Many people don't know they are eligible for complimentary Microsoft software and services. You can help spread the word to ensure that people in your community are making the best of what's available to them.
Microsoft and many other suppliers offer technology donations through TechSoup. Microsoft has donated more than $19,000,000 worth of technology to NZ nonprofits through this programme.
Microsoft's BizSpark programme provides complimentary software, cloud services and access to a community of partners around the world who are involved in supporting software-fuelled innovation and the next generation of technology entrepreneurs.
For home users and small businesses, Microsoft Security Essentials is a complimentary download from Microsoft that is simple to install, easy to use, and is automatically updated to protect Windows PCs with the latest anti-malware technology.
Māori language packs
Complimentary Māori language packs are available for Microsoft Windows and Microsoft Office are available to translate commonly-used features, giving people the choice to use the technology in a language that is familiar.
Microsoft offers a number of services free of charge to help people live and work a little smarter. Here’s a quick overview of technology to make life a little simpler and more fun. More than a million Kiwis use at least one of these services, and you'll probably find something that's useful for you and your community.
Protect your online safety
For Cyber-Safety Awareness Week this year, we featured top tips to help you keep safer and more secure online.
1 to 7 May 2011 is Privacy Awareness Week. It’s a great time to take a few moments to look at simple things we can all do to look out for our own personal privacy in our day to day computing.
Your privacy matters, and if you want to stay in control, there may even be some new tricks to learn.
The simplest way to control your information is to be careful about how and when you give it out. Never give your passwords to strangers, always type in web addresses for banks and online services yourself rather than following links (which could conceal a scam), and be aware of scammers who are out to trick people into giving up personal information and credit card details in all sorts of underhand ways.
A little net savvy goes a long way!
The focus of this article is on some simple steps you can take as a home user to control the information you do choose to share. It’s to help make sure you’re the one pulling the strings with:
This blog post covers each of these in turn.
This article provides a checklist, but doesn’t provide step-by-step instructions. So, if you’re not sure how to carry out any of the steps described here, ask for help from a professional, a tech savvy friend, or an online community.
Your Personal Computer
The first thing to be sure of is that your personal computer really all yours, without any malicious software that could be collecting information about you. Simple steps to take:
In Windows 7, that means a visit to Windows Update. Once you’ve done the updates there, check for updates for any other software you have installed. For example: Web browsers, Adobe PDF Reader and Adobe Flash, your anti-virus software, iTunes and Java. If the software doesn’t have a way to check for updates (often in the Help or Tools menu), check the website of company that made it for a newer version. Secunia has a complimentary tool to help you keep up to date.
If your anti-virus software has expired or you don’t have any, try the complimentary Security Essentials anti-virus and anti-spyware software from the Microsoft website. A full scan can take a couple of hours, so if you don’t want it to get in the way of your computing you can start it just before bed time.
Beware of scams that try to get personal information out of you, or pressure you into installing and paying for software to remove viruses or enhance computer performance. Many of these scams will try to scare you by saying there some sort of problem with your computer, or entice you with something that’s too good to be true. They try to get to you through websites, email, or even a call to your phone. Don’t fall for it. Make sure that you only install software from websites you can trust. If you are ever unsure, you can do a free check of your Windows PC.
If you’re using a computer that you don’t know you can trust, think twice about entering passwords or other personal information. If the computer is infected with malicious software, you could be sending your personal information to a criminal without knowing. Some services provide temporary passwords that you can use on unfamiliar computers, and you should use this option whenever you can. Otherwise, if you must use a computer you are not sure you can trust, be sure to change your passwords as soon as possible when you have access to a trusted computer.
Your Web Browser
Now that you have peace of mind about what’s on your computer, turn your attention to one of the most important computer programs you have: Your web browser.
Use it right, and it’s a powerful tool. With great power, comes great responsibility!
What you do in your web browser is often tracked across many websites, even if you use “private” browsing or delete your cookies regularly. This tracking often happens without people realising it, because most web browsers automatically download all sorts of bits that can be used for tracking from many websites other than the one people think they are visiting.
Internet Explorer 9 is the only web browser that gives you built-in control over this type of tracking, so if you want to enhance private browsing with a minimum of fuss we suggest you upgrade to Internet Explorer 9, then add a tracking protection list.
Here are some more tips for using Internet Explorer 9 features to keep yourself private.
If you’re following all three of the steps above, your address bar in Internet Explorer 9 would look like something like this when you’ve securely logged in to Hotmail (live.com):
An example of this protection in action is shown below:
Your Wireless Home Network
That’s two pieces of the privacy and information security picture in place. If you have a wireless home network, it’s critical that you’re trust everyone who’s using it. Otherwise you could find that someone parked in the street outside is using up your limited monthly Internet allowance, watching your online activity, or even doing something illegal using your wireless network that could get you in hot water.
All wireless networks should be:
If you’re concerned that your wireless home network is not secure, or you would simply like to update the password to make sure only authorised people have access, you need to configure the wireless modem, usually by typing a special address for its control panel into your web browser.
The user manual for your wireless modem will have instructions for how to access the control panel. If you can’t find the instructions, try looking your wireless modem’s model number (usually on the modem itself) on the manufacturer’s website. If you don’t feel confident about this, it’s best to ask a professional (or a trusted tech savvy friend) to help.
Once you are in the control panel, choose the best security that is supported by every computer and gadget that connects to your wireless modem. Gadgets that are less than three years old probably support WPA2 encryption, but it’s worth checking each of them first to be sure. Changing the name of the wireless access point (the name of the wireless network) to something quirky or unusual is recommended, and go for a long password (say, 40-60 random characters). The password can be generated quickly (just combine three of these random strings into one password), but be sure to write it down carefully somewhere secret, or keep it safely on a USB data stick or computer in your house for when you need it.
Finally, you’ll need to re-connect each computer and gadget to newly named wireless network using the new password.
Make sure you have a reliable way to remember your new password.
Your Personal Internet “Cloud”
Your personal computer, your web browser and your home network are the foundations and they need to be in shape. But you probably use a webmail services like Hotmail, social media sites like Facebook, and services like SkyDrive to store documents and photos in the cloud. In fact it’s hard to imagine being without them. Unfortunately people’s accounts are compromised all too often, exposing their most personal data and that of their friends. And it doesn’t need to happen.
Take a few moments to make sure you’re in complete control of your personal “cloud”.
Here are steps to take for each of your online accounts, from a trusted personal computer:
For example, in Hotmail you would click on your account name in the upper right corner, choose Account, and then set at least one trusted email address for password resets, and at least one Trusted PC (example below). Make sure you go through all the necessary steps so that these show up as Confirmed (as shown below). Taking these simple steps will make it so much easier to get back control of your account if anyone ever gets unauthorised access.
For example, in Hotmail you would click on your account name in the upper right corner, choose Privacy Settings, and choose the settings you prefer. In many services there is an Advanced option which is probably worth a look if you want more precise settings.
You should have a different password for each service you use. Weak passwords are short, or contain words, names, dates or obvious sequences of numbers. Try to avoid these mistakes in your passwords.
For example, I could choose a sentence like ,“I am feeling great about my online privacy with this new password for SkyDrive online storage.” This could become a password like iafgamopwtnpfsos and then to add a small twist I might tweak it like this: !@fgm0pwtnpfSOS . Now that’s quite hard for someone else to guess, but quite easy for me to remember. And don’t use this password – take a few minutes to create your own!
Make sure you have a reliable way to remember all your new passwords.
Your Toys and Gadgets
If you’ve done all that you should be feeling a lot better about your privacy. But if you’ve got toys and gadgets that connect to the Internet, there’s still a bit more to do. If you have a smartphone, say, the snazzy new Windows Phone 7, or you have an Xbox 360 entertainment system, bear with us a just a little longer.
Toys and gadgets that connect to the Internet use information in new ways to deliver services to you, and they give you choices about the way your information is used. Just be sure to check you’re happy with the settings.
If you want them to, modern game consoles can tell your friends when you’re playing and what. They provide online stores that let you rent videos and buy games without getting up from your couch. And with a Kinect sensor, you can also upload priceless videos of yourself jumping around your living room that will have anyone who sees them rolling on the floor laughing. This is lots of fun, and when we think you might be uncomfortable the default is not to share, but know that you are in control and can change these settings at any time for the Xbox 360 itself and the Kinect sensor.
Smartphones are a hub of activity, and they have the potential to collect an enormous amount of information about what we do, and where we do it. But if you’ve ever lost a smartphone, you’ll probably agree it’s a really good idea to lock access to your smartphone with a pin. Another great thing smartphones offer is location based services, which can be extremely helpful. However, be sure that you understand how the phone and the applications you install on it are using information about your location. Make sure you’re not sharing more than you feel comfortable with.
If you would like help to carry out any of the steps described here you could try asking a tech savvy friend, or experts on an online forum like the New Zealand PCWorld Press F1 community or the Microsoft Answers community.
A great post that sums up every step you should take to stay safe online - the Trusted PC step on Hotmail was news to me and the smartphone security tips for Windows Phone 7 much appreciated, we'll let our helpline callers know about this resource.
Chris @ NetSafe