<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Deemable Tech &#187; Malware</title>
	<atom:link href="/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Tech news worth talking about and tech help worth listening to</description>
	<lastBuildDate>Fri, 30 Sep 2016 19:24:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.3.28</generator>
	<item>
		<title>Sandra asks, &#8220;Is my computer infected?&#8221;</title>
		<link>/2014/04/sandra-asks-computer-infected/</link>
		<comments>/2014/04/sandra-asks-computer-infected/#comments</comments>
		<pubDate>Thu, 03 Apr 2014 10:40:50 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[Listen]]></category>
		<category><![CDATA[Questions]]></category>
		<category><![CDATA[Radio Segments]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[anti-malware software]]></category>
		<category><![CDATA[Anti-virus software]]></category>
		<category><![CDATA[Avast]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[radio segments]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=8684</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2014/04/adware-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Credit: DanMelinger / Flickr" style="float:left; margin:0 15px 15px 0;" />Q: Help! I keep getting pop-up ads on my computer even when I go to websites I know don?t have ads. Does my computer have an infection? How do I get rid of it? A: Unfortunately, Sandra, seeing unusual pop-ups <a href="/2014/04/sandra-asks-computer-infected/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2014/04/sandra-asks-computer-infected/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2014/04/adware-150x150.jpg" class="attachment-thumbnail wp-post-image" alt="Credit: DanMelinger / Flickr" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><script id="prx-p115133-embed" src="http://www.prx.org/p/115133/embed.js?size=small"></script></p>
<p><strong>Q: </strong>Help! I keep getting pop-up ads on my computer even when I go to websites I know don?t have ads. Does my computer have an infection? How do I get rid of it?<span id="more-8684"></span></p>
<p><strong>A: </strong>Unfortunately, Sandra, seeing unusual pop-ups like this is a sure-fire sign that you&rsquo;ve got uninvited guests on your hard drive.</p>
<div id="attachment_8685" style="width: 332px" class="wp-caption alignright"><a href="/media/2014/04/adware.jpg" class="gallery_colorbox"><img class=" wp-image-8685   " src="/media/2014/04/adware.jpg"  alt="Credit: DanMelinger / Flickr" width="322" height="257"></a><p class="wp-caption-text">Credit: DanMelinger / Flickr</p></div>
<p>These types of infections are what we call malware, and there are several different types. The really bad ones are called viruses (with any luck that&rsquo;s not what you have). There is also a more benign type of infection that exists mostly to put annoying pop-up ads on your screen and make money for whoever created it. We call this adware.</p>
<p>Adware often takes the form of &ldquo;helpful&rdquo; toolbars installed on your Internet browser. Another sign that you have been infected is that when you search for things on the Internet you&rsquo;re constantly redirected to websites you didn&rsquo;t mean to go to, usually sites that are full of ads.</p>
<p>What you need, Sandra, is a good anti-malware program. We would start by downloading <a href="www.avast.com/" target="_blank">avast! Antivirus</a>, a free antivirus program that has a great reputation. Once you have it downloaded and installed it, set it to run a &ldquo;boot-time scan.&rdquo; This will reboot your computer into a special operating system that just runs the antivirus software, which will scan your computer and then automatically start Windows. This is great because a lot of malware hides itself inside Windows so that it can avoid being detected by the antivirus software.</p>
<p>One thing we should mention about avast! is that, while it is free, you&rsquo;ll need to register the program when you install it. It will prompt you to provide an email address the first time you run it, and ask you to confirm your license every year. The program will not protect your computer if you don&rsquo;t do this, so make sure you take the time to register.</p>
<p>Now, antivirus software like avast! mainly focus on traditional viruses like Trojan horses, worms and similar infections, so it may not catch that pesky adware. For that, we recommend installing a second program called <a href="www.malwarebytes.org/" target="_blank">Malwarebytes Anti-Malware</a>. This free program is exceptionally good at getting rid of malware that is so new traditional antivirus software won&rsquo;t even detect it.</p>
<p>Both of these programs should help you out, but ideally we should all try to avoid the risk of being infected in the first place. One thing that you can do to stave off adware is to pay attention when you&rsquo;re installing programs, because it will often piggyback on other software. If a program asks you if you&rsquo;d like to install a toolbar, say no!</p>
<p>Another good way to protect yourself is to stay off of sketchy websites. If you are using the Google Chrome browser, it will alert you with a red warning screen if you click on a website that is known to host infections. You can check out some of our other tips for avoiding malicious websites in <a title="Jamie asks, ?How can I avoid malicious software and dangerous websites??" href="//2013/10/jamie-asks-can-avoid-malicious-software-dangerous-websites/" target="_blank">this article</a>.</p>
<p>So, to sum up: pay attention when you are installing software, stay off of dangerous websites, and try out Malwarebytes Anti-Malware and avast! Antivirus.</p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2014/04/sandra-asks-computer-infected/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Jamie asks, &#8220;How can I avoid malicious software and dangerous websites?&#8221;</title>
		<link>/2013/10/jamie-asks-can-avoid-malicious-software-dangerous-websites/</link>
		<comments>/2013/10/jamie-asks-can-avoid-malicious-software-dangerous-websites/#comments</comments>
		<pubDate>Thu, 31 Oct 2013 10:40:33 +0000</pubDate>
		<dc:creator><![CDATA[Sean Birch]]></dc:creator>
				<category><![CDATA[How To]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[Questions]]></category>
		<category><![CDATA[Radio Segments]]></category>
		<category><![CDATA[anti-malware software]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[questions]]></category>
		<category><![CDATA[radio segments]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=8391</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2013/10/malware_ahead-150x150.png" class="attachment-thumbnail wp-post-image" alt="You may see warnings like this if you attempt to visit a malicious website.

Image Credit: Google" style="float:left; margin:0 15px 15px 0;" />Q:&#160;I recently started experiencing random pop-up ads on my computer even when I was on websites that don&#8217;t have popups. Downloading a malware removal program didn&#8217;t fix the problem. Eventually I had to roll back to a clean install of <a href="/2013/10/jamie-asks-can-avoid-malicious-software-dangerous-websites/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2013/10/jamie-asks-can-avoid-malicious-software-dangerous-websites/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2013/10/malware_ahead-150x150.png" class="attachment-thumbnail wp-post-image" alt="You may see warnings like this if you attempt to visit a malicious website.

Image Credit: Google" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p><script id="prx-p105686-embed" src="http://www.prx.org/p/105686/embed.js?size=small"></script></p>
<p><strong>Q:</strong>&nbsp;I recently started experiencing random pop-up ads on my computer even when I was on websites that don&rsquo;t have popups. Downloading a malware removal program didn&rsquo;t fix the problem. Eventually I had to roll back to a clean install of Windows. How did my computer get infected, and how can I avoid this in the future?</p>
<div id="attachment_8392" style="width: 310px" class="wp-caption alignright"><a href="/media/2013/10/malware_ahead.png" class="gallery_colorbox"><img class="size-medium wp-image-8392" alt="You may see warnings like this if you attempt to visit a malicious website. Image Credit: Google" src="/media/2013/10/malware_ahead-300x161.png"  width="300" height="161"></a><p class="wp-caption-text">You may see warnings like this if you attempt to visit a malicious website.<br>Image Credit: Google</p></div>
<p><strong>A:&nbsp;</strong>Getting infected with malware and pop-ups is no fun. Even though there are lots of software programs out there to clean this junk off your hard drive, these kinds of malware programs are <em>designed</em> to be a pain to remove.</p>
<p>The key is to avoid getting infected in the first place. People know that it&rsquo;s not a good idea to walk down a dark street in the middle of the night, and the Internet is pretty similar. It has some bad neighborhoods, and you just need to know to avoid them.</p>
<p>First off, you want to be careful with what you search for. Unscrupulous spammers and hackers tend to stake out popular Google searches, and they especially love celebrities. In fact, anti-virus company McAfee <a href="http://www.mcafee.com/us/about/news/2013/q3/20130917-01.aspx?cid=127498&amp;ctst=1">published a list of 2013&rsquo;s most dangerous celebrities to search for</a>. The #1 most dangerous person to search for is Lily Collins &ndash; one in seven of the results will land you on a malicious web site! Others dangerous celeb searches include Katy Perry, Sandra Bullock, and Britney Spears.</p>
<p>Celebrity searches aren?t the only searches that can get you in trouble, though. There are plenty of seemingly safe, regular search terms that can yield dangerous results, including:</p>
<ul><li>&ldquo;lyrics&rdquo;</li>
<li>&ldquo;free music&rdquo;</li>
<li>&ldquo;game cheats&rdquo;</li>
<li>&ldquo;free ringtones&rdquo;</li>
<li>&ldquo;solitaire&rdquo;</li>
<li>&ldquo;make money&rdquo;</li>
<li>&ldquo;work from home&rdquo;</li>
<li>&ldquo;free downloads&rdquo;</li>
</ul><p>Now, a few different things can happen when you visit an unsafe website. The most common is that you&rsquo;ll be hit with a pop-up asking you to download some &ldquo;helpful&rdquo; program. Never agree to this! Running strange programs from unknown sources is extremely dangerous. If a website asks you to download something and you weren&rsquo;t expecting to download it, say no.</p>
<p>In some cases it&rsquo;s possible for a website to load a malicious program onto your computer secretly. Avoid this by upgrading to the latest version of your web browser. Still running Internet Explorer 7? Go download version 10 immediately. Having the latest and greatest makes sure you&rsquo;ve also got the most recent security updates.</p>
<p>You also need to be smart about email. It&rsquo;s a bad idea to open a program or file that&rsquo;s been emailed to you if you weren&rsquo;t expecting it, even if it&rsquo;s from someone you know. That person could be infected with a virus, many of which love to spread themselves through email attachments. If you&rsquo;re not sure, email the person back and ask, &ldquo;Did you mean to send this?&rdquo;</p>
<p>Follow these steps and you&rsquo;ll be pretty safe. But accidents do happen, so know that if you do get infected with malware, there&rsquo;s help. Google keeps a list of safe, useful malware removal programs at <a href="http://www.google.com/goodtoknow/">google.com/goodtoknow</a>. Just click on the &ldquo;keep your device clean&rdquo; link.</p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2013/10/jamie-asks-can-avoid-malicious-software-dangerous-websites/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>#42 Trust Issues</title>
		<link>/2013/07/42-trust-issues/</link>
		<comments>/2013/07/42-trust-issues/#comments</comments>
		<pubDate>Mon, 08 Jul 2013 04:05:23 +0000</pubDate>
		<dc:creator><![CDATA[Ray Hollister]]></dc:creator>
				<category><![CDATA[Apps]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[anti-malware software]]></category>
		<category><![CDATA[computer disposal]]></category>
		<category><![CDATA[Dashlane]]></category>
		<category><![CDATA[e-waste]]></category>
		<category><![CDATA[ecycling]]></category>
		<category><![CDATA[LastPass]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Nextdoor]]></category>
		<category><![CDATA[Password management]]></category>
		<category><![CDATA[secure delete]]></category>

		<guid isPermaLink="false">http://deemable.com/?p=7486</guid>
		<description><![CDATA[<img width="150" height="150" src="/media/2013/07/Screenshot-2013-07-08-at-12.02.47-AM-e1373256598590-150x150.png" class="attachment-thumbnail wp-post-image" alt="Screenshot 2013-07-08 at 12.02.47 AM" style="float:left; margin:0 15px 15px 0;" />On this week&#8217;s episode of Deemable Tech, Ray and Tom help a few listeners out with their trust issues. They help one listener trust LastPass and/or Dashlane to store their passwords, another to trust Nextdoor to find out what&#8217;s happening <a href="/2013/07/42-trust-issues/#more-'" class="more-link">more »</a><p class="more-link-p"><a class="more-link" href="/2013/07/42-trust-issues/">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<img width="150" height="150" src="/media/2013/07/Screenshot-2013-07-08-at-12.02.47-AM-e1373256598590-150x150.png" class="attachment-thumbnail wp-post-image" alt="Screenshot 2013-07-08 at 12.02.47 AM" style="float:left; margin:0 15px 15px 0;" /><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p>On this week&rsquo;s episode of Deemable Tech, Ray and Tom help a few listeners out with their trust issues. They help one listener trust LastPass and/or Dashlane to store their passwords, another to trust Nextdoor to find out what&rsquo;s happening in their neighborhood. Another listener&rsquo;s trust was broken by a bad batch of malware.</p>
<span class="embed-youtube" style="text-align:center; display: block;"><iframe class="youtube-player" type="text/html" width="752" height="453" src="https://www.youtube.com/embed/U1KpYGT57a8?version=3&amp;rel=1&amp;fs=1&amp;autohide=2&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent" frameborder="0" allowfullscreen="true"></iframe></span>
<p><!--[if lt IE 9]><script>document.createElement('audio');</script><![endif]-->
<audio class="wp-audio-shortcode" id="audio-7486-1" preload="none" style="width: 100%; visibility: hidden;" controls="controls"><source type="audio/mpeg" src="http://cpa.ds.npr.org/wjct/audio/2015/02/DeemableTech_2013-07-07.mp3?_=1"></source><a href="http://cpa.ds.npr.org/wjct/audio/2015/02/DeemableTech_2013-07-07.mp3">http://cpa.ds.npr.org/wjct/audio/2015/02/DeemableTech_2013-07-07.mp3</a></audio><br><a href="http://cpa.ds.npr.org/wjct/audio/2015/02/DeemableTech_2013-07-07.mp3">#42 Trust Issues</a></p>
<p dir="ltr">DRAFT TRANSCRIPT</p>
<p dir="ltr">RAY: From WJCT studios in Jacksonville, Florida, I&rsquo;m Ray Hollister,</p>
<p dir="ltr">TOM: I&rsquo;m Tom Braun,</p>
<p dir="ltr">RAY: and this is Deemable Tech, tech help worth listening to.</p>
<p dir="ltr">RAY: This week&rsquo;s episode of the Deemable Tech podcast is brought to you by A Small Orange, Homegrown Hosting. A refreshingly different approach to web hosting. On the web at a small orange dot com.</p>
<p dir="ltr">TOM: And, by audible.com &ndash; Deemable Tech listeners can get a FREE audiobook download at <a href="http://www.audibletrial.com/Deemable">audibletrial.com/Deemable</a> Over 100,000 titles to choose from for your iPhone, Android, Kindle or mp3 player.</p>
<p dir="ltr">RAY: And, from All Florida Insurance Options, an authorized Progressive agency, helping people shop for insurance at 904-757-3288 or at their office in Highland Square on Dunn Avenue in North Jacksonville.</p>
<p dir="ltr">TOM: Got a question about your computer, smart phone, tablet or the Internet? Give us a call us at One Eight Eight Eight, Nine Seven Two, Nine Eight Six Eight, or send us an email at <a href="mailto:questions@deemable.com">questions@deemable.com</a>.</p>
<p dir="ltr">RAY: Today on Deemable Tech, we&rsquo;re answering your questions about how to throw away your computer, and</p>
<p dir="ltr">TOM: whether or not you can trust LastPass, and how Nextdoor.com can make your neighborhood better.</p>
<p dir="ltr">RAY: But first, we have a voicemail from a listener named Felicia.</p>
<p dir="ltr">Hi Deemable Tech my name is Felicia and I saw you OneSpark and I still have your card and I&rsquo;m hi thing problems with the condo with it I have a &hellip; dell laptop and 2 days ago I start getting con do it kept coming up whenever &hellip; I&rsquo;ve browse on internet explorer work for &hellip; because I&rsquo;ve browse on both of them because I&rsquo;m old and so I did internet explorer &hellip; I was I went on the online and I was able to get rid of it sort of in that it doesn&rsquo;t come up anymore but my computer is like running really slow and so it makes me think that it&rsquo;s still floating around in there somewhere so how can I get rid of it completely and speed things back up again</p>
<p dir="ltr">Oh, that&rsquo;s a pain, Felicia. Well, sounds like you have unwittingly installed Conduit Search. But don&rsquo;t worry, you&rsquo;re not alone: this annoying piece of software piggy-backs on legitimate downloads and installs itself on the computers of thousands of unsuspecting users.</p>
<p dir="ltr">As you surmised, there is a conduit search plug-in which you need to uninstall from each of your infected browsers. The really annoying thing about Conduit Search is that it doesn&rsquo;t just install a browser plug-in, it also installs software and changes your search provider. So you have to fix each of these problems separately.</p>
<p dir="ltr">How to Remove Search Conduit Toolbar and Add-ons on Internet Explorer</p>
<p dir="ltr">1. Open Internet Explorer.</p>
<p dir="ltr">2. On top menu, select Tools. Choose Manage Add-ons from the drop-down list.</p>
<p dir="ltr">3. A new window to manage current add-ons will open. On Add-on Types pane, select Toolbars and Extensions. Look for ?Conduit? items on right pane. You cannot delete the toolbar and extensions from this process. But you must disable it to stop working. You may jump to tips below to uninstall the Conduit Toolbar.</p>
<p dir="ltr">4. One at a time, select ?Conduit? item and click on Disable button to stop the service.</p>
<p dir="ltr">How to Remove Conduit Search Provider on Internet Explorer</p>
<p dir="ltr">1. On the same window, click on Search Providers on Add-on Types pane.</p>
<p dir="ltr">2. You cannot remove Conduit Web Search if it is on default stage. On right pane, select your desired search engine (Google or Bing) and set it as default. Hover your mouse on the desired service and click on Set as default button.</p>
<p dir="ltr">3. You can now highlight Conduit Web Search. Click on Remove button to delete the service.</p>
<p dir="ltr">Other Things:</p>
<p dir="ltr">1. Uninstall Conduit software by going to Control Panel. Click on Uninstall a program. Look for Toolbar or any phrase relevant to Conduit Search. Highlight the program and click the Uninstall button at the top of the screen.</p>
<p dir="ltr">2. Set Internet Explorer homepage to default by going to Tools menu. On General tab, click on Use default or replace the address with your desired home page URL. Click on Apply to save the settings.</p>
<p dir="ltr">Alternatively, some mal-ware programs may be able to eradicate Search Conduit for you. Either way, make sure that you uninstall the software. If any slow-downs are being caused by Search Conduit, uninstalling the software should help.</p>
<p dir="ltr">I&rsquo;m not entirely sure that Search Conduit is the problem here. Although it&rsquo;s an annoying little piece of malware, it doesn&rsquo;t seem to be particularly malicious. Download a good virus and malware scanner and run it. Where there&rsquo;s one piece of malware, there could be more.</p>
<p>&nbsp;</p>
<p dir="ltr">Kim K. writes, There was a break in at my neighbor&rsquo;s house last night. If I hadn&rsquo;t seen the cops pull up as I was leaving for work, I wouldn&rsquo;t even had known about it. It made me realize just how few of my neighbors I actually know. Is there was a website or some other way I can get to know my neighbors that doesn&rsquo;t require going door to door and meeting my neighbors in person?</p>
<p dir="ltr">A: It is ironic that with Facebook and Twitter we can know what a random acquaintance from high school had for lunch, but we still might not know the name of three of our neighbors. There is a new social network called Nextdoor that is trying to fix that. Nextdoor is a private social network that only connects you to people who live in your neighborhood. To join, you have to prove where you live. To verify where you live, you can provide a credit or debit card to verify your street address, choose to have Nextdoor sent a postcard in the mail with a security code, or in some areas you can have Nextdoor call your landline telephone. Otherwise, you&rsquo;ll have to be verified by the Founding Member or a Lead Neighbor.</p>
<p dir="ltr">Once you&rsquo;ve been verified, you can sign into the website or the iPhone app to find out about all of the yard sales, missing puppies, and fun events in your neighborhood. In my neighborhood, folks are giving stuff away, having garage sales, posting information about church and theatre events, and talking about the car smash and grabs that happened last year.</p>
<p dir="ltr">Now, you can even share and talk with folks in nearby neighborhoods, so you won&rsquo;t be limited to just your community. You can choose if you want your information and posts just shared with your neighborhood and/or with nearby neighborhoods. Also, like any self respecting social network, Nextdoor has an iPhone app, and is developing an Android app, so you can post and read others posts on the go.</p>
<p dir="ltr">To sign up for Nextdoor, go to Nextdoor.com. If your neighborhood is already added to Nextdoor, you&rsquo;ll be able to join it. If it isn&rsquo;t in Nextdoor yet, you can become a founding member and start a community on Nextdoor for your neighborhood. If you click on the link we&rsquo;ve created for our readers, <a href="http://dmbl.co/nextdoor">http://dmbl.co/nextdoor</a>, and add your neighborhood, Nextdoor will give you a $50 Starbucks gift card.</p>
<p dir="ltr">So, if you would like to be social with your neighbors without, you know, being social, check out Nextdoor.</p>
<p>&nbsp;</p>
<p dir="ltr">For the listeners of the Deemable Tech podcast, Audible is offering a free audiobook download with a free 30-day trial to give you the opportunity to check out their service.</p>
<p dir="ltr">Even New York Times best sellers like</p>
<p dir="ltr">Fiction: Inferno by Dan Brown</p>
<p dir="ltr">Non Fiction: Lean In by Sheryl Sandberg: Women, Work, and the Will to Lead</p>
<p dir="ltr">Not in Audible yet: William Shakespeare&rsquo;s Star Wars</p>
<p dir="ltr">But from the same publisher, there is Jane Austen and Seth Grahame-Smith&rsquo;s Pride and Prejudice and Zombies</p>
<p dir="ltr">To download your free audiobook today go to&nbsp;<a href="http://audibletrial.com/Deemable">audibletrial.com/Deemable</a>. Again, that&rsquo;s&nbsp;<a href="http://audibletrial.com/Deemable">audibletrial.com/Deemable</a>&nbsp;for your free audiobook!</p>
<p dir="ltr">Julie writes, I&rsquo;ve been hesitant to use a service like LastPass because if it is hacked then all of my accounts would be compromised.</p>
<p dir="ltr">I first listened to your segment on radio and then downloaded your podcast. I&rsquo;m an elementary school Instructional Tech Teacher and have learned a lot. Thanks!</p>
<p dir="ltr">A: LastPass and Dashlane both provide an incredible service: remembering the dozens upon dozens of passwords and logins that people have to use on a daily basis. Both LastPass and Dashlane use AES-256 encryption, the same encryption your bank uses to keep your account information safe. On top of that, Dashlane and Lastpass encrypt your information one more time using SSL when it is transmitted across the Internet. Also, your master password is not stored anywhere. What does this all mean to you? IF, someone is able to hack into Dashlane&rsquo;s or LastPass&rsquo; database, they will pretty much have useless information. It will take the hackers a very long time to decrypt it, many months to several years. You&rsquo;ll have plenty of time to change your passwords.</p>
<p>TOM: Greg asked: I have a laptop that is about 10 years old, and it is completely beyond repair. What can I do with it? Is it OK to just throw it in the trash?<br>
RAY: NO! Stop! If you&rsquo;ve already put it out for the trash, stop listening right now, and go bring it back inside! Never, ever, throw computers or almost any electronics in the trash.<br>
TOM: First of all, you need to protect yourself and clear any personal data off of that thing before you release it into the wild. I&rsquo;m not talking about a simple, quick re-formatting. I mean such a thorough scrubbing of your data that it would take the entire cast of CSI to recreate it.<br>
RAY: Right, because when you delete something from your hard drive, it isn&rsquo;t really erased. The computer just pretends it&rsquo;s not there. To really delete a file from your computer&rsquo;s hard drive, you have to write something over that file. There are a few programs that will securely delete your files.<br>
TOM: If it&rsquo;s a Windows PC you&rsquo;re getting rid of, use a program like Eraser or the Drive Wiper in CCleaner to completely eradicate your data. If you&rsquo;re tossing out a Mac, there&rsquo;s a program called Permanent Eraser.<br>
RAY: Once you&rsquo;ve taken care of protecting yourself, you need to protect the environment. Computers are loaded with toxic metals and materials that are dangerous to the environment and need to be handled appropriately. Some cities and counties have curbside pickup of e-waste, but you should never just toss your computer in with the regular trash.<br>
Check with your municipality&rsquo;s website to find out where you can drop off your computer so that it is disposed of properly. Here in Jacksonville e-waste can be dropped off Tuesday through Saturday at the city&rsquo;s Household Hazardous Waste Facility located at 2675 Commonwealth Ave.<br>
TOM: What kind of chemicals are there in your computer, Ray?<br>
RAY: Oh man, it&rsquo;s like a chemistry lab in there. Circuit boards contain Cadmium and Beryllium, which are carcinogens. The steel inside your computer likely has hexavalent chromium baked into it, which is bad for your lungs. The LCDs in your PC contain mercury. And then of course there&rsquo;s the plastic parts, all of which are non bio-degradable.<br>
And in a laptop, you have the most toxic culprit of all, the battery. It contains lead and, even worse, battery acid.<br>
TOM: Wow, that&rsquo;s kind of a scary list of chemicals. Is there any chance those toxins could pose a threat to the person using the computer?<br>
RAY: Well, most likely not. For one thing, the case of your computer shields you from direct contact with any of these chemicals. More importantly, though, all of these toxins are found in trace amounts that would most likely be harmless to a human. The problem is that when everybody tosses their electronics into the landfill, all of these toxins can start to build up and pose a threat to the environment.<br>
TOM: We definitely don&rsquo;t want to do that.<br>
Of course as they say, one man&rsquo;s toxic trash is another man&rsquo;s treasure. There are companies that will take computers and monitors apart and extract the metals out of them to sell as scrap. So before you just throw that old junker away, you might be able to get a few bucks out of it, even if it is beyond all hope of repair.<br>
You do have to be careful though. There are several companies that will ship your computer and monitor overseas where they will be melted down to get the metals out. This is very dangerous and very unsafe for the workers. Make sure that the company you are dealing with is handling your e-waste responsibly.</p>
<h1 dir="ltr"><span style="font-size: 13px;">Thanks for all your questions, and keep them coming. Call us at our toll-free number, 1-888-972-9868 or you can send us an email at questions@deemable.com. Also, subscribe to the show! Search for Deemable Tech on iTunes or point your favorite podcast app to dmbl.co/pod.</span></h1>
<p dir="ltr">Our producer is Sean Birch. I&rsquo;m Ray Hollister, I&rsquo;m Tom Braun, and this is Deemable Tech.</p>
<p dir="ltr">Thanks for listening. Have a great week.</p>
<p><a href="/media/2013/07/Screenshot-2013-07-08-at-12.02.47-AM-e1373256598590.png" class="gallery_colorbox"><img src="/media/2013/07/Screenshot-2013-07-08-at-12.02.47-AM-e1373256598590-300x206.png"  alt="Screenshot 2013-07-08 at 12.02.47 AM" width="300" height="206" class="alignright size-medium wp-image-7491"></a></p></body></html>
]]></content:encoded>
			<wfw:commentRss>/2013/07/42-trust-issues/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
<enclosure url="http://cpa.ds.npr.org/wjct/audio/2015/02/DeemableTech_2013-07-07.mp3" length="40649874" type="audio/mpeg" />
		</item>
	</channel>
</rss>
