Italian American Police Society of New Jersey

Tech Tips

We have moved our tech tips to to another section of our web site.  To see a complete, more updated list,   go to Tech Tips.

Below are older items that may be outdated.  Tech usually has a short “shelf life”

Turn off the Facebook Facial Recognition feature!

https://www.eff.org/deeplinks/2011/06/how-disable-facebooks-facial-recognition-feature

Fall 2009

Anti-Virus and Firewalls

3-20-2014  Microsoft Security Essentials.  Free MS Anti-Virus

A good Firewall is also essential to prevent threats from the outside cyber world.  One of the better ones is Zone Alarm. http://www.zonealarm.com .  It will prevent threats  from getting to your computer.  Go to the web site to find out more.

—-

Facebook is the latest in social networking web sites.  Originally called thefacebook, Facebook was founded by former-Harvard student Mark Zuckerberg (while at Harvard) who ran it as one of his hobby projects.  It has now become a way for kids to keep in touch or adults to find long lost friends.  Don’t be embarrased to join, but just be aware that there are many setings that will limit access to the info you post.  -Don’t post full birthday.  -Set profile to Only Show personal info to “friends”.  Facebook features many games you can play.  Be careful when they ask for your cell phone number to “get your score”  You may be subscribing to a “pay service”  Remember fellow officers,  keep your info brief.  Just enough to make contact with old friends.

Caution:  Sometime a friend will have a video on their “wall”  If it has a url that is in a foreign country and looks wierd,  DON’T PLAY IT !!!.  It may be a virus and wreak havok on your computer or your router, etc

New Facebook Privacy Issues!   Check out these articles:
Detecting Facebook Security Problems 5/17/2010
Technologizer: How to Control Your Facebook Privacy 5-19-2010

Top 10 social networking tips for police” 8-28-2009

Incidentally, We are now on facebook Search for us or use this link

We have moved our tech tips to to another section of our web site.  To see a complete, more updated list,   go to Tech Tips.

Tech stuff

As cops, many of us have not yet moved into to 21st century.  It took many years for some of us to lose the beeper in favor of a cellular phone. We are now living in an information age whether we like it or not. Some of our departments are on the cutting edge with computers in the cars which print reports back at the station, or realtime license plate scanning on the move. This is a great direction. As long as things are simple, we love it.

Here are some tips which I will convey from time to time and hope will be of value. They may be websites, email etiquette, or tech shortcuts. I will also be posting these tips on our website at http://oldsite.iapsnj.org/category/tech-tips/.

1. Faxing is passe’ Email is in. Many of us are involved with our various unions or organizations and from time to time are promoting an event. While faxing is the recognized staple of disseminating information, email is much faster and easier. Most of the time a flyer is created on a computer, whether it be a graphic file or some sort of document. The best quality for any thing created in a computer, is when it remains in the digital realm. When you print it and then walk over to that clunky fax machine, your quality has degraded about 20 times over. When you ask someone to Post this on their website, a number of things can happen. First, The fax may be scanned. Then converted into a graphic or a PDF. Then uploaded onto the website. Then that link sent back to the originator. This all takes time and the quality of the finished product is, mediocre at best.
Keep it digital! Send the original flyer via email. it is then created to a PDF (form features added if needed so it can be filled out on-screen) Posted. Now you have a flyer AS GOOD as the original. Much easier and professional looking. In short, If it starts in the computer, make sure a copy stays in the digital realm.

2. Emailing or forwarding of email jokes is a full time job to some. If you still need to forward these (I do too), remember to try and make the email “your own”. Depending on the recipient’s email program, or service, these emails which have been forwarded countless times are either 20 screens long, or are nested 20 emails deep. Sometimes, and quite often, not worth the effort to finally see the picture or read the joke.
If you get a good picture or joke and feel the need to share, Copy & Paste just the picture or joke into a completely new email.
Also, keep peoples privacy by NOT putting everyone you know in the TO: field. Here’s a trick, Put yourself in the TO: field and put everyone else in the BCC: field.

3. Remeber that not all the CAUTION emails are real. We get them at least on a weekly basis. Super Virus, or the old Bright Headlight/gang initiation gag. Before you forward this to everyone you know, Please check it out. and also be aware that not all of the so-called “Hoax Websites” are right either. Due Diligence!
——————————

:
Those of us who have blackberrys for personal use would like a way to back-up our contacts (phone list) & maybe a calendar somewhere where you can sit at any computer and edit or copy information down and have it sync up with your Blackberry.
has the answers.

  • First, sign up for a free GMAIL account. You can choose to either use the email or not. But the “contacts section” in the account is the important thing.  (The email has tons of storage so you don’t have to delete anything to make room for more)
  • Next, set up a Google Calendar too.  You can access this calendar from wherever you are.
  • Now, download Google Sync. It is an APP that will allow you to sync both your calendar and contacts.   (You may need to download App World on your blackberry)

You might be asking yourself, “Why do I need to sync this stuff?” It’s simple. What happens if your wife runs over your phone in the garage?  What about if you get pushed in a pool with your blackberry? It’s summer afterall. Also, It’s just easier to import or export contacts. Or even print a list to keep on file. The calendar,  well it’s just plain easier to use a desktop keyboard to enter your whole schedule instead of those tiny keys.  It’s also just plain cool!

Move down a screen
Press the Space key.
Move up a screen
Press the Shift key + the Space key.

————
Winter, 2009-2010

More Blackberry tips & Tricks are available at http://na.blackberry.com/eng/support/blackberry101/tips/

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.  In order to protect yourself, follow these simple tips.
No Bank or On-Line Store or site (like Ebay) will email you and request personal information.  A legitimate email will tell you to “Log In  to your account” and will Not pProvide a link in the email.  Most fraudulent emails will look authentic with logos, etc and provide a link to click on and send you to their “Fake” website.  There they will ask you to Log-in with your username & password. That’s where they have stolen your info.  If you don’t realize this, you could possibly have money transferred from your bank account, or purchases made in your name.  These frauds will usually set up a temporary PO Box and change the delivery address to the temporary box.    If you receive one of these questionable email, before you delete, forward the email to the real site in question. For example spoof@ebay.com, or fraud@yourbank.com, or spoof@yourbank.com, for example.  The websites should have a facility for reporting phishing.
——–
From Cnet:
by Jessica Dolcourt
(Credit: CNET Networks)
Editor‘s Note: This article was updated on 5/8/09 from a previous version published on 3/3/08, and the original, published on 12/15/06.
No matter how you arrive at an unsafe Web site, it’s all downhill from there. Phishers will attempt to coerce you into disclosing your address, credit card number, or social security number. Or maybe adware engines will start sprouting pop-ups over your screen like a field of clover. Worse, your computer may become part of a botnet, its processing power used to send spam and infections to others, possibly even in your name. Here are nine telltale signs you’re swimming in dangerous waters, with tips to help keep you firmly in the safety zone.
Before we dive in, take note of two tools to help warn you of dangerous sites. McAfee SiteAdvisor for Internet Explorer and Firefox and AVG LinkScanner assess the hazards of sites you visit, and are available for Firefox or Internet Explorer. Online Armor is one firewall that scans sites in real time based on traceable patterns of malicious software behavior. Also check out our Security Starter Kit for an excellent set of tools that defend against potential threats.
Sign 1: Pop-up city
You click a search result and are suddenly bombarded with no fewer than 10 porn pop-ups. Back out immediately by right-clicking the pop-up in your task bar and selecting ‘close’ or by killing the EXE in your Task Manager. It might also help to press Alt-F4 to close your browser. Then run a malicious software scanner and remover to assess and fix the damage–Malwarebytes Anti-Malware is a good start.

It’s a mouthful, but EULAlyzer’s ease of use makes up for its awkward pronunciation.
(Credit: CNET Networks)
Sign 2: Where’s the EULA?
Rogue antivirus apps often scare you into parting with your credit card number by informing you it’s found bogus spyware on your machine (it!) If you’re about to sign up for or purchase a service and aren’t prompted to accept an end-user license agreement, nor are you offered a privacy policy to view. Shady site proprietors often disclose their intentions in the privacy policy or EULA, so you should always read carefully! The free tool EULAlyzer (from the makers of SpywareBlaster) is a great help because it analyzes license agreements and notes any unusual or possibly dangerous language. An upgrade to the professional version is available for about $20.
Sign 3: Excessive firewall alerts
Your firewall repeatedly alerts you to file extensions you don’t recognize and other suspicious anomalies. Once you’ve set your firewall to allow your most common programs, any alert should be taken seriously, and a number of warnings should be a red light something is amiss. If you’re not running a firewall, get one right now.
Sign 4: E-mail and instant message links phish for information
You follow a link embedded in an e-mail and arrive at a site that asks you to provide security information for an “important update.” Misleading links are increasingly sent through instant messages under the guise of a contact’s friendly tip. This variety is especially easy to fall for. If the page is asking for data or looks like a different destination than the link implied, pull yourself out of autopilot and start taking screenshots. Contact the company for verification before taking any action, and check the Federal Trade Commission’s alert board.
Sign 5: The site’s URL and e-mail don’t match
Any case in which a site’s URL doesn’t match the contact’s e-mail address should raise an alarm. Most legitimate companies provide their employees with a corporate e-mail account. This doesn’t mean, however, that you can automatically trust sites where the two align. Illegitimate companies can purchase domain names as easily as legitimate companies.

————
Some of us at one time or another have needed a computer file from their home computer while at work, or vice versa.  Whether it was a document, or a music file.  Here’s a way to always have items available at home or work and even accross every computer you have,  seamlessly.  It’s called Dropbox. (Dropbox.com).  You start out with 2 GB in a Free Account.  You then gain more free space by referring people to join.  It’s simple,  Sign-up using this link http://db.tt/Xx1SA5c and the IAPSNJ will get more space to use for the organization. In turn, you can invite people to join, and you will also receive more space.  There is a short video on the Dropbox.com page which explains it all.
————
On our new web site we will be striving for better communication between the organization and our membership.  You may already know we are on Facebook and we are now on Twitter.  (twitter.com/iapsnj/) Twitter and Facebook are not just for kids anymore (see above).   If you don’t receive emails from the IAPSNJ,  Please join our email list, either by sending an email to list@iapsnj.org, or subscribe on the new website.  Be sure to include your Name, address, Dept, & member number if you remember it.
————-

We have moved our tech tips to to another section of our web site.  To see a complete, more updated list,   go to Tech Tips.

&n