Gmail is the email service of choice for most of the world. Google has done an excellent job with it. But that doesn’t mean it couldn’t be better. With the right apps and extensions, you can be more productive in your Gmail inbox.
You can turn it into an Instagram-like feed to quickly skim through your inbox. A “Do Not Disturb” setting will ensure new message notifications don’t break your concentration. There’s something for everyone here.
A while back, we loved a new app called Sortd, which turned Gmail into a Trello-like task board. Since then, Sortd has added myriad new features that turns it into a heavy extension. If you want something simpler like the old Sortd, try Drag.
When you send an important email, it’d be nice to know if the recipient received it and read it. MailTag will tell you that, and it will also say how many times it was read.
It’s the simplest, free extension for this. Install it in Chrome or Firefox and it will sit quietly in the background. When you send an email, add a MailTag to track it. Once the recipient opens it, the extension sends a notification saying the message was read. It will continue to track the email after that too so that you know if it was re-read.
3. DND Email (Web, All Gmail): Stop Incoming Distractions
Every new email is a distraction. A notification or alert makes it feel like you absolutely must check it right away. Only the email is often unimportant and breaks your concentration for no compelling reason. DND Email gives you control over when an email lands in your inbox.
The idea is to create Do Not Disturb (DND) times for your inbox. Set up which days of the week you want it for, start and end times for your DND period, and what times Gmail will fetch new messages. This way, your phone won’t ding with notifications all the time.
4. gfeed (Android, iOS): Instagram-Like Feed for Inbox Zero
A filled inbox is overwhelming to look at, and even worse to go through. gfeed turns it into an Instagram-like social network feed. Along with seeming more approachable, it also has a few smart tricks up its sleeve.
Whatever action you take on gfeed will be reflected in your Gmail inbox across all apps and platforms. In essence, the app makes it easy to scroll through messages at a quicker speed and take the right action each time.
It’s a new site so there isn’t a huge collection of templates yet. But it’s a good resource nonetheless. Broadly, you will get announcements and newsletters, a template to send a portfolio, and some marketing and sales stuff. Design is the key here, which is the hard part for most people to do. If your email looks like it was made with professional HTML, a recipient might appreciate it more.
Get Email Monster’s extension for Chrome. Next time you open a Compose window, you’ll find an icon for it next to the Send button. Click it, choose a template, customize it to say what you want, and send it away. Simple!
Besides the casual search for a program, most users don’t. Instead, it stays discretely nestled within the Windows UI never to meet its full potential. That is, until now! Read on to turn your Start Menu into a one-stop repository for almost anything you’d need to know from your PC.
From sending reminders to watching The Office on Netflix, Cortana is no longer a Windows 10 frill. It’s shaping up to be a genuinely impressive program which can theoretically send an email, schedule a reminder, find directions, write a note, send an SMS message, identify a song, convert currency rates, and set an alarm without typing a key.
You don’t have to use Cortana, but it definitely adds another dimension to your typical Start Menu. I haven’t even started iterating all the new, interesting feature Microsoft plans to pack into Cortana, so try it out for yourself.
2. Folder and Program Organizer
People look high and low for ways to organize their programs. Taskbar modifications, third-party docks, wallpaper sections, and folders can only do so much. Why not lay all the most-used programs in your arsenal right on your Start Menu? It only takes a few minutes, and will definitely save a lot of time tracking down those important programs and files.Why You Should Use a Vertical Windows TaskbarWhy You Should Use a Vertical Windows TaskbarThe Windows Taskbar has always appeared at the bottom of the screen. Depending on your monitor, vertical Taskbar might have several advantages. Let us show you what they are.READ MORE
To pin a program or folder, right-click the subject within your File Explorer and select Pin to Start.
Once you’ve placed your tile, you can mouse over the small, default space slightly above the tile. Click on this space, and you will be able to name your tile category. This will work for programs and folders alike, along with drive icons.
You can also resize your icons by right-clicking the icons, mousing over Resize, and selecting your size. This will allow you to create smaller icons, which will shrink the tile and only display the icon instead.
Take the time to place your most valuable folders and programs on your Start Menu. Once you do, you won’t regret it.
3. Weather and News Forecaster
I don’t know about you, but my morning routine never changes: drink some coffee, check the weather, and read the news. Now, however, you won’t have to sit through panel banter for the important bits of news anymore.
Head to the Windows Store and download a weather application along with a few news apps as well. I’ve chosen The Weather application for weather, for example. Once you’ve downloaded your application, right-click the listing within your Start Menu programs and select Pin to Start. When you see the application within your Start Menu, right-click the square and select Resize to add or subtract space from the application. Then, right-click the application again and select More, and then Turn Live Tile on to get tidbit text concerning the top story of the day.
That’s it, now you have the news and weather every morning smack dab on your Start Menu.
4. Game Drawer
Putting your games directly on your PC not only bypasses pesky Start Menu searches, it also allows for an aesthetically pleasing menu. To add your games, Steam games specifically, onto your Start Menu, it’s as easy as downloading the Steam Tiles application from the Windows Store.
When you first enter the application, enter your Steam ID into the entry provided and select Update. Your Steam games will automatically be loaded into the program.
Sometimes, you’d just like to have everything you need to do for the day laid out for you. The Start Menu can do that. You’ll only need to pin a few applications, namely: Mail, Calendar, Alarms & Clock, and Snips. All, except for Snips, should be available on your PC by default.
Now that you know how to use what the Start Menu has to offer, you can utilize it full screen to create a command console of sorts. It’s also very simple to do. Click on your Start Menu and type in start. Then select the Start settings option and switch the Use Start full screen option to On in the following window.
That’s it! Now, when you click on the Start button or select the Windows key on your keyboard, you will be able to view your Start Menu in complete 1080p (or whatever your resolution may be).
Of course, this feature works better with touchscreen interfaces than otherwise. Yet, once you’ve populated your Start Menu with useful applications, folders, and game tiles, the fullscreen Start Menu will become second nature.
Looks Like Utility’s Back on the Menu!
Don’t let your Start Menu go to waste. After a few minutes of configuration, you can ingrain some much-needed utility to your Start Menu. After you’ve set it, forget it and enjoy the utility your once ignored Start Menu has to offer!
Readers routinely ask me whether it’s still possible to clean install Windows 10 with an unused Windows 7 or Windows 8.1 product key. Over two years after Microsoft first enabled this functionality, the answer is a resounding yes.
And I can think of a number of reasons why one might need to do so.
Almost a year later, I reported that this capability—which was supposed to be temporary, by the way–still worked. Since then, I’ve tested this scenario on a very regular basis, probably roughly once a month. And as people have asked me about it, on Twitter or via email, I’ve told them that it still works.
But it’s been a while since I’ve written on this topic formally. So here goes.
It still works.
What this means is that you can download the Windows 10 Setup media—which is always the latest version, so you’ll get Windows 10 version 1709, or the Fall Creators Update, at the time of this writing—and perform a clean install of the OS on any PC. And then you can activate that install of Windows 10 using an unused retail Windows 7, Windows 8, or Windows 8.1 product key. And it will just work.
You may think that most people will never need to do this. If your PC was already running Windows 7, 8, 8.1, or any version of Windows 10, a clean install of Windows 10 today will probably activate automatically anyway.
And that’s fair. A better way to look at this is that most people simply won’t be able to do this anyway. I mean, who has a bunch of unused retail Windows product keys hanging around anyways?
Some might. And if you have or have had an MSDN or TechNet subscription, all those old product keys will work too.
So let’s think about the scenarios where this might be useful.
It’s rare, but you might have a newly-built or purchased PC that did not come with any version of Windows.
You might want to clean install Windows 10 in a virtual machine (VM).
You might want to clean install Windows 10 on a Mac, either in Boot Camp or virtually.
You might want to upgrade from Windows 10 to Windows 10 Pro. Assuming you have the right kind of Windows 7, 8, 8.1 product key, this will work too. (See below.)
The unusual nature of most of these scenarios is what I think explains why this functionality is still working even though it was supposed to be temporary. It doesn’t hurt anyone. And if you really do need to do this, it’s nice to have.
That said, there are some important caveats.
That old Windows product key can only activate against an equivalent Windows 10 product edition. For example, a product key for Windows 7 Starter, Home Basic, and Home Premium can be used to activate Windows 10. And Windows 7 Professional and Ultimate product keys can activate Windows 10 Pro. It has to be a retail key, not a key that came with a computer. And it has to be unused, though there is some anecdotal evidence that even used keys will work in some cases. (And you could always call Microsoft support, explain the situation, and try for a phone activation.)
And here’s a fun future use for this feature. If you purchase a Windows 10 S-based and do not upgrade to Windows 10 Pro before the free upgrade offer ends next year, you can use a valid Windows 7, 8, 8.1 to do so. Yes. I’ve tried that too.
Anyway, you can activate Windows 10 at any time by navigating to Settings > Update & security > Activation. If it’s not activated, or if you simply want to upgrade from Windows 10 to Windows 10 Pro, you can do so from there.
What operating system do you use? For some, that question may as well be posed in Latin or Sanskrit. For others, it’s an invitation to have a heated debate about the benefits of GUI vs. command line, modern day UI vs. old school metaphor, the pros/cons of Windows 10, LAMP vs. IIS … the list goes on and on. For most, however, the answer will be a variation on Windows or Mac.
But anyone that has used Windows (in any of its incarnations) long enough knows, at some point, frustration will rule the day, and you’ll be working along and, seemingly out of nowhere, Windows will decide to apply updates and restart, putting your work at risk while you go through the lengthy process of applying updates and rebooting. Or what about the inevitable virus or malware? You spend precious dollars on antivirus software or, worst case scenario, you have to send the machine to your local PC repair to get the virus removed. All the while, work is not being done. While Apple’s macOS products suffer less from the vulnerabilities found in the Windows platform, they also come with a fairly hefty price tag.
There is, however, another alternative to both that doesn’t cost any money to download and install, and is far more immune to viruses and malware. That operating system is Linux. What is Linux? Let’s take a look.
So what exactly is it?
Linux came about in the mid-1990s, when then-student Linus Torvalds was tasked with creating a disk driver so he could read the Minix file system. (Minix is a POSIX-compliant, UNIX-like operating system that saw its first release in 1987.) That project eventually gave birth to what would come to be known as the Linux kernel. The kernel of an operating system is an essential core that provides basic services for all aspects of the operating system. In the case of Linux, the kernel is a monolithic, UNIX-like system which also happens to be the largest open source project in the world. In the most basic terms one could say, “Linux is a free alternative to Microsoft Windows and macOS.”
Linux is a ‘can do’ platform
For those that are concerned about getting their work done with Linux, let’s take into consideration how the average user works with a computer and how Linux can meet those needs. For the average user, a computer is a means to:
Interact on social media
Listen to music
Watch Youtube or Netflix
Occasionally write something
Five years ago, each of those tasks would have been handled via a different application. Now, not so much. Modern computing tasks are most often relegated to a browser. Facebook, Google Docs, Netflix, Outlook 365… they’re all used within the likes of Chrome, Firefox, Safari, or Internet Explorer. Each one of those browsers does a good job of enabling the user to do their thing. It’s only on very rare occasions that a user will land on a site that will only work with one of the above browsers.
So considering that the average user spends most of their time within a browser, the underlying platform has become less and less relevant. However, with that in mind, wouldn’t it make sense to use a platform that doesn’t suffer from the usual distractions, vulnerabilities, and weaknesses that plague the likes of Windows? That’s where Linux shines. And with Linux being open source, users are not only able to use the platform for free, they can also alter and re-distribute the operating system as their own distribution.
Linux lets you customize and share
There are basically two different types of software: Proprietary and open source. With proprietary software, the code used to create the application (or operating system) is not available for public usage or viewing. Open source, on the other hand, makes the code used to create the software freely available. While the average user might not be concerned with the option to make alterations to their OS, this functionality of Linux helps to explain why this operating system doesn’t cost you anything. Linux is an open source platform, meaning that the code is available for anyone to download, change, and even redistribute. Because of this, you could download the source code for the various elements that make up a Linux distribution, change them, and create your very own distribution.
And as for that distribution, this is very often a point of confusion with new users. As mentioned above, Linux is really just the kernel of the operating system. In order to actually use it, there are layers that must be added to make it functional. The layers include things like:
Developers will sometimes adapt those layers, to achieve a different functionality, or swap out one system for another. In the end, the developers create a unique version of Linux, called a distribution. Popular Linux distributions include:
There are (quite literally) thousands of Linux distributions available. To see a listing of which distributions of Linux are popular, take a look at Distrowatch.
Getting to know a different kind of desktop
One of the biggest variations you will find between the different Linux distributions is the desktop environment. Most users know what both Windows and Mac desktops look like. You might be surprised to find there are some Linux desktops that look and behave in a very familiar fashion. Others, however, offer a rather unique look and feel. Take, for instance, the GNOME desktop (pictured below). This very modern user interface does a great job of ensuring desktop elements are rarely (if ever) in the way, so that interaction with applications takes focus. It’s a minimal desktop that delivers maximum efficiency.
The GNOME desktop as seen on openSUSE, showing the activities window.
But what exactly is the desktop? In very basic terms, the desktop is comprised of pieces like the Apple menu, applications menu, menu bar, status menu, notification center, clickable icons, and some form of panel (or dock). With this combination of elements, the desktop makes it very easy for the user to interact with their computer. Every desktop contains a mixture of these parts. Linux is no exception. With the aforementioned GNOME, you have the GNOME Dash (which is like the application menu), the top bar (which is like the Apple menu bar), a notification center, and can even (through the use of extensions) add a customizable dock. Without a desktop environment, you would be relegated to the command line; trust me, you don’t want that.
There are a number of other desktop options, but the above tend to be considered not only the more popular, but user friendly and reliable. When looking into desktops, you’ll want to consider your needs. For example, the KDE desktop does a great job of functioning like Windows 7. Cinnamon and Mate are similar, but less modern looking. Xfce is a very lightweight desktop, so if you have slower hardware, it makes for a great solution. And again, GNOME is a minimalist dream, with very little getting in your way of working.
The desktop environment is also where you an interact with applications … which brings us to our most important issue.
Are the application options any better?
This is one area that has been, in the past, a point of contention for Linux. If you ask any dyed in the wool Windows fan/user, they will tell you, just like with macOS, you cannot run Windows applications on Linux. But that’s not necessarily true. Thanks to a compatibility layer, called Wine (which used to stand for Wine Is Not an Emulator), many windows applications can be run on Linux. This is not a perfect system, and it’s not for everyone. But it does enable users to run many Windows applications on Linux.
Even without native Windows applications, Linux still has you covered with the likes of:
LibreOffice — a full-blown office suite (think MS Office)
Linux has tens of thousands of free applications, ready to install. Even better, most modern distributions include their own app stores (such as GNOME Software or the Elementary OS AppCenter) that make installing software incredibly easy. Nearly all modern Linux distribution’s app stores can be found within the desktop menu. Once you’ve opened your app store, look for applications like LibreOffice (which is probably installed by default), The GIMP (a powerful image editing tool), Audacity (a user-friendly audio recorder that’s great for recording podcasts), Thunderbird (email client), VLC (multimedia player), or Evolution (groupware suite), to name just a few.
Is Linux for me, and how do I start?
Linux is ready to open up a world of free (and open) software that is reliable, secure, and easy to use. Is it perfect? No. If you happen to depend upon a proprietary piece of software, you might find that Linux (even with the help of Wine) cannot install that application you need. The big question on your mind might be, “How do I find out if Linux will work for me?” Believe it or not, Linux has that covered as well. Most flavors of Linux are distributed as “Live Distributions.”
What that means is you can download the distribution ISO image, burn that image onto either a CD/DVD or USB flash drive, insert the media into your computer (either in the CD/DVD drive or USB port) and boot from that media. Instead of installing the operating system, the Live Distributions run directly from RAM, so they don’t make any changes to your hard drive. Use Linux in that way and you’ll know, pretty quickly, if it’s an operating system that can fulfill your needs. Unlike the early years, you don’t have to be a computer geek to get up to speed on most of the readily available Linux distributions. To find out more about Linux distributions, head over to Distrowatch, where you can download and read about nearly every available Linux distribution on the planet.
In our new series Getting It, we’ll give you all you need to know to get started with and excel at a wide range of technology, both on and offline. Here, we’re arming you with everything you need to know to master the world of IFTTT.
If you think back to your high school geometry class, you might remember that “If/Then” statements were used in solving mathematical proofs. But even if math wasn’t your thing, you actually use If/Then statements every day: “If it’s raining outside, then I will bring an umbrella.” Or, “If I eat this donut, then I will be very guilt- um, happy.”
Taking the logic of the If/Then statement to its place in today’s hyper-connected world is the website IFTTT. It’s pronounced to rhyme with “gift,” and it stands for “If This, Then That.” Through the IFTTT website and accompanying app, users are able to create logic statements that help them pair up Internet-enabled services and devices in ways that can make life easier—or more entertaining.
Here’s what you need to know to “get it.” (Note: For the purpose of this article, we will be referring to the browser-based version of IFTTT, but nearly all of the information can be applied to the app, as well.)
Like pretty much all other Internet-based services, IFTTT requires you to create an account to begin using it. Signing up is extremely straightforward and, because the service is completely free, there is no need to provide a credit card. Simply visit the website and use your email address or Google or Facebook accounts to sign up.
Everything IFTTT can do is accomplished through applets. These are tiny programs that you can create which use triggers (the “If’s”) to execute actions (the “Then That’s”). For example one applet might be: “Every time the New York Times publishes a new article in its science section (If), send me an email (Then That).”
It’s important to realize that only companies that have linked up with IFTTT will be available to access via applets. For example, you’ll be able to access applets that control the Nest thermostat (as well as several others), but if you have a Vivint thermostat, you’ll be out of luck because the company hasn’t made its services available through IFTTT.
Because IFTTT has been around since 2011, there are a lot of pre-made applets you can choose from that already have triggers and actions linked, so chances are good that you’ll be able to find what you need without having to create your own applet. First we’ll tell you how to do that, then we’ll show you how to start from scratch.
Finding A Pre-Made Applet
IFTTT allows users to search for applets in several ways.
If you know what you’re looking for, simply click on the search text in the upper left corner of the screen, enter your topic in the search bar and hit enter. For example, if you’re looking for an applet that can automatically turn your Philips Hue lightbulbs on at sunset, enter “Hue” in the search bar. You’ll be taken to a page that will first list services that can used to build an applet and, beneath that, you’ll see a list of pre-existing applets. In this case, the one we want shows up at the start of the list, so all you have to do is click on it, and then click the “Turn On” slider.
This will take you to another page that explains which services need to be activated to make the applet work. In this example, it’s Weather Underground and Philips Hue. Click the OK button, and you’ll be walked through the steps necessary to activate the services needed for your applet. For this example, you need to tell Weather Underground where you live and then log in to your Philips Hue account.
Once you’ve completed the steps needed, your applet will be activated and you can begin enjoying a new level of interconnectivity.
Another way to find IFTTT applets is to click on the “Discover” link at the top of the screen. This will provide you a list of suggested applets based on those you’ve already activated. Alternatively, you’ll notice that when you click on “Search” at the top of the screen, you’ll see a convenient grid showing you a variety of categories. Click on a category, and you’ll be taken to a page showing you applets grouped by genre.
If you can’t find a pre-existing applet that suits your needs, you can create one as long as the company you want to access has an arrangement with IFTTT. To begin, click on “My Applets” at the top of the screen, then click the “New Applet” button in the upper right.
You’ll then be taken to a screen that features the words “if +this then that.” Somewhat counterintuitively, you’ll need to click on the blue “+this” section of the text.
In this case, we’ll create a simple applet with a daily trigger. To set it up, click on Date and Time and you’ll be taken screen that describes the service. Choose when you’d like your trigger to activate (hourly, daily, weekly, etc) and click on “Create trigger.”
Once your service is connected, you’ll then be taken back to the screen showing the large text version of “if this then that,” only this time, the “+this” section will be replaced by a graphic of the trigger you just chose.
Next, it’s time to select the action you want to have activated by your trigger. To do that, click on “+that,” which will now be blue.
In this simple example, choose SMS, then click on the green box that says “Send me an SMS.” You can then customize the applet to send you a message at the interval you specified in your trigger. Click “create action” and your applet will be created. If you want IFTTT to send you a message every time your applet runs, you can click the slider next to “Recieve notifications when this Applet runs.” Then, click “Finish” and you’ll be all set.
Turning applets on and off
Once you’ve activated one or more applets, you can turn them on and off as needed. Simply click on the “My Applets” text at the top of the screen, click onto the applet you’re interested in controlling, and click the “On” button to turn it to “off.”
On these screens, you can also make changes to any applets you’ve created. To do so, click the gear icon in the upper-right corner of the applet box and you’ll see the options you have for applet customization.
At any time, click the IFTTT logo in the upper-left corner of the screen to be taken back to the main page.
A huge flaw in Wi-Fi devices using WPA and WPA2 security encryption was exposed by Mathy Vanhoef, working out of KU Leuven, yesterday. Attackers can use this flaw to steal sensitive data – passwords, credit card numbers, emails – or inject malicious software into websites. If you’re using an Android device, an attack could be “exceptionally devastating”.
Here’s what you need to know.
What Is KRACK?
KRACK stands for Key Reinstallation Attack. In short, it is an exploit that takes advantage of the WPA2 protocol – the protocol most internet users are currently utilising to encrypt the information they send when online. It is directed at a process known as a 4-way handshake that all protected WPA2 Wi-Fi networks use.
This ‘handshake’ acts like a secret greeting between a client (such as your smartphone, laptop etc) and an access point (such as a modem/router): If both client and access point know the secret greeting (the password), then you can connect to the internet. This process also generates an encryption key.
This particular point in the process is vulnerable to being tricked to reinstall that ‘key’ that is already in use, thus the name KRACK.
Attackers can clone a protected Wi-Fi network while forwarding the internet connection – essentially meaning the user can still access the internet – and then using KRACK can manipulate this ‘handshake’ process. Thus, the attacker, in Vahoef’s words, “obtains a man-in-the-middle (MitM) position between the victim and the real Wi-Fi network.” This doesn’t give the attacker access to your WPA2 Wi-Fi password, but it does allow them to ‘listen in’ on the information that a client is sending between an access point.
Confusing? Definitely – the take home message is that this exploit can affect any device that uses WPA2 protection to encrypt data over a wireless network. That means pretty much every device you use in your daily life.
Fortunately, for it to be taken advantage of, an attacker would need to be in the physical vicinity of the Wi-Fi device.
Why Is Android Vulnerable To This Exploit?
Android 6.0 and above is particularly susceptible to attack via KRACK because of the way devices running this system deal with WPA2 protection.
The exploit was unearthed by Mathy Vanhoef who specifically notes that “due to an implementation bug, Android and Linux … will reinstall an all-zero encryption key [which] makes it trivial to intercept and manipulate all data that is transmitted by these devices.”
You can see his explanation, in full, below:
As you can see in the video, Vanhoef also explains that simply visiting secure sites – sites that are HTTPS-protected – does not necessarily prevent an attack, because some of these HTTPS-protected sites are also easy to manipulate. In the video, this results in the attacker, using KRACK, being able to see the username and password combination that the user has entered on a website.
How Can I Ensure My Android Device Is Secure?
At the moment, there’s not a lot you can do short of not using your Android device to access the internet via Wi-Fi, or more accurately, being conscious of your internet usage. Ensure that you update your devices with the latest patches as they become available. Importantly, Google have stated they will implement a fix for Pixel devices in their security update on November 6, 2017 but other, older devices don’t have as solid a date, with Google stating they’ll be patched ‘in the coming weeks.’
If you’re running an Android device with an Ethernet port, then you can use an Ethernet cable to connect to the internet instead of Wi-Fi. The exploit can only be used when a device has been connected to the internet via Wi-Fi. We recently posted a guide to the different types of ethernet cables, if you need help deciding which one is right for you.
Public Wi-Fi can also be dangerous, so it would be best to avoid it until a fix is released. Without any clear idea of who is on the network or how they’re using it, you open yourself up to attack.
It’s a pain, but during this time of uncertainty I would also ensure that you are connecting to secure services and webpages that include HTTPS in their address. Though this doesn’t guarantee you’ll be safe, it’s another layer of protection that you should always be aware of (and not just in the face of a WPA2 exploit). You can also find extensions such as HTTPS Everywhere, for Chrome, which ensure you are connecting to secure websites when browsing the internet.
Lastly, you can use a VPN service and connect to that when using Wi-Fi on your smartphone or connected devices. This will ensure you data is encrypted end-to-end. If you need help choosing a VPN, consult this guide.
Simply put, no. However, these devices and other devices that connect to the internet via Wi-Fi are potentially open to attack until manufacturers and suppliers roll out patches for them. Several have released statements regarding the exploit, which I have included below:
Belkin, Linksys, Wemo
“Belkin, Linksys, and Wemo are aware of the WPA vulnerability. Our security teams are verifying details and we will advise accordingly. Also know that we are committed to putting the customer first and are planning to post instructions on our security advisory page on what customers can do to update their products, if and when required.”
“We are in the process of reviewing which of our devices may contain this vulnerability and will be issuing patches where needed.”
“NETGEAR is aware of the recently publicized security exploit KRACK, which takes advantage of security vulnerabilities in WPA2 (WiFi Protected Access II). NETGEAR has published fixes for multiple products and is working on fixes for others. Please follow the security advisory for updates.
“NETGEAR appreciates having security concerns brought to our attention and are constantly monitoring our products to get in front of the latest threats. Being pro-active rather than re-active to emerging security issues is a fundamental belief at NETGEAR.
“To protect users, NETGEAR does not publicly announce security vulnerabilities until fixes are publicly available, nor are the exact details of such vulnerabilities released. Once fixes are available, NETGEAR will announce the vulnerabilities from NETGEAR Product Security web page.”
A spokesperson for Belong suggested that modems and routers will be “automatically updated once [a patch] is available.”
“We are aware of the issue and will be rolling out patches to Nest products over the next couple weeks.”
No matter your device, because of the ubiquity of WPA2, pretty much anyone who connects to the internet is able to be targeted with this exploit. Ensure your devices are as up-to-date as possible and that you keep an eye out for available patches as soon as they become available.
People today have many concerns regarding their browsing history and the visibility of their data to another person. There could be varying reasons for that. Many of them want to get rid of intrusive ads, and some just don’t want their searches to be seen by others using the same Internet connection.
However, for multiple reasons, most people couldn’t find an appropriate and efficient solution. Through this article, we hope to tell you about various security measures that can help you wipe your browsing history and prevent it from being exposed.
1. USE BROWSER’S PRIVACY MODE
While using a computer at a public place or the one that is shared by others, your browsing history is automatically stored. To avoid such a situation, you must activate the browser’s privacy mode before performing any activity that allows you to surf the internet. Doing so blocks the third-party cookies tracking your activity between different sites. Also, the first party cookies that the site keeps as proof of your presence are also wiped out when you leave the site, thereby preventing other people from seeing clues of your presence.
All you have to do is select private or incognito mode from the browser’s toolbar.
2. DELETE THE COOKIES
The removal of third-party cookies is a way to prevent your browsing history from being tracked, but something known as super cookies is a greater threat. Sites that run Flash are generally those with some kind of video stuff, and they do keep the Flash cookies (or super cookies). These could retain much larger amounts of data and could reproduce those deleted third-party cookies.
Super cookies record your path through which you move from one browser to another. The way to remove super cookies and other cookies could be CCleaner, which you have to download. If you don’t want to do that, be vigilant, as you could be signed-in frequently many times by a site using third-party cookies.
3. RESTRICT BROWSER FROM SENDING LOCATION DETAILS
Oftentimes the browser locates your presence at a certain place and transfers that information to the site you are visiting. They usually keep this data to give you more targeted and personalized search results. Moreover, it could also be used to enhance the ads displayed by advertisers.
To avoid such a situation, you could refuse the location request given by the browser when you visit a site. However, to remove such requests permanently, you could follow these steps;
Chrome – Go to Preferences > Settings > Advanced > Content settings, and choose the option of Disallow or Ask for the request of location whenever you visit a site
Safari – Preferences > Privacy, and select ‘Disable Location Services’ or ‘Ask’
Firefox – Type “about:config” in the URL bar and after that ‘geo.enabled’. To avoid Firefox’s repeated requests for sending your location to any website you visit, double-click to disable location entirely
Microsoft Edge – To turn off location requests, you will have to do it from the main computer settings. Then go to Privacy and choose location option. Now turn off Microsoft Edge
4. SEARCH ANONYMOUSLY
Search engines like Google have heavy traffic on them for which they have to respond. Also, the result given by Google differs from person to person depending upon the user’s data. In some ways, it is useful for us as we get the advanced results according to our needs. However, it keeps us away from certain other web pages that could contain useful information regarding the topic.
To restrict Google from doing this, access Search Tools > Results >Verbatim. However, a more efficient way to avoid your activity from being tracked is just to move to a private search engine, such as DuckDuckGo. The ads are also been restricted while browsing privately.
5. AVOID GOOGLE TRACKING
Google provides you with many of its services, including Google Calendar, Gmail, Chrome and others. With all these one-click browsing folders, we could easily get the information or your desired content at a very fast speed. But it’s also negative for us, as Google could track your activities in many ways through your emails, searching activities, etc. that give it an opportunity to present personalize results.
Also, this data of yours could help them display interrupting advertisements. You could avoid this problem by getting out of “shared endorsement” in Ads and by turning off Ad Personalization. This will not prevent ads from showing up, but it will restrict them to ones that are not personalized according to your browsing history.
Now, download Google Analytic Browser Add-on to stop Google tracking your activity and creating an ad profile.
6. STOP SOCIAL SITES FROM TRACKING YOU
For social sites, it’s really easy to track our interests, as we have immense information and personal interest activities on such sites like Facebook, Twitter, LinkedIn and others. Also, these sites follow our activities even after we have logged out of our accounts. They do it through the sharing or like button we click on.
To avoid personalized ads on social networking sites, you could follow these steps:
For Facebook – Go to Facebook settings > Adverts to control whether ads are targeted based on your clicks in and out of Facebook
For Twitter – Access settings > Security and Privacy. Then uncheck the box for “Tailor Ads”
For LinkedIn – Go to Privacy and Settings > Accounts > Managing Advertising Preferences
This process will stop personalized ads from appearing, but your activity will still be tracked for security reasons.
7. AVOID TRACKING
Almost every internet site tracks you by different methods, including cookies. These are present on distinctive objects on the web page, such as ads, comment section and sponsored links. Advertisers belonging to an ad network place cookies on a site to get data about when someone visits it.
These advertisers extract your interests and preferences through this data and share it with members of that ad network, so as to better advertise their product.
To stop such activities, you could change it from browser privacy settings and from there turn on Do Not Track option. You could also opt-out of tracking at the Network Advertising Initiative and Digital Advertising Alliance.
You would still observe ads on web pages, yet they are not personalized.
8. STOP EVERY TRACKING ACTIVITY BY AD BLOCKER PLUGINS
You can’t confirm that your activity is being tracked or not after you have opted out. This is because many sites do not cater such requests. However, downloading browser plugins for the anti-tracking purpose could block all sites from tracking.
Plugins, such as Privacy Badger, Ghostery, or Disconnect, stop all intrusive ads by blocking cookies and prevent advertisers to build your profile based on your internet activities.
9. USING VPN COULD HELP
Your browsing activity could also be tracked through your IP address. All the above options are really helpful at keeping you away from marketers by blocking tracking cookies.
For further protection, a VPN is an excellent anonymity tool that masks your real IP address and assigns you a new IP. This protects your location and browsing information from being exposed as your real identity is not on display.
It would also be helpful in unblocking sites that are restricted and banned in some countries.
10. REMAIN ANONYMOUS THROUGH PRIVATE BROWSER
A private browser with plugins, proxies, and setting changes could give you an excellent and anonymous browsing experience. Private browsers protect you from being tracked and bring all the above-mentioned features. You could enable proxy by turning it on from the toolbar in a private browser.
Epic Privacy Browser, for instance, is based on Chrome but with specialized settings that could stop trackers following your activities. You will still see ads but without being tracked, and your homepage will show the information about how many trackers have tried to observe your activity.
11. USE TOR
The Tor browser distributes your internet traffic through many nodes(servers). Therefore, your presence at a certain website will only show the IP address of the existing node.
This is why using Tor could make it really hard for snooping eyes to track your activity. However, while using Tor, you could face speed issues.
Most of the time, we are not aware of the fact that we are being tracked by websites we visit. Also, internet users are not familiar with the cons of internet movement tracking that in some ways is beneficial. Although it requires efficiency and effort to make your browsing history anonymous, once you are done with these privacy settings, you can enjoy secure browsing without the fear of being noticed.
About the Author:Peter Buttler is a professional security expert and lecturer. He serves as a digital content editor for different security organizations. While writing he likes to emphasize on recent security trends and some other technology stuff. You can follow him on Twitter.