Friday, September 30, 2011

What to Do if You've Been Hacked http://bit.ly/qpM3F8
Get help to prevent hacking and help recovering from being hacked- see geeksoncall.com

Blog title...

What to Do if You've Been Hacked

wsj.com - 9/26/2011
BEN WORTHEN

It's a nightmare scenario every business fears.
Your tech department has spotted suspicious activity on the company network. Your customers and employees are getting hit with credit-card fraud and identity theft. MasterCard Inc. is on line one.

The panic sets in: Your company has been hacked!

So, what do you do?


First, take a breath and remember that you're not alone. Last year, 662 organizations publicly disclosed data breaches, according to the nonprofit Identity Theft Resource Center, a figure that includes real-world theft and accidents as well as cyberintrusions. And the actual number is likely much higher than that, since not all hacking incidents get disclosed.

Next, remember that getting hacked doesn't have to be a business-crippling experience. While it will likely set a company back financially, if handled properly it won't have a long-lasting impact.

"The public is forgiving when it's apparent that the company is doing the right thing," says Lori Nugent, a lawyer at Wilson Elser Moskowitz Edelman & Dicker LLP who specializes in breach cases. In fact, if a company is on top of the technological problems and communicates well, it can build loyalty among its customers, she says.

There are a number of small but critical steps businesses need to take when they find out they've been breached. Here's a look at what to do when it happens to you.


Don't unplug. The natural instinct when an employee discovers he or she has been hacked is to power off the machine (and maybe throw it against the wall in frustration).

But it's the wrong move.

True, turning off the Internet connection and detaching the computer from the corporate network can help prevent the infection from spreading. But shutting the machine down can also erase valuable evidence that will help investigators determine what's been stolen and where it's been sent. A lot of malware--a catchall term for programs like viruses written and installed by hackers--resides in a computer's memory and not on the hard drive. Turning off a computer erases the memory, and with it many traces of the hack, security experts say.


Call in the pros. By now, you've probably realized you're in over your head. There are many companies that specialize in post-breach forensic investigation; it's a good idea to get in touch with one of them now. In fact, you should have one on speed dial for emergencies.

Also, now is the time to tell the police. (This is a separate step from disclosing the breach publicly, so you can wait to make that decision.) Local law-enforcement groups typically don't have the resources to investigate a breach, but filing a police report is often necessary to collect insurance. If you decide you do need official help, the Secret Service is the federal entity charged with investigating hacking intrusions. The Federal Bureau of Investigation also has a cyber division.


Keep a chain of custody. From here on out, you aren't just trying to stop the breach; you're also planning for the inevitable legal fallout. Maybe you won't get sued, but if you do, you'll need to be able to demonstrate that you responded to the breach in an appropriate manner. Record every time someone touches a compromised computer or server and everything that's done to it.


Find out if the breach is still open. Don't assume that because one infected computer has been cleaned up or removed the attack is over. The hacker could have taken control of multiple machines. At this stage, your job is mostly to sit back and let the pros do a thorough search of your systems. Be patient: Learning the full scope of a breach can be a time-consuming process, so don't worry if this takes a few days or longer.

Among the things the experts will need to do is find the malware that the hacker used and determine what kind of information it's programmed to find and where it sends it. Likewise, they'll check the logs of all the outbound communications for any suspicious activity. Patrik Runald, a researcher with security company Websence Inc., says that hackers often send data to so-called dynamic hosts that constantly change their Internet addresses. Most legitimate websites don't use this kind of addressing. If data are still being sent to these types of addresses, it's a possible sign that a breach is still happening.


Stop the bleeding. Now that the pros have assessed the scope of the problem, take the infected computers offline. Investigators will take a digital snapshot of the information on them, leaving you free to erase their contents. Also, block all access to and from any of the Internet addresses associated with the malware.

It's also important to figure out how the hacker broke in, and to fix that hole. Again, experts can look through log files and trace the hacker's movements to, say, find the email with the fake spreadsheet that an unsuspecting employee opened.


Find out what they stole. This will be slow and frustrating, but it's important to get right--so don't take shortcuts, and resist the temptation to call off the hunt too early.

If companies aren't thorough in their analysis, they'll have to disclose that a breach was bigger than they originally said. This can hurt a company that's trying to rebuild trust with a customer base, as was the case with TJX Companies Inc., which eventually said it lost more than double the number of records it initially announced in the breach it disclosed in January 2007. (A TJX spokeswoman declined to comment.)

"I always say correctly is better than quickly," says Brian Lapidus, the chief operating officer of Kroll Inc.'s fraud-solutions division.


Figure out whom to tell. This is when you bring in the lawyers.

Forty-six states have laws that specify when a company has to inform people whose records have been exposed in a data breach. And they're all different. Other entities, such as the federal Department of Health and Human Services, have separate reporting requirements for organizations they oversee.

Usually, if the data stolen include a name and something like a credit-card or Social Security number, then notification laws are triggered. But sometimes if the data are encrypted or there's a strong reason to believe that the information won't be misused, there's no need to tell anyone. In other cases, credit-card data could be so old that all the cards would have expired.

"Sometimes it's pretty clear that the data is not likely to be misused or the data doesn't meet the notification requirements," says Ms. Nugent, the breach lawyer.


Deciding whether to disclose a breach isn't just a matter of law. Sometimes companies do it because they're afraid it will get out or just because they think it's the right thing to do.

Email marketing firm Epsilon Data Management LLC, a division of Alliance Data systems Corp., earlier this year said that email addresses it manages for companies like Target Corp. were stolen by a hacker. The company wasn't legally obligated to disclose the breach because email addresses aren't considered personal information. But Epsilon CEO Bryan Kennedy concluded that the news would get out anyway and that coming clean was in the best interest of Epsilon's customers.


Be Apologetic. You probably feel like a victim, but remember, so do the people whose information was stolen. And in their minds, it's your fault.

Remember also that your customers will probably expect the worst when they get the news about the breach. "Consumers tend to jump immediately from a data breach to identity theft," says Matthew Mors, a vice president at Mix Public Relations who has helped craft the response to many breaches.

So, while your lawyer will probably tell you not to apologize, striking a conciliatory tone is important. A good breach-notification letter will make it clear that you are taking the issue seriously and that you've gotten to the bottom of it. Also, be sure to stress that you have taken steps to make sure that something like this doesn't happen again.

Some people will still be concerned, so set up a website with more information and give them a phone number they can call. In some cases, businesses offer customers a year of free credit monitoring after a breach. An increasingly common freebie is credit-restoration services for anyone who runs into problems as the result of a breach.

Get help to prevent hacking and help to recover from being hacked- see geeksoncall.com



Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Wednesday, September 28, 2011

New security software covers PCs to phones http://bit.ly/pUn5GB
Ensure your safety w/ this software & the help of our techs- geeksoncall.com

New all-in-one security software covers PCs to phones

msnbc.com - 9/27/2011
Suzanne Choney

Looks like the time has come: We all own so many dang digital devices that trying to protect them in various ways with various software has grown into a ginormous hassle. Now, McAfee Security is out with an all-in-one product that provides protection to PCs, Macs, tablets and smartphones.

McAfee may be the first major security player at bat on this unified security front, but others are coming for consumers. Kaspersky will have a similar product available next month, and Symantec in 2012, according to reports, says IT Pro.

McAfee's All Access is described by the company as the "first cross-device security solution that protects multiple Internet-enabled devices (PCs, Macs, smartphones, netbooks and tablets) under one annual plan." It costs $99.99 for individuals, and $149.99 for the household version.

Not that we need stats to back up the fact we all own a growing number of digital devices. We know it by the number of cords jammed in the corners of rooms around the house. But, McAfee compiled some stats for us, anyway:
•25 percent of "consumer Internet users now own at least five devices per household, with 60 percent owning at least three."
•41 percent spend "more than 20 hours per week using a digital device for personal use."
•Consumers "place an average value of $37,438 on the 'digital assets' they own across multiple digital devices, yet more than a third lack protection across all of those devices. In the U.S., people valued their assets at a higher figure than anywhere else, at nearly $55,000."
•"As a global average, respondents had 2,777 digital files stored on at least one digital device," with those files including music, photos, personal communications, personal records, resumes, portfolios, cover letters and email contacts.


The figures come from research firm MSI International, which surveyed more than 3,000 consumers in 10 countries.

"Despite the high value of their digital assets, people still aren’t securing every device they own," McAfee said. The survey found that more than 36 percent "don’t have security protection on all of their devices and 7 percent have no protection at all — leaving potentially thousands of dollars worth of digital assets at risk, if stored on an unprotected device."

How well an all-in-one security approach works remains to be seen. But with more of us stashing our digital files in various places, like phones and tablets, and not just computers, one-stop security shopping could be a plus.


Ensure your safety with this software and the help of our techs- visit geeksoncall.com

Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Tuesday, September 27, 2011

Another OS X Trojan imitates Adobe Flash installer http://bit.ly/rtl8IU
Have your technology scanned & secured by our techs- geeksoncall.com

Another OS X Trojan imitates Adobe Flash installer

cnet.com - 9/26/2011
Topher Kessler

A few months ago security company F-Secure uncovered a Mac Trojan horse that posed as an installer application for Adobe Flash, taking advantage of the popularity of the plug-in to trick users into installing it. After installation, the Trojan would alter the system's hosts file to redirect Google sites to fraudulent servers. Now Intego has discovered a new Trojan for OS X that does pretty much the same thing: masquerades as a Flash Player installer to trick people into installing the program.

Unlike the previous Flash Trojan (called Bash/QHost.WB), which changed one file on the system, this new Trojan is a bit more complex and first deactivates network security features, then installs a dyld library that will run and inject code into applications that the user is running. The Trojan will also try to send personal information and machine-specific information to remote servers.

Intego calls the Trojan OSX/flashback.A, and is not too specific about how this Trojan runs, but it will undoubtedly compromise your system if you run it. The Trojan appears to use Apple's basic installer package system and includes Flash player logos so it looks like a legitimate software package.

While people may be concerned about this Trojan and other recent Mac malware, the risk of being infected is exceptionally low. If you need Adobe Flash on your system, just go to Adobe's Web site and get it or go to a trusted source like CNET's Download.com. Doing this will ensure that you get the file directly as the developer intended, as opposed to using either an outdated version, a modified version, or a rogue application disguised as a Flash installer.

In addition to being easy to avoid, the Flashback Trojan does not self-replicate so it will not affect other systems. In essence, as with all Trojan attacks this is an attempt to disguise malicious software in hopes of stealing information from unsuspecting people.


Intego claims its VirusBarrier X6 anti-malware utility can detect and remove this latest Trojan if it is installed, but other scanners should soon also be updated to detect this threat. While there is no information on how to manually remove Flashback, Intego says the program installs its malicious dynamic library in the /username/Library/Preferences/ folder as the file "Preferences.dyld," so you can go to that location and remove that file to dispose of the code.

Besides getting your download updates and installers from trusted sources, you can do some additional things to protect your system from these and other threats:

1. Turn off Safari's auto-open command
In Safari, go to the General section of the preferences and uncheck the option to "Open safe files after downloading." While this will not open applications, if checked it will open documents and media that may contain executable code, and turning it off is recommended.

2. Install a malware scanner
Install a scanner like Sophos, VirusBarrier, ClamXav, Kaspersky, or iAntiVirus, and set it up to scan your e-mail and your download folders. While doing this will help ensure your downloads are safe, the rarity of malware threats on OS X makes it optional. Nevertheless, this has steadily become more of a recommendation of mine.

3. Never trust a program
If something asks you to install an item on your system, shut it down and confirm the source of the item. Only install programs on your system if you know exactly where they came from.


Have your technology scanned and secured by our techs- geeksoncall.com




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Monday, September 26, 2011

FRANCHISE OPPORTUNITIES - Virginia Beach-based Geeks On Call gets upgrade http://ping.fm/Bdn61

Virginia Beach-based Geeks On Call gets upgrade

Gone is the guy wearing a baseball cap, a polo shirt and eyeglasses with broken frames. Someone wearing a crisp white shirt and a tie has taken his place.

The change in Geeks On Call's signature Geek reflects the computer-repair company's heightened emphasis on selling services, including voice-and-data services, to businesses.

"Before, our franchise owners were technicians who knew how to fix computers," said Glenn Davis, CEO of Geeks' parent company, On Call Holdings International. Today, he said, Virginia Beach-based Geeks is seeking franchisees with entrepreneurial drive and an ability to sell.

Davis and business partner John Finguerra spent almost two years revamping the company's strategy after buying the assets of Geeks On Call America in late 2009. With several changes in place, they began offering Geeks franchises this month.

Davis and Finguerra already had built a telecommunications services company by the time they acquired what remained of the former Geeks On Call. Despite the departures of key managers and several franchisees, Davis and Finguerra figured Geeks' franchise structure could become a vehicle for selling telecom services to businesses throughout the country.

Organized in 1999, the previous Geeks began selling franchises in 2001 and expanded rapidly. At its peak, it had franchisees in more than two dozen metro areas, including Boston, Chicago, Denver and Los Angeles. Service personnel drew attention to the company by driving Chrysler PT Cruisers bearing Geeks' toll-free phone number.

However, a split within the management prompted some officers to leave in 2006. More left in 2009. Franchise owners, too, bailed out.

By early last year, the number of franchisees had dwindled to 54. Today it stands at 44. One reason for the falloff was the difficulty some franchisees had adjusting to the weak economy, especially if they relied on residential computer-users, said Richard Artese, president of Geeks On Call International and an officer in the earlier company.

When Davis and Finguerra bought Geeks, "we walked into a very lean shop," Davis said.

Still, the new company was able to handle customers' inquiries and deliver services to franchisees without disruption, he said.

The new Geeks has 30 employees, with slightly more than half working in the Virginia Beach call center. Ten employees in the parent company, On Call Holdings, provide accounting, advertising and marketing services for Geeks and its franchisees.

Coming up with a different model for selling Geeks' franchises took longer than the partners expected. One reason was their determination to realign the costs for franchisees and eliminate a heavy royalty that Geeks was charging, said Davis, who serves on the Virginia Beach City Council.

"Some franchise owners worked 60 to 70 hours a week, and some worked 40 hours," he said. "We figured, 'Let's not penalize the owners who put in extra effort'" by imposing the royalty on their revenue.

The new model also had to include a way for franchisees to sell voice-and-data telecom services to businesses. That's important because sales of these services can generate a steady stream of income for franchisees, Davis said.

Because Geeks had become a new company, its owners had to compile a new franchise disclosure document for the Federal Trade Commission and get approval from states that require franchise offers to be registered. Several states, including Virginia, require franchisors to provide detailed information about their background, financial condition, complaints involving franchisees and the cost of buying and operating a franchise.

Geeks is selling franchises in 36 states and registering to sell in the remaining 14, Davis said. The company also plans to offer franchises in Canada, he said.

A faltering national economy has complicated the sales of some franchises, especially those that require significant financing. Today, companies selling franchises want prospective buyers to have greater resources, including more working capital, because of the economic uncertainties, said John Pearce II, a professor of management and operations at Villanova University's School of Business, near Philadelphia.

"The franchisor makes money from the success of the franchisee" and is looking for greater assurance that their investment will generate a return, he said.

However, Geeks On Call has scaled back the fees that a franchise-buyer once had to pay. The cost of a Geeks territory includes an initial $20,000 franchise fee and a monthly membership fee of $500.

That compares with a franchise fee of $25,000 for a single territory, an 11 percent royalty on the franchisee's gross revenue and a weekly advertising payment of $275 for each territory under the predecessor Geeks.

The company has received inquiries from prospective buyers, but has not sold any franchises, Davis said.

As part of their restructuring, he and others at the company sought to address several issues that upset franchisees in the past, including the fees, lapses in customer support and advertising costs.

"There's no question that things are better under the new ownership," said Shep Bostin, who owns nine territories in Maryland suburbs of Washington. "These guys have the ability to run a business and give us the support we need."

Geeks' new owners still have work to do, said Bostin, a Gaithersburg, Md., resident, but the complaints among franchisees are now, "When is the new stuff coming in?" rather than "How am I going to keep the doors open?"

Meanwhile, Geeks' emphasis on selling services to businesses "is more consistent with where the real money is," he said.

Liz Lasicki, who owns franchise territories in the Charleston, S.C., region with her husband, lauded the company's communications with franchisees and the expansion into telecom services.

"It helps us get our foot in the door with businesses that don't need computer services" but may want to reduce the cost of their voice-and-data services, she said.

Call today for more info, 1-800-905-GEEK (4335) or visit us online http://ping.fm/gL63M
Amazon's tablet serious challenge to Apple's iPad http://bit.ly/qGZynK
Need help deciding which tablet fits you best? call 1-800-905-4335

Amazon's tablet serious challenge to Apple's iPad: analysts

huffpost.com - 9/26/2011
Dhanya Skariachan

Amazon.com Inc, which revolutionized reading with its Kindle e-reader, is expected to unveil a tablet computer this week that analysts say will seriously challenge Apple's market dominating iPad.
Amazon on Friday invited media to a press conference to be held in New York on Wednesday, declining to provide further details.

But analysts were confident that the world's largest Internet retailer will introduce its long-awaited tablet computer this year to expand in mobile commerce and sell more digital goods and services.

"Wednesday is tablet day," BGC partners analyst Colin Gillis told Reuters.

The tablet has been awaited as a strong competitor to Apple Inc's iPad. Apple has sold about 29 million of the devices since its launch in April 2010.

"The real issue here is that, you know, it is likely going to be good for consumers; is this going to be good for shareholders?," Gillis said. He wondered whether Amazon would price the tablet below those of rivals -- and thereby do little to boost margins.

"Knowing Amazon, it is likely to be a very aggressive price," Gillis said.


In much the same way Amazon's Kindle e-reader was priced low to quickly get traction among readers the company is likely to keep the price of its tablet low to attract users and sell other content and services, one analyst said.

"It's a marketing tool to build a relationship with customers and sell them cloud (computing) services," said James McQuivey, an analyst with Forrester Research.

While Amazon has remained tight lipped even about the device's existence, the TechCrunch blog earlier this month said the Amazon tablet also will be called Kindle.


It will be a 7 inch device with a full color, touch screen, run on Google's Android software and cost $250, the blog said, well below the price of the least expensive iPad.

Robert Baird & Co analyst Colin Sebastian said in a note last month than an Amazon tablet would be a "game-changer." Sebastian forecast the device could sell 3 million units in its first year.

The tablet could pose a major threat to Apple because of the Kindle's popularity and the movie and music services Amazon sells.

Forrester's McQuivey said the device also takes aim at Barnes & Noble Inc's NookColor device, which hit the market last year and features tablet functionalities.

Several technology companies like Research In Motion and Samsung have introduced tablets that sold poorly. Hewlett Packard Co announced recently it would abandon its tablet.

Amazon shares finished the day up 0.2 percent at $223.61 on Friday on Nasdaq. The stock had traded as low as $219.06, but rallied as invitations to the media event began arriving.




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Friday, September 23, 2011

Technolog - Use Skype on the iPhone? Your info could be stolen http://bit.ly/qxVNm1
Stay safe- even on the go! visit geeksoncall.com

Blog title...Use Skype on the iPhone? Your info could be stolen

msnbc.com - 9/20/2011
Rosa Golijan

Are you using the Skype for iOS app on your iPhone or iPod Touch? Then you need to be aware of how easily your information -- particularly your entire address book -- could be stolen without your knowledge. All it takes is a single chat message.

According to TechCrunch, the issue was first discovered by AppSec Consulting security researcher Phil Purviance -- who claims that he pointed out the vulnerability to Skype about a month ago. You can see a rather technical demonstration of how information is stolen in the video below, but here's the simplified version:

*An evildoer places malicious code into the "Full Name" field in his or her Skype profile

*That individual sends a chat message to his or her victim -- someone who is using Skype on his or her iPhone or iPod Touch

*As soon as the victim views the message, the malicious code begins to run on his or her mobile device

*Information -- such as the victim's address book -- is uploaded to the evildoer's computer

*The evildoer is able to sift through the stolen information at his or her leisure

The reason this series of events can occur is because the "Full Name" field isn't checked for malicious code.

Scary, right? But there are a few things you should know before you panic.

For starters, thanks to the way Apple has designed iOS -- its mobile operating system -- only certain files, including your address book, are vulnerable.

But most importantly, you should know that Skype is working on a fix for the security issue:


We are working hard to fix this reported issue in our next planned release which we hope to roll out imminently. In the meantime we always recommend people exercise caution in only accepting friend requests from people they know and practice common sense internet security as always.


stay safe- even on the go- visit geeksoncall.com



Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Wednesday, September 21, 2011

Apple No1 for 8 years! http://bit.ly/o1UBUP
For help with your technology needs and equally impressive customer service call 18009054335

Apple No. 1 in customer satisfaction for 8th year

msnbc.com - 9/21/2011
Suzanne Choney

Apple continues to retain the No. 1 spot when it comes to happy customers, according to the American Customer Satisfaction Index in its annual survey about personal computers. It's the 8th year in a row the Cupertino company has held the title.

"Among Windows-based PC makers, there is very little change from a year ago," noted the ACSI. With 100 as the top score, Apple scored highest at 87, up 1 percent from last year and placing the company "among the top 5 companies measured in all of ACSI."

PC maker HP -- which has said it is getting out of the consumer PC business -- was up 1 percent to 78, "best among the Windows-based PCs," ACSI said, while HP-owned Compaq was at 75, "last among all brands."

In-between the two HP brands are Dell, Acer, "and the aggregate of all other brands (such as Toshiba, Lenovo, and Sony)," unchanged from last year with scores of 77.

And while Apple may be atop the heap, "despite weakening (computer) demand, satisfaction with (all) personal computers remains at an all-time high score of 78 on the ACSI's 100-point scale," ACSI said.

"Apple's winning combination of innovation and product diversification -- including spinning off technologies into entirely new directions -- has kept the company consistently at the leading edge," said Claes Fornell, founder of the ACSI, which includes the University of Michigan's Ross School of Business as a founding partner.

"Even as Apple parlays its newer iPad products into dominance of the tablet computer market, its traditional PC business continues to thrive," ACSI said in its report. "In the second quarter of 2011, sales of Apple desktops and laptops grew 16 percent year-on-year, compared with only 1 percent growth for Dell's consumer products."

The report is based on approximately 3,000 customer surveys.

The last time a brand other than Apple got the highest rating was in the 2003 ACIS survey; at that time, Dell was ranked first with a score of 78, Apple was second with 77 and HP was third with 70. Compaq ranked the lowest that year, with 68.

ACSI's survey also measured customer satisfaction with televisions, Blu-ray disc and DVD players. At a score of 85, those products received the "highest score among 47 industries covered by the ACSI."

"Customers are upgrading to TVs that provide better picture quality, more features, and save space, while the (Blu-ray disc) format is becoming more widely available and affordable," said Fornell. "Clearly, customers are pleased with what this industry has to offer them."


For help with your technology needs and equally impressive customer service call 1800-905-4335 or visit GeeksOnCall.com


Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Tuesday, September 20, 2011

A Tablet Kids Can Grow Into http://bit.ly/rptJvp
Our techs can show you the benefits technology can give your child- visit geeksoncall.com

A Tablet Children Can Grow Into

wsj.com - 9/14/2011
KATHERINE BOEHRET

The crowded tablet market now offers a number of devices in various weights, screen sizes and operating systems. But are there any tablets built to withstand tough treatment from kids?

This week, I tested a tablet aimed at ages 4 through 9: the $100 LeapPad Explorer from LeapFrog Enterprises Inc., a company known for its educational children's toys. This tablet, which is available in green or pink, has a built-in microphone, camera, video recorder and kid-size stylus for writing and drawing on its five-inch touch screen (a finger also works).

It was designed with tough plastics, a sheet of Mylar over its glass screen and an extra metal frame around the screen to withstand physical abuse. This tablet can be used for reading e-books, playing games and running through digital flashcards.

The LeapPad Explorer is the latest in LeapFrog's gadget lineup, which started with the original LeapPad educational toy in the late 1990s and more recently continued with the Leapster Explorer hand-held game in July 2010.



The Explorer tablet for kids works with over 40 downloadable apps and has a topside slot for running older game cartridges. A spokeswoman said the company expects to offer more than 70 apps by the end of this year, and has no plans to stop selling cartridges. Cartridges cost $25 each and downloadable activities--including games, apps, flash cards, videos and eBooks--range from $5 to $20 each.

While using the LeapPad Explorer, I discovered plenty of features that would appeal to young kids like fun sounds, on-screen graphics and a sense of accomplishment while progressing through books, games and activities.

The main appeal of the LeapFrog products is the company's focus on personalized education. When children set up the Explorer, they enter their grades, ranging from prekindergarten to sixth grade. The device's activities then automatically tune to a child's capabilities. This means that if a third-grader is performing at a higher level than is expected for that age, the Explorer adjusts to a slightly higher level, and the child is notified and congratulated. However, if a child is progressing at a lower level, the system adjusts to a slightly lower level without notifying the child.

A feature called the LeapFrog Learning Path lets parents digitally track their child's progress. Whenever the Explorer is plugged into a computer, details about the child's time on the device are transferred to the PC so a parent knows how the child is performing and can get tips on how to help the child improve.



The activities address spelling, phonics, math, creativity, science, music and geography. And because of LeapFrog's partnership with Disney-Pixar, kids will likely recognize characters from movies in the Explorer's games and books.

My favorite app was the Ultra eBook, "Cars 2: Project Undercover." LeapFrog's ultra eBooks are like eBooks on steroids. They let kids record themselves reading an entire book and play it back. They're animated and have six built-in comprehension activities and three games. They offer stories written at three text levels and they use a visual dictionary for vocabulary development. "Cars 2: Project Undercover" is the only Ultra eBook currently available, but LeapFrog plans to add six more to its app store before the end of the year.

LeapFrog designed the Explorer tablet with certain features that keep its cost down, and some also solve child-safety concerns. For instance, the Explorer lacks a wireless connection, so kids can't get online without plugging the tablet into a Windows PC or Mac. Downloading apps also requires a parent's password.

Another example is that the LeapPad Explorer runs on four AA batteries rather than the rechargeable lithium ion batteries found in most regular tablets.

LeapFrog's spokeswoman said this keeps the cost low and noted that Li-Ion batteries can leak, making them unsafe for kids' toys. Kids can plug the Explorer into the wall with a $10 AC adapter.

The Explorer is a far cry from popular tablets. The device's one-inch thickness makes it chunkier than most grown-up tablets and its screen is of a lower quality than that of iPads and Android tablets. Its built-in camera has resolution of less than one megapixel. I found the tablet's response time to be a bit sluggish, but doubt most kids under 9 would.

Each Explorer tablet comes loaded with three apps and a free app of choice (eBook, game or video) from the LeapFrog Connect app store, accessible via computer once the tablet is plugged in via USB cord. Preloaded apps include a pet game, which gives kids a pet to care for, Story Studio for creating stories with photos, voice-overs and art, and Art Studio for drawing and painting with various colors and stamped images.

Though the LeapPad Explorer looks a bit chubby compared with regular tablets, its features will be adequate for kids. Its ability to grow over time with more downloaded apps makes it a smart investment for parents.

let our techs show you the many benefits technology can bring to your child's life- visit geeksoncall.com


Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Monday, September 19, 2011

Can you use technology without risking your privacy? http://bit.ly/pkv5q8
Give us a call and we'll make sure you're safe! 1-800-905-4335

Can you use technology without risking your privacy?

If youre unsure give us a call and we'll make sure you're safe! 1-800-905-4335 or visit geeksoncall.com

today.com - 9/19/2011
Christina DesMarais

Location Tracking
"I think perhaps the hottest issue right now is location. Location, location, location," says Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation in San Francisco.

Indeed, both Microsoft and Google were recently under fire for collecting the locations of millions of laptops, cellphones and other Wi-Fi-enabled devices around the world. (Msnbc.com is a joint venture of Microsoft and NBCUniversal.)

The unique identifiers for those devices were then made public, meaning that if a person knew someone's Media Access Control (MAC) address, he could infer where that person spent time with her phone in tow.

A MAC address is a device's unique hardware number or physical address, and it allows a cellular carrier to find a phone and link it to its network.

While both Microsoft and Google have since made changes to their databases to assuage privacy concerns, the fact remains that our mobile phones can double as tracking devices.

"[Mobile phones] can reveal information about your location not only to your cellphone carrier but also to the cellphone manufacturer, the developer of the operating system of your phone or location-based service applications on your phone," Bankston says. He adds that some apps have no use for your location, but simply want access to it for marketing purposes.

To keep those apps from tracking you, often it's just a matter of making a few adjustments to your phone settings. On the iPhone, for example, you can turn off location features by going to Settings, General, Location Services. There you can enable or disable location functions for each app on your phone. Android handsets have a similar option in Settings, Location and Security.

But aside from shutting off your phone entirely, your cellphone carrier will always be able to triangulate tower signals to determine your location if law enforcement or some other entity should ask for it.

Geotags in photos
"Anytime you use an electronic device, depending on what the device is, you're leaving a data trail, whether it's GPS meta data in a photograph you take or [the] cookies you pick up when you're online," says Rainey Reitman, activism director with the Electronic Frontier Foundation.

She's right. As we have pointed out, every time you take a photo with your cellphone, there's a good chance your location is being stored along with the photo. Cellphones with GPS often default to storing this information when GPS is turned on. And some point-and-shoot and dSLR cameras also have GPS built into them.


There are a couple of ways to remove the location information from your photos, which is also called Exchangeable Image File Format (EXIF) data. First, you can download a simple program that strips out the EXIF data. For Windows PCs, try Easy Exif Delete (free on cnet.com) or iPhoto Exif Cleaner for Mac (free on cnet.com) for Macs. These programs will indiscriminately remove all of the EXIF data.

Cookies that can't be deleted
And the cookies Reitman mentioned are the reason the ads you see online seem to know that you're old enough to possibly want to buy wrinkle cream, or that you're in the market for a new car.

In studying the companies and technology behind this targeted advertising, The Wall Street Journal found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors.

"There are third-party tracking cookies on almost every popular commercial site so they're virtually impossible to avoid," says Paul Stephens, director of policy and advocacy for the Privacy Rights Clearinghouse in San Diego, Calif.

While tech-savvy Web surfers used to simply delete these tracking cookies from their machines, the Wall Street Journal found that "...new tools...scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them."

Understandably, some people think this kind of activity is wrong. Wired recently reported that website analytics firm KISSmetrics and more than 20 of its customers, including Spotify, AOL's About.me, Etsy, Spokeo and the news site Gigaom.com were recently sued on the grounds that KISSmetrics' tracking technology violated federal and state privacy laws.

All Web browsers provide ways to delete cookies from your computer. The website ghacks.net gives a good tutorial on doing it in each major browser. You can also visit the Network Advertising Initiative to opt out of the behavioral advertising conducted by its member companies.

Data mining
It might distress you to know how many websites display things like your address, phone number and other personal information.

"The problem is...if a consumer has a severe need to have privacy--if they're a public defender or a law enforcement officer or the victim of stalking -- it is practically impossible to truly keep your privacy online, especially your home address and such, because these information broker websites don't have to remove your information," says Reitman, who adds that some sites such as Spokeo, which at one time posted maps that pointed to people's houses, now offer an opt-out option.


What makes facial recognition disturbing is how it could be used in the future as technology progresses. Already in Japan there are billboards that can recognize your gender, approximate age and ethnicity so as to better target ads toward you. And you may have heard that after the recent riots in London, police were using facial recognition to identify looters.

While identifying looters sounds like a good idea, think about what it would be like if everywhere you went cameras could determine who you were. Personally, I find the idea appalling. Remember the movie "Minority Report"?

And you might have reason to worry about those seemingly harmless Facebook photos that you're tagged in.

Researchers from Carnegie Mellon University have found that it's possible to use facial recognition technology to match the photos and real names from publicly available profiles (such as on Facebook) to profiles where the user used a pseudonym and wouldn't want his real name used, such as Match.com.

In a published report the authors wrote, "Hence, face recognition creates the potential for your face in the street (or online) to be linked to your online identity(ies), as well as to the sensitive inferences that can be made about you after blending together offline and online data."

The Los Angeles Times recently posted a guide for disabling Facebook's facial recognition.

Devices with memory
If you've ever used a digital copy machine there's a good chance the data you scanned is still saved to the copier's memory. In fact, this poses such a privacy concern that several states are working on passing laws to require businesses to erase or encrypt stored data from digital copiers before recycling or disposing of them.

Any device with memory, including your PC or phone, should be cleared out before you part with it.

While some people think that deleting files and folders is sufficient before selling or disposing of a computer, they're wrong. Deleted files can be undeleted. Even reformatting your hard drive can be undone. The most secure way to remove data from your computer is to use one of the wiping or erasing utilities we recommend when prepping your computer for disposal.

It's also important to erase data from your phone before getting rid of it. With Apple's iOS, it's a just a matter of hitting Settings, General, Reset, Erase All Content and Settings. For Android, you'll want to format your microSD card, which you can do through SD Card and Phone Storage, under Settings. Then do a Factory Data Rest, under the Privacy menu in Settings.

The bottom line
There's no doubt that as technology evolves privacy concerns grow. As a final example, let me share another tidbit. The Air Force is working on tiny spying aircraft that might be as small as a dragonfly. While they're not sure how the little bugs might be used, the point is that technology is capable of finding more information about people than ever before thought possible.






Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Friday, September 16, 2011

You can now edit videos on YouTube http://bit.ly/qIkuzc
Test it out and send us videos about the service we've provided you- geeksoncall.com

You can now edit videos directly on YouTube

msnbc.com - 9/15/2011
Rosa Golijan

The folks at YouTube want to help you make your videos look a bit better. How? By letting you use a number of tools to stabilize, rotate, and spice up your clips directly on the site -- without needing to re-upload footage.

According to the official YoutTube blog, the new tools can be used on newly uploaded as well as older videos (as long as they do not have over 1,000 views or any third-party content). The videos' URLs and ID numbers will remain the same unless you choose to save the edited footage in brand new clips.

You can see a little preview of just what you'll be able to do with all the editing tools in the clip below. I recommend taking a peek just for the sake of seeing how the Instagram-style filter effects work -- because let's face it: We're bound to start seeing those a lot more frequently.

Note that the editing features are being rolled out gradually. So don't worry if you're not seeing the magical "Edit Video" button just yet -- just give it a bit of time.


Use this great service to send us a video telling us how we are doing- geeksoncall.com




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Thursday, September 15, 2011

Check out this new service and what our techs can do for you! http://bit.ly/qR8Nf7
Visit us at GeeksOnCall.com

Online Shopping on the Side

wsj.com - 9/8/2011
WALTER S. MOSSBERG

Online shopping is quick and easy if you know what you're looking for, or only have to decide between a couple of products. But it can get tedious and time-consuming if you're making a purchase that requires lots of comparisons over multiple sites.

So, I've been testing Digital Folio, a new, free software product to be announced next week. It's a browser add-on that lets you save and view potential product choices in a single place, and quickly see how their prices compare among some major online retailers.

You just drag links to products that interest you into a sidebar right alongside your Web browser. This module stays with you regardless of what website you're viewing, and its contents can be shared with friends.

Best of all, for certain kinds of products from certain merchants, the sidebar will almost instantly show price comparisons for the same item from other online stores--even if you aren't viewing the other stores' websites. If you decide to buy an item, you just click on its link in the sidebar, and you'll be taken to the retailer's site, where you can place your order as you normally would.

Digital Folio is labeled as a beta, or test, version. But, in my tests, I found that, despite some limitations and rough edges, it's a powerful piece of software that I believe could save shoppers both time and money.

Its maker, a small startup from Denver of the same name, has been showing and testing Digital Folio for awhile, but finally feels it's ready for wide use. You can try it now at digitalfolio.com. The company makes money by getting a small cut of purchases made by Digital Folio users at partner online merchants.


Before getting into the details, it's important to lay out three key limitations of Digital Folio today. First, while it can save potential choices for any kind of product from any site, Digital Folio only generates automatic price comparisons when you save product listings from its five online retail partners, which it calls "Smart Retailers." These are Amazon, Best Buy, Target, Wal-Mart and Sears.

Second, even at the partner retail sites, Digital Folio's price comparison feature works for only 13 categories of items, all of them electronic products or appliances. These include cameras, computers, TVs, printers, refrigerators, dishwashers and microwaves. Oddly, two of the hottest such product categories--smartphones and tablets—aren't included now in the price-comparison feature, but the company is planning to add more products.

Third, it only works with the two most popular Web browsers: Internet Explorer on Windows and Firefox on either Windows or Macintosh. And you'll need relatively recent versions of the browsers and the computers' operating systems. I tested it using the latest versions of the two browsers on the latest versions of Windows and the Mac OS.

Mobile versions are planned in the coming months for Windows Phones and Apple mobile devices, with an Android version coming later.

There are other comparison-shopping products, but none that work like this.

Digital Folio's sidebar has two main sections, marked by tabs at the top. One called My Folios stores your lists of possible purchases. These can be divided into sections, or folios, for different products. For instance, in my tests, I set up folios for cameras, laptops and TVs. Each folio can also have sections, like laptops with screens in a certain size range.

The second tab is called Compare, and it provides the varying prices at the five partner merchants, though these prices don't yet include shipping and handling costs.


Here's an example of how it worked for me in my tests. While shopping for a pocket-size digital camera, I noticed on Amazon a certain Canon Powershot model. So I dragged its link into the Digital Folio sidebar. It was $129 on Amazon, but Digital Folio immediately advised me that Sears had it for about $113, and Wal-Mart for $119. It also listed higher prices at other of its partner merchants.

An even more interesting thing happens when you go to a retailers' page that lists many items in a category, say a page at Amazon that lists TVs. The Compare tab starts pulsating and, in seconds, it generates a list of all the items on the page, along with prices at the other partner merchants.

In my tests, this allowed me to see that a certain Samsung model was cheapest at Amazon, but a Vizio model that also caught my eye was a lot less at Wal-Mart.

Unlike items you've deliberately dragged into Digital Folio, these instant comparisons at list pages don't stay in the sidebar. They disappear when you navigate away from the page. But they're amazingly dynamic. For instance, if you narrow down the selection on the list page by, say, brand, size or price, the Digital Folio list with price comparison changes along with it.

So what are those rough edges I was talking about? Well, I found setup to be clumsy on Internet Explorer, requiring multiple steps. I also much preferred using the product on Firefox, because, when you click on an item in the sidebar to revisit its original page, that page opens in a tab. By contrast, in Internet Explorer, it opens a new window and has to slowly reload the Digital Folio sidebar.

Also, you can't drag an item directly into a folio in the sidebar. Instead, you have to wade through a dialog box to choose the folio where it should reside. And you can't automatically, or rapidly, set up a new folio for a new category of item you find on a site; you have to first manually establish a new folio.

The product also doesn't automatically refresh itself on one computer, if you've made changes to your folios on another. And it crashed Firefox repeatedly on one of my test Macs, though not on another.

Still, despite its early limits and design drawbacks, I believe Digital Folio is a good start toward making complicated online buying decisions simpler.


Check out everything else we can do for you- visit us at GeeksOnCall.com

Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Wednesday, September 14, 2011

Want to run Windows products on your Mac? We can show you caw- visit GeeksOnCall.com
New Parallels World http://bit.ly/r9otyP

A Parallels World Where Windows Zips on Macs

wsj.com - 9/1/2011
WALTER S. MOSSBERG

Apple's Macintosh computers have long been able to run Windows, in addition to their native operating system, Mac OS X. But the process has sometimes been clumsy, slow or taxing to the machine and it hasn't been tailored to the new Lion version of Apple's OS.

Now, the most popular utility for running Windows programs simultaneously with Mac programs has been updated in a speedier version that takes advantage of some Lion features. It's called Parallels Desktop 7 for Mac, and it goes on sale Sept. 1, as a $50 upgrade for current Parallels users and on Sept. 6 for new users at $80. The product comes from a Seattle company of the same name.

I've been testing the new Parallels 7 on last year's version of the MacBook Air laptop, running Lion with 4 gigabytes of memory. That's the recommended amount of memory for running Windows 7, the version of Windows I tested.

In my tests, this latest Parallels edition ran Windows quickly and smoothly, and integrated well with some of Lion's new features, even though my test Mac isn't the fastest Apple laptop available today.


For instance, while I'm writing this in a Mac program on the Air, I'm simultaneously running the Windows-only Internet Explorer Web browser, and a couple of other Windows programs, with no discernible slowdown in any of them. I can easily recommend Parallels 7 to Mac users who need to use Windows programs some of the time.

I also tested a new companion Parallels Mobile iPad and iPhone app, which allows you to remotely control both your Mac and Windows running on your Mac. I am less sanguine about this product, which also goes on sale Thursday, for an introductory price of $5 (the regular price is $20). It did work, but like similar mobile programs for controlling PCs, I found it a bit awkward to use.

Parallels works by creating a so-called virtual machine inside your Mac. Within this virtual machine, you can install a copy of Windows you've purchased and it will behave like a faux Windows computer, compatible with the same programs as a physical Windows PC.

You can run Windows programs on your Mac either in one large window that displays the Windows desktop and taskbar, or in a mode that allows the Windows programs you run to simply appear on the Mac as if they were Mac programs, without the Windows desktop.

Going Back and Forth

Either way, you can switch back and forth between this virtual Windows computer and your regular Mac environment. You can copy and paste material between Mac programs and Windows programs, and drag files between the two operating systems. You can even open files from the Mac side of the machine in Windows programs, provided they are compatible.


This isn't the same as another method for running Windows on a Mac, called Boot Camp-- a built-in feature of the Mac designed by Apple. Boot Camp, which also requires you to purchase and install Windows, has two big advantages over Parallels: It's free, and it dedicates the Mac's hardware solely to Windows, so it runs Windows programs even faster.

But it has a big disadvantage. It doesn't allow you to run both operating systems simultaneously, or copy and paste material between them. With Boot Camp, if you want to switch between the Mac OS and Windows, you have to reboot the Mac.

I found that the new Parallels started and resumed Windows much faster than its predecessor. When launching Windows, the Mac no longer slowed to a crawl, as it had in past versions.

All Windows 7 programs I tested launched and ran quickly and smoothly, and the fancy visual effects in Windows 7, such as mini-previews for icons in the taskbar, worked great.

Playing Solitaire

I was able to run the Windows versions of Microsoft Office (including Outlook), Quicken, and many other programs. I also easily ran such Windows-only programs as IE, Windows Media Player and even the venerable Windows Solitaire.

In addition, the new Parallels for the first time can take advantage of the Mac's built-in webcam.

It has a new wizard for creating a virtual machine. And now, it will even allow you to buy, download and install Windows right from within Parallels. Previously, you had to obtain Windows separately. This is a big improvement, in my view.

Windows in Launchpad

Windows, and Windows programs, can be displayed in Lion's new Launchpad feature, which mimics the main screen of an iPad. They also show up and behave like Mac programs in Lion's new Mission Control feature, which shows all the programs running on the Mac in miniature. Windows programs can also run in Lion's new full-screen mode.

The companion iPad app has been enhanced so it not only remotely controls the virtual machine, but the entire Mac. This has some advantages, such as allowing you to view Flash videos that the iPad normally can't play, by playing them remotely on the computer.

But I found that, as on other iPad apps for remotely controlling computers, controlling PC and Mac screens is difficult using iPad gestures.

Many Virtual Machines

Parallels 7 can create and run multiple virtual machines, and also handle operating systems other than Windows. For instance, I was able to run Linux and an open-source version of Google's Chrome OS on my Mac using Parallels. At one point in my tests, I had four operating systems running at once, and could control all four from an iPad.

Oddly, the new Parallels can even run a second, virtual copy of Lion, on a Lion-equipped Mac, though this would mainly be of interest to developers testing products.

(Apple says Lion won't work in a virtual machine running on a PC.)

There are a couple of drawbacks to Parallels 7. As in prior versions, it can't run the most graphics-intensive Windows games and other programs, so heavy-duty gamers will do better with Boot Camp or a physical Windows PC. And I found it wouldn't share my Verizon 4G data modem with the Mac OS.

If you're likely to be using Windows most of the time, it's best to just use a regular Windows PC. But for Mac users who need to run a few Windows programs some of the time, Parallels 7 is a fine product.


Want to run Windows products on your Mac?
We can show you how- visit GeeksOnCall.com




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Tuesday, September 13, 2011

Better Facebook Sharing http://bit.ly/nvanWq
Concerned by all the changes? We can ensure your privacy is still intact visit GeeksOnCall.com

Facebook Updates Help Users Share Better With Others

wsj.com - 9/7/2011
KATHERINE BOEHRET

On a recent vacation to Aruba, I had to smile when I saw that each of the computers in the hotel business center had Facebook.com saved in their Internet bookmarks. Even people in a tropical paradise are anxious to check Facebook.

For all of Facebook's popularity, many of its users are still nervous about how to maintain their privacy on the network. Google's rival social network, called Google+, answered the call for easier sharing control: Each post clearly shows which groups of friends will see it, and these groups are privately named by users.

This week I'll dig into the latest updates on Facebook, which aim to ease the process of controlling one's profile and privacy. An upcoming Facebook developer conference in two weeks is expected to reveal additional changes.


Show Me the Viewers

One of the interface changes on Facebook is its more obvious way of showing users who will see their posts. Facebook takes a page from Google+ by better revealing sharing: It uses a drop-down menu beside each post that, by default, checkmarks either Public, Friends or Custom, and sharing can be changed with each post. The Custom setting can exclude or include certain groups, but people still must open it to adjust customized sharing. With Google+, though, all groups with whom content is shared are constantly visible underneath the post.

Facebook's own blog hints at future improvements to this sharing awareness, saying that this drop-down menu will grow to include smaller groups of people with whom you may want to share so as to make it easier to choose the audience you want for certain posts, which sounds a lot like what Google+ offers.

Now, you can change the sharing settings associated with a post after it publishes to your profile. In the past, a post's sharing settings were permanent once it was published, and changing it required deleting the entire post and re-posting with different sharing settings.

Location, Location, Location

A handy new feature in Facebook is the ability to add one's location to each post. This feature was once limited to the Facebook app on mobile devices. Adding a location to a post like, "heading off for lunch with friends," gives the post more contextual information. By tagging the photos I share on Facebook from my recent vacation with "Aruba," I save myself the trouble of creating an Aruba album or adding a caption to each photo that says where it was captured.


Tag, You're It

When Facebook first enabled tagging people in posts, a method used for mentioning someone so other people know that person is with you, numerous friends asked me how to do this since it wasn't obvious. Before now, the way to tag someone was by placing the "@" symbol before a friend's name while mentioning that friend in a post, or simply typing his or her name. Now, a small symbol below the window where users type posts shows an icon of a person with a "+" symbol. Clicking on that lets users type other people's names to add to the post.

Facebook now lets you tag people in photos and posts even if you aren't Facebook friends with them--and vice versa. Previously, you could only tag people if you were already Facebook friends.

Also, any post or photo in which you're tagged by someone who isn't a Facebook friend must first be approved by you. And Facebook takes this a step further by now letting you opt to review and approve any tag someone else tries to add to one of your Facebook posts or photos.

Before, any other Facebook friend could tag you or other people in your photos without your say-so. This content tag review isn't on by default, so to turn it on, select Account (in the top right corner of your Facebook page) and then Privacy Settings. Next, edit the settings in How Tags Work and turn Profile Review on.

My Profile, My Way

One of my favorite new features is that it's now easier for me to tweak my own profile page to include content I want on it. For example, a friend tagged me in one of her photos and one of my eyes was closed. Rather than un-tagging myself from my friend's photo, which totally unidentifies me in the photo, I can now just remove the photo from my profile.

To do this, I clicked on the icon that appears at the right side of each post and selected Remove Post in the drop-down menu. This lets my friend keep the photo tagged with my name, but the photo doesn't appear with my profile. The same is true for non-photo posts that include my name.

The Change-Up

Not all new features in Facebook will be well received. A former feature that let people click a "Link" button in a post to add a URL is gone as part of an effort to streamline the network. People can still share links in posts by pasting a URL into a post, but this doesn't automatically remove the long URL, like that "Link" button did. Facebook is weighing whether to add the link capability back in posts.

Facebook isn't currently as good as Google+ when it comes to showing users exactly which groups of friends will see their posted content. But many more people use Facebook--and social networks work best when the people you want to socialize with are using them--so Facebook currently maintains its go-to social-network status. With Google+ nipping at its heels, Facebook will surely further improve the way it displays sharing options.



Concerned by all the changes? We can ensure your privacy is still intact- visit GeeksOnCall.com




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Monday, September 12, 2011

Corp. America To Microsoft: We'll Pass On Windows 8 http://bit.ly/oL55yn
preparing to make the switch? let us help! Visit GeeksOnCall.com

EXCLUSIVE: Corp. America to Microsoft: We'll Pass on Windows 8

foxnews.com - 9/9/2011
John Brandon

Next week, Microsoft will finally pull the covers off on a new OS. And despite what Microsoft wants you to believe, the next version of Windows might be more icing on the same old cake.

Michael Silver, a vice president at research firm Gartner who studies personal computers, exclusively told FoxNews.com that many companies have what he calls "migration fatigue" and will skip Windows 8 entirely.

"We ... expect most companies to skip it," Silver told FoxNews.com. "To the extent that the market expects companies to adopt Windows 8 in large numbers, it may be disappointed."
Corporate America just went through a massive upgrade to Windows 7, which most consider a raging success for consumers and business: Gartner estimates that 80 percent of companies skipped Vista and went to Windows 7. Some remain on Windows XP, slow to move due to costs or legacy software. Now, because of the immense cost, they'll skip Win 8 as well, he said.
But there's a silver lining to Windows 8, Silver said, a word that gives consumers goosebumps: tablets.

"The market is obviously waiting for Microsoft to have an OS that can run on a tablet that can compete with the iPad," Silver told FoxNews.com. "So far, most of the Android tablets have been less than successful. Windows 8 will be another measure of whether there is a tablet market or just an iPad market," he said.

With Windows 8, Microsoft has its guns aimed at the Apple iPad.

A new interface called "Metro" will run on top of the operating system and work with new tablets. Experts say the new UI will allow users to switch quickly between the normal Windows look and the new Metro look.

Roger Kay, the principal analyst at Endpoint Technologies, said Microsoft has quite a bit of intellectual property and patents for touchscreen interfaces. The company has mostly failed to deliver a capable touch interface, however. Silver agreed, saying earlier handhelds and the Windows Media Center UI were not major successes. He thinks this third attempt could finally pan out.

Kay is more positive about the benefits of Windows 8, such as a ribbon interface that will make its debut in just about every dialog box and bundled application, not just the Paint app.

Kay says the ribbon interface puts tools, file management and other tasks in a neat row, and lets users interact more directly with OS functions. Meanwhile, the chief competitor to Windows 8 -- Apple's OS X, now in version 10.7 -- tends to rely more on shortcuts to files.

Microsoft declined to comment for this article, citing the Build conference beginning Tuesday, Sept. 13, where the company will reveal more details about the operating system.

Meanwhile, a behind-the-scenes blog about developing the next-gen OS has revealed a few details about Windows 8. The president of the Windows division at Microsoft, Steven Sinofsky, recently wrote that the new OS will provide direct access to the contents inside an ISO image, which is normally a protected file used for burning DVDs. You'll be able to mount the files within Windows 8 -- a handy feature for sure.

Likewise, a few new tricks related to virtual disks will help users manage files. A virtual disk could be used for storing sensitive business information with extra encryption, for example.

One boon for new users is that the ribbon interface will take away some of the complexity of file management. In the past, users had to know to right-click a file to see properties, or to press CTRL-A to select all files. Now, these options are listed right on the screen. Each window will have tabs, similar to what you'll find in Microsoft Office, for quickly finding advanced functions.

Rob Enderle, the principal analyst with Enderle Group, said the big draw with Windows 8 will be the Metro interface, and that Windows 8 will run on the ARM processors used for tablets. Still, the jury is undecided on whether Microsoft can actually convince people to switch from what they know to a less familiar touch interface.

If they don't, Windows 8 could be another epic failure, as many label the Windows Vista OS.

Windows 7 was partly successful because it was a minor upgrade from Windows Vista. Whereas, Windows 8 is more of an overhaul -- and companies sometimes balk at those.

Besides, Microsoft has some new competition: Google. What seems like a niche operating system, Google's Chrome OS could challenge Microsoft, say the experts, because it is entirely free, takes advantage of the cloud for storing most apps and data, and runs extremely fast.

The other major competitor is also an Apple product: the iOS. Every analyst mentioned this operating system, which runs on the iPhone and the iPad. There's a swift transition taking place to portable devices, and given the high sales figures of Apple products, Microsoft had better take note.

"Apple is certainly coming on strong with both Mac OS X and iOS," Silver told FoxNews.com. "Users are requesting Macs more frequently."

"iOS devices ... are making the PC relatively less important and putting a lot of pressure on Microsoft to respond," he said.



Preparing to make the switch? let us help!
Visit GeeksOnCall.com




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Friday, September 9, 2011

Twitter has 100 million users http://bit.ly/qCZbWj Are you on Twitter? if so follow us @geeksoncall and be entered in our monthly giveaways!

Twitter now has 100 million active users monthly

MSNBC.com - 9/8/2011
Suzanne Choney

Twitter now has 100 million active users logging in at least once a month. CEO Dick Costolo shared the stats with reporters and the info was also -- appropriately -- tweeted live by Twitter Thursday during Costolo's remarks.

Here's a look at some of the info on how the short-messaging blog is doing:

◦There are 50 million active users of Twitter every day.
◦The site has 200 million registered users.
◦55 percent of Twitter's active users go the cellphone route to access Twitter. "We've seen tremendous growth with mobile -- about 40 percent increase quarter over quarter," Costolo said.
◦Twitter has more than 400 million monthly unique visitors, according to Google Analytics. "That number is up from 250 million" in January of this year, he said.
◦40 percent of Twitter's "monthly active users do not tweet. This means that they have not tweeted in the last month," but merely followed the tweets of others.

Twitter's product team is working on continuing to simplify the site's interface and make it "more consistent across devices," which include phones, tablets and computers.

In response to reporters' questions on Twitter about whether the site would lift its 140-character limit on tweets, the CEO was quite definite.

"No. We are going to offer simplicity in a world of complexity," he said in a 62-character response (including spaces and punctuation).


Are you 1 in 100 million? If so follow us, @geeksoncall, and be entered in our monthly giveaways


Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Thursday, September 8, 2011

Risky rides ahead because of malware? Keep your info secure with the help of our techs- visit GeeksOnCall.com
http://bit.ly/ncSxZ6

Risky rides ahead because of malware?

MSNBC.com - 9/7/2011
Suzanne Choney

Our cars are morphing into moving Internet hubs, with Wi-Fi becoming more available in autos, as well as a slew of embedded systems, from in-vehicle infotainment to controls for slowing your car down if it's going too fast.

All good, but not so much if drivers and passengers don't take the same computing precautions in vehicles that they do outside of them with their laptops, desktops or smartphones, and make sure they choose strong passwords and do not leave those digital doors open to intrudes.

If you don't have enough to worry about, security software maker McAfee gives you more in its new report, "Caution: Malware Ahead: An analysis of emerging risks in automotive system security."

Of course, McAfee, like other Internet security firms, plans to be a part of providing "proper security and management," for the growing market for IP-connected devices and embedded systems in vehicles:


Last year, researchers of the University of California, San Diego, and the University of Washington demonstrated that critical safety components of a vehicle can be hacked if physical access to the vehicle's electronic components inside the passenger cabin is available. The proof-of-concept software, which they dubbed "CarShark," was developed using homemade software and a standard computer port. The scientists figured out how to hack into a modern car using a laptop. Recently, the same research team extended the scenario to remotely mount attacks via Bluetooth. This demonstration supports the need to consider the future security implications of embedded devices in cars and conveniences such as mobile phones, GPS and Bluetooth.

Bluetooth requires a PIN number to use -- but most people use the common default setting of "0000." So, improving all your passwords and PIN numbers will help, in the car or out of it. McAfee says:


Going one step further is to combine the CarShark attack and weaknesses of Bluetooth implementation in cars. Once the attacker guesses the Bluetooth PIN, the attacker could mount the CarShark attack. Other wireless devices like web-based vehicle-immobilization systems that can remotely disable a car could be manipulated in these situations as well. The immobilization system is meant to be a theft deterrent but could be used maliciously to disable cars belonging to unsuspecting owners.

It's up to each of us to take responsibility for staying secure. As we move to a more Internet-centric world in our vehicles, McAfee's "Consumer Considerations" list, shared here, is perhaps the handiest tool for each of us to start with, before we start fretting about being hacked on the road.



Keep your information secure all the time with the help of our techs - visit GeeksOnCall.com



Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Wednesday, September 7, 2011

Keep your personal info safe as new technology is created to make your cell phone your wallet http://bit.ly/qcIpvg Visit GeeksOnCall.Com now

Your Smartphone Will Soon Double as Your Wallet

Learn to keep your personal info safe as new technologies are created to let you use your cell phone as your wallet- Visit GeeksOnCall.com

www.fastcompany.com - 9/1/2010
DAN MACSAI

The Japanese call it osaifu keitai (cell-phone wallet). Flash your phone virtually anywhere you go for almost any purchase and it's automatically logged into a digital expense report. Eat frequently at McDonald's? Tap your phone to pay and your all-in-one debit card/receipt tracker/loyalty program may instantly offer you 10% off.

Today, if you want to enjoy these benefits, you have to go to Japan. But after years of talk, wireless carriers, banks, startups, and handset makers are now actively working to transform Americans' cell phones into mobile wallets. The goal: to snag a share of the processing fees associated with the $3.2 trillion in annual retail credit-card charges, and to turn the $1.2 trillion in cash and check spending into digital transactions.

For the past five-plus years, Visa and MasterCard have used near-field communications(NFC) chips in tap-to-pay credit cards and key fobs. Now they're embracing mobile phones as well. Later this month, Visa will release an iPhone case (developed with Dallas-based Device Fidelity) that makes the handset compatible with tap-to-pay consoles. This follows MasterCard's similar entry this summer, when it started marketing tags (developed with Atlanta-based First Data) that stick to phones. "Consumers already use phones for online payments," says Josh Peirez, MasterCard Worldwide's chief innovation officer, referring to downloaded songs and software. "The goal is to get them comfortable doing the same thing in the physical world."

The interim offerings will have a decidedly short shelf life. Nokia has announced that it will include NFC chips in all its 2011 smartphones, effectively forcing Apple, Research in Motion, and other rivals to follow suit. "Stickers and stuff are welcome bridges," says Gerhard Romen, Nokia's director of mobile financial services, "but demand is growing, and full implementation is what makes a technology go forward."

Analysts estimate NFC will become ubiquitous within the next three to five years, which will give wireless carriers newfound leverage in determining the future of the mobile wallet. Indeed, AT&T, Sprint, T-Mobile, and Verizon are reportedly working on a joint-payments initiative. (All either declined to comment or couldn't be reached.) "Not only do they distribute the physical devices and 'own' millions of customers," says Philip J. Philliou, of payments-consulting firm Philliou Selwanes Partners, "but they also understand how to do payments -- billings, collections, maintaining accounts -- on a massive scale."

That said, carriers are unlikely to go it alone. In Japan, a primarily cash-based society, NTT DoCoMo took control of the mobile-wallet market by buying a bank. A likelier scenario in the United States -- where consumers already love to buy now, pay later -- would be for one or more carriers to partner with or even acquire a credit-card network, so as to take advantage of its brand equity, processing savvy, and retail relationships. "Together, they can offer unparalleled fraud protection," Philliou adds. "And when risk decreases, so does cost."

The excitement surrounding the mobile wallet's potential is so fevered that in addition to carriers and credit-card networks, now banks, tech giants, and startups are all eager to lay claim to some part of this potentially huge new ecosystem. PayPal already lets users send money via text message, and Osama Bedier, its VP of mobile platforms and new ventures, envisions a service that stores gift cards and alerts customers when they're near a merchant. This past summer, mobile startup Loopt launched its Loopt Star program, an über digital-rewards card for such brands as Starbucks and Gap. U.S. Bank is working with Infosys to move beyond a basic banking app: It's developing a location-based "concierge" so smart (and potentially creepy) that it can offer a shampoo discount to shoppers browsing the hair-care aisle. As NFC tech proliferates, says Dominic Venturo, U.S. Bank's chief innovation officer, "we'll be able to make a business case for services that are even better."

This year, eBay expects U.S. consumers to buy roughly $1.5 billion worth of goods using its smartphone apps. It's a short leap, then, to using that same handset to pay at the Target in your neighborhood shopping center. "From the customer's point of view," says Robert Hedges, a partner at the financial-services consultancy Mercatus, "the question is, When is the banking industry going to catch up with us?"




Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity

Tuesday, September 6, 2011

iPhone not for you? check out these alternatives http://bit.ly/pmgz9D Once you choose let out techs securely sync your data-geeksoncall.com

The top 8 iPhone alternatives

iPhone not for you? check out these alternatives and once you choose let out techs securely sync your data- geeksoncall.com


MSNBC.com - 9/1/2011
Avram Piltch

With Samsung's long-heralded Galaxy S II smartphone coming to three of the four major carriers, the iPhone faces some stiff competition. However, Samsung's giant handset isn't the only device that's ready to give Apple a run for its money. Each of these eight alternatives offers something that Apple's ever-popular handset lacks.

Motorola Atrix 4G (AT&T)
With a speedy dual-core Tegra 2 processor and generous 4-inch qHD screen, the Atrix 4G is one of the most powerful phones on the market. A unique lap dock turns the Atrix into a notebook with an 11.6-inch screen and full Firefox browser. Try doing that with your iPhone.

Samsung Infuse 4G (AT&T)
A 4.5-inch Super AMOLED display gives the Infuse 4G one of the largest canvases on the market, great for typing and watching movies. The iPhone 4's 3.5-inch screen is tiny by comparison. A fast 1.2-GHz processor, an 8-MP HD camera and HDMI-out make this a true multimedia powerhouse.

Motorola Photon 4G (Sprint)
Pair an attractive 4.3-inch qHD screen with a dual-core 1-GHz Tegra 2 CPU and 4G speeds and you have a powerful iPhone 4 foe. Better still, the Photon 4G plugs into an optional dock for enjoying the full web (yes, including Hulu) on the big screen.

HTC EVO 3D (Sprint)
The iPhone 4 doesn't offer a stereoscopic 3D screen or a camera that lets you record 3D photos and videos, but the HTC EVO 3D does. Throw in a a dual core 1.2-GHz Qualcomm Snapdragon CPU and HTC's elegant Sense interface and you have more beauty and brains than Apple's handset.

myTouch 4G Slide (T-Mobile)
Not a fan of correcting touchscreen typos? Pick up the myTouch 4G slide, which has one of the best physical keyboards on a smartphone. Plus, this device has one of the sharpest and fastest cameras we've ever used. No more shutter lag.

HTC Sensation 4G (T-Mobile)
The gorgeous HTC sense UI, a 1.2-GHz Qualcomm Snapdragon processor, a 4.3-inch qHD screen, and T-Mobile's fast 4G HSPA+ network combine to make this Android handset a winner. Best of all, the HTC Sensation lasts over 7 hours on a charge, which is well above average.

HTC Thunderbolt (Verizon)
While the 3G iPhone 4 can't even get 2 Mbps download speeds on Verizon or AT&T, the Thunderbolt rides on Big Red's industry-leading 4G LTE network, allowing it to get download speeds as high as 17 Mbps, averaging 8.3 Mbps across our testing. You can even turn the Thunderbolt into a hotspot to share the speed with your notebook.

Samsung Droid Charge (Verizon)
A colorful, 4.3-inch Super AMOLED screen allows you to view the screen on the Droid Charge even in direct sunlight. Average download speeds of 7.8 Mbps on Verizon's 4G LTE network give device four times the bandwidth of an iPhone 4.



Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Monday, September 5, 2011

Looking for the best music service? See what's new to Facebook or talk to one of our techs - visit geeksoncall.com
http://bit.ly/qpLNPi

Facebook to Launch Music Service Sept. 22

Foxnews.com - 8/31/2011

Facebook is planning to launch a new online music service on Sept. 22, Forbes reported Wednesday, citing someone familiar with the social network's plans.

The announcement is expected to come at Facebook's annual f8 Developer Conference.

According to CNBC, Facebook will not actually host music on its site, but will partner with other developers who will do so.

Sources close to the deal have confirmed part of the story to Forbes, telling the news outlet that when launched, users will see a Spotify icon in the left side of their news feed, among the icons for events, friends and photos.

Neither Spotify nor Facebook have officially confirmed the service, however. A Spotify representative claimed to have no knowledge of the deal.

Other news sources suggest several music sites will join in the deal, including not just Spotify but also MOG and Rdio at launch. Other services may join in later.

Facebook says that's nothing new. A spokesman for the site told Mashable.com that "many of the most popular music services around the world are integrated with Facebook -- and we’re constantly talking to our partners about ways to improve these integrations."



Still looking for the best music service? Check out what is coming to Facebook or see what other services our techs can help you setup-visit geeksoncall.com





Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Friday, September 2, 2011

Google offers offline Gmail Calendar Docs http://bit.ly/rfgSSh
Increase productivity with this and other tips from our techs GeeksOnCall.com

Google offers offline Gmail, Calendar, Docs

MSNBC.com - 9/1/2011
Suzanne Choney


There you are in a train station or on a plane, and you're trying to get to you Google Gmail, Calendar or Docs on your laptop and you can't: No Internet connection to the Web-based apps. If you use Google's Chrome Web browser, you're in luck: Gmail is now available for checking offline, and in the next week, Calendar and Docs will be too.

The offering, called Gmail Offline, is a Chrome Web Store app that you'll need to download to use. And, you also need to be using Google's Chrome Web browser on your laptop to take advantage of the offline offering, at least for now. Like most of Google's other apps, Gmail Offline is free.

Here's what product manager Benoit de Boursetty wrote on a Google blog about the Gmail Offline:


This HTML5-powered app is based on the Gmail web app for tablets, which was built to function with or without web access. After you install the Gmail Offline app from the Chrome Web Store, you can continue using Gmail when you lose your connection by clicking the Gmail Offline icon on Chrome's "new tab" page.

Google Calendar and Google Docs let you seamlessly transition between on- and offline modes. When you're offline in Google Calendar, you can view events from your calendars and RSVP to appointments. With Google Docs you can view documents and spreadsheets when you don't have a connection. Offline editing isn't ready yet, but we know it's important to many of you, and we're working hard to make it a reality.


So, while you can't edit documents or change your calendar offline, you can at least view them.

CNET's Stephen Shankland noted that offline access to Google apps "is critical to the success of Chromebooks," the bare-bones laptops that run on Google's Web-based Chrome operating system. Acer and Samsung now make Chromebooks, which range from $300 to $500.

"Without offline productivity apps, Chromebooks' utility drops significantly for those who plan to use it as more than a machine that stays put in an office or school," he wrote.

The timing of Gmail Offline may be a little off for selling more Chromebooks, with most students and parents done with buying back-to-school laptops. But, hey -- the holidays are ahead.


Increase your productivity with this and other tips from our Techs- GeeksOnCall.com



Keywords: geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, gmail, productivity...

Thursday, September 1, 2011

What Is That? Let Your Smartphone Look http://bit.ly/ngzBSF
If your phone can't answer you, ask one of our Techs Visit GeeksOnCall.com

What Is That? Let Your Smartphone Have a Look

NYTimes.com - 8/31/2011
STEVEN LECKART


I never carry a point-and-shoot camera. Chances are you don't either. In the last few years, cellphone optics have improved substantially. That means more megapixels, better image sensors and stronger flashes and zooms on the one device most of us carry all the time.

Now comes the next phase: using your smartphone and its camera to identify what is in front of your eyes.

Although image-recognition software is still in its infancy, a number of mobile apps are already translating signs, naming landmarks and providing a running commentary on your world.

Google Goggles, which appeared on Android phones in late 2009 and on the iPhone last year, is best at deciphering landmarks, text, book and DVD covers, artwork, logos, bar codes and wine labels. You start the app -- it's part of Google's search app for the iPhone -- and peer at the object through the camera lens. It takes a stab at identifying it.

I've found the app especially useful for comparison shopping. If you're browsing through a bookstore, for instance, one quick snapshot of a book's cover allows you to check the price on Amazon. It's much faster than typing the title into a search bar. Same goes for photographing paintings or craft beer bottles.

Perhaps its most promising use, for tourists especially, is language translation. Goggles can scan English, French, German, Italian, Spanish and, a recent addition, Russian text.

In practice, I'll admit 'had only modest success translating phrases from restaurant menus or street signs. Part of the challenge is capturing an image that's clear enough for the software to recognize. Unless the text appears on a white background, the software's success is diminished. But when it does work -- wow. Optical character recognition is only going to get better and broader.

Asian languages pose different challenges, says Hartwig Adam, a Goggles engineer. Their alphabets consist of thousands of characters, which tend to be strung together with fewer obvious boundaries. Be wary when buying apps that say they translate Japanese or Chinese. The ones I've tried are not fully baked. For now, the handwritten specials posted on the walls of no-frills Chinese restaurants will remain a mystery to me.

Even Google admits Goggles is "not so good" at identifying plants. For that you want Leafsnap, a free iPhone app that supplements a traditional field guide. You photograph a leaf on a white background within the app, which then scans the silhouette. The app then cross-references it with its built-in database. For each potential match, you're shown high-resolution images of the plant's leaves, flowers, fruit and bark. Your location is also recorded on a map so you can build a database of your urban forest.

Developed by researchers at Columbia University, the University of Maryland and the Smithsonian Institution, Leafsnap has been downloaded 400,000 times since May. It's easy to see why. I had a blast trying it out in San Francisco -- even though the plants in the app's database are mostly specific to the New York and Washington areas. In the next 18 months, it will expand to 750 species from 250 species found in the continental United States (excluding South Florida), says Peter Belhumeur, a Leafsnap co-founder and computer science professor at Columbia. Eventually, the app will also use your location to refine its search and improve accuracy, he said.

Goggles has other limitations. It's not good with faces -- deliberately, for privacy reasons. And when I photographed an apple using Goggles on both iPhone and Android handsets, no close matches were found. Minutes later, I tried Meal Snap, a $2.99 iPhone app meant as a tool for dieters. Not only did it correctly identify the fruit, but Meal Snap also provided an accurate caloric range (60 to 90 calories).

Even more impressive was what happened when I used the app to deconstruct a bowl of homemade chopped salad. The app correctly identified diced beets and sliced cherry tomatoes alongside broccoli in the tossed mess. That said, the app failed to spot my spinach, deli turkey, cauliflower and bits of pepperoncini. However, the calorie estimate was only off by about 100 calories; and it was actually inflated, which is O.K. if your goal is weight loss.

Another photo-recognition tool with health implications isSkin of Mine, a $2.99 iPhone app that analyzes moles and freckles.

Start the app, and an outline of a human body appears. Once you touch a spot on the body, the camera opens. After taking a snapshot, you trace a mole using a tiny on-screen pencil. From there, the mole's symmetry, border and color are analyzed and assigned numerical values. By cross-checking the numbers with a database of a few hundred images culled from dermatologists, the app estimates whether your mole might be consistent with melanoma.

"The idea isn't to replace your dermatologist, but keep an eye on things between doctor visits," says Ellen Kislal, president of Medical Image Mining Laboratories, which developed Skin of Mine. For users in Connecticut, Louisiana, Maryland, Nebraska, New Jersey and New York, the app also provides the option of connecting online with a doctor. For $40 to $65, the doctor will examine your photo and make a diagnosis. Eventually, the app will expand to include assessments of other skin conditions like acne, vitiligo and wrinkles, Dr. Kislal said.

When it comes to comparison shopping for books, CDs or DVDs, an alternative to Goggles is SnapTell, which is available for Android and Apple phones. Like Goggles, the free app features a bar code scanner. Still, I find photographing items much more satisfying. Once you snap a picture, the app determines online prices at sites like Amazon, Alibris and Textbooks.com (SnapTell was acquired by Amazon in 2009). Better still, the app uses your location to call up prices at brick-and-mortar retailers. Another location-based app is Snooth Wine Pro, which is intended for wine lovers. Take a close-up of a bottle's label, and the $4.99 iPhone app not only displays the price, but also maps nearby bodegas, liquor stores and wine cellars. I photographed six bottles of wine, including a cheap red, a more expensive pinot and sake. The app recognized five of the six. Other bells and whistles for hardcore oenophiles include user-submitted reviews, a wish list and private tasting notes. Even if you are not a connoisseur, don't settle for the free version of the app; it doesn't include photo recognition.

Beyond browsing books or window-shopping wines, you can also buy fine art using photo ID. ArtMatch, a free iPhone app developed by Art.com, the online poster and print company, has a database of more than a million works. It's ideal for museums, restaurants or doctor's offices, basically anywhere where you're likely to see well-known originals or prints. I found artMatch effective at spotting a Van Gogh self-portrait, but not art from contemporaries like Geoff McFetridge or Rachell Sumpter.

It is difficult to predict how these apps will evolve, but one thing is certain: they are already changing the way we see our world.


If your phone can't give you the answer ask one of our Techs- Visit GeeksOnCall.com



geeksoncall, geeks on call, geeksoncall.com, 800-905-geek, computer repair, computer service, home computer repair, home computer service, information technology, business network service, virus removal, network, wireless network, facebook, safety, analyze computer, internet explorer, malware, music, phone apps, photos...