Wednesday, March 31, 2010

Are You Less Social (Media) Because You’re Older?

Are You Less Social (Media) Because You’re Older?: "

social media privacy According to tech pundits, location-based apps are "the next big thing."  Location based apps like Gowalla and Foursquare, which allow you to "check in" to locations and venues via your mobile device, and share with your friends or the world at large, are all the rage.  Other apps share even more personal information, such as your spending habits.  Blippy, for example, lets other people see and discuss what you’re buying, after you enter in credit card information and other types of accounts.  How comfortable do YOU feel with the new round of social media apps?



Ask this question to ten people, and you could get ten different answers, ranging from "I put my whole life out there," to "I won’t touch social media sites with a ten foot pole," to everything in between.  What characteristics drive those views?  Here are a few possibilities.


 


 


Age


Is age the primary driving factor behind privacy concerns?  It does seem that younger internet users have no qualms about exposing their lives to the world.  Similarly, it seems like those in my age-bracket (early 40s), or older, are much less likely to expose personal information.  Is it really age, though, or other factors that often correlate with age, such as wisdom, or perhaps lack of tech knowledge?


 


Tech Knowledge


There are certainly many tech-savvy people in almost every age bracket.  But there does seem to be a higher concentration of "techiness" in younger circles.  As with much in life, lack of familiarity can breed distrust, so those who don’t know how some of these sites work may be less prone to share information on them.


 


Occupation


Some people are dependent on social media because of their occupations.  Other individuals don’t need/use social media at all in their line of work.  In fact, in some professions it is taboo to use certain types of social media.  In my profession (law), it took quite a bit for me to feel comfortable exposing my life, even to the limited extent that I do.


 


Nationality


When I discussed this issue with Bobby here at 40Tech (he is Canadian), he suggested that "being an American might have something to do with increased privacy concerns on your end as well."  He pointed our that there are more people in the U.S than in Canada, so there are more people who actually could do you harm by accessing your personal information.  Even if those concerns would turn out to be unfounded, he pointed out that the mainstream media thrives on scare tactics.  We may know better, but with a large percentage of people still new to the internet, there are many users who are easily swayed by sensational stories of horror.


 


"Self-preservation" trait


Is it possible that some folks are just more wary than others?  Just like some individuals drive more deliberately than others, could it be that some internet users are similarly cautious, due to the same type of personality trait?  A site like PleaseRobMe would only reinforce those fears.  PleaseRobMe was basically a Twitter search for Foursquare check-ins, to show which Twitter users were away from home.  The site founders recently disabled that functionality, claiming that they had proven their point.


 


None or all of the above


Perhaps there is no single defining characteristic that determines how comfortable someone is with sharing his or her life on the internet.  Perhaps there aren’t even a few predominant defining characteristics, but instead, as with much in life, each person is different, and there are a multitude of reasons, none of which could be said to be primary.


 


How much information do you share on the internet?  Is your Facebook profile public?  Do you share personal details on Twitter and Facebook?  What are your views on sharing your personal information through sites like Foursquare, Gowalla, and Blippy?  Let us know in the comments.




Related posts:

  1. How Social (Media) Are You?

  2. Gdgt: Social Networking for Gadget Lovers

  3. Social Follow: All Social Networks in One Highly Configurable Button

"

How I'd Hack Your Weak Passwords

How I'd Hack Your Weak Passwords: "

User Login If you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it? Let's see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I'll probably get into all of them. ...

"

Tuesday, March 30, 2010

Can You Be Traced by Your Email Address?

Can You Be Traced by Your Email Address?: "

E-mailWhen you communicate with people or post online, chances are you don't think twice about sharing your email address. But should you? Is there a way your phone number and address can be tracked by someone who only has your email address?


The short answer is yes. It could be very easy for you to be found by just your email address… or it could be quite difficult. Exactly how difficult it might be depends on three things: how you've used your email address, what information you've put in public places, and whether or not you've broken the law.


You can test the security of your email address by searching for it on the internet. Most search engines don't let you search for your exact email address, as they treat "@" and "." as spaces, but it's still a good place to start (especially if your email address is unique). Now realize that everything your search just returned can just as easily be found by anyone trying to track you down.


The worst case scenario would be a standard "name and address"listing, which includes your name, email address, physical address and phone number.


If this information has been posted online(by you or someone else) then absolutely anyone can find you with a quick and easy search.


If someone is trying to track you down it's more than likely they already know several other things about you in addition to your email address. They probably know your name and at least your general location.

Add those two bits of information and your tracker has even more to go off of.


When it comes to protecting yourself social networking sites are often overlooked. And it's not just Myspace and Facebook- it's other niche sites as well. With any of the information above (usually name and city are enough), there is often a lot of information available to the public. Try this: log out of any social media sites you are a member of, search for yourself by just name and city and see what information is available to anyone about you now.


If you have a fairly unique email address or perhaps unique handle for logging into some sites, people might not only find out where you live, but perhaps also view pictures of you, learn where you work or go to school, and see what sites you've visited recently. And they can do it in about 5 minutes. A more dedicated searcher could find even more.


The real concern is not what people can find, but rather how easy you've made it for them to find it. So what can you do?


Use a "throw-away" email address when doing things like placing ads or using any public site where the contact could eventually lead to meeting new people, or people wanting to find you for some reason. This throw-away address should be completely unique, unrelated to you, and should be created with completely fake information. That way at least the casual searchers will find very little from just that email address.


But what do you do about the not-so-casual searchers?


If you've broken the law even a throw-away email address may not be bullet proof.


Just like IP address tracing, it is possible that in the course of investigating a crime, authorities could use a court order to get additional information from the email service you've used for your throw-away account. They can get the IP address or other information about the computer or location from which the account was created, and they could potentially use it to locate you. It's not something that's taken lightly, but if crime warrants it, it is certainly possible.


The bottom line? Be aware that your email address may not provide you with the anonymity you think; used in conjunction with other readily available information much can be discovered about you. When it's important, risky or otherwise prudent make sure to take steps to appropriately anonymize the trail back to the real you.


Get more free tech help and advice from Leo Notenboom by visiting http://ask-leo.com With over 30 years of industry experience, including an 18 year career as a software engineer with Microsoft, Leo gives real answers to real questions from ordinary computer users at Ask Leo! Subscribe to Leo's weekly newsletter now and receive a free ebook: "Internet Safety – Keeping Your Computer Safe on the Internet", a collection of steps, tools and concepts you need to know to keep your computer and your information safe.






Copyright © WatchingTheNet.com. All Rights Reserved.



radio 2 mp3
Discover new music without using peer-to-peer networks!
Get It Now - Radio2MP3





"

Become a Social Network Ninja with Seesmic

Become a Social Network Ninja with Seesmic: "

In the Twitter ecosystem, Seesmic has carved a niche for itself with its apps deployed across various platforms: desktop, mobile and web. Seesmic’s web app was launched to much fanfare and gets feature upgrades on a regular basis. The web app is boasted as being a tool to manage and organize your community online. Let’s go ahead and check if Seesmic performs as often advertised.



Sign Up


Seesmic Web offers a very unique sign up page. You can choose to login with your Twitter account or you can choose to sign up for a Seesmic account and then integrate your Twitter account.


Sign Up

Sign Up


Let’s go with the Twitter login option. Just enter your Twitter login info. and you can authorize Seesmic to access your Twitter account. The entire process occurs via Oauth and the password is not stored.


Twitter Login

Twitter Login


Interface and Stream Organization


After logging in, you are presented with two columns containing your Twitter stream and mentions along with a hovering Seesmic sign up window.


Seesmic Signup

Seesmic Signup


You will need a Seesmic account to keep all your columns intact every time you use Seesmic, so let’s go ahead and sign up.


Post Login

Post Login


The sign up is very simple and does not require email activation. The interface is simple and uncluttered. There are not a lot of buttons or controls, making the UI look more refined. The overall interface design is modern and fresh but without the heavy graphics other apps sometimes include, adding to Seesmic’s snappy interface.


User Interface

User Interface


Columns


You can manage your Twitter stream with the help of columns. Though you cannot create custom columns, Seesmic allows you to create preset columns for Retweets, Searches, Trending topics etc.


Retweet Selection

Retweet Selection


For example, you can create a Retweet from the Retweets option on the left hand side of the page.


Reweet Column

Reweet Column


You can also create columns for trending topics from the Trending topics option on the left hand side.


Trending Topics Options

Trending Topics Options


Trending Columns

Trending Columns


The columns created are flexible and can be moved around by dragging them to the left or to the right. Using the column controls in the bottom left of the page, you can adjust column size or switch between multi-column and single column view.


Moving Columns

Moving Columns


An important feature here is the extensive use of JavaScript enhancements, making this web app both powerful and easy to use.


Tweeting


The tweet box is very simple without any frills, appearing as a basic input field when not selected and expanding to display additional information and options such as character count, link insertion and Geo location. As with most Twitter apps, there’s a built in URL shortener through bit.ly.


Tweeting

Tweeting


More Features


Lists


Unlike many other web apps, Seesmic enables you to create Twitter lists from the Seesmic page itself. This is a greatly appreciated feature; one which should be included in many other web apps.


Lists

Lists


To create a new list, select the Lists option from the left hand pane and select Create New List. You will then be presented with the list creation window where you’ll name and describe your list, then choose whether to keep the list public or private.


Lists Creation

Lists Creation


Geo Location


Seesmic also allows you to publish your location with the built in Geo location option. To use this feature you must enable Geo location in your Twitter control panel. Once setup, your location will be tagged to the tweet.


Geo Location

Geo Location


Messages


Messages

Messages

You can view the Direct messages, both sent and received, from the messages page as well as begin a new conversation using the New message… link. Clicking messages opens a column to the right of the main message list showing the entirety of the conversation. The great thing about this is your messages are shown as conversations rather than individual messages. This helps simplify communication.

Contacts


The contacts page shows your profile information in an elegant manner. From this page you can see a list of your followers and the people you are following. You’ll be able to unfollow people along with view interesting information from MrTweet, such as your (or your follower’s) tweet count per day, most contacted twitterers, etc.


Contacts

Contacts


Strangely, you’re not able to look up Twitter users and follow them from this page. Although, you are able to navigate via links in followers profiles to other users and follow them that way.


If you know the username of the Twitter user you want to follow or view, change the username at the end of the URL in the browser location bar. Ex: http://seesmic.com/web/index.html?locale=en#profile_USERNAMEHERE


Notifications


Notifications

Notifications

If you are multitasking while using Seesmic, you can turn on notification sounds to alert you when there is a tweet or DM. Although this is basic, it seems to be forgotten in some apps.


Unified Inbox (Single Column)


Last, but not the least, is the unified inbox view, which presents all the tweets in a very pretty Gmail-like interface. You’re able to do all the regular functions as in the multi-column view but you’re limited to viewing your regular Twitter stream.


Unified Inbox

Unified Inbox


To get to this view, click the single column icon at the bottom left of the page.


Final Thoughts


Seesmic Web seems to be a pretty simple and very responsive web app. Seesmic is blazing fast. This includes load times and functions such as search, direct messages and updating the Twitter status. Like Hootsuite, Seesmic is built with all sorts of JavaScripty goodness, giving it desktop-like capabilities.


However, there are quite a few shortcomings, such as the inability to manage multiple Twitter accounts, lack of customization, separate page for messages, etc. We hope that the Seesmic team ensures that these features are added in the next upgrade as most of them have become staple features in other Twitter apps.


While Seesmic is a fantasic Twitter web app—arguably among the best—it just isn’t as robust, feature filled and refined as other Twitter web apps that come to mind. For this reason, we’re giving Seesmic an 8/10.


Don’t Forget, Subscribe and Follow


Be sure to subscribe to our feed and follow us on Twitter for more great web app reviews, how-tos, roundups and giveaways!




"

Sunday, March 28, 2010

Mozilla discloses fixes to Firefox flaws

Mozilla discloses fixes to Firefox flaws: "

Mozilla patched more than one vulnerability in Firefox when it updated the browser to version 3.6.2 on Monday, the company confirmed today.

A total of 10 flaws were fixed in Firefox 3.6.2, according to Mozilla's security advisory page, but details of others have been withheld until the company updates the older Firefox 3.0 and Firefox 3.5 browsers. Mozilla is scheduled to ship the updates, Firefox 3.0.19 and Firefox 3.5.9, next Tuesday, March 30.

"

World’s Most Stunning Data Centers

World’s Most Stunning Data Centers: "


Who says technology can’t be art? Taking a break from our typical hacks and mods, we bring you the most impressive data centers of the world. Pictured above and below, Microsoft seems to have their top-secret data center organization down to an art. As you can see, the final results are just breath taking.



Sweeden’s Largest ISP:







This thing looks like a secret lair! On a truly epic scale, above is a newly opened high security data center run by one of Sweden’s largest ISPs. It’s located in an old nuclear bunker deep below the bedrock of Stockholm city and sealed off from the world by entrance doors 16 inches thick. Some data center’s have discovered how to turn those troublesome cables into something beautiful:


Data Center Cable Art:






As you can see, some data centers know how to properly organize their setups. The above are some of the best looking cable setups we’ve seen, but wait until you see the world’s worst cable messes.


Similar Posts:



Images via 1, 2, 3.




"