Recently in answered Category
We received this message in the inbox the other day:
Now, in order to answer this fairly, we need to back up. Adobe Illustrator is one of a number of programs that can be used to manipulate images. It's closely related to Adobe Photoshop. Photoshop is targeted at the manipulation of things like photographs, whereas Illustrator is better for drawing things like corporate logos or cartoons.
As to the question of whether either one of these programs records IP addresses as the files are being created or modified, the short answer is: No, I don't think so. At least, we have no evidence of them doing so.
But that short answer can be misleading, if the real question isn't "Is this recording my IP address", but really "Is it recording information about the computer that is either creating or editing the file?" If you're really asking the second question, then the answer is "Yes, it certainly is."
Save any picture you like off the Internet. For instance, let's take the first thing that showed up on Flickr when I searched for the word "Radio": A photograph of someone's very elaborate radio room. Note that on the right-hand side of the screen, Flickr says "This photo was taken on January 17, 2010 using a Canon EOS 50D." That information comes from the "metadata" stored along with the image. Metadata is the information about the picture that's stored inside the file data about the picture itself. If, for instance, you were to download the original version of the photograph in that link, you could then (using Windows) right-click on the file and select "Properties".
What you'll see depends upon which version of Windows you're using. Using Windows Vista, you'll have a choice of tabs, one of which is named "Details". Clicking on that tab brings up a list of details about the photo. Again, each computer is configured differently, but among the many pieces of information that may be stored include the name of the author, the title of the picture, the photo's dimensions and resolution, the time and date when it was taken, the type of camera used, details of the photo's setup (including factors like ISO speed and F-stop). All of this extra information is called metadata. It's also stored along with many other files you routinely use and create, including files in spreadsheets and word processors, PDF files, MP3 recordings, and virtually everything else. And, depending upon how your computer is configured, every such file you create may be recording details about your computer that can be retrieved easily by anyone who gets a copy of that file.
So: Is Adobe Illustrator recording your IP address? Not likely. But is your computer routinely storing information about you and your files inside the metadata within those files? You bet.
Does Adobe Illustrator record IP addresses as you are building a document?
Now, in order to answer this fairly, we need to back up. Adobe Illustrator is one of a number of programs that can be used to manipulate images. It's closely related to Adobe Photoshop. Photoshop is targeted at the manipulation of things like photographs, whereas Illustrator is better for drawing things like corporate logos or cartoons.
As to the question of whether either one of these programs records IP addresses as the files are being created or modified, the short answer is: No, I don't think so. At least, we have no evidence of them doing so.
But that short answer can be misleading, if the real question isn't "Is this recording my IP address", but really "Is it recording information about the computer that is either creating or editing the file?" If you're really asking the second question, then the answer is "Yes, it certainly is."
Save any picture you like off the Internet. For instance, let's take the first thing that showed up on Flickr when I searched for the word "Radio": A photograph of someone's very elaborate radio room. Note that on the right-hand side of the screen, Flickr says "This photo was taken on January 17, 2010 using a Canon EOS 50D." That information comes from the "metadata" stored along with the image. Metadata is the information about the picture that's stored inside the file data about the picture itself. If, for instance, you were to download the original version of the photograph in that link, you could then (using Windows) right-click on the file and select "Properties".
What you'll see depends upon which version of Windows you're using. Using Windows Vista, you'll have a choice of tabs, one of which is named "Details". Clicking on that tab brings up a list of details about the photo. Again, each computer is configured differently, but among the many pieces of information that may be stored include the name of the author, the title of the picture, the photo's dimensions and resolution, the time and date when it was taken, the type of camera used, details of the photo's setup (including factors like ISO speed and F-stop). All of this extra information is called metadata. It's also stored along with many other files you routinely use and create, including files in spreadsheets and word processors, PDF files, MP3 recordings, and virtually everything else. And, depending upon how your computer is configured, every such file you create may be recording details about your computer that can be retrieved easily by anyone who gets a copy of that file.
So: Is Adobe Illustrator recording your IP address? Not likely. But is your computer routinely storing information about you and your files inside the metadata within those files? You bet.
If you have kids (or grandkids), you're probably quite proud of them. That's great; it means you're a caring parent. But please do not use your child's picture as your Facebook profile photo -- or your profile picture anywhere else on the Internet, either. Here are several reasons why:
- Safety. Don't make it easier for predators to identify your kids by putting their pictures on the Internet. It's ridiculously easy to figure out who's related to whom just by using a few simple Internet searches. Once someone knows your name, and knows that you have kids, it takes no more than a couple of steps for them to figure out your kids' names. And if a predator knows your name, your kid's name, and what your kid looks like, then it's remarkably easy for that predator to target your child at school, at soccer practice, or on the playground -- and then use their knowledge of your family to concoct a potentially convincing story: "Hey, [child's name], my name's [fake name], and I'm a friend of your mommy and daddy. [Your name] had some car trouble, and they told me to take you home." If the predator has followed your Twitter posts, he might be able to add convincing details about something you did last weekend. If he's been following your LinkedIn profile, he could add lots of information about where you work and false details about how long you've been "working" together. Most children aren't wired to be skeptical enough for the information that's readily available today.
- Confusion. If someone is looking for your profile online, they want to confirm that it's you that they've found. Casual acquaintances, old friends from school, and other people who are looking for you (which is what a profile picture is for) probably don't know what your kids look like. They might be able to locate a resemblance of some sort, but don't make their lives more difficult. Just put up a picture of yourself.
- Identity in the Internet age. The Internet has delivered the age of permanent memory. And as tools like Google Image Search improve, words (like your name) and pictures are being linked permanently in the "memory" of the Internet. Linking your child's photo to your name means that, should something happen to you (good or bad), it can become associated with your child's identity. If, for instance, you were to be accused of a crime, or involved in an accident, newspapers and television stations are going to search online for a picture of you, because that's what their readers and viewers want to see. If you've caused your name to be linked to your child's picture, they're going to get false results -- but how would they know? Mixing the wrong name with the child's picture can cause confusion and possibly even damage the child's reputation. It's going to be hard enough in the future for people born in the Google age to keep their reputations intact, with tools like cell-phone cameras available to document every childhood indiscretion. Don't make it harder for kids to protect their reputations by intermixing their identities with your own -- who knows what indiscretions of our own from the pre-Internet era are going to find their way online, on top of the ones we add today?
Madeline writes with this question:
Today when I get in to read my e-mails, Zimbra comes up. I use Firefox. When I hit print Zimbra prints at top of page. Is this something Firefox has started or do I have something I need to get rid of and how do I do it?
Brian's answer:
Madeline's e-mail address says that she's using Frontier Internet, which is a service provider widely used for dial-up Internet access, especially in smaller communities (of which Iowa has plenty). I don't use it personally, so I'm trying to draw some conclusions based upon the evidence. Frontier appears to offer two ways to access e-mail: One through its own in-house webmail service, the other through a customized Yahoo service.
It was announced about a year and a half ago that Frontier would use the customized Yahoo service along with the Zimbra Collaboration Suite. Zimbra is a set of programs intended to integrate things like e-mail and calendar services under one umbrella. Yahoo used to own Zimbra but sold it earlier this year, so it would not surprise me if they previously hadn't done much to advertise their own name within Yahoo services, but had suddenly started to do so.
It doesn't really have anything to do with Firefox. But it's also nothing I'd get worried about.
Today when I get in to read my e-mails, Zimbra comes up. I use Firefox. When I hit print Zimbra prints at top of page. Is this something Firefox has started or do I have something I need to get rid of and how do I do it?
Brian's answer:
Madeline's e-mail address says that she's using Frontier Internet, which is a service provider widely used for dial-up Internet access, especially in smaller communities (of which Iowa has plenty). I don't use it personally, so I'm trying to draw some conclusions based upon the evidence. Frontier appears to offer two ways to access e-mail: One through its own in-house webmail service, the other through a customized Yahoo service.
It was announced about a year and a half ago that Frontier would use the customized Yahoo service along with the Zimbra Collaboration Suite. Zimbra is a set of programs intended to integrate things like e-mail and calendar services under one umbrella. Yahoo used to own Zimbra but sold it earlier this year, so it would not surprise me if they previously hadn't done much to advertise their own name within Yahoo services, but had suddenly started to do so.
It doesn't really have anything to do with Firefox. But it's also nothing I'd get worried about.
David asks:
My wife and I have an IBM-compatible computer that uses Windows XP. We recently switched from dial-up to a higher-speed line, giving us 1.5 mb/second. The problem is, it still seems to take forever to start our computer (and download e-mails). We suspect that we have a ton of programs that are slowing us down.
Can you recommend a low-cost software to scan our computer, delete unnecessary programs, and increase our computer's speed? Thanks for your consideration.
Brian's answer:
Can I recommend a program to do this? No. But I can offer you a series of steps that won't cost you anything and create the same result.
First, you'll need to run a full backup of anything valuable on your hard drive. You should do this anytime you're about to do any technical work on your computer, just in case anything goes wrong.
Once you've completed the backup, run a complete scan of your computer using your antivirus and anti-spyware programs. There are usually several different levels of scanning available. Use the most thorough one and plan to let it run overnight some night (this will take at least two nights, since you'll run antivirus one night and anti-spyware the next night). If either scan picks up anything nasty, allow the program to clean it up, then run it again the following night. As it says on the side of the shampoo bottle, "lather, rinse, and repeat." Repeat these scans until both of them come up clean.
Next, you'll need to learn how to enter your computer's system configuration utility and shut off those programs that automatically load themselves. It's not difficult, but it does involve following some pictures in order. I've prepared a guide to cleaning up the system configuration utility. Print it and follow the instructions.
Finally, to reduce the likelihood that you'll have these problems in the future, set up your computer to operate in a limited-access mode for most of your routine use (like web browsing and checking your e-mail). This will help make your computer more resistant to viruses and other malware that are often the culprits slowing your computer.
My wife and I have an IBM-compatible computer that uses Windows XP. We recently switched from dial-up to a higher-speed line, giving us 1.5 mb/second. The problem is, it still seems to take forever to start our computer (and download e-mails). We suspect that we have a ton of programs that are slowing us down.
Can you recommend a low-cost software to scan our computer, delete unnecessary programs, and increase our computer's speed? Thanks for your consideration.
Brian's answer:
Can I recommend a program to do this? No. But I can offer you a series of steps that won't cost you anything and create the same result.
First, you'll need to run a full backup of anything valuable on your hard drive. You should do this anytime you're about to do any technical work on your computer, just in case anything goes wrong.
Once you've completed the backup, run a complete scan of your computer using your antivirus and anti-spyware programs. There are usually several different levels of scanning available. Use the most thorough one and plan to let it run overnight some night (this will take at least two nights, since you'll run antivirus one night and anti-spyware the next night). If either scan picks up anything nasty, allow the program to clean it up, then run it again the following night. As it says on the side of the shampoo bottle, "lather, rinse, and repeat." Repeat these scans until both of them come up clean.
Next, you'll need to learn how to enter your computer's system configuration utility and shut off those programs that automatically load themselves. It's not difficult, but it does involve following some pictures in order. I've prepared a guide to cleaning up the system configuration utility. Print it and follow the instructions.
Finally, to reduce the likelihood that you'll have these problems in the future, set up your computer to operate in a limited-access mode for most of your routine use (like web browsing and checking your e-mail). This will help make your computer more resistant to viruses and other malware that are often the culprits slowing your computer.
David writes with this question:
Two or three weeks ago I heard you mention on your show that I need about three different pieces of software to protect against viruses and spyware. I was driving and couldn't write those down. Where can I find what you recommend for protection? I couldn't find these posted on your WHO webpage. I believe these were freeware but I might be wrong. I currently am using Trend Micro. Are the ones you recommend better?
Brian says:
Dan and I differ on this subject. He recommends that people use AVG Antivirus, Spybot Search and Destroy, and Ad-Aware. I don't really mind Spybot Search & Destroy, nor do I mind Ad-Aware, though I don't actively use either one because I prefer other alternatives. But I got really angry with AVG Antivirus when they started bombarding the Internet with traffic that wasn't really necessary. To the best of my knowledge, they've gotten their ducks in a row and aren't hogging bandwidth like they used to, but the experience really soured my opinion of them. Today, I generally recommend that people pony up a few dollars for commercial antivirus software from a source like Symantec or Kaspersky. But if you're too cheap to do that, I've found Avast to be a decent free alternative for home users.
Maybe it's unfair of me to hold a grudge against AVG like I do, but as the operator of a number of websites for which I have to pay overage charges if I get too much traffic (even if it's bogus traffic from antivirus programs, like what AVG was doing), I think it's fair to punish those who have transgressed.
No matter what antivirus software or anti-spyware tools you're using, though, the single most effective way to avoid trouble is to use a limited-access Windows profile. I could repeat this every ten minutes on the air, put a 300-foot banner on the side of 801 Grand, and hire a pilot to go skywriting with the message over Des Moines every day, and I still could not get the message across to enough people. Use a limited-access account, and you'll avoid -- by my estimate -- 90% to 95% of most malware risks on the Internet.
By the way, if you ever need a reminder about the free tools we talk about on the air, I keep a list of most of them at http://www.gongol.com/research/opensource.
Two or three weeks ago I heard you mention on your show that I need about three different pieces of software to protect against viruses and spyware. I was driving and couldn't write those down. Where can I find what you recommend for protection? I couldn't find these posted on your WHO webpage. I believe these were freeware but I might be wrong. I currently am using Trend Micro. Are the ones you recommend better?
Brian says:
Dan and I differ on this subject. He recommends that people use AVG Antivirus, Spybot Search and Destroy, and Ad-Aware. I don't really mind Spybot Search & Destroy, nor do I mind Ad-Aware, though I don't actively use either one because I prefer other alternatives. But I got really angry with AVG Antivirus when they started bombarding the Internet with traffic that wasn't really necessary. To the best of my knowledge, they've gotten their ducks in a row and aren't hogging bandwidth like they used to, but the experience really soured my opinion of them. Today, I generally recommend that people pony up a few dollars for commercial antivirus software from a source like Symantec or Kaspersky. But if you're too cheap to do that, I've found Avast to be a decent free alternative for home users.
Maybe it's unfair of me to hold a grudge against AVG like I do, but as the operator of a number of websites for which I have to pay overage charges if I get too much traffic (even if it's bogus traffic from antivirus programs, like what AVG was doing), I think it's fair to punish those who have transgressed.
No matter what antivirus software or anti-spyware tools you're using, though, the single most effective way to avoid trouble is to use a limited-access Windows profile. I could repeat this every ten minutes on the air, put a 300-foot banner on the side of 801 Grand, and hire a pilot to go skywriting with the message over Des Moines every day, and I still could not get the message across to enough people. Use a limited-access account, and you'll avoid -- by my estimate -- 90% to 95% of most malware risks on the Internet.
By the way, if you ever need a reminder about the free tools we talk about on the air, I keep a list of most of them at http://www.gongol.com/research/opensource.
Larry sends us this question:
Don't you think that the world would be a better place if smartphone manufacturers would allow their phones to be unlocked and useable with any service provider? The problem with iPhone is that it can only be used with AT&T. My experience with AT&T is that there are many places in this country where their cell service is not available. Other carriers have better coverage. But by only allowing the iPhone to be available through one carrier precludes me from owning one. That's why I have the Motorola Droid. It's usable nearly every place life takes me. Do you think there should be laws passed, similar to anti-monopoly laws that would open the marketplace to a more beneficial level playing field for users?
Brian's reply:
I'm with Larry all the way up until his very last sentence. I think the deal struck between Apple (maker of the iPhone) and AT&T is pretty silly. Imagine if Henry Ford and Alfred P. Sloan had spent their time negotiating agreements whereby you could only drive a Ford or a Buick on certain roads, but not on all the rest. If they'd been that ridiculous, then today, all Americans would be driving Packards or some other vehicle.
Exclusivity makes a little bit of sense up-front: Instead of building phones to work on America's two segregated cellular networks, Apple only had to focus on one (the GSM band). The agreement drew a lot of users to AT&T Wireless who probably would have shopped around otherwise, and that allowed Apple to split the costs of marketing and promoting the phone with a single dedicated partner that had all kinds of incentive to make the product work.
And it's not as though Apple and AT&T were the first to strike an exclusive deal. Cell phones are subsidized heavily by the wireless-service companies, who pay for some of the cost of the phone in order to lock customers into (usually) two-year contracts with hefty fees for early termination.
But the exclusive agreement undoubtedly cost AT&T a lot of customers in places -- like rural Iowa, for instance -- where GSM coverage is lousy. Geographically speaking, AT&T's 3G network (their broadband Internet data service) covers perhaps 5% of the entire state, and excludes Mason City, Waterloo/Cedar Falls, Dubuque, and Sioux City, among other major cities. No problem if you never leave metro Des Moines. A big problem if you plan to hit a football game at any one of the three state schools and want to stream anything to your iPhone when you get there.
The answer to this problem, though, isn't more government regulation. The market has already solved the problem, just as Larry has discovered: Competitors to the iPhone -- some of which are probably even better than the iPhone -- are available, and they work on networks everywhere. I took a vacation in December and was able to get Internet access on my phone both on the cruise ship and walking around places like Grand Cayman, using a Palm Centro. A friend who also went on the trip got nothing from his AT&T iPhone. Now, maybe you want to be cut off from your e-mail while on vacation. But I'm a partner in a business, and I can't be unreachable for that long. So I'll never be a customer of a wireless network that doesn't allow me to travel freely. I still want a smartphone, though, so I represent a ready-made market for smart wireless providers and phone makers. And there are a lot of us.
Why do I oppose government intervention in this market? Because I think it's costly, intrusive, and ineffective:
Don't you think that the world would be a better place if smartphone manufacturers would allow their phones to be unlocked and useable with any service provider? The problem with iPhone is that it can only be used with AT&T. My experience with AT&T is that there are many places in this country where their cell service is not available. Other carriers have better coverage. But by only allowing the iPhone to be available through one carrier precludes me from owning one. That's why I have the Motorola Droid. It's usable nearly every place life takes me. Do you think there should be laws passed, similar to anti-monopoly laws that would open the marketplace to a more beneficial level playing field for users?
Brian's reply:
I'm with Larry all the way up until his very last sentence. I think the deal struck between Apple (maker of the iPhone) and AT&T is pretty silly. Imagine if Henry Ford and Alfred P. Sloan had spent their time negotiating agreements whereby you could only drive a Ford or a Buick on certain roads, but not on all the rest. If they'd been that ridiculous, then today, all Americans would be driving Packards or some other vehicle.
Exclusivity makes a little bit of sense up-front: Instead of building phones to work on America's two segregated cellular networks, Apple only had to focus on one (the GSM band). The agreement drew a lot of users to AT&T Wireless who probably would have shopped around otherwise, and that allowed Apple to split the costs of marketing and promoting the phone with a single dedicated partner that had all kinds of incentive to make the product work.
And it's not as though Apple and AT&T were the first to strike an exclusive deal. Cell phones are subsidized heavily by the wireless-service companies, who pay for some of the cost of the phone in order to lock customers into (usually) two-year contracts with hefty fees for early termination.
But the exclusive agreement undoubtedly cost AT&T a lot of customers in places -- like rural Iowa, for instance -- where GSM coverage is lousy. Geographically speaking, AT&T's 3G network (their broadband Internet data service) covers perhaps 5% of the entire state, and excludes Mason City, Waterloo/Cedar Falls, Dubuque, and Sioux City, among other major cities. No problem if you never leave metro Des Moines. A big problem if you plan to hit a football game at any one of the three state schools and want to stream anything to your iPhone when you get there.
The answer to this problem, though, isn't more government regulation. The market has already solved the problem, just as Larry has discovered: Competitors to the iPhone -- some of which are probably even better than the iPhone -- are available, and they work on networks everywhere. I took a vacation in December and was able to get Internet access on my phone both on the cruise ship and walking around places like Grand Cayman, using a Palm Centro. A friend who also went on the trip got nothing from his AT&T iPhone. Now, maybe you want to be cut off from your e-mail while on vacation. But I'm a partner in a business, and I can't be unreachable for that long. So I'll never be a customer of a wireless network that doesn't allow me to travel freely. I still want a smartphone, though, so I represent a ready-made market for smart wireless providers and phone makers. And there are a lot of us.
Why do I oppose government intervention in this market? Because I think it's costly, intrusive, and ineffective:
- Costly, because you may recall the days when Ma Bell had a government-regulated monopoly on phone service. You got a rotary-dial phone and you paid mightily for long-distance service. All of the real innovation in telecommunications has happened ever since government got out of the day-to-day regulation of telephone service. Ma Bell never gave you text messaging, free voice mail and call waiting, or wireless 3G service, did she?
- Intrusive, because we all instinctively seem to want everyone else to be regulated, but never ourselves. That's because we recognize the harm of over-regulation when we pay the costs, but we tend to ignore it when we think someone else is paying. For instance, if I told you that the government was going to regulate what chair and microphone I had to use on the WHO Radio Wise Guys, you probably wouldn't care. But if I told you that the government was going to regulate which presets you could use on your car stereo and which stations had to be programmed in, you'd probably revolt. If I were running a wireless-service company or a phone manufacturer, I wouldn't want government telling me what deals I could cut any more than I want them telling me how to run a radio show.
- Ineffective, because Apple has been down this road before. They had a choice in the 1980s to allow open development on their computer platform, or to try to control the operating system and the manufacturing of the computers themselves. Microsoft, on the other hand, licensed its operating system to any manufacturer who would pay for it, and allowed programmers to build as many useful tools around their OS as wanted to. Microsoft controls a crushing share of the OS market today. Opening up to different computer manufacturers and outside programmers did far more to allow Microsoft to become a near-monopolist than trying to tightly control the system, like Apple did. In other words, we shouldn't be surprised if we look back ten or twenty years from now and marvel at how dumb it was for Apple to go with an exclusive deal with AT&T, as 85% of us end up using smartphones built on some other platform.
Listener question:
My wife and daughter will be going to Europe on a cruise, primarily in Italy, Greece, Turkey, and Ukraine, and various locations getting to these countries. They want to have a cell phone that they can use, and I don't think US Cellular has a tower there. Where do we get information about a phone that might actually work in these countries?
Brian's answer:
You're right: US Cellular doesn't work overseas. That's because many American cell phone companies, including US Cellular, use CDMA. The European mobile-phone services use GSM. Do you really need to know the technical details? Not really. Just understand that it's a lot like the problem you'll encounter when you try to watch a Region 2 DVD on a Region 1 DVD player.
To use a phone in Europe, you have two choices:
1. Sign up with a US phone service that offers GSM, like AT&T or T-Mobile. Then be prepared to pay some seriously huge roaming charges, especially if they're hopping from country to country. You won't really know the full cost until a month or two after they're home.
2. Buy a prepaid GSM phone that can be used here or there. If you really want to get sophisticated, you could forward calls from their regular numbers to the prepaid phone, but then be prepared to pay some big-time long-distance charges, since you'll probably be charged international rates for every minute of forwarded calling.
If it were me, I'd probably just get a prepaid GSM phone and leave a special outgoing message on their phones saying "here's where to reach me in an emergency."
We'll take calls from domestic and international listeners alike this Saturday from noon until 2:00 on Newsradio 1040 WHO at 515-284-1040. Or text us at 515-989-1040 and save on roaming charges.
My wife and daughter will be going to Europe on a cruise, primarily in Italy, Greece, Turkey, and Ukraine, and various locations getting to these countries. They want to have a cell phone that they can use, and I don't think US Cellular has a tower there. Where do we get information about a phone that might actually work in these countries?
Brian's answer:
You're right: US Cellular doesn't work overseas. That's because many American cell phone companies, including US Cellular, use CDMA. The European mobile-phone services use GSM. Do you really need to know the technical details? Not really. Just understand that it's a lot like the problem you'll encounter when you try to watch a Region 2 DVD on a Region 1 DVD player.
To use a phone in Europe, you have two choices:
1. Sign up with a US phone service that offers GSM, like AT&T or T-Mobile. Then be prepared to pay some seriously huge roaming charges, especially if they're hopping from country to country. You won't really know the full cost until a month or two after they're home.
2. Buy a prepaid GSM phone that can be used here or there. If you really want to get sophisticated, you could forward calls from their regular numbers to the prepaid phone, but then be prepared to pay some big-time long-distance charges, since you'll probably be charged international rates for every minute of forwarded calling.
If it were me, I'd probably just get a prepaid GSM phone and leave a special outgoing message on their phones saying "here's where to reach me in an emergency."
We'll take calls from domestic and international listeners alike this Saturday from noon until 2:00 on Newsradio 1040 WHO at 515-284-1040. Or text us at 515-989-1040 and save on roaming charges.
Colleen asks this question:
Saturday afternoons are busy for me, but I did happen to catch your show Jan. 30 and heard about Amazon Mechanical Turk. I went to the site and checked it out. I am new to this kind of thing and was wondering how safe a site like this is. In the process of signing up to the site, I learned that as a worker I would be asked to supply my social security number so 1099's could be made out by the requester and sent next tax season. I am not sure that is a wise thing to do. Any insight?
Brian's answer:
You're very smart to be conscious of the security consequences involved in giving anyone your Social Security Number. Bravo! Taking a look at the IRS instructions, it appears that a requester would only need to issue a Form 1099 to you if you earned more than $600 in a single year. So if you really want to avoid this problem, you might just be careful to not exceed $600 worth of work for any individual requester. That having been said, if you've done $600 worth of work for any person or company, you've probably had a sufficient chance to figure out whether they're honest or not, and whether you'd be willing to give them your SSN. By the way, to get your tax information, the requester has to supply his or her own EIN (Employer Identification Number) as well.
Saturday afternoons are busy for me, but I did happen to catch your show Jan. 30 and heard about Amazon Mechanical Turk. I went to the site and checked it out. I am new to this kind of thing and was wondering how safe a site like this is. In the process of signing up to the site, I learned that as a worker I would be asked to supply my social security number so 1099's could be made out by the requester and sent next tax season. I am not sure that is a wise thing to do. Any insight?
Brian's answer:
You're very smart to be conscious of the security consequences involved in giving anyone your Social Security Number. Bravo! Taking a look at the IRS instructions, it appears that a requester would only need to issue a Form 1099 to you if you earned more than $600 in a single year. So if you really want to avoid this problem, you might just be careful to not exceed $600 worth of work for any individual requester. That having been said, if you've done $600 worth of work for any person or company, you've probably had a sufficient chance to figure out whether they're honest or not, and whether you'd be willing to give them your SSN. By the way, to get your tax information, the requester has to supply his or her own EIN (Employer Identification Number) as well.
Connie asks this question:
Something bad has happened to my computer. Somehow, and I honestly don't know who, but Personal Security program has been installed onto my computer. I have been able to run my antivirus and eliminate the problem through that, and I have also now been able to delete it from my programs area. But, it seems to have deleted my icons from my desktop and is preventing me from accessing current websites in my favorites list. Please tell me I have not ruined my computer. And, if possible help me restore to where I was before this misfortune.
I listen to your program as often as I can, as I an a little older computer user and can use all the info in can get into my brain.
I am feeling extremely vulnerable, as my Norton expires and needs renewal by 12-27-09 and I am afraid at this point to use a credit card while this is going on.
I hate to sound like I am begging, but, the truth is the truth. HELP!!!!!!!!!!!!!!!!!!!!!!!!!!
Thank you so much for your consideration to my problem.
Brian's answer:
To be perfectly honest, your inquiry completely baffled me when I first read it. The missing part to the puzzle was that when you described "Personal Security", I thought you were talking about Norton Internet Security and I couldn't understand what sort of problem you were describing. After some further research, I now understand better: You were talking about "Personal Security", which is the trade name of a piece of malware that behaves just like a virus -- with the intention of more or less coercing you into paying for a specific piece of anti-virus software. It's exactly the opposite of "personal security"; it's a security liability.
Rather than trying to reinvent the wheel, I'm going to point you to an existing description of how to remove "Personal Security" that seems to have earned the approval of lots of respondents on message boards, including one for users of AVG Anti-Virus.
If you have followed all of the policies listed in the links I copied above and are still having trouble, you're going to need some one-on-one help. But here's some advice for everyone, so they can avoid your kind of trouble:
Something bad has happened to my computer. Somehow, and I honestly don't know who, but Personal Security program has been installed onto my computer. I have been able to run my antivirus and eliminate the problem through that, and I have also now been able to delete it from my programs area. But, it seems to have deleted my icons from my desktop and is preventing me from accessing current websites in my favorites list. Please tell me I have not ruined my computer. And, if possible help me restore to where I was before this misfortune.
I listen to your program as often as I can, as I an a little older computer user and can use all the info in can get into my brain.
I am feeling extremely vulnerable, as my Norton expires and needs renewal by 12-27-09 and I am afraid at this point to use a credit card while this is going on.
I hate to sound like I am begging, but, the truth is the truth. HELP!!!!!!!!!!!!!!!!!!!!!!!!!!
Thank you so much for your consideration to my problem.
Brian's answer:
To be perfectly honest, your inquiry completely baffled me when I first read it. The missing part to the puzzle was that when you described "Personal Security", I thought you were talking about Norton Internet Security and I couldn't understand what sort of problem you were describing. After some further research, I now understand better: You were talking about "Personal Security", which is the trade name of a piece of malware that behaves just like a virus -- with the intention of more or less coercing you into paying for a specific piece of anti-virus software. It's exactly the opposite of "personal security"; it's a security liability.
Rather than trying to reinvent the wheel, I'm going to point you to an existing description of how to remove "Personal Security" that seems to have earned the approval of lots of respondents on message boards, including one for users of AVG Anti-Virus.
If you have followed all of the policies listed in the links I copied above and are still having trouble, you're going to need some one-on-one help. But here's some advice for everyone, so they can avoid your kind of trouble:
- Use a limited-access account. Don't use your administrator account unless you're trying to specifically install a program. This one step will eliminate 95% of your ordinary risk when using the Internet.
- Use Firefox, Opera, or Chrome instead of Internet Explorer when surfing the Web.
- If you're worried about using your credit card for any reason, there's always an alternative: You can call the company selling the product or go to a physical store where you can purchase the software (or whatever you're buying).
Listener question:
I purchased a new computer at Best Buy and windows software they sold me doesn't have outlook express. My daughter suggested a free program but i don't know which to choose. It would cost another $100 to download outlook. I'm frustrated.
Answer:
I don't mean to sound snarky, but don't use Outlook. Outlook is what we call client-based e-mail, which means that every e-mail message you receive is downloaded onto your computer before you can read it. The problem is that using a client-based service means your only line of defense between the viruses that are attached to a lot of e-mail and your computer is your anti-virus software.
Your question came from a Gmail account. We have repeatedly advocated using webmail services (like Gmail, Yahoo Mail, and Hotmail) to handle all incoming e-mail. That's because they do a much better job of protecting your computer from inbound e-mail viruses than you could do. First of all, they filter the spam before it reaches your computer. If I were a betting man, I'd wager that 95% or more of viruses and Trojan horses that cross the Internet are attached to spam, rather than to legitimate messages you send and receive from family and friends. So, if you can filter out the spam before it gets to your computer, you've done 95% of the work.
Second, webmail services usually include automatic virus-checking. That's because it doesn't do them any good to have customers whose computers are full of viruses, either. You shouldn't rely on automatic virus-checking through a webmail service for all of your protection -- you should use your own anti-virus software, too -- but having a free second layer of protection certainly doesn't hurt.
Third, webmail services make you stop before trying to download attachments. Using a client-based program may give you instant access to attachments, but it also gives those attachments instant access to your computer. When those attachments include viruses and Trojan horses (which they sometimes do), it's far better to have to take an extra step to make sure that you know what you're downloading -- and that you're running the download past your antivirus software -- than to risk ruining your computer with malware.
So, the bottom line is this: Use a webmail service unless you absolutely must have a client-based program (say, for instance, if it's required for work). If you have absolutely no choice in the matter and have to use a client-based e-mail program, Thunderbird is a free, open-source alternative to Outlook.
For more tips, tune in to the WHO Radio Wise Guys this Saturday at noon on Newsradio 1040 WHO.
I purchased a new computer at Best Buy and windows software they sold me doesn't have outlook express. My daughter suggested a free program but i don't know which to choose. It would cost another $100 to download outlook. I'm frustrated.
Answer:
I don't mean to sound snarky, but don't use Outlook. Outlook is what we call client-based e-mail, which means that every e-mail message you receive is downloaded onto your computer before you can read it. The problem is that using a client-based service means your only line of defense between the viruses that are attached to a lot of e-mail and your computer is your anti-virus software.
Your question came from a Gmail account. We have repeatedly advocated using webmail services (like Gmail, Yahoo Mail, and Hotmail) to handle all incoming e-mail. That's because they do a much better job of protecting your computer from inbound e-mail viruses than you could do. First of all, they filter the spam before it reaches your computer. If I were a betting man, I'd wager that 95% or more of viruses and Trojan horses that cross the Internet are attached to spam, rather than to legitimate messages you send and receive from family and friends. So, if you can filter out the spam before it gets to your computer, you've done 95% of the work.
Second, webmail services usually include automatic virus-checking. That's because it doesn't do them any good to have customers whose computers are full of viruses, either. You shouldn't rely on automatic virus-checking through a webmail service for all of your protection -- you should use your own anti-virus software, too -- but having a free second layer of protection certainly doesn't hurt.
Third, webmail services make you stop before trying to download attachments. Using a client-based program may give you instant access to attachments, but it also gives those attachments instant access to your computer. When those attachments include viruses and Trojan horses (which they sometimes do), it's far better to have to take an extra step to make sure that you know what you're downloading -- and that you're running the download past your antivirus software -- than to risk ruining your computer with malware.
So, the bottom line is this: Use a webmail service unless you absolutely must have a client-based program (say, for instance, if it's required for work). If you have absolutely no choice in the matter and have to use a client-based e-mail program, Thunderbird is a free, open-source alternative to Outlook.
For more tips, tune in to the WHO Radio Wise Guys this Saturday at noon on Newsradio 1040 WHO.