20 approaches to keep your internet identity safe from hackers

Do you use the equal password for all web sites? Do you overshare on Facebook? If so, you’re a goal for cyber criminals – whose computer scams are costing Britain £27bn a yr. We requested professionals for their pinnacle pointers to beat the fraudsters

We’re excessive up inside the Gherkin in the City of London and Garry Sidaway, director of the safety method at Integralis, a firm which advises government corporations, pharmaceutical and financial offerings multinationals, is giving my laptop a security MOT. “You don’t have anti-virus software program, I see,” he says, a trace of mockery in his voice. “That’s your first mistake.”

Graet New

According to Sidaway, while most of us are a lot greater awareness about the risks now (“My mom shreds her documents even supposing she would not realize why” he says), we have to all be raising the bar. He thinks we Britons are a very trusting lot. Sitting geese for an armada of hackers, who’s every bit as centered on stealing our statistics as we’re comfy about storing it. “The crook gangs recognize precisely which kind of information they need and in which it’s far likely to be,” he explains. “Conversely we’re no longer certain what they’re after.”

Image result for internet

So what are they after, I ask? “We see an extensive sort of assaults – everything from opportunists seeking to extract passwords through phishing [emails which purport to be from legitimate sources and attempt to get us to click on an infected link] to distinctly organised crime units targeting organizations and government systems with a purpose to scouse borrow highbrow assets and data related to important infrastructure.”

The authorities estimate that the total value of cybercrime within the UK is £27bn 12 months. The majority (£21bn) is devoted towards organizations, which face high tiers of intellectual belongings robbery and commercial espionage.

Enabled via the sharing lifestyle on social media – and with ever more state-of-the-art malicious software referred to as malware at their disposal – cyber criminals have turn out to be some distance greater adept at crafting assaults and targeting people and firms. Phishing emails purporting to be from buddies, often reflecting our pursuits – perhaps gleaned from social media web sites – or from trusted enterprises together with your bank or HM Revenue & Customs inspire us to click on inflamed hyperlinks or attachments containing malware. (A current example of the latter turned into malware disguised as a security caution from Microsoft’s virtual crimes unit.) “We have a level of accepting as true with in certain corporations, and criminals take advantage of that agree with,” says Sidaway.

Typically, these so-known as “man-in-the-middle” attacks deploy colorfully named Trojans (pieces of malware, basically) which includes Zeus, SpyEye or Citadel on computers, that have the impact of compromising, as an instance, on line banking transactions. “Everything then you do in your compromised pc is subverted thru a hacking web site which means that when you [communicate] with your financial institution, you’re going through a person within the middle. Initially, guy-in-the-middle assaults were passwords used in authentication – the crook could wait until you had finished starting using the credentials that they had just gathered. This is why banks delivered in one-time passwords or codes,” he says.

“But extra latest malware will perform a person-in-the-middle assault to reap the consumer’s session (a session is created after a user logs in successfully and the browser and the bank’s internet site use this to retain the interaction) and fake the logout requests. Once the user thinks they’ve logged out, the attacker can make payments using the prevailing session with out the sufferer seeing any changes to their stability till the subsequent time they log on. This is partially why banks have rolled out card readers to help prevent bills to new payees.” He adds: “It’s a constant game of cat and mouse.”

1. Never click on a link you probably did now not count on to acquire
The golden rule. The essential manner criminals infect PCs with malware is through luring customers to click on on a hyperlink or open an attachment. “Sometimes phishing emails incorporate obvious spelling mistakes and negative grammar and are smooth to spot,” says Sidaway of Integralis. “However, focused assaults and well-performed mass mailings can be almost indistinguishable [from genuine emails].” Social media has helped criminals profile people, permitting them to be an awful lot extra effortlessly targeted, he provides. “They can see what you are interested in or what you [post] about and ship you crafted messages, inviting you to click on something. Don’t.”

2. Use distinctive passwords on unique sites
With people normally having anything up to 100 online bills, the tendency has grown to be to share one or passwords across money owed or use very simple ones, inclusive of loved ones’ names, first pets or favorite sports teams. Indeed, studies by Ofcom last month found out that over 1/2 of UK adults (55%) use the same passwords for maximum, if no longer all, websites they visit, while one in 4 (26%) use birthdays or names as passwords. Any phrase located in the dictionary is effortlessly crackable. Instead, says Sian John, on line protection consultant at Symantec, have one memorable word or a line from a favorite music or poem. For example: “The Observer is a Sunday newspaper” will become “toast.” Add numerals and a special person for that reason: “T0!Asn”. Now for every web site, you go online to, add the primary and closing letter of that web site to the start and stop of the word, so the password for Amazon might be “AT0!Ann”. At first look, unguessable. But for you, still memorable.”



‘This.’ sucks: why you need to stop using the net’s worst one-word sentence

Internet slang became as soon as Rhik Samadder’s new jam, however now he can’t even. As new social community This. Arrives, he explains why language in the meme-age is not amazeballs

This. Is the buzziest social media web page. No, no longer this. This.Cm is a platform in which customers can pay the best percentage an unmarried hyperlink an afternoon, in an try to nonetheless the white noise of facts overload. This misses the factor of the internet, that’s the exponential proliferation of ideas, and pithy clips of cats being bastards. But I become struck by using the call, which references a piece of net slang that is uniquely worrying and sinister, like someone sporting a balaclava at a buffet.

What is it approximately on line speech that can be so anxious? I’m not glad you requested. Writing approximately slang is thankless and futile and slides into irrelevancy faster than tea cools. In the meme-age, it shapeshifts like a chameleon on mephedrone. In gaming communities, slang breeds in its very own microbial way of life, spawning unexpectedly, mutating, and demise unobserved to the outer world.

Graet News Network

But a few slang sticks around lengthy enough or receives big sufficient, that we certainly are aware it, even supposing we don’t recognize it. It perpetually sparks a whole lot of anger, depression, and the wailing actuality that English has died, younger humans now speak by drawing on each different in digital crayons, and in 30 years will all be speaking in a few type of bastard binary.



Related image

Maybe that’s authentic. There are a few eye-watering examples of on-line idiocy around, the maximum brazen of that are acronyms. Acronyms are the holiday reps of internet communicate, grinding on you in hotpants, providing you neon drinks, making you experience vintage. STAY! They holler in your face, however DILLIGAS! Is it viable to stay abreast of net acronyms? QTWTAIN. (In point of linguistic technicality, maximum of the above aren’t acronyms, due to the fact they’re not pronoun- SORRY, TL;DR.)

We don’t like acronyms because they’re abstruse and extraordinary, that’s kinda the deal with slang, daddy-o. Frantically looking them up on Urban Dictionary is as vain as choosing up sex tips from magazines – you’re by no means going to use them well.

Doge meme
Doge: amazeballs. Photograph: net
Then there are as soon as fun terms staled through repetition, and using repetition, I suggest the second one time you listen to them. I lol’d out loud the primary time I saw roflcopter, rollerskates, the usage of *hints fedora* as a gesture of respect. I love the playfulness in language – the creative misspellings, idiot pronunciation and syntax of lolcats, Homestar runner and doge nonetheless tickle me silly. Even amazeballs – I am providing you with amazeballs, you can’t say fairer than that – would possibly have earned a grudging smirk once, and as soon as best. Where there once turned into creativity, however, there is now herd-lol. One-dimensional jokes can most effective be stretched one manner, that’s too thin.

But there’s a more insidiously annoying species of net phraseology. It’s easy to understand, and not looking to be humorous. It’s the kind of template-mind-set followed using those who simply dig themselves. Take a word like “X is my new jam”. X is my new jam is – or on account that I’m writing about it here, changed into – a breezy manner of sharing a song on social media. While it literally method “this is what I’m being attentive to,” it aspires to be a white man with dreadlocks, tossing you a CD as he rolls using on a longboard. In other words, it deserves a dry slap. Its remit also broadens, to the point that some thing may be your new jam, whether it’s a strolling excursion of the Imperial War Museum or marmalade.

The open ended “I can’t even” is an affectation of incomprehension that you can’t a method or respond to what you’ve got just examine or visible, due to the fact it’s far a brand new paradigm of stupidity/sexiness/goats making a song Taylor Swift. It’s no longer ineffective, but it’s far lazy – while we soar to responsive stop-factors like this, discussion shuts down. (Similarly, I don’t like “Just saying,” as it implies the user is a sassy directly-talker, who settles issues in a manner nobody else can manipulate, or speak beyond.)

ways to stop hackers: ‘What’s the hassle with sharing my Facebook info with friends of buddies?’
Facebook frequently updates its timeline and privateness settings, so it’s far sensible to monitor your profile, mainly if the layout of Facebook has modified. Firstly, in the privacy settings menu, under “Who can see my stuff?” trade this to “friends” (be warned: setting this to “pals of friends” means that, in step with one Pew examine, on common you’re sharing information with 156,569 human beings). Also in privacy, setting “limit old posts” applies pals-handiest sharing to the past in addition to future posts. Thirdly, disable the ability of other search engines to link on your timeline.


Facebook Twitter Pinterest
It’s the Taylor Swift Screaming Goat. Just saying.
But for my cash, the worst is ‘This.’ Always with the capital T, and complete forestall, to suggest communication starts of evolved and ends with something I am about to reveal you. Sometimes you get it in all caps, any other indicator you aren’t in a conversational realm. ‘This.’ Aims for a lapidary excellent, as if the endorsement must be carved in stone drugs and broken over your head. It might be a vine of Ryan Gosling feeding a rabbit, or a newsreader accidentally announcing ‘boner’. It doesn’t depend. Prepare for the summum bonum (heh, bonum) of enjoyment. Perhaps it’s simplest ‘This.’ for the sharer. However, it has the huge weight of a black obelisk, annoying your attention. It doesn’t give you information, or choice. There is a risk in it. Whoever writes ‘This.’ has given them the sanction to accomplish that, and also you ought to comply with. Only despots quash subjectivity, pretending there are not any those, simplest this.

Don’t do that.

Passwords, phones and privacy settings: how to protect yourself on line

Stay safer at the net with these guidelines on shoring up your digital security, and join our stay Q&A on the issue at 2 pm these days

Sensible humans are vigilant approximately on line protection as a matter of course, ever alert to the opportunity that someone would possibly breach their passwords for the purposes of stealing. Like those who drink the advocated quantity of gadgets and make sure their puppies by no means have chocolate, I don’t recognize human beings like this. However, I’ve heard they exist.

Graet Report


As horrific as theft is, there may be an extra peril, that is what induced online game developer Zoe Quinn to plot Coach, a chain of stroll-throughs to protect you on the line, and feminist activist Anita Sarkeesian to create her online protection manual.

If you’re monumentally unlucky, you could find yourself in the attention of the net’s fury, and the range of factors cyber-able strangers can do to you is huge and extremely nasty. Doxing is while a person hacks into your account and publicizes your private details – from there, the dying and rape threats which might be habitual for women with a substantial online presence take on a hideous new plausibility. You are susceptible to acts of baroque vandalism, like swatting – wherein an emergency name is faked from your cope with and the police storm your own home – and, of course, nonetheless theft.

Image result for internet

Start using downloading a password control tool – I used LastPass. You go through your accounts in this order: Google, Yahoo, Microsoft, Apple, Dropbox, Facebook, Twitter, Tumblr, PayPal, eBay, Amazon, after which any not-so-ordinary sites (Ocado and Outnet, basically). LastPass generates new passwords for them so that it will be then autofill via a snowflake button at the browser. The method of converting is painful; it shames me to admit that, more than as soon as, I incorrectly stored the brand new password on to LastPass, then needed to undergo hell to change it again, ending up with a couple of variations of the equal web site in my “vault.” I am nevertheless locked out of Facebook however this is for the best, I suppose. It ought to take approximately an hour – it took me approximately.




Online abuse: how ladies are fighting back
Read greater
Then you check in for two-step verification where you may, which means each time you want to make a transaction, you’ve texted a code for your cell. This sounds like a greater problem than it is because it’s rare in your cell to be very far away. Even in case you are an inveterate non-worrier, you may feel more relaxed after this. Especially in case you are a person whose passwords had been all variations on the equal formation, and you previously spent your lifestyles seeking to consider the minute variations, you’ll be surprised at how much free time you currently have and may get on with getting to know an device or a brand new language.

Other than that, the main porosity I discovered became Companies House. If you are an employer director – and this isn’t as niche as it sounds, since it consists of firms with charitable targets but not charitable status – your private home cope with could be indexed, until you’ve got alerted them to some precise threat. In america, there are also some of the websites that are listing humans’ addresses – inclusive of Spokeo – and you will need to touch every of them immediately to ask to be eliminated. Apart from Freeelectoralrolls.Com, this isn’t always such big business in the UK.

Other viable breaches are: failure to choose the proper privacy settings for your internet site or selected social media, and this is enormously easy; or leaks via your own family members, particularly on a domain like Facebook, where you may have the most stringent settings but discover that your place may be correctly diagnosed maximum of the time through your fool children. You might also, in case you haven’t misplaced the will to stay, need to undergo these types of approaches with the alternative participants of your household.

Hardware compromises are where things grow to be complex: symptoms that your pc has been hacked consist of home windows opening on their own, unexpected slowness, tough-drive grinding. Mac has a program referred to as Little Snitch if you want to tell you while information is being despatched out of your pc, and Wireshark is a community protocol analyzer. Yes, exactly: your paranoia needs to be at quite excessive ranges for this degree of interest to be profitable.

The terror of swatting: how the regulation is tracking down high-tech prank callers
Read more
The journalist Geoff White and techie Glenn Wilkinson have finished some bracing paintings, meanwhile, on how plenty records may be accrued approximately you and your whereabouts via your smartphone or mobile tool. The tech journalist Christian Payne summed this up smartly: the only way to defend yourself from the possibility that a person ought to thieve your identification or find out your whereabouts thru your telephone is to hold it in lead-lined pockets and no longer use it.

Using Facebook on a smartphone
Facebook Twitter Pinterest
The handiest manner to avoid a safety breach from a cellular smartphone is to not use one in any respect. Photograph: Kennedy Photography / Alamy/Alamy
Incidentally, the equal is genuine of your passport – its details can be examined from a distance, and consequently it leaks information constantly. Keep away from public Wi-Fi networks, hold your gadget up to date, and download Prey directly to every device, so you can wipe it remotely if it’s far stolen. But there is simplest one way to keep away from all of the security breaches offered through a cell cellphone, and that is via not having a cell cellphone.

Despite Quinn’s paintings simplifying the manner, it stays quite an challenge, and I resented it. Sometimes men launch those assaults on every other, hack every other in presentations of techie braggadocio, but it is essentially yet every other unwanted price of being a lady.

Internet carriers urge dad and mom to screen children’s internet interest

Internet Matters is released, presenting advice on children’ online profiles, the sites they go to and defensive towards abuse

The UK’s four biggest internet companies have advised mother and father to check which websites their children go to, audit their on-line profiles and turn on filters blocking irrelevant content in an enterprise-extensive reaction to the authorities’ push for higher infant protection on-line.

Icas Network

BT, Sky, TalkTalk and Virgin Media on Tuesday launched the .”, with a portal presenting recommendation on defensive households against cyberbullying, on line grooming, sexting, and pornographic content.

One in four youngsters have seen sexual pics online by means of the age of 12, even as 60% of teens were asked for a sexual photo of themselves, and 28% of children do not tell their dad and mom while they’re being bullied on line, regularly for worry of having their cellphone taken away, according to analyze via the telecoms watchdog Ofcom, the NSPCC and the marketplace studies organisation Opinion Leader.

Image result for internet

“Internet Matters will help dad and mom to recognize the issues children can face on line whether or not they’re five or 15,” Bunting stated. “We consider that is the first time that the principal broadband companies in any u. S . A . Have joined forces for such a project. The UK is therefore main the way with regards to toddler internet protection.”



Launched by using the singer-songwriter Sophie Ellis-Bextor and her mom, the previous Blue Peter presenter Janet Ellis, at London’s Museum of Childhood, the portal can even recommend on how to control on line reputation. Children’s social circles can be large on-line than at faculty, with the common eight-to-eleven-year-vintage gathering 92 social network buddies.

The initiative has pass-birthday celebration support, with the high minister describing it as a “sizable leap forward in our undertaking to shield kids on-line.” David Cameron referred to as net companies to Downing Street for a cyber summit in November, to cozy stricter controls over the online fabric. Labour leader Ed Miliband and deputy high minister Nick Clegg also voiced their approval.

The portal will help parents to perform filters, consisting of those on Google and other engines like google. It follows the creation of optional on-line filters from every of the four net providers in current months.

Internet Matters recommends parents control, in preference to block, their kid’s get admission to the internet. It advises them to test the websites visited via searching up net browser histories; set up parental controls on computer systems, however also on telephones, capsules and games consoles; delete profiles on social networks that youngsters are not the use of; and encourage youngsters to ignore and block on-line bullies.

Ellis-Bextor stated: “Today’s dad and mom need to cope with issues that didn’t even exist while we were developing up. I’m careful to keep an eye fixed on my boys, especially my 10-12 months-antique, who’s at that age while he’s starting to explore the internet on his own.”

Internet Matters’ pinnacle suggestions for toddler protection on line
1. Encourage your baby continually to apply infant-pleasant serps, such as Swiggle, Ajkids or Kids-search. Safe search settings can also be activated on Google and Bing. Don’t forget about to opt for the safety mode on YouTube, iTunes and Google Play.

2. Parental controls have to be hooked up to each device your child makes use of cellular smartphone, pill, and video games consoles (both home and handheld).

Three. Cyberbullies are looking for a response, so make certain your baby knows that by using deciding now not to answer they’re making an lively choice now not to give energy to the bully.

4. Use the integrated gear on social networks and mobile services to block absolutely everyone who’s cyberbullying your child.

5. Remind your youngsters that even though human beings they’ve met on the line would possibly sense like friends, they may not be who they say they are.

6. Make a habit of checking the information that’s on-line approximately your child. Keep a watch on the social community pages and other sites your toddler uses.

7. If you see erroneous statistics about your child, ask the person that published it to accurate or delete it. If they received, ask the site administrator to accomplish that.

8. When your infant stops using a social networking profile or internet site, it’s an excellent concept to deactivate or delete their account.

Nine. Look in the browser records at the search phrases your toddler has been using and the websites they’ve visited. Keep an eye fixed on the apps they’ve downloaded on their telephones too.

10. No clear out is a hundred% effective. Make sure you speak on your toddler about on line pornography as well.

6 Social networking
Delete your Facebook account. Why do the CIA’s work for it? And in case you ought to use it, don’t place your date of beginning on your profile. Why give identity thieves an even wreck? And remember that, no matter what your privateness settings, you do not have to manipulate over information approximately you that is posted via your “pals”.

7 Location information
Avoid using offerings including FourSquare that require place statistics.

Eight Wireless offerings
Have Bluetooth off by default in all your cellular gadgets. Only transfer it on while you explicitly need to use it. Otherwise, you will discover that even a dustbin can listen in on it. Similarly, watch out for the usage of open wifi in public locations. At the very minimum, make sure that any website you have interaction with uses HTTPS instead of unencrypted HTTP connections. If you don’t know, then all people close by can use Firesheep to see the whole lot you’re doing.

Nine Personal Security
Forget password, think passphrase – i.e., a meaningless sentence that you’ll bear in mind – and do some variations on it (first and 1/3 letters of each phrase perhaps) so you can generate a more potent password from it every time. Or use a password-management app like LastPass or 1Password. And if a provider offers multi-element authentication, employ it.

10 Search engines
All the big search engines like google and yahoo tune you seek records and construct profiles on you to serve you personalized consequences based on your search records. In case you need to break out from this “clear out bubble” you want to replace to a search engine that does not song your inquiries. The maximum apparent one is the bizarrely named but pretty effective DuckDuckGo.

Internet protection: 10 approaches to preserve your personal facts secure from on line snoopers

The net has modified our lives in limitless high-quality methods, but it has a darkish aspect. Personal privacy has been lost, leaving you at hazard from shady people, agencies and safety companies. But there are steps you could take to limit your exposure
When Tim Berners-Lee changed into designing the technology that has transformed our international, he looked for a noun that would describe what he had in mind. The one he, in the end, settled on was “net,” that is how the sector huge internet was given its name.

Jacc Blog

To its inventor, the noun has to have seemed flawlessly apposite: it defined the elaborate, natural linking of websites and pages that he had in mind. But “web” has other, metaphorical, connotations. Webs are matters that spiders weave with the intention of capturing prey. And if you need a metaphor for considering wherein we’re now with networked generation, here’s one to ponder.

Imagine a big, global internet in which can be trapped upwards of billion flies. Most of these unlucky creatures don’t know – yet – that they’re trapped. After all, they wandered cheerfully, willingly, into the web. Some of them even consider that they could get away if they wanted to.

Image result for internet

We are the one’s insects. The simplest way of escaping our quandary is to give up the arena inside the way that Trappist clergymen as soon as did. Since we’re not going to try this, we need to face the truth: we’re trapped in a system in which the whole lot we do is monitored and logged and in which privateness is an element of the past. Everything which you do with cutting-edge communications equipment leaves a virtual path. And this path is accompanied assiduously no longer simply using giant groups, but also by way of governments and their protection offerings – as vividly illustrated by way of the revelations of Edward Snowden.



What’s impressive is how unconcerned many people seem like about this. Is it because they are unaware of the volume and comprehensiveness of the surveillance? Or is it some weird manifestation of Stockholm syndrome – that odd condition in which prisoners showcase fine feelings towards their captors? What we’ve found out exceptionally from the Snowden leaks is that the size and functionality of the NSA surveillance are plenty greater than everybody imagined. Most people had assumed that maximum non-encrypted communications have been vulnerable and a few speculated that some encrypted communications (e.g., Skype) had a hidden backdoor for the NSA. But nobody realized that, because the modern day revelations showed, all of the encryption technology mechanically used to protect online transactions (https, SSL, VPN and 4G encryption), plus something going thru Google, Microsoft, Facebook, and Yahoo, have been cracked.

What this means is that no shape of electronic, verbal exchange treated via business corporations can now be assumed to be at ease. In that feel, the NSA has genuinely fouled the nest of america net enterprise. And it is even suspected that about 90% of communications routed via the TOR community is the use of encryption which could additionally have been hacked by way of the NSA. What are you able to do in case you’re a person who feels uneasy approximately being stuck on this net? The sincere answer is that there is no comprehensive answer: if you are going to use telephones (cell or landline) and the net then you are going to leave a trail. But there are things you can do to make your communications less insecure and your path harder to observe. Here are ten ideas you might recollect.

1 Email
Rethink your e mail setup. Assume that all “loose” e-mail and webmail offerings (Gmail and so on) are suspect. Be organized to pay for a provider, which includes FastMail, that isn’t based within the US – though some of its servers are in New York with backups in Norway. (My hunch is that greater non-US e-mail offerings will appear as marketers spot the business possibility created via the Snowden revelations.) It might also be worth checking that your agency has now not quietly outsourced its e mail and IT structures to Google or Microsoft – as many UK enterprises (including newspapers and universities) have.

The real difficulty with e mail is that whilst there are methods of keeping the content of messages personal (see encryption), the “metadata” that goes with the message (the “envelope”, because it had been) can be very revealing, and there is no way of encrypting that because it’s needed with the aid of the net routing machine and is available to maximum safety offerings with out a warrant.

2 Encryption
Encryption was the sole province of geeks and mathematicians. However, loads have modified in latest years. In specific, diverse publicly available gear have taken the rocket technological know-how out of encrypting (and decrypting) email and files. GPG for Mail, for example, is an open supply plug-in for the Apple Mail program that makes it smooth to encrypt, decrypt, signal and confirm emails the use of the OpenPGP fashionable. And for defensive files, more recent variations of Apple’s OS X operating device come with FileVault, an application that encrypts the hard drive of a computer. Those running Microsoft Windows have a similar application. This software will scramble your data, however, won’t defend you from authorities traumatic your encryption key under the Regulation of Investigatory Powers Act (2000), that’s why some aficionados propose TrueCrypt, a program with a few very thrilling facilities, which might have been useful to David Miranda.

3 Web browsing
Since browsing is probably what internet customers do most, it is worth taking browser protection and privateness severely. If you are unhappy that your clickstream (the log of the web sites you go to) is in impact public property as some distance as the security offerings are involved, you may keep in mind the usage of freely to be had equipment which includes Tor Browser to obscure your clickstream. And to defend your self towards the amazingly brazen efforts by business companies to music your on-line behavior you have to, at the very minimal, configure your browser so that it repels many of those could-be boarders.

4 Cloud services
The message of the Snowden revelations is that you should avoid all cloud services (Dropbox, cloud, Evernote, etc.) which might be based totally on the US, the UK, France and different jurisdictions are known to be tolerant of NSA-style snooping. Your operating assumption has to be that some thing stored on such systems is probably handy with the aid of others. And if you have to entrust statistics to them, ensure it is encrypted.

5 File storage and archiving
An choice that increasing numbers of human beings are exploring is running their non-public cloud service the use of merchandise which includes PogoPlug and Transporter that provide Dropbox-kind facilities, however on internet connected drives that you very own and manipulate. And if you convey around private data on a USB stick, ensure it’s encrypted the usage of TrueCrypt.


Selling artwork online and accomplishing new markets: 5 suggestions for artists

Don’t confuse social networks with sales platforms and keep nurturing your links with the conventional offline artwork market
Woman looking at paintings

The net offers the visual art marketplace wonderful potential for boom and exchange. Currently, on-line sales make up simply 1.6% of overall worldwide sales. However, that is set to change. In the past couple of years, hundreds of thousands of dollars had been invested in online sales systems. In 2013 Artspace received $8.5m (£five.2m) of funding, Paddle8 obtained $6m (£3.6m) of investment – backers included Damien Hirst and Jay Jopling – and Amazon Art turned into release.

Jav Leech

A change in how art is sold has traditionally performed an essential function in the growth of the art marketplace. The salons helped expand the art market in the 19th century, the economic galleries inside the twentieth century and now the internet can assist increase the art market within the 21st.

With an expanding artwork marketplace, we do not just see changes to how art is bought, however additionally modifications to what artwork is sold, why it is offered and via whom. Online sales systems are presenting some very exciting answers to these questions. The capacity of online art platforms to empower the general public as tastemaker is an instance of 1 such trade, one which has many effective outcomes: for the public, who could be capable of refining their decisions of artwork; for artists, who preference a level gambling subject; and for lifestyle, which turns into far greater consultant of all society, no longer simply the curator instructions.

The internet is a first rate opportunity for rising artists and customers to enter the visual art marketplace and shape its improvement. Social media, art income systems, and person web sites – all of them provide some thing one-of-a-kind. Here are 5 top hints to help artists get commenced in the new and unexpectedly expanding online visual art market.



Image result for internet

Don’t confuse networking systems with sales structures
Online income structures are designed to generate new sales from new customers, while man or woman artist websites and social media platforms are critical networking equipment, designed to assist manipulate existing customers. Social media is hardly ever considered an outlet for the purchase of artwork, and the web sites of individual artists are getting an increasing number of inconspicuous on the internet.

Keep running with the traditional offline art market
Never undercut mounted gallery marketplace prices on-line and do not use the net to dump inferior work. Online activities aren’t an opportunity income tool, however, an additional sales tool to complement and assist companies offline.

Be proactive and spread your options
Join an expansion of various on-line income systems. They provide awesome comfort and choice to art shoppers, just like artwork festivals, however they all function slightly differently and so appeal to distinctive art shoppers for distinctive reasons.

Saatchi Online takes the concept of a gallery online, Axisweb presents a notable enterprise networking tool, and Visual Art Trader – a domain that I founded – is a web artwork community that appeals to local audiences. There are masses to choose from, so shop around.

Online sales will by no means replace head to head income
According to a record by ArtTactic and Hiscox, The Online Art Trade 2013, of these, not shopping for art on line, 79% stated it turned into due to the fact they couldn’t inspect the paintings earlier than purchase. Continue to exhibit works of art in as many offline spaces as possible, along with your studio.

You need to additionally assessment the interesting log, which suggests your whole history of posts and allows you to test who can see them. Similarly, you ought to look at your image albums and take a look at you are glad about the sharing settings for every album. In the future you can need to don’t forget to construct “lists” – subsets of buddies, which include near friends and own family, who you may want to percentage infant pix with, as opposed to every Tom, Dick, and Harriet.

Also, do away with your private home deal with, telephone quantity, date of birth and every other statistics that could use to faux your identification. Similarly, you might need to delete or edit your “likes” and “groups” – the greater hackers recognize about you, the greater convincing a phishing email they could spam you with. Facebook apps often proportion your facts, so delete any you do not use or do not don’t forget to install. Finally, use the “view as” tool to test what the public or even a selected man or woman can see for your profile, retain to “edit” and modify to taste. If this all sounds rather tedious, you just might opt to completely delete your account.

Remember you’re human in any case
While an awful lot of the above are technical answers to save you you being hacked and scammed, hacking achieved well is the skill of tricking human beings, not computers, by way of preying on their gullibility, taking gain of our trust, greed or altruistic impulses. Human blunders continue to be the maximum in all likelihood purpose why you will get hacked.

Keep facts detailed and updated
There are no sales teams on the line to answer customers’ questions. Buyers need to rely upon the up-to-date and accurate information supplied by using the artist. In the ArtTactic and Hiscox document, ninety-two% of artwork consumers stated that the best of the artwork photograph and the statistics supplied on the website had been the maximum crucial factors when buying artwork online.

How to use seek like a pro: 10 recommendations and hints for Google and beyond

Searching with ordinary sentences will only get you thus far – in case you want to find something a bit difficult turn to these advanced yet easy methods

Search engines are quite true at finding what you’re looking for nowadays, however, now and then they nevertheless come up quick. For those activities, there are a few little-acknowledged tricks which are available on hand.

So right here are some hints for better googling (because it’s the most popular seek engine) however many will work on other serps too.

1. Exact phrase
Exact search
Facebook Twitter Pinterest
Exact search Photograph: Samuel Gibbs for the Guardian
The handiest and best manner to search for something unique is to apply quote marks round a phrase or call to search for the ones actual words in that exact order.

Living Tired

For example, searching for Joe Bloggs will display effects with each Joe and Bloggs but not always positioned sequentially. Searching for “Joe Bloggs” will surface best people who mainly have the name Joe Bloggs someplace on the page.

The specific or explicit word seek may be very beneficial for with the exception of greater common however much less applicable results.

Image result for internet


A look for “Joe Bloggs” -denim will find consequences for Joe Bloggs, but it’s going to exclude those outcomes for the Joe Bloggs brand of jeans.



3. Either OR
OR search
Facebook Twitter Pinterest
OR search for matters that might be one thing or every other. However, you don’t want both phrases to existing on an unmarried web page.
Default textual content searches discover consequences with all of the words of the query. By using the OR term, you may search for one or another term, now not just all the phrases. OR searches can be beneficial for finding things which you’re no longer sure which period will be used from an acknowledged list.

4. Synonym search
Synonym search
Facebook Twitter Pinterest

Sometimes it’s beneficial to look for a less specific period. If you’re not positive which period can be used you can use synonym search.

Searching for plumbing ~university will carry up outcomes for plumbing from colleges as well as universities, for instance.

Five. Search inside a domain
Google site seek
Facebook Twitter Pinterest
Use Google to search a specific site. Photograph:
The search engines like google of maximum web sites are negative. You can search using Google rather with the aid of the usage of the website or area limiter.

6. The strength of the asterisk
Wildcard seek

Like the blank tile in Scrabble, the asterisk works as a wild card within searches. It may be utilized in place of a missing phrase or part of a phrase, that is useful for finishing terms, however additionally when you’re trying to look for a much less definite article.

A look for architect* will search for an architect, however additionally architectural, structure, architected, architecting and every other phrase which starts of evolved with the architect.

7. Searching among values

Searching for something with a qualifier between levels is a good way of answering questions. For instance, in case you’re searching out the who were the British prime ministers between 1920 and 1950 a search the use of British top minister 1920.. 1950 will bring up effects with dates ranging among 1920 and 1950.

That’s your search period accompanied using two full stops and an area.

8. Search for phrase within the body, name or URL of a web page
entitled: search
Facebook Twitter Pinterest
in a title:
Sometimes you simplest need to discover textual content either in the URL, body or name of a web page. Using the qualifier injury: will seek just inside the URL. The qualifier intext: will search in the frame, even as in title: will seek best within a web page name.

For instance, entitle: review will convey up all the articles with “evaluation” in the web page identified.


10. Combine them
combined search terms
Facebook Twitter Pinterest
Combine the phrases and modifiers for effective searches. Photograph:
All these seek equipment may be mixed to slim down or expand searches. While some of them may be used only rarely, some along with specific word searches are beneficial in nearly all instances.

As Google and different search engines enhance their understanding of the way human beings obviously type or say seek queries, these electricity equipment will in all likelihood grow to be less and much less useful – as a minimum that’s the goal that engines like google are running closer to – however that’s absolutely not the case in the interim.

Approaches to forestall hackers: ‘I’ve been the sufferer of on line credit card fraud.’
Banks have to refund a purchase if he or she has been the victim of fraud until they can prove that the patron has acted “fraudulently” or been “grossly negligent.” As with any case of fraud, the matter is always decided on an individual basis. “Anecdotally, a consumer who has been a sufferer of a phishing scam through unwittingly providing a fraudster with their account information and passwords handiest to be later defrauded might be refunded,” explains Michelle Whiteman, spokesperson for the Payments Council, an industry body. “However, have been they to fall sufferer to the same fraud inside the future, after their bank had knowledgeable them about the way to live safe, it’s miles viable a next refund may not be so sincere. Under price services rules, the onus is on the price-provider provider to show that the customer became negligent, now not vice versa. Credit card safety is furnished under the Consumer Credit Act and gives similar protection.”

Two guidelines to avoid facts overload on the net

Managing information may be a nightmare. Louise Kidney explains the way to make the excellent use of Twitter and RSS feeds

Information overload is affecting increasingly of us, as we sign in for yet greater web sites which promise to change our running life/deliver us greater time to our households/do our jobs for us. No one tool can ever live up to such grandiose guarantees, no matter which tech luminary is endorsing the subsequent large issue, however, you could honestly save your self a few walking around circles with a chunk of savvy attention to detail and some preliminary time funding.

Media Focus

The first criticism I regularly listen is that people keep lacking tweets on Twitter from people they’re very interested in, due to the fact they get lost inside the noise generated with the aid of other human beings they may be following. The first-rate way to remedy that is to set up lists, a service which Twitter has presented given that the start, however, few human beings appear to experience over.

Instructions on the way to set them up may be observed on the Twitter internet site and may be pretty time eating. However, it is worth bothering with. Essentially, you may create a listing called News, upload all and sundry who tweets news inclusive of @bbcbreaking to the list, and then in case you most effective want to read tweets which contain information, you simply go to your listing on Twitter by means of going to

Image result for internethttp://twitter.Com/<yourtwitterusenamehere>/<yourlistnamehere> so if I desired to visit my information feed list and simplest see tweets from news source, I could visit http://twitter.Com/loulouk/reputable-news-feeds. Once you have installation your lists, you can upload new human beings to those lists as you cross. As an addendum to this, it is well worth noting that in case you use Tweetdeck, it’s far viable to create any range of columns primarily based on lists.



The 2d grievance is that humans see hyperlinks in tweets they had to want to comply with. However, they’re analyzing Twitter of their lunch hour or all through a short wreck between conferences, and they don’t have enough time to follow the link and read a full article. After all, Twitter is meant to be quick, sharp messages. This is where the “Favourite” button comes into its very own. If you favored a tweet from each person, even someone you are not following, it can be recalled at any point by way of going to http://twitter.Com/<yourtwitterusernamehere>/favorites, so if I desired to view my favorites, I could go to http://twitter.Com/loulouk/favorites (Note america spelling of favorites).

Once you understand approximately favoring tweets, it all of sudden turns into a lot less overwhelming to maintain up with the hyperlinks people share on Twitter. You can constantly come lower back to them later – days or even weeks later if necessary. Again, Tweetdeck offers the functionality of making a column based totally on your Favourites.

If it is your activity to keep the music of what grassroots are questioning in addition to senior management, blogs can be splendid; however, if you frequently examine a number blogs every day or week, checking again manually to each weblog to peer if it has been updated is going to speedy put on skinny. This is wherein RSS may be your friend. RSS stands for Really Simple Syndication (a identify some might talk to the Trade Descriptions Act), however once understood it corrals all of your reads into one location, highlighting in ambitious new posts from all the blogs you comply with, which can be an actual time saver. There are guides to setting up your RSS reader all over the net. However, the BBC provides a specifically beneficial one in conjunction with a list of all their news feeds – it’s now not simply blogs that will let you RSS their content.

So there you have it. Two smooth steps to getting the facts you need, while you want it. These are just multiple examples of the equipment to be had that will help you manage your information but if there’s a selected trouble you are experiencing with virtual facts, why not comment underneath, we will do our high-quality to assist.

eight. Play YouTube in gradual motion
There are many amusing hints and guidelines, or easter eggs, to be found on YouTube. For instance, the capacity to play arcade games within the viewer, but there may be additionally a trick this is surely beneficial: playing motion pictures in slow motion. It’s less difficult to spot yourself in the history of a TV vox pop that manner. It’s distinctly simple: simply keep down the gap bar, and the video will start playing at a slower speed, best regarding grabbing the appropriate screenshot of a specific moment (and here’s the way to do this on Mac and PC). You’re welcome.

Nine. Twitter shortcuts
Just as Photoshoppers understand that shortcuts are the cornerstone of productiveness, avid tweeters recognize that shortcuts are your pal. Did you know that urgent “n” will open up a brand new tweet communicate container (on native internet Twitter)? Or that you could without problems favorite a tweet through certainly urgent “f”? Here’s a list of Twitter shortcuts:

Also: remember to continually area a full forestall earlier than @-mention when tweeting something you want to be seen in your timeline, and no longer just any other’s point of the movement.

10. Free yourself from distractions
Finally, we all recognize how damn distracting the net is. You need to get on with paintings, however … Gchats … and Twitter … You don’t need to rip the ethernet cable from the computer, due to the fact you continue to want the internet in some capacity.

So how to get around this? Luckily, there is software you could use to help. Cold Turkey, as an instance, can be downloaded and will prevent a consumer from traveling websites, but whitelist others. You may even lock certain web sites and programs on a timer placing to truely ensure you keep away from Facebook. Cold Turkey is loose, with a paid-for seasoned model. However, there are other productiveness programs, including self-control. You can discover a listing here.

Write or Die
Facebook Twitter Pinterest
Write or Die – a high-quality device for productivity. Illustration: Screengrab
Oh, and on a cut-off date and need to just get phrases on the web page? WriteOrDie can help. It will sound a massive alarm while you forestall typing, and in its maximum intense model, begin deleting your wor

Brilliant internet hacks to make your existence higher

The internet. Probably the best invention ever (with apologies to the wheel). But are you using it efficaciously? Here are ten ways to enhance the level in
emojis feature photo

1. Logging out of Facebook remotely
Ever checked Facebook on a friend’s or family member’s device after which realized, with horror, which you forgot to sign off? Never fear, there’s a simple, however little known, way to log off of your profile remotely. Navigate to “settings” using the drop-down within the proper hand corner of your display screen, then “security,” then “when you’re logged in.” From this display screen, you may be able to close an open consultation, on whichever device it’s nevertheless jogging on.


Facebook log off remotely
The Facebook web page is enabling remote logout. Photograph: Facebook
2. Searching incomplete terms on Google

Sign up to the Media Briefing: information for the information-makers
Read greater
When looking to recall a particular quote, phrase, proverb or lyric, it’s often the case that we half of-remember, missing words or skewing them barely.

Image result for internet

A little recognized Google trick makes it a lot simpler to become aware of them. Putting an asterisk in a quoted sentence will indicate that a word is missing (replaced with the asterisk). This makes it much more likely that the precise period you are seeking out might be returned, as opposed to effects which just happen to include the alternative words or rest of the sentence.

For instance: I need to perceive the Foals’ music Give It All through attempting to find the subsequent lyric: “all that stays are words inside the rain,” but permit’s say I didn’t pretty capture “phrases” or “rain.” If I were to just look for “all that stays are within the,” I might return seek effects on a band called All That Remains. If, however, I google “all that remains are * inside the *” (which include citation marks), the Foals tune can be again within the outcomes. Clever.



Three. Twitter soft block
Twitter has a quite precise function inside the mute button, which allows you to stay following an account but hides its tweets and retweets out of your timeline. It’s a remarkable way of essentially ridding a person out of your Twitter revel in without offending them through unfollowing. (People do no longer recognize while you mute them. To mute: click on at the cogwheel to the right of someone’s profile.)

Mute feature
This is what it would love if I muted my boss.
However what you often really need is to mute someone from reading your tweets. Here there’s an unofficial alternative that can assist; it’s referred to as “the smooth block.” This is a sly method of forcing a person to unfollow you by way of blocking off and straight away unblocking them. Once they’re unfollowing, your tweets and retweets will not appear in their timeline. The desire is which you are less seen, and so drawing much less engagement from this man or woman. It’s a good manner to manipulate stalkers and those who continuously favorite your tweets and slide into your mentions at every possibility.

If someone’s keen, however, they will likely be manually checking in on your profile and recognize, perplexed, that they may be no longer following. In this example, blocking – or a well-mannered phrase – is the most effective alternative.

I simply performed my first soft block. These milestones
Retweets four four likes
Twitter Ads information and privateness
four. Incognito home windows
It’s traumatic how many humans don’t use incognito mode when browsing the internet. For all of us who does the sort of component like spend seven minutes at paintings finding out how celebrities from the Nineteen Eighties have elderly, this is a should. Pretty lots all major browsers offer Incognito or personal browsing mode; this means that a person’s preceding pastime will not be logged and saved in records.

This isn’t simply, as people anticipate, for looking at specific or otherwise embarrassing content, however, can show beneficial while, for example, attempting to find the opposite half’s birthday present or looking on line for a guide for an difficulty you’d rather any individual didn’t stumble throughout for your browser history.

Turning surfing records off does no longer make you nameless on the net
Here’s the way to browse privately the usage of Chrome, Firefox, Safari and Internet Explorer. ISPs (internet provider companies) and websites themselves, however, will realize while a website has been visited – so don’t think non-public browsing makes you anonymous on the internet. It doesn’t. You’d want Tor for that.


5. Mute an electronic mail thread
There’s no longer an awful lot greater demanding than an workplace electronic mail thread or a series mail you’d want you’d in no way opened. Luckily, there may be an easy way to such suffering. Email threads can, blissfully, thank you, Lord, be muted. Using Gmail, click on at the “more” tab at the pinnacle of the email, after which the mute choice. In Outlook, the mute function can be discovered thru the home tab (the feature is known as ignore in Outlook). Muted email threads can be unmuted ought to you ever want to (never) be a part of returned in.


6. Use emoji on computer web
Of course any individual has devised an real IRL emoji keyboard (well, fourteen certainly, to healthy all the emoji in, assume giant blending table), however, how do you go about writing emoji quick and easily on computing device web?

Emoji pop-up
What the pop-up emoji panel looks like on a Mac laptop. Photograph: LifeHack
7. Amuse your self on Gchat

If you are wedded to Gchat for intraoffice banter and aren’t au fait with all of the top notch shortcuts to produce stupid animations, you’re in for a deal with. There are hints to produce animations for your personal enjoyment, or ones as a way to display up within the recipients’ chat. Type in the following shortcuts (in italics) and spot what occurs.




The net can harm your productivity by way of making you sad – here’s what to do

Following some simple recommendations have to shield you from the subtly miserable affect of social media, preserving you each glad and effective
He’s been in the workplace for a little too long cropped shot of a mature businessman strolling his neck anxiously at the same time as running in his city officers of the United Arab Emirates’s Ministry for Happiness will begin their schooling in happiness technology, a software designed for them by the University of California, Berkeley, and Oxford University. The UAE mounted its Happiness Ministry in February. In July, the government of Madhya Pradesh kingdom in India observed in shape.

My Amend

Typically, while governments set out to enhance their residents’ subjective well being, they gift the idea as a worth result in itself. That’s no longer to be sniffed at. But there may be some other facet to this pursuit. Plenty of evidence indicates that glad human beings are not most effective more healthy in the long run (and consequently less luxurious to the kingdom), but additionally higher worker bees.

Image result for internet

A simple test demonstrates this. When volunteers are requested to perform clean mathematical responsibilities over in return for a modest per-challenge fee, they do about 10% more work if they have just watched a couple of minutes of a comedy show. If they watch an uneventful video rather, or simply don’t locate the show uplifting, the effect isn’t there.



Outside of the lab, software program programmers are higher at solving analytical issues while they’re happier. Putting plenty of employees collectively, personnel’ task satisfaction levels today can even predict a firm’s price on Wall Street 12 months down the street.

An emotional support animal is just a mouse click on away
Read extra
Beyond these slim measures of productivity, there’s a set of broader societal benefits – public items – that waft from preserving citizens smiling. In Germany, as an instance, the 7% of the populace that offers blood doesn’t suit into any smooth demographic generalization. It isn’t disproportionately male or woman, employed or now not – or more or less knowledgeable. However, Germans who report feeling usually satisfied within the previous month are more likely to donate blood than folks that don’t.

As enlightened governments figure all of this out and are seeking for to inspire happiness and its spin-off consequences, there’s as a minimum one apparent bump in the street: a countervailing fashion that isn’t making a mass-happiness introduction so easy. The power to elevate residents’ wellness is taking vicinity as human beings are shifting their communications from in-character conferences to ever greater online exchange.

Probably the most important have a look at of its type, intended to evaluate the consequences of social media use on every body in Italy, makes for gloomy reading. It links spending time on social networking web sites with lower degrees of man or woman happiness, and more especially, with a lower level of preferred agree with in society.

Long before released its marketing campaign against cyberbullying, even before Monika Lewinsky received a pummeling inside the late 1990s, there has been the true purpose to suspect that on-line groups would foster terrible vibes. Fifty years of research has underscored the belief that swapping written messages is an ineffective way to generate cooperation in struggle conditions. Face-to-face communication is inordinately better.

This implies, of direction, that the online global can also already be playing nicer than it did some years ago, as social media structures have made it simpler for people to share video and audio material. Companies together with Facebook have cottoned on to the idea that they need to develop a whole host of smooth talents to foster online harmony.

What is regularly neglected in discussions of social media malaise is that individuals, armed with the modern-day happiness research, can also expand smooth skills in their very own, to guard themselves against the subtly negative impacts of on line interaction. To that cease, here are a few tips to preserve your subjective well being notably buoyant.

Upset? How to find a happier region using Twitter
Read greater
First, don’t worry approximately what number of on-line friends you’ve got. Whatever your personality type, age or profits, a look at of five,000 humans (and their friends) in Canada exhibits that doubling your number of actual-global pals has a huge impact on your happiness. Doubling your pals on social media has almost none.

Second, keep away from passively scrolling through your Facebook feed. Doing so has been proven in experiments to make people experience low and green with envy as they consume the rose-tinted edits of they pals’ lives. Actively messaging and commenting on Facebook is a long way less probable to present you the blues.

Third, in case you insist on scrolling thru your Facebook feed, educate your self to pay selective attention to updates from friends with whom you’re near in the offline global. Their posts are probably as biased as every body else’s, but analyzing them fosters an excellent kind of envy of the high-quality, self-motivating range. By comparison, consuming a glut of handy romance and unique adventure sports from remote friends is in all likelihood to conjure up a choice to tug others down.

Finally, if you sense low, indulge in net cats, the YouTube content class with extra perspectives-in keeping with-video than every other. Research out of Indiana University finds that the extra humans watch internet cats, the extra they experience the experience. (And in case you get clearly into it, you can constantly visit the net cat film festival.)

Based on their happiness measurements, the authors of that examine go up to now as to signify a position for Grumpy Cat and the permanently kitten-sized Lil Bub in puppy remedy, potentially in the location of the real element.