Posts

Sites with Security Hacks

How Many Times Have You Been Hacked?

Results: How many times have you been hacked?Half of American adults had their personal information exposed to hackers last year alone. In a recent attack at the federal Office of Personnel Management, hackers stole the most sensitive personal data for 21.5 million people.

The New York Times recently created a microsite that allows you to answer a few questions to learn which parts of your identity may have been stolen in some of the major hacking attacks over the last two years and what you can do about it. Not all attacks are included, and many attacks go undetected, so think of your results as a minimum level of exposure.

Here’s the link: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html

Connected Devices Map

A Map of Every Device Connected to the Internet

This isn’t exactly current (about a year old, actually) but I ran across a tweet recently by programmer and “Internet cartographer” John Matherly: Read more

Google Font

Google Font Library Project

Someone I follow on Twitter (CodeVixen) sent out a link to Font Library, an open source project intended to tag and organize Google Fonts.  If you’re a little typography-challenged at times like I am, you can shop by tag and the site displays a sample of each font on the page so that you can see how it looks.  Really helpful!

Two-Factor Authentication

Sites with Two-Factor Authentication

Looking for a way to keep your online accounts (cloud storage, banking, social media, email, etc.) as secure as possible?

Two-factor verification (also known as two-step authentication, abbreviated to TFA) is a process involving two stages to verify the identity of a user trying to access services in a computer or in a network. This is a special case of a multi-factor authentication which might involve only one of the three authentication factors (a knowledge factor, a possession factor, and an inherence factor) for both steps. If each step involves a different authentication factor then the two-step authentication is additionally two-factor authentication. (Wikipedia) Read more

Evernote Import Folders

Creating an Import Folder for Evernote

Import folders are a perfect way to easily drag and drop documents from a computer into your Evernote account.  Follow these instructions to set up an import folder:

First, open your Evernote application (the Evernote program, not the web site) and click on Tools and then Import Folders.

Accessing the Import Folders settings in Evernote

This will open the Import Folders setting dialog box.  Below are the settings I use and recommend.  The Subfolders setting will allow you to drag and drop a folder of documents into the Import Folder rather than having to drop the documents themselves.  I recommend creating a dedicated Evernote Notebook for incoming scanned documents, which is indicated in the settings as well.  Finally, you can decide whether you want Evernote to delete documents after they’ve been imported so that you don’t have to periodically do it.

Evernote import folder settings dialog box

One last note about the Source/Delete setting.  There are several things that will cause Evernote to not load your PDF:

  • The PDF contains more than 100 pages
  • The PDF file is more than 25MB
  • The PDF does not contain at least one “scanned” page, defined as:
    • A “scanned” page contains at least 1025 pixels of image data
    • A “scanned” page contains no more than 512 characters of regular, searchable text (e.g. this is enough for a text-based fax header or similar). PDF files that have already been processed by a separate OCR system will not satisfy this condition and will be rejected.
  • The PDF contains more than one non-scanned page. (I.e. the doc may have one “cover” page without any image data, but if there’s more than one, than it’s not a real scan and we reject it.)
  • The analysis crashes or fails for some technical reason, typically due to a malformed PDF from some crazy source, or if the PDF is password protected (encrypted).
  • This analysis process takes more than 30 seconds to complete.

If any of these exist and you have the Source option set to “Delete”, you may lose a document that you need to archive.  If you can’t load it to Evernote, you can always keep a local copy of it… but not if Evernote deletes it first.

Need Evernote?  You can get it for free here.