Posts Tagged: ‘Internet’

Cyber Security Awareness II

October 30, 2016 Posted by Tiny

SWLAPCUG

SWLA Personal Computer Users Group

Skip to content
Advanced search

Quick links
FAQ
ACP
MCP
User avatar TinyJWRinLC
Private messages [0]
Notifications [0]

Home Portal Board index Everything Else
Post Reply
Advanced search
1 post • Page 1 of 1

User avatar
TinyJWRinLC
Site Admin
Posts: 425
Joined: Wed Feb 18, 2015 4:11 pm
Location: In Front of a Computer

Thursday, October 20, I attended the Cyber Security Awareness Workshop at Port Arthur, Texas.  This was a follow up to the Cyber Security Awareness Kickoff held earlier in the month.

There were three discussions, each lasting an hour.  All of the speakers were extremely interesting and spoke their entire allotted time.  I took a few notes each session.

1. Real Cybercrimes – Detective Brian Cater, Port Arthur Police Department.

Detective Cater spoke mostly about internet scams that were actual cases in the city.  These were mostly the same scams we hear about nearly every day: phishing, website spoofing, lottery scams, online job listings, etc.  In recent years, victims have generally been older people.  In most cases, funds are lost and never recovered.  If you are a victim, suspect a scam or want to learn more, check the Internet Crime Complaint Center website.

As he ran out of time, his final tip was to create your Social Security Account if you haven’t already.  That way, no one else can create one using your identity.

2. Social Media – Javier Barajas, IT Support, City of Port Arthur.

Mr. Barajas gave an interesting talk on using social media.  The average person uses their cell phone 4.7 hours a day.  He talked about things to watch for and gave some great examples.  My personal favorite was a young lady that posted “guess who got a new credit card” and uploaded a picture of her new card.  One of the responses to her post was from someone that asked what the cvv number on the back of the card was. You can guess what happened.

Advice:
a. Watch what you post, once on the internet, it’s always there.
b. Don’t share your location.
c. Click “like” on Facebook may result in bad things – Many of these sites are data farming.
d. Check your social app privacy settings.  An internet search can prove useful.
e. Use two-step verification when available.
f. Use different e-mail addresses/user names for different sites.
g. Don’t use selfies as your avatar.
h. Don’t enable auto login.
i. Change your passwords frequently.
j. Close old accounts.
k. Think twice before clicking on links.

3. How to Configure Your Home Network – James Cammack, Instructor at Lamar College PA.

Mr. Cammack gave a great presentation on setting up and configuring your router.  He used an excellent analogy of comparing a router to the U.S. Post Office.  One delivers web pages to your computer and the other delivers mail to your house.  Both use addresses.

Advice:
a. Use WPA2 encryption.
b. Change your router password.
c. Hide your SSID.
d. Use guest network (or disable if you don’t want to share).

Mr. Cammack only had time to finish part of his presentation.  Hopefully, he will speak again next year.

I had another great day in Port Arthur and am looking forward to attending next years events.

Cyber Security Awareness Month

October 8, 2016 Posted by Tiny

On October 6, I attended the 5th Annual Cyber Security Awareness Month Kickoff in Port Arthur, Texas.  There were four seminars, all free to the public.  I thought I would share a few notes and comments on my day.

1. The Internet of Things – was presented by Ira Wilsker of the Lamar Institute of technology.  He gave a presentation on the many home appliances, medical devices, security systems and other things that are all connected to the internet.  One of the many problems is that most of these things have no security and can be used as ingress points into your home network.  He also talked about how they can be used as remote bots for attacking web sites and used the recent Krebs on line site as an example.  I didn’t bother to note all the many items he talked about, but there were a few that I found interesting:

Johnson & Johnson warns insulin pumps can be hacked – many medical devices and systems are vulnerable, maybe even more so than driver less automobiles.

Connected Cattle – a farmer that has tagged all of his cattle with devices that monitor their health, feeding, etc.  It can even tell when the animals get pregnant.

IoT devices being increasingly used for DDoS attacks – a Symantec blog explaining how a Denial of Service attack works.

Sad reality: It’s cheaper to get hacked than build strong IT defenses – an excellent article by Iain Thomson that compares hacking defenses to the Ford Pinto formula.

2. NetSmartz – was presented by Detective Michael Nixon, Beaumont Police Department Special Victims Unit.  He talked about keeping safe from cyberbullying, on social media, etc.  Some notable links were:

Parents & Guardians – a section of the NetSmartz website with tips for caretakers of children.  There are also sections for educators, law enforcement, teens, tweens and kids.

CyberTipline – where you can report cyber crimes.

Suicide of Amanda Todd – a Wikipedia article about a fifteen year old girl who was cyber-bullied.  She posted a You Tube Video, and then committed suicide.

3. Security Today – was a presentation by Dell Computers and Wayport Business Solutions. They spoke about the SonicWALL Advanced Gateway Security Suite which is an advanced firewall.  They also briefly talked about Lightbeam, a web browser extension for keeping track of third party web sites that track your online activities.  (My research after the fact shows that the extension is only available for the Firefox browser.)

4. Cell Phone Forensics – was presented by Elie Van Horn of the Port Arthur Police Department.  He spoke about data found on cell phones and the methods used to find it.  He also spoke at length about how cell phones can be used to track you.  Some interesting links:

TeenSafe – an online service that can be used to put tracking software on phones.

StealthGenie – another tracking app.  My later research revealed that this app is no longer available because the creator has been jailed.

MobilStealth – still another tracking app.

So what did I learn from the seminar?  I had a passing knowledge of most of the items presented.  One thing I found the most interesting of the entire day was a website that was mentioned by the first and third speakers.  The final speaker started his presentation by stating how he was definitely going to check this site when he got home.

SHODAN, The Search Engine for the Internet of Things is exactly what it sounds like.  With it, you can search for things connected to the internet.

I really enjoyed the day and am looking forward to attending again next year.

Too Much Security? – Originally Published February 2016

February 10, 2016 Posted by Tiny

A Pain in the Whatchamacallit
By Tiny Ruisch

Lately I’ve been wondering if it is possible to have too much on line security.  Everyone that knows me will probably tell you that I’m sometimes a little paranoid when it comes to my computing.  I often talk about using a password manager, a virtual private network and encrypting important data on my hard drives.  Although I’ve contacted a few viruses and other malwares, I can honestly say that they haven’t gotten past my defenses and did not do any damage to my computers.

I’ve been reconsidering a little bit.  For the past week, I’ve been aboard a cruise ship.  I’ve been on several cruises, but this one has a major difference for me.  I purchased the satellite internet plan.  They’ve finally lowered the prices to where I can afford it.  It’s not nearly as fast as what I’m used to, but that’s a story for another article.

What led to the idea for this article is the fact that I’m pretty security conscious.  I use a password manager and generate strong passwords, usually 30 characters or more.  I almost always use a Virtual Private Network when I’m online.  All my important data files are encrypted.  (I’ve even got a couple of files where I encrypted the already encrypted file.)

I also use two-factor authentication on sites that allow it.  This caused a few not nice words to escape my lips when I logged into different sites and get the “we have sent a text to your phone, please enter the code in this box.”  This proved to be rather hard to do because there wasn’t a cell phone tower in the middle of the ocean.

That got me to thinking.  Do I really care if my Facebook account gets compromised?  They don’t have any of my credit card information or hardly any other personal data.  Many of my accounts that worry me don’t offer two-factor.  My bank comes immediately to mind.

Could it be that security doesn’t matter any more?  No matter how locked down your data is, there always seem to be companies like Sony, Target, Adobe and Home Depot being compromised releasing our information to the world.  Even many of our governmental agencies contribute to our identities being placed at risk.

If you follow any sites like Krebs on Security, you soon find there is a security breech about every second or third day.  There are also many others that never get reported.  When we do find out, it is often months after the fact.

The simple fact is that if you go online in the modern world, you should assume that your personal data has been compromised.  I guess I was incorrect in my opening paragraph.  You can’t have too much security.

That’s all for this month. Thanks for reading.

Finding Free Software – Originally Published November 2015

November 22, 2015 Posted by Tiny

A Pain in the Whatchamacallit
By Tiny Ruisch

I was looking back through some of the old newsletters when I saw an article about the annual club software disk.  Tom used to work hard at making all club members a CD with several freeware/shareware programs that were always useful.  Being a frugal computer user, I often got a gem or two from the annual Christmas gift.

I don’t think we should return to the days of an annual disk, but I thought I’d share my methods of obtaining free software.  Keep in mind that nothing is free.  We’ve all heard the saying “when something is free, you are the product.”  Although not necessarily always true, often you pay a price for “free” software by giving up personal data, looking at advertisements, getting fewer features, etc.

No, I’m not making a plea to turn back the clock.  Instead I thought I’d write about where to find useful software for zero or little charge.  Although I’m not going to recommend any software as being “better”, I will mention that I’m writing this article with LibreOffice Writer, a module of the LibreOffice suite.  You can download it for free at LibreOffice – the document foundation.

When looking for free software, a good idea is to load your favorite internet search engine and include the words free or freeware in your search terms.  Refine your results as necessary.  For instance, when I became the newsletter editor, I searched for “best freeware newsletter software”.  Search engine suggestions (usually found near the bottom) soon made me realize that I was really looking for desktop publishing software.  It wasn’t long before I found several programs that I plan to test.

There are many sites that offer lists and reviews of different categories of software.  Almost all of them have a search function.  Those that don’t have menu buttons to easily find what you are looking for.

My favorite is one that I have often talked about.  Gizmo’s Freeware is a community site with several members that curate lists of freeware in different categories.  Recently, they have also added reviews for free to try and paid programs.  I have found this to be one of the best software resources on the internet.

Major Geeks goal is to provide the top one percent of editor tested freeware downloads.  They’ve been on the internet since 2001, so they must be doing something right.  There is also an active user forum.

FileHippo is another site where you can find many popular freeware programs for downloading.  A unique feature of the website is the FileHippo App Manager.  This is a small utility that scans your installed software and notifies you of programs that have an available update.  The app only works for programs that are hosted on the site.

The Giveaway of the Day website offers one free license software title each day.  The programs are available for only twenty four hours.  Software companies do this with the hope that you will like the program enough to purchase it.  Many days the free program isn’t the best, but there is the occasional gem.

A fellow by the name of Nir Sofer has written more than a hundred utilities.  They are mostly small, stand alone programs that are easy to use and solve a specific problem.  Best of all, they are all free.  You can check them out at Nirsoft.

There are many other places to find free software.  Some are good and some are not so reliable.  Watch out for sites that hide their download links.  They may try to fool you by having you click on a big download button for software you don’t want while putting the correct link at the bottom of the page where it is easy to miss.  Before installing unknown software, do an internet search of the program name.  If you use a keyword such as problems, you might find something to change your mind.  The more reviews you read, the better informed you will be.  You will soon get a “feel” whether or not the program is worth trying.

Thanks for reading.

Why You Should Get Your Own Domain – Originally Published February 2015

February 7, 2015 Posted by Tiny

A Pain in the Whatchamacallit
By Tiny Ruisch

I’ve owned my domain name since May 10, 2001.  No, this article isn’t going to be a long plug for my website.  I’m going to try and convince you to register your own domain.  I’ve long believed that everyone should have a presence on the internet.  It’s kind of like having a phone number.

The biggest reason you should probably get a domain name is so that you can easily control your e-mail.  If your e-mail address is YourName@suddenlink.net, you would lose it if you want to change your Internet Service Provider to AT&T or another company.  It would be a real pain in the you know what to have to change your e-mail address with all of your contacts.  For me, it would be even harder to have to make the change on all of the websites I’ve registered with.

If you had your own domain, you could have the e-mail address of YourName@yourdomain.com or .net, or .org, etc.  You would keep that e-mail for as long as you owned the domain.  Never again would you have to change your e-mail address.

Many people avoid those problems by registering their e-mail with Yahoo, Google, AOL, etc.  One of the problems with this method is that you are often limited in your mailbox storage, size of attachments, composition tools, security, etc.  Free e-mail also usually includes free advertisements.

Many computer users have a “junk” mail address.  This is one that they only use for message boards, free offers or other sites that you don’t want to have your real e-mail.  With your own domain, you control all your e-mail addresses.  For example, I often create a one time address for sites.  I usually make an e-mail like del0201@tinys-bs.com.  This lets me know that I can delete the mail address on February 1.  One more advantage to having your own e-mail control is that if you give an address to a specific place and all of a sudden you get spammed at that e-mail, you know who compromised you.  You can then delete the address and never deal with them again.

Owning your domain isn’t expensive.  For instance HostGator, the club’s web hosting service, charges $12.95 a year to register SWLAPCUG.org.  Hosting services are $7.16 a month.  If you sign up for three years, the rates drop to $12.98 and $3.96.  If you do a web search you will find many companies and many different pricing plans.

For that low fee, you get unlimited e-mail addresses, disk space and bandwidth.  There are several other hosting features that you may or may not want to use.

E-mail isn’t the only reason you might want to consider having your own domain.  You can easily make a website to show off your hobbies, a family photo album, share recipes, or do like me: just plain BS.

Other things I’ve used my domain name(s) for is to give family members their own e-mail address, host private chat rooms, store files, etc.

That’s all of my thoughts for February.  My mind is empty again.  Thanks for reading.

Obsolete Technology A to Z – Originally Published January 2015

January 11, 2015 Posted by Tiny

A Pain in the Whatchamacallit
By Tiny Ruisch

Over the years, I’ve written many articles on technology terminology.  This is another one of them.  It originally started as a Mind Bender quiz, but soon evolved into a list of obsolete technology, terminology, companies, etc.  I hope you enjoy learning the alphabet from A to Z.

A is for Amiga computers, the last product line of Commodore International.  That was the company that brought us the VIC-20, the Commodore 64 and many other great computers.
B is for Beta Max tapes.  They have become obsolete along with the letter V.
C is for Circuit City.  After the bankruptcy, the brand name was purchased by Systemax and lived for a while on the internet.  Even that is no longer with us.
D is for dial up modems.  I imagine that someone somewhere is still using one.  Can you remember calling someone on the telephone and getting that unique sound?
E is for ENIAC, the first computer.  It was initially designed to calculate artillery firing tables for the United States Army.
F is for floppy disks.  They started big and got smaller.  Finally they disappeared.  CDs and DVDs probably won’t be around very long.
G is for Google Reader, which was an RSS aggregator operated by Google.  Although it was still popular, Google discontinued it.
H is for Honeywell computers.  Still in business today, Honeywell International ceased manufacturing computers in 1989.
I is for Infocom.  If you’ve read any of my past articles, you’ll know that I think they produced some of the best games ever.  My all time favorite was Suspended.
J is for the Jupiter Ace.  In 1983, it was advertised as possibly the fastest computer in the universe.  Instead of BASIC or CP/M, the machine’s default operating language was FORTH.
K is for Kinescope, at one time the cutting edge of video technology.
L is for Laserdisc, a video technology that never really made it to the big time.
M is for Mosaic, one of the first graphical web browsers.
N is for Netscape, once the dominant browser for surfing the internet.  The final version was released in February 2008.
O is for Olivetti, once a well known typewriter manufacturer that branched out into making computers.  They are still in business as a subsidiary of an Italian telecommunications company.
P is for Pager.  It used to be the machine that made the noise in movie theaters.  Supposedly, you were important if you carried one.
Q is for Quantum Link which later became America Online.  Q-Link was one of the first on line bulletin boards.
R is for Rolodex.  Does anyone still use these index cards to keep track of their contacts?
S is for Slide Projector.  The only time you hear about slides anymore is when someone wants to know how to digitize them.
T is for typewriters.  There is still a company that makes them, but you won’t see them in use very much.
U is for UNIVAC, the first general purpose computer for commercial use.  It was also the first computer to correctly predict the outcome of a presidential election.
V is for VHS tapes.  They have become obsolete along with the letter B.
W is for Windows 1.0, Windows 2.0, Windows 3.0 Windows NT, Windows 95, Windows Millennium, Windows 98, etc.
X is for the xD-Picture Card.  These flash memory cards were only used in Olympus and Fujifilm cameras.  They were expensive and replaced by SD cards.
Y is for Y2K which on January 1, 2000 was going to be the end of the world because computers wouldn’t be able to correctly calculate the date.
Z is for Z-DOS, a forked version of MS-DOS designed to run on the Zenith computer.  I was originally going to make Z for Zenith, but they are still around.  LG owns the brand and sells a few items.

That’s all of my thoughts for January. My mind is empty again. Thanks for reading.

My Thoughts on the Sony Data Hack

December 12, 2014 Posted by Tiny

If you read a newspaper, watch the television, surf the internet or probably even have a casual conversation on the street, you’ve probably heard someone’s opinion about the Sony data breach.  I’ve got my own impression.  Want to hear it?

HO HUM!  What’s new?  I’m not surprised.

In October of 2012, I wrote an article titled “Companies I Dislike a Lot“.  One of the companies I mentioned was Sony.  I haven’t changed my mind since then.  With the exception of watching Jeopardy and a few Sony movies, I haven’t put any of my money into their coffers.

This isn’t Sony’s first data problem.  In 2009, George Hotz (the first person to jailbreak the iPhone) announced that he was going to hack the PlayStation 3.  The following year he did so.  Sony retaliated by suing him.  They went so far as to obtain the IP addresses of everyone that visited Hotz’s website.

In response, the hacker group Anonymous sent this warning to Sony:

“Your corrupt business practices are indicative of a corporate philosophy that would deny consumers the right to use products they have paid for and rightfully own, in the manner of their choosing. Perhaps you should alert your customers to the fact that they are apparently only renting your products? In light of this assault on both rights and free expression, Anonymous, the notoriously handsome rulers of the internet, would like to inform you that you have only been ‘renting’ your web domains. Having trodden upon Anonymous’ rights, you must now be trodden on.”

About two weeks later, Anonymous launched an attack on the PlayStation Network.  They shut the network down for 23 days and obtained the personal details of about 77 million PlayStation customers.  Even with advanced warning, Sony didn’t protect their customers.  Doesn’t that seem like a company that doesn’t care?

In the next several months, there were many attacks on Sony servers.  In June of 2011, the hacker group LulzSec broke in to the Sony Pictures servers and obtained private information including passwords, email addresses, home addresses, dates of birth, etc. of over one million customers.  Why did they do it?  This was their statement.

Our goal here is not to come across as master hackers, hence what we’re about to reveal: SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now. From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?

The hackers said that all of the extremely sensitive data was easy to find and stored in plain text.  Does this sound familiar?  Compare it with the recent hack.  I’ll repeat myself, “HO HUM!  What’s new?  I’m not surprised.”

Why does Sony keep getting hacked?  I think it is for two reasons.  Sony doesn’t care about their customers.  Starting with the DRM rootkit, they have made decisions that are both legally and morally wrong.  Many of these customers are also hackers.  They get upset and retaliate.

Secondly, Sony makes it easy for hackers to hack them.  They obviously have not learned any lessons from previous attacks.  They don’t seem to have done much to fix their security problems.

When I think about the latest Sony hack, my first thought is, “Great.  I still have not forgiven them for putting a root kit on my computers.”  I do feel sorry for all of the Sony employees whose data is readily available for downloading.  They did no wrong.  Too bad that corporate thinks as little of their workers as they do of their customers.

Are Apple Products Safe? – Originally Published February 2014

September 6, 2014 Posted by Tiny

A Pain in the Whatchamacallit
By Tiny Ruisch

I did it again.  Sometimes I just can’t keep my mouth shut.  The other day, I was at Best Buy waiting in the Geek Squad line.  Yes I know.  Going to the Geek Squad for a computer repair is kind of like going to Burger King for a steak.  It’s not going to happen.  Anyway, that’s another story.

There were two ladies in front of me in the line.  One of them was carrying a laptop and a copy of Webroot Secure Anywhere.  She was telling the other gal how she had called Best Buy.  They told her to bring her computer in and they would clean the viruses an reset the password.  The second lady told her, “You need to get a Mac.  If you’ve got windows then you have a virus.”

That’s when I opened my mouth and asked her why I didn’t have any viruses on any of my four windows computers.  She quickly changed the subject and started talking about how she didn’t have to worry about getting hacked.  I said, “You obviously haven’t heard about Mat Honan.”

She hadn’t, so I briefly explained to her how Mat Honan’s Apple account was fairly easily hacked.  Mat Honan is a writer for Wired magazine.  One of his most widely read articles was about how his digital life was ruined by hackers in less than an hour.  Hackers got the last four numbers of his credit card from Amazon.  (These numbers are available on many web sites.  They then called Apple and asked for a password reset using the same numbers for identity verification.  After that it was simply a matter of changing passwords on all accounts.  Honan then could not access any of his data.

I’m not rehashing this story to trash Apple.  My point is that all computers are vulnerable to viruses and/or hackers.  It’s almost always because of operator error.  I’m knocking on wood as I tell you that I’ve never had any malware problems that shut me down.  Over the years, the worst thing that has happened is the root kit I got from a Sony music CD.  After all these years, I’m still steaming over that incident and refuse to knowingly purchase any Sony products.

The easiest way to clean viruses and malware from you computer is to not let them install in the first place.  It doesn’t make a difference if you’re a Windows or Apple user.  Use a good anti-virus program.  Read EULAs and all carefully check boxes when you install software.  Don’t blindly click on links in e-mail, even if it is from someone you know.  Be wary of clicking links in forum posts, especially if the poster is new to the group.

Keep your web browser updated.  On sites visit often I sometimes click on a ad, not because I’m interested in buying something, but to send a little cash to the web site owner.  Be careful if you do this.  Many of these advertisements lead to bad sites.  I’ll click an ad for a reputable company much faster than one that tells me I can get rich quickly.  It doesn’t really make a difference if you use Windows, Apple, Linux or anything else.  It’s almost always the operator that causes problems.

Thanks for reading.

TunnelBear VPN – Originally Published March 2014

August 28, 2014 Posted by Tiny

Some Lagniappe for You
By Tiny Ruisch

la·gniappe (lnyp, ln-yp)
n. Chiefly Southern Louisiana & Mississippi
1. A small gift presented by a store owner to a customer with the customer’s purchase.
2. An extra or unexpected gift or benefit. Also called regionally boot.

Do you ever download from the internet on unsecured wireless networks?  If you answered “no” to that question, I can say that you are most likely not telling the truth.  The first thing almost everyone does when they come to our monthly meeting is log in to the local WI‑FI.  It is probably safer than the local McDonald’s, Starbucks, or library.  Personally, I’m not willing to bet my personal data on that.

That’s why I use a Virtual Private Network (VPN).  Put simply, a VPN is a group of computers networked together over a public network, namely the internet.  A VPN client is the software that allows you to enter an encrypted network and access the internet.  Anyone intercepting your data will not be able to decipher and read it.

If you search for “free VPN”, “best VPN”, etc. you will find literally thousands of VPN clients.  Of course they will all tell you why they are the best.  I like TunnelBear. I’m not going to tell you it is the best, but I’ll try to convince you that it is pretty good.  The first thing I like about TunnelBear is that it is a Canadian company.  This means that they aren’t subject to a National Security Agency court order.  It’s really not that big a thing, but I know the NSA spies so why make it any easier for them.  TunnelBear has servers in seven different countries.  They create a secure, encrypted connection between your internet device and the host country you are connecting to.

TunnelBear is easy to download and setup.  There is no need for the user to learn about network protocols, IP addresses, encryption levels, etc.  After downloading and installing the program, an account must be created.  The only user information required is name, e-mail address and password.  No need for your phone number, address or Mother’s middle name.

Like all other VPN companies, TunnelBear offers both a free and paid service.  Their free service gives you 500 MB of free data every month.  This should be plenty for the occasional user.  A bonus 1 GB can be obtained by promoting them on Twitter.

TunnelBear is easy to setup and use.  Give it a try and see if you like it.  You can download TunnelBear here.

If you like the program, just tell everyone that you’ve got a SWLAPCUG extra, a bonus perk; a little lagniappe.

Funny Stuff On The Internet – Originally Published May 2013

August 16, 2014 Posted by Tiny

A Pain in the Whatchamacallit
By Tiny Ruisch

My grandson twisted my arm last month and forced me to take him to CyPhaCon.  When I was younger, I went to a lot of science fiction conventions.  Back then it was mostly Star Trek conventions.  Now that I’m older, I have a hard time remembering if I’m a “Trekkie” or a “Trekker”.  SciFi conventions are a lot of fun.  Unfortunately, they can be pretty dangerous too.  That is why you always see uniformed police officers on duty.  About the only thing that is really safe is the healthy food you can buy.

The internet is a lot like a SciFi convention.  There are so many things to see and do.  You can even read stupid articles written by old men that ramble on about gatherings of SciFi people.  Everyone also knows about the dangers and we all keep our antivirus programs updated. I know that all of the SWLAPCUG club members have recently checked their router firmware for updates and have their firewalls activated to keep the bad guys away.  Since everyone is so safe, I thought that this month I’d talk about some of the fun things to do on the internet.

There’s about 161,000,000 of them.  I know that everyone doesn’t have the same idea of what’s fun, but maybe if I tell you about my favorite sites, you might find something entertaining.

One of the things you can find a lot of on the internet are free games to play.  If you’re looking for games, a good place to start is the Freeware Genius lists of top games.  My personal favorite online game is Texas Hold’em Poker.  There are a lot of places to play, but you’ll usually find me at World Series Poker at games.com.  If you like to play hearts, I recommend you try Bicycle Hearts at the Microsoft Gaming Zone.  The Gaming Zone has been around for quite a while and they have lots of games.

I’ve never been much of a television or movie watcher, but I love to listen to the old time radio shows.  Most evenings I’m listening to The Lone Ranger, Gunsmoke, Jack Benny, or my personal favorite, Fibber McGee & Molly.  My hard drive has about 21 GB of radio program files.  One of the best places to find them is at The Internet Radio Archive.

In December 1995, Bill Watterson retired from cartooning and I lost my daily dose of one of the funniest cartoons ever.  Now, thanks to the internet, I can still read Calvin & Hobbes everyday.  You can probably find a daily comic you’ll like at GOCOMICS, AZ Central, or ArcaMax Publishing.  None of the comics sites require registration.  Make sure you check out Pickles, another one of my favorites.

“The Alphabet has been Updated with 15 Exciting New Letters” is only one of the funny satires you’ll find in The Onion.  The fictional paper was started in 1988.  They have been around more that twenty years, so they must be doing something right.  Their fictionalized news seems so genuine that it has occasionally been cited as real news.  I’ve got to warn you though.  There is often adult language used in the paper.  Another funny satire site is the Bongo News.

Another web site that never fails to make me laugh is Geezer Planet, a senior citizen humor site.  If you like senior citizen humor, you also might like to check out Geezer Guff.

The Darwin Awards is a chronicle of enterprising demises honoring those who improve the species…by accidentally removing themselves from it!

Maybe I shouldn’t admit it, but I think some of the videos on You Tube are extremely funny.  I also visit the College Humor website almost every day.

Sometimes when I’m really bored, I click the Random Link Generator 40 or 50 times and end up finding an interesting web site to browse.

As you might or might not know, I’m a transplanted Northerner.  When I talk with my brother and sisters on Facebook, I usually translate into Southern for them.  Everybody gets a few laughs.  Translating into a dialect is easy when you use The Dialectizer.  As I write this you can convert into eight different dialects.  It hardly ever fails to make me laugh.

Here is a sample:
As y’all might o’ might not know, I’m a transplanted No’therner.  When ah talk wif mah brother an’ sisters on Facebook, ah usually translate into Southern fo’ them, dawgone it.  Ev’rybody gits a few laughs.  Translatin’ into a dialeck is easy when yo’ use Th’ Dialeckizer.  As ah write this hyar yo’ kin cornvaht into eight diffrunt dialecks.  It hardly evah fails t’make me laugh.

That’s just a few of the things I like to do on the internet for fun.  I hope you enjoyed them too and maybe found a new site you’ll visit often.  Do you have a favorite place you think everyone should know about?  Why not take a minute right now and go to the club website.  Log in, go to the forums and post the link so we can all check it out.

Oh, by the way, the grandson is already making plans for a costume for next years CyPhaCon.  I suspect it might be one that is also suitable for Contraband Days.

Thanks for reading.