The online world is abuzz with news of the photo sharing service Instagram (recently acquired by Facebook) which has changed its terms of service to allow for the possible sale of people’s photos — without the photographer making a penny. This is just the latest example of a problem I’ve been trying to educate people about for years now: who owns your information when you post it online?
I’ve just posted this audio lesson which you can listen to and learn more about this problem, which affects everyone who posts anything online such as photos, Facebook or Twitter posts, etc., as well as potentially people who store information online in online “cloud” storage, and the many people who use web-based email services such as Yahoo Mail, Gmail, and so on.
I recorded this audio lesson a couple of years ago, and I’ve talked about the problem in recorded lessons as well as here on my newsletter, and it seems like finally people out there are starting to wake up to this.
If you’re not familiar with
In my last post I gave you a non-technical explanation of what the cloud is. I had a student named Ronald write to ask me about whether it was a good idea to use cloud services. He said:
I’ve had a lot of people ask me to explain what “the Cloud” is, and whether it’s the same as Apple’s iCloud service. They also wanted to get a better understanding of what iCloud does, and why they’d want to use it.
I’ve mentioned the threat of computer “trojans” before (here’s a link to a video lesson I recorded last year about protecting yourself from a common type of trojan). There’s a new type of trojan circulating now that I thought I’d take the opportunity to teach you about today.
Briefly, a trojan is a maliciously written program designed to infect computers. It is sort of similar to a computer virus, but worms generally try to trick you into installing them by making you think they’re something you want or need to install. Check out the video in the link to learn more about how they work and how to stay safe from them.
This particular threat I’m writing about is a new type in the sense that it is new to the Mac world, but it’s a type of threat that has existed for many many years on the Windows side of things.
I received an email with a question from a computer training student named Mary Anne Robbins who wrote:“I really appreciate all your efforts to make us better PC handlers. I do have a question that you may be able to help solve. My router (Westell1600) for my Verizon High Speed Unternet is locked with a seemingly unretrievable password.
A student named Gerald Smith wrote me with a question about the Apple Mac program Garageband. He wrote:“I have been having trouble with making a podcast.Everything seems to be alright but the bar with the start record button on it does not appear.