Your friend has been hacked

On Facebook?  Watch what you click and don’t fall for scams.  Recently I saw Facebook Security had posted to my wall.   But I knew a friend was hacked.  How?  When you use Facebook, you will see associated friends in the top right corner.  In fact Facebook Security and I had 24 mutual friends.  So I knew instantly.

If you see an email or a name on your wall that says Facebook Security, hover your mouse DON’T CLICK on the name Facebook Security (this is the fake name they will be using and not just in email). If you look in the lower left corner of your screen you will see your real friend’s name that has been hacked. Call them and let them know. Do NOT Communicate with them on Facebook! You can be talking to the hacker…

Here’s some rules and tips!

  • Don’t list your phone number and personal information
  • Don’t take pictures of valuables (they may be in the background of your pictures)
  • Don’t announce vacations or trips
  • Don’t check in at coffee shops, theaters, or other places (you are telling whoever that you are not home)
  • Set your profile to private
  • Don’t leave your account logged on
  • Don’t accept anyone as a friend
  • Don’t post pictures that may embarrass you later
  • Don’t give information about what school you attend or the hours (limit the information)
  • Don’t let your license plate appear in pictures
  • Only let true friends post to your wall (limit it under privacy settings)
  • Don’t post questionable materials  or other articles that may be considered offensive (use common sense)
  • Keep your antivirus up-to-date
  • Don’t click on any link you don’t know where it goes -including tagged  pictures
  • Use a complex password
  • Don’t vent your feelings on Facebook
  • Don’t allow public search engines to index you (under privacy settings)
  • Use two part authentication
  • Don’t talk about work unless it is positive and public information
  • Avoid games that may be from a malicious programmer – games that ask about favorite characters or quiz you and reveal information about you

There are tons of other privacy items you have to worry about.  Think about it this way.  You meet someone in the mall and you have never met them before.  Do you give them all of your information?  Are they your friend after one meeting?  Would you give them your cell number?

Do you have a tip?

The REAL Facebook Security


Want to know more about cyber security?

National Cyber Security Awareness Month

Picture of National Cyber Security Awareness Month

“When you begin college, you are probably on your own for the first time. You are taking on new responsibilities, making your own decisions, and becoming part of the campus community. There is an important role that you can play in your college’s cybersecurity efforts that combines these elements of responsibility, decision-making, and community.”  StaySafeOnline

TTC Shelbyville supports the National Cyber Security Alliance and has once again submitted to be a partner (2011 NCSAM Champions) under the National Cyber Security Alliance.

Get Involved!

The Virtual Computer Tour

Ever wanted to visit the inside of your computer but you were too scared?  Link This virtual computer tour not only takes you through your computer, but gives you a small video on what the inner workings do.  Go check it out.

How to Build a Computer an Animated Guide – You won’t believe the Graphics

Rick over at What’s on My PC  has found a great link for everyone that show’s an animated guide to building a computer.  This GEM will be used in class. Excellent Find!  The graphics are just unreal.   If you select a processor, it zooms to the case, into the case, removes the heatsink and fan and shows the processor flipping out.   Awesome.

Excellent Animated Guide

Publish Your Blog as an ebook

Earlier this year I showed you how to convert your blog into a pdf that could be printed as a book or downloaded as a pdf.  By using BlogBooker, you can export your WordPress blog as an xml and BlogBooker converts it to a pdf where self publishing companies can publish it.

Now you can use BlogBooker and make your blog into a pdf and upload it to Epub2Go and convert it to an Epub.  Why Epub? So that iPhones, iPads, Kindles and others can read your blog as a book. (PDF files must be <30 mb.)

To read an ePub with an iPhone.  Simple, download Stanza for free.

or try 2EPUB if the file is complex (supports up to 20 mb files)

ePub format checker

Want to read it with Windows, Mac or Linux?  Try Calibre.

Want to read ePub books on your iPad, iPhone or iPod?  Use Stanza.

Lenovo ThinkPad Tablet Puts Business First

Lenovo’s new ThinkPad Tablet flips the “consumerization of IT” paradigm by adding business-class capabilities, says eWEEK Labs analysts. Features include management software, full-size peripheral connectors and an optional digitizer pen. The 10.1-inch Android device offers an Nvidia Tegra 2 dual-core chip, and applications are bright and clear.  Read more on eWeek

Users Still Careless With Email – security Blog

While not necessarily a surprise, secure email is a huge problem for enterprises. In a survey of how people use email shows that employees may be a bit too loose with their email use when it comes to sensitive and protected information, according to secure messaging service provider VaporStream. Of course, the results play into the services the messaging provider offers, but the results are nonetheless scary for any business–especially those in regulated industries.Users Still Careless With Email – security Blog.

Android Adoption Twice That Of iOS – mobility Blog



Android took over the smartphone landscape several months ago, and since then, it is like the platform has kicked in the turbo chargers. During the last three months, Google’s mobile darling captured 56% of the market on its own, with Apple’s iOS coming in a distant second with 28%.Android Adoption Twice That Of iOS – mobility Blog.

How much energy is your computer using?

How much energy is your computer using?  Is your power supply adequate?


 Joulemeter is a software tool that estimates the power consumption of your computer. It tracks computer resources, such as CPU utilization and screen brightness, and estimates power usage.   Microsoft ResearchThanks Kevin!