something in Turkey. It made so much sense for Mutlu to do fashion. She owns 200 pairs of shoes.
- In 2009, Mutlu dropped out of Harvard to start Trendyol, bootstrapping $300,000 of her own funds to launch the fashion portal.
- Her parents were not happy. He dad did not talk with her for two months. He wanted her to take the traditional corporate track and eventually work in the family business.
- The sites name means, “become a trendy person” in Turkish and is centered on the model of flash sales, where the latest fashions are available at discounted prices.
- Daily flash sales typically involve 20 brands offering 3,000 new items.
- Trendyol offers a selection of international and domestic Turkish fashion and brands.
- Trendyol also runs its own fashion label, Milla, which happens to be the fastest growing portion of its business.
- The site has raised over $50 million in external funding from venture capitalists including Tiger Global and Silicon Valley venture capitalist firm KPCB.
- Mutlu was the first Turkish entrepreneur to receive investment from KPCB.
- Only a month after launch, the site had had 100,000 customers. By late 2011, the site boasted more than 4 million customers. In 2016, Mutlu expects sales to be $350M.
- Mutlu hopes to expand internationally, but her aspirations go beyond geography. Her goal is to become a billion-dollar company,
- Mutlu believes in supporting her fellow entrepreneurs. She now invests in several Turkish companies, including Peak Games, one of the largest social gaming sites, and Doktorsitesi.com, the leading health portal in Istanbul.
- In 2016, she was named a Young Global Leader by the WEF, along with Mark Zuckerberg and Marissa Mayer.
Pay TV loses ground to Antenna-only
- A study released Wednesday by market research firm Park Associates shows a steady increase in US TV customers who are forgoing traditional cable.
- Some 15 percent of US broadband households now get all of their TV from an antenna. That number has increased steadily over the course of five years as pay TV subscriptions have seen a corresponding drop.
- Parks Associates says cord-cutters are gaining ground because of a lack of satisfaction with traditional cable service.
- With lots of antenna options out there for those looking to cut the cord, the reasons to stay with a cable subscription you don’t like are shrinking.
- If you are interested in cutting the cord. Here are a few pointers.
- Use http://antennaweb.org to locate TV towers in relation to your house. This will help you position the antennas
- Buy good quality antenna, may two. Flat antennas are easier hide.
- Experiment with location. Objects in the room may even affect signal.
- An inline amplifier may not help, if you are close to the TV stations.
Everyone Is Falling For This Frighteningly Effective Gmail Scam
- Security researchers have identified a “highly effective” phishing scam that’s been fooling Google Gmail customers into divulging their login credentials.
- Researchers at WordFence warned of the attack in a recent blog post, noting that it has been “having a wide impact, even on experienced technical users.”
- Here’s how it works. The attacker, usually disguised as a trusted contact, sends a boobytrapped email to a prospective victim. Affixed to that email, there appears to be a regular attachment, say a PDF document. Nothing seemingly out of the ordinary.
- But the attachment is actually an embedded image that has been crafted to look like a PDF. Rather than reveal a preview of the document when clicked, that embedded image links to a fake Google login page.
- Everything about this sign-in page looks authentic: the Google logo, the username and password entry fields, the tagline.
- Even there, it can be easy to miss the cue. The text still includes the “https://accounts.google.com,” a URL that seems legitimate. There’s a problem though; that URL is preceded by the prefix “data:text/html.”
As soon as a person enters her username and password into the fields, the attackers capture the information. They immediately find past emails and attachments in the compromised account, create booby-trapped-image versions, drum up believable subject lines, and then target the person’s contacts.
- Google recommends that people should use two-step authentication, an added layer of security that can help prevent account takeovers.
Can Police get information from Amazon Echo?
- When police in Bentonville, Arkansas were faced with an unsolved murder last year, they looked to a nearby Amazon Echo. The owner of the house where the murder occurred, and chief suspect in the case, had purchased Amazon’s popular new personal assistant, and police looked to the device’s records for clues as to his guilt.
- For local data, all police (or anyone else) would need is physical possession of the Echo unit, which would be much easier to get than a court order.
- The good news for Echo owners is that there is very little data on the device itself. The hardware includes only 4GB of storage, and that is mostly taken up by device firmware.
- The ephemeral data is quickly wiped by restarting the device. Even then, the Echo has no data ports and storage can only be reached by physically removing the components or connecting directly to a pinout on the circuit board.
- However, much of the data implicated in the case should be available on the suspect’s phone. Through the associated Echo app, associated phones store text versions of nearly every request made to the device. The phone needs to be unlocked for police to access the data, which is still a challenge with iPhones.
- The resulting data isn’t likely to solve any cases by itself, but it provides a surprisingly comprehensive picture of a person’s activities. Each request includes timestamps showing when the request was made, so it could be used to establish when a person was present in the room.
Pentagon Battle-Tests Micro Drone Swarm
- The United States Department of Defense on Monday announced a successful demonstration of one of the world’s largest micro drone swarms at China Lake in California.
- Three F/a-18 Super Hornet combat jets launched 103 Perdix drones in the exercise, which took place last fall.
- The micro drones demonstrated advanced swarm behaviors such as collective decision making, adaptive formation flying and self-healing.
- The Massachusetts Institute of Technology’s Lincoln Laboratory debuted Perdix in 2013. Since then, the DoD’s Strategic Capabilities Office has upgraded the technology using commercial components, 3D printing and agile manufacturing.
- Perdix fits into the DoD’s concept of future battle network scenarios in which autonomous systems allow humans to make better decisions more rapidly.
- Once launched, the micro drones gain situational awareness and locate other micro drones to create a swarm.
- The drones run on AA batteries. They are 6.5 inches long and have a wingspan of 11.8 inches. They have propellers 2.6-inch propellers. They weigh 290 gm, fly at 40 to 60 knots, and can stay airborne for 20 minutes.
- Perdix micro drones share one distributed brain for decision-making and adapting to each other. They collaborate through communications.
- Perdix can be deployed for low-altitude missions such as surveillance and reconnaissance.