Skip to content

Quick Bytes News Letter

from PC Techniques

  • PCT Website
  • Home

Tag: email Security

Quick Bytes News – Summer 2017

Posted on June 13, 2017September 11, 2017 by Greg Dance

I hope you all have coped with the constant media pre electoral spin season, dizzying wasn’t it!

Can we try to forgive & forget the unacceptable conduct of those so called ‘leaders’ whom we are supposed to respect enough to represent us nationally, when they behave worse than feral teens on a sugar high?

And as for the TV & written media please don’t get me started … do I really need a TV any more I wonder.

One particularly glaring point about the election result is that it brought to the fore the newly arrived insignificance of the mainstream TV and printed media platforms.

Our youth mostly don’t bother with those platforms so their views were formed without being tainted by politically biased media proprietors or influenced by a need to kowtow to murmurings of privatisation. Refreshing!

Anyway on to I.T topics and these are on Social Media.


Facebook

Postings – Occasionally we see a post on our Facebook news feed which might contain a request that instead of using its ‘share’ link, we copy/paste the content instead and make a new post of it ourselves. I assume that would also apply to the memes that are all over Facebook every time some kind of vote is looming. For images you might have to make a copy of the image and create a post with it. Why do this and what happens if we do?

There appear to be 2 main outcomes, so depending on the nature of the post material some care is advised.

Algorithms – These days algorithms are being built into social media platforms as a norm so you might want to consider what making this choice will do for your own posts.

Algorithms are said to have the effect of influencing the readers behaviour when using the platform, i.e how we react to posts we see. More so now than before we are becoming aware that what we are given is probably only a part of the whole pool of available information on the topic. This is down to algorithms working on the website and the logic is that because we don’t have time to read everything we get what they think is most likely to be interesting.

Background – In effect what appears in our ‘news feeds’ has been shaped to suit any bias or preferences that the platform has detected in our responses previously, what we liked and to which posts we responded. In the main we can suspect this is done for marketing purposes, after all its a ‘free service’ and by them using us as a target audience for marketing purposes its a easy guess their motive. Though more darkly, political agendas are now identified as being heavily involved and are said to have been effective in recent controversial electoral outcomes such as Brexit & Trump.

For more on this you might like to read the section titled ‘Controversy surrounding the use of algorithms’ on this Wikipedia – Algorithms, and I refer in particular to the sub title ‘Legal Concerns’

So what is the main difference?

Sharing Posts

If you re-post using the ‘share’ link, your post is subject to the restrictions placed on its circulation by the person who posted it before you, so according to their privacy settings it may only reach friends that you share with them. So this could restrict the reach of the post, in some cases its not safe to share some types of personal or other information too widely.

Also if the post is identified as one which needs removal i.e. its faked news or a scam the removing it from all feeds down stream is easy the originating account post is removed. So control is better.

The downside of this is that because the posts incoming to you carry a restriction you may wish to use the Public Post option in which case it would be accessible to a much wider audience (though again I expect some algorithmic re-shaping might apply.

 

Copy/Pasted Posts

If you copy/paste a post into a new one of your own you can remodel it say by adding a picture or rewording or spell correcting it.

But if the post is one of the more ‘challenging’ types it is harder to stop and so scammers and news fakirs have a freer run and can use a search function in the platform to identify you personally as someone they might like to close up to, user beware! this would also happen to all others who used copy/paste, you in effect own it the same as any post you originate yourself.


Two Stage Log In

I am reading now that some experts say that the use of ‘strong’ passwords alone is being seen as falling off the back of the secure practices wagon. Do I hear a sigh or two? ……

Many of you will have already used a version of this with your online banking where your debit card is used with your PIN to generate a code to enter as a second stage to the log in process into your account.

So a second stage login authentication for other vital websites is now also a good idea.

This applies to social media, email and other more important online sites such as for editing your own website  because if you were to lose access to it because a hacker had locked you out and was using it to rob your friends or misrepresent you how would you feel?

 

There are 2 particular methods and one involves a mobile signal connected smart phone or pad, the second method uses a small App that generates the code without a mobile signal.

Note:- because  the use of texts by the first method means an insecure text is used to send you a login code, it is advised to use the second (App) method instead. Also I have experienced some annoying delays in receiving texts recently for some reason which have delayed my use of a website.

If you use the first method you would log into the website first using your user name & password, then on receipt of the text you enter the code in the text. Done.

This is offered by most sites you log into these days and is often set up by finding your way into the “Settings” – Security area of the websites menus. You add your mobile phone number and its done.

A text is sent each time you then log into that website.

 

The second (I think better) method is the App generated method.

This involves you downloading a free small Authenticator App such as Sophos Authenticator or Google or Microsoft Authenticator onto your smart phone or pad … there are several around just find them through the usual preferred App repository on your particular type of smartphone. Do make sure you allow the App to access your smartphones camera for it to work. note:- if you choose Google Authenticator App then see this article on ‘Authy’ which might be also useful.

Once you have installed the App on the smart device you go to the website you wish to set up 2 stage login on a another device such as a PC or laptop. Navigate to the Settings or Options page associated with 2 stage login, the App setup method bit.

This will offer you a QR code in the form of a strange looking square on your laptop/PC screen, use the Authenticator Apps ‘scan QR code’ option to run the camera through the App and point it at the laptop/PC screen to capture the QR code.

The App will record the QR code and add it to a list in the App. Done!

Save the settings on the website to use the 2 stage login in future and logout.

The next time you log into that website it will prompt you for a code which your smartphone will generate there and then, this code changes every minute or so so you will need to open the App each time you log in.

Should you lose access to your smartphone for any reason you can prevent a lockout by downloading and keeping safe some access codes the website will let you have, but grab these NOW so you have them already, just in case…..

 

Lastly there is a new and very secure method in development using ‘Security Keys’ but as this snippet from Facebook’s website shows its far from universally usable now so better left until its more developed.

“Security keys for Facebook logins currently only work with certain web browsers and mobile devices, so we’ll ask you to also register an additional login approval method, such as your mobile phone or Code Generator.To add a security key from your computer, you’ll need to be using the latest version of Chrome or Opera. At this time we don’t support security key logins for our mobile Facebook app, but if you have an NFC-capable Android device with the latest version of Chrome and Google Authenticator installed, you can use an NFC-capable key to log in from our mobile website.”  source Facebook


That’s all for this edition, I hope you found it useful and not too heavy going.

As always do call me for a chat if you would like to reflect on IT matters, or life in general, ….

though not politics …. PLEASE, NO MORE POLITICS!!     🙂

 

Warm Regards

 

Greg

Have up to 30 minutes FREE consultation time!

Share this:

  • Tweet
  • Email
  • Print

Like this:

Like Loading...
Posted in email, IT Advice, IT Support, Online Security, Social MediaTagged email Security Log in Security pc techniques newsletter quick bytes news Social media SecurityLeave a comment

Recent Posts

  • Opening Up Carefully
  • STOP Sign Year
  • Quick Bytes News – Autumnal Alerts!
  • Quick Bytes News – July Covid-19 Update
  • Covid Days – New Ways

Recent Comments

Archives

  • February 2021
  • January 2021
  • August 2020
  • July 2020
  • May 2020
  • April 2018
  • December 2017
  • September 2017
  • June 2017
  • March 2017
  • January 2017
  • October 2016
  • August 2016
  • May 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015

Categories

  • 2 Factor Authentication
  • Android
  • Apple Mac
  • Browser Security
  • Data Storage & Security
  • email
  • Health
  • IT Advice
  • IT Support
  • LiFi Technology
  • Linux OS
  • Mac Security
  • MS Office
  • obsolescence
  • Online Privacy
  • Online Security
  • Prevent Windows 10
  • Secure Log In
  • Smartphone OS
  • Social Media
  • Uncategorized
  • WiFi Radiation
  • WiFi Security
  • Windows (general)
  • Windows 10

IT Support @ Stroud

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 9 other followers

PC Techniques on Facebook

PC Techniques on Facebook
Website Powered by WordPress.com.
Cancel

You must be logged in to post a comment.

Loading Comments...
Comment
    ×
    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.
    Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
    <span>%d</span> bloggers like this: