All posts by Computers Made Simple

Facebook’s Hidden Message Box

We’re quite sure that everyone knows how to send and receive messages on Facebook. Did you know that your Facebook account has two inboxes? We didn’t until yesterday. Here’s the scoop on Facebook’s hidden message box.

When you receive a message from a Facebook friend, you get a notification and you can click the message icon on the top row of any Facebook page to read it. When you reply or comment on something on a stranger’s page, sometimes you get messages from complete strangers. Where do those messages go? It turns out that Facebook, just like any other email service, plunks those messages into your Facebook junk mail folder. Say what? A Facebook junk mail folder? You read that right. Here’s how to find it.

1. Start by checking your regular inbox, the one that’s actually called Inbox:

Photo of Facebook Hidden Inbox   1
Click on the message icon at the top of any Facebook Page.

 

2. Move your mouse just a bit to the right of the word Inbox and click on Other. Yes, it looks like it’s hidden but it’s not:

Photo of Facebook Hidden Inbox   2
Click Other to access your hidden inbox.

 

3. If you haven’t accessed this area of Facebook before, here is the warning message that you will see:

Photo of Facebook Hidden Inbox   3
This explains everything!

 

Now, you may have some messages here or you might not. It depends on how active you are on Facebook. One of our accounts had over 30 messages, another account had only 6. The interesting this is that some messages are complete spam but some were from real Facebook users who had either replied to a comment we made and wanted more info or who were offering us more information on something we had asked in a comment.

WARNING! Please remember this: Once you send a message to a stranger or respond to a message that a stranger sent to you, your whole profile opens up to them, just as if they aren’t a stranger anymore. Read that again. When you get a message in this ‘junk’ box, sometimes that message is a phishing expedition, an attempt to see more of your profile than you would normally allow a stranger to see. Who would do this? Spammers for sure but stalkers send messages on Facebook, too. Don’t let your guard down. Be careful when you send a message or reply to a message from someone you don’t know, someone who is not a Facebook friend.

While you’re at it, why not Like our Facebook page? Here’s the link: Computers Made Simple on Facebook

As always, thanks for reading!

 

Encrypting Your Stuff – Create a TrueCrypt container for DropBox Part Two

This is the last post on encryption for a while. Today we’re going to show you how to lock up your DropBox storage folder, both online and on your computer.

(In case you don’t know about DropBox, you should really check it out. We’ve written several posts on this free and very cool service so search our site or head over here and sign up for your free 2 gigs of space. Here’s how DropBox works:  Post 1  Post 2   We’ve also written about how Dropbox can ‘save your bacon’. It really can! Here’s  a link to that post: How DropBox can Save Your Bacon)

Photo of Dropbox
DropBox – Make sure you encrypt your stuff.

In spite of what DropBox says about its encryption and the safety of your files in its Cloud, don’t believe it. At the drop of a hat, DropBox will open up your private files to anyone who asks. Anyone with a badge that is. What’s the problem with that? We’re all for law and order but we don’t think anyone should be able to go through your personal files without you knowing about it. Even if no one in authority has an interest in your stuff, the employees of DropBox can and do sift through your files on a regular basis. Microsoft does this too, this kind of thing is not limited to DropBox. Let’s just say that everyone does the same thing.

Once you’re clear on that, here’s how to keep your information private. You made an encrypted container right? We showed you how to do that in our last post. Here’s the link in case you missed it: Encrypting Your Stuff – Create a TrueCrypt container for DropBox. You should make more than one container. Instead of putting everything in one locked volume, consider making several. Let’s say you make one for passwords, one for personal photos, one for videos, one for financial information, etc. That way, you don’t have to upload a massive folder every time you do some work on the things in that folder. We’ll explain that next.

DropBox keeps your stuff online AND on your computer(s). The beauty of DropBox is that you can access your material from any computer anywhere in the world. Sometimes you will access your online folder using a browser. Other times, when you’re on one of your own computers, you will access your stuff in the folder that is on your hard drive. DropBox automatically syncs that folder every time you go online. If you access your folder in a browser, DropBox syncs any changes that you made with the folder that’s on all or any of your computers the next time you go online. You don’t have to worry about any of this, it’s all done automatically.

All you have to do is make sure that your encrypted containers/volumes/folders are in the DropBox folder on your computer. As soon as you put the encrypted volumes there, DropBox syncs everything automatically, any time there are changes. It really is that simple.

Knowing all of this, you’ll probably agree that this is the best way to hide your personal information online and on your own computer(s). If your house is broken into or if you lose your laptop, anyone can access that information if it’s not encrypted. Don’t wait for that to happen, do it now! Don’t keep the TrueCrypt password on your computers, that’s kind of obvious but we thought we’d mention it.

Photo of Encryption poster
Not just your email. Encrypt everything!

TIP: Use several small containers instead of one large one. That makes syncing much faster. As mentioned above, encrypt a few 10 MB containers and label them accordingly. If you do need a larger container for a video, for example, you probably won’t change it too much so syncing time won’t be an issue.

That’s it for now. If you have questions, comments, suggestions, please let us know.

Thanks for reading! Why not Like us on Facebook? Here’s the link: Computers Made Simple on Facebook 

 

Encrypting Your Stuff – Create a TrueCrypt container for DropBox

In our last post we talked about containers. If you think about a container as a large box that you put things in, you’ll have the right idea. Today, let’s lock that box up tight using TrueCrypt.

We’ve written about TrueCrypt before but it’s certainly worth another post. First, it’s free and, second, it’s the easiest encryption tool we’ve ever used. Download it here: TrueCrypt

Point A. TrueCrypt can be installed on your computer or you can run it from a folder on your desktop (or anywhere else for that matter). It’s self-contained, in other words, able to run without being installed on your computer.

Tip: You can carry a copy of TrueCrypt around on a flash drive with your container. You would use TrueCrypt to open the container, interact with the contents then lock it up again.

Point B. Basically, you will create a folder, name it, encrypt it and use a password to lock it. TrueCrypt is very simple to use but we’ll run through the steps using screen captures, just so you don’t screw things up. In reality, the only thing you have to worry about is forgetting your password. If you do, everything in the encrypted folder is lost for good. That’s how powerful TrueCrypt is.

Here we go:

1.

Photo of TrueCrypt Container   1
The TrueCrypt opening menu. You want to click on ‘Create Volume’.

 

2. TrueCrypt has a few options to choose from but we want to do the simplest set-up here.

Photo of TrueCrypt Container   2
Choose the first one, ‘Create an encrypted file container.’

 

3. Again, stick with the simplest volume (container):

Photo of TrueCrypt Container   3
We just want a Standard TrueCrypt volume here, nothing fancy.

4. The next menu is a bit confusing. Take a look:

Photo of TrueCrypt Container   4
This is the most confusing part. Read our description of this menu.

This menu seems to be asking you to choose a file/container, as if you have already created one. You haven’t created one yet but you will now. Don’t type anything in the space, just click the ‘Select File’ button. When the file menu opens, navigate to your Desktop. You can put the new file anywhere but we find it easier if it’s right in front of us, right there on our desktop. Read the warning! Do not choose an existing file. TrueCrypt will delete it and create a new file using the same name. Repeat, do NOT choose an existing file. Read step 5. 

5. After you have navigated to your desktop, your next job is to type a name  in the slot. You could name your new file Mary, Joe, Sparky, whatever you want. You can simply use a name or a number or an obscure combination of letters and numbers, it doesn’t matter. We would suggest, however, using a name and a file type. Why? We want a file type because someone who is looking for a hidden file would probably not look for a photo or video file, right? That’s why we named our file, ‘summertime.avi’. It’s not really an ‘avi’ file, though. It can’t be opened by any program other than TrueCrypt.

Photo of TrueCrypt Container   5
We chose to use ‘avi’ as the file type but you can use .txt or .docx or .dll, whatever.

5. Once you click Save, TrueCrypt knows that the file it creates will be named, in our case, summertime.avi. Next, TrueCrypt will ask you what kind of encryption algorithm you want to use. Go with the defaults here unless you know what you’re doing.

Photo of TrueCrypt Container   6
Go with the flow, use the default settings here.

6. How big should your container be? Only you know that. For our example, we set it to 1 gigabyte in size.

Photo of TrueCrypt Container   7
Don’t make it too small, use a decent size.

7. Next comes the password. Use a good one. Make sure you don’t forget it. Read the tips that TrueCrypt gives here. You can always change the password later on, no worries.

Photo of TrueCrypt Container   8
A good password is vital.

8. If your password is too short, TrueCrypt warns you about it.

Photo of TrueCrypt Container   9
Danger Will Robinson!

9. Now comes the fun part. You’ll never see this anywhere else. You are now creating the encryption key as you move your mouse over this menu box. Take your time and do what the instructions tell you. Once you’re bored of darting back and forth, click Format and TrueCrypt will create the volume/container for you.

Photo of TrueCrypt menu
Move your mouse up and down, around and around, back and forth.

10. This is what you should see next:

Photo of TrueCrypt Container   10
Success! If you don’t see this, you screwed up somewhere but we think you’ll be fine.

11. OK, you’ve created the container. It’s sitting on your desktop waiting to be used. How do you open it?

Photo of TrueCrypt Container   11
There is our ‘summertime.avi’ file on the desktop.

Well, you won’t open that file with anything but TrueCrypt.

12. Using the same technique as before, navigate to the file on your desktop. What you want to do now is to tell TrueCrypt to ‘mount’ the container you just created. (Container, volume, file, all the same thing.)

Photo of TrueCrypt Container   12
When you get to the file, click Mount to open it.

13. TrueCrypt will ask for your password. Again, don’t forget it.

Photo of TrueCrypt Container   13
Don’t ‘Cache passwords and keyfiles in memory’ OK?

14. Click OK and the file is shown in the TrueCrypt window:

 

Photo of TrueCrypt Container   14
There is ‘summertime’avi’ waiting to be opened. Double click on it now.

15. You’ve managed to create an encrypted container that is locked with a strong password. Now it’s time to fill it with your stuff:

Photo of TrueCrypt Container   15
Drag and drop files into this folder/container/volume up to the limit of room it has in it.

16. When you have finished adding files, make sure you click Dismount All before  you close TrueCrypt. You mount the volume, enter the password, add or look at the files in it, then close the folder then dismount it in TrueCrypt. Don’t forget the last part.

 

This is a long post, next time we’ll explain the DropBox part of it. Thanks for sticking with us so far!

 

 

 

Encrypting Your Stuff – Zip or Container?

Warning: Lots of discussion in this post but we think it’s worth the time it takes to read it. These are the basics of encryption, things you should know. (But dull, unfortunately!)

Encryption week continues, this time with a discussion of a containers versus zip files and encryption in general. Here are some definitions with explanations:

1. If you use a password to log on to your computer, you can’t say that your computer is encrypted. Yes, it is locked but it’s not necessarily encrypted.

2. You can lock your computer with a password and encrypt the hard drive. That’s not difficult to do, Windows can do this by itself, but you run the risk of losing ALL your data if something screws up. With Windows, that is a distinct possibility.

3. If you encrypt something, you have to use a password. That may seem obvious but this site is for beginners, right? Go back and read number one then read this one again. Passwords don’t automatically mean something is encrypted but everything that is encrypted requires a password.

4. You can have a zip file that is not encrypted. Almost all zip files don’t require a password. If you’re confused about what a zip file is, think of a suitcase. You can pile socks, T-shirts,hats, gloves, etc.,  into that suitcase, packed as tightly as possible. The suitcase goes on the plane/train/car with you. When you get to your destination, you usually unpack that suitcase. The things that were in it can then be put into drawers, on to hangers, and so on. A zip file is a suitcase. It’s smaller than the original file but everything is still there, nothing has been removed. To use the stuff inside a zip file, you have to unpack it.

Photo of Zips and Containers   1
A zip file icon.

5. Whether a zip file is password protected or not, you need a program to unzip it. Windows can do this on its own, as long as the zip file is just that, a zip. (There are other types of ‘compressed archive’ files but, for now, we’ll deal only with zips.)

6. A container is more like your house. Your house has a lock on the door, a container has a password, same thing. Your password protected computer could be termed a container. In our world, containers are much larger than zip files.

Photo of Zips and Containers   2
An encrypted container can be put on a flash drive.

7. An encrypted container is something like a glass house where the windows are actually mirrors or they are smeared with petroleum jelly. You might be able to see inside but you can’t see what’s there. If you have the key to the lock, you can see everything. Without the key, no such luck.

Tip: A container can be a file or a folder but it could also be an encrypted flash drive or hard drive. In this post and in the future posts on encryption, we are discussing files and folders, not flash drives.

8. Using a program such as Notepad, you are able to look into any computer file. If you open a .jpg file, you’d be able to read the file header and know it was a .jpg. You wouldn’t be able to see the picture itself but you would know what type of file it is. If you open an encrypted file or folder in Notepad, everything inside it is illegible, nothing can be interpreted. Once the file or folder is unlocked, however, everything inside it becomes readable.

9. Nuts and bolts now. Use a zip file to send to someone via email. Use an encrypted zip file to protect passwords, personal documents, financial data from anyone who might intercept that file, on a flash drive or external hard drive, for instance. Use an encrypted container to store your files on your computer and online, in the Cloud. If you keep a copy of the container on your computer, you can simply upload it again and again, replacing the online one with the new, updated one.

 

Now you know a bit more about zip files and encrypted containers. In our next post we’ll show you how to encrypt a container using TrueCrypt. Finally, you may be asking yourself, “Why should I even bother to encrypt my stuff?” Here’s why.

Anything you put into an online storage facility, whether it is DropBox or Microsoft’s SkyDrive, is open to viewing by employees of that facility. If you think that these companies don’t go through your stuff, you’re mistaken. They do sift through your stuff on a regular basis. Your own and other government officials go through your files too but that’s not the point of our articles. We’re here to help you keep your personal data safe. 

Thanks for reading! How about heading over to our Facebook page and clicking Like? Sounds like a good idea to us! Here’s the link:  Computers Made Simple on Facebook

Encrypting Your Stuff – Create Very Strong Passwords

There’s no sense in encrypting your personal files and folders if you don’t secure them with a strong password. Today, we’re going to show you how to do just that. You’ll create an easy to remember password that will lock your material tighter than Fort Knox.

1. There are some prerequisites to this course. In order to create this special password, you have to use a number pad, either the one on the right side of your full-size keyboard or the numbers you can access using the FN key on a laptop, for instance. Yes, there are numbers across the top of every keyboard but those are not the ones we want to use here. If you always use a full-size keyboard, make sure the NumLock key is pressed down. If not, figure out how to use the ‘other’ numbers, usually on the top of certain keys, like this:

Photo of Character Map Passwords   1
See the small numbers on top of some keys, even on top of number keys?

On this keyboard, you would press the FN key and the J or K or L key, etc. The normal number keys on the top row are not what you would use, except for 7, 8 and 9 with the FN key.

2. Ok, once you’re clear on that, let’s bring out the Character Map. Click on start, down on the bottom left of your taskbar, then type ‘charmap’ into the slot. Charmap.exe should show up but, if it doesn’t, type charmap.exe and press enter.

Photo of Character Map Passwords   2
It’s up at the top there, but you may have to type the full charmap.exe.

 

3. Welcome to Character Map! Here’s what you should see when you hit Enter:

Photo of Character Map Passwords   3
This is known as Character Map.

With this handy part of Windows, you can pretty much type any letter in just about any language. Symbols, archaic letters, they’re all here.

4. The default typeface for us is Arial. Your default typeface may be different. Here are some of our choices:

Photo of Character Map Passwords   3
Lots of choices here but make sure you remember which one you choose.

Whichever one you choose to create your password, make sure you remember it. Each selection here has a completely different set of characters. You can make a password out of any of them but you must remember which typeface you chose.

5. Once you make a selection, click on one of the letters/symbols. This is an example:

Photo of Character Map Passwords   5
This is an O, sort of, with two dots on top. See the keystroke on the bottom right?

This letter, according to Character Map is ‘U+OOD6: Latin Capital Letter O with Diaeresis’. Phew! Forget that, it’s not important. What is important are the words on the bottom right corner: Keystroke: Alt+0214.

6. Open Notepad. Use Notepad not Word or Wordpad. Notepad doesn’t mess with letters, it just shows what you type, nothing else. Once Notepad is open, Press the Alt key down and keep it down. On your number pad, type 0124 then let up on the Alt key. Like magic, this Ö appears. Practice in Notepad until you get it right.

Note: Not every letter or symbol has an ‘alt+number’ shortcut. Obviously you would choose ones with a shortcut, otherwise you have to copy and paste the symbol which wouldn’t be as easy. What we want here is to be able to type the symbol/letter without opening Character Map, right?

7. Now it’s time to play a little memory game. You can do this a few ways but here’s a suggestion. Look for a symbol that has a familiar number shortcut. In our example above, the shortcut is Alt+0214. Maybe 0214 are the last four digits of your phone number. Get it? Look for a combination that rings a bell and is something you can never forget; your age, your address, your shoe size, whatever. Once you have that symbol, you’re on your way to a very secure password.

8. The hard part is done. You have a symbol that pretty much locks up your password from anyone who doesn’t know your secret. You could still use something simple for the rest of the password but once you insert that symbol, it is very, very secure.

9. Here’s an example of an unbreakable password:     !pass0214ÖBod

For fun, we’ve put both the typeface we used, Bodoni, and the number you have to use with the Alt key to create the special character, Ö.

These are the basics and we’re sure you can create very strong passwords using this technique. Have fun with this and make sure you comment if you have questions about this.

TIP: Character Map is for reference only. You only need it to find the character you want to use and the numbers that create it with the Alt key. Character Map does not have to be open when you are typing the character.

 

Thanks for reading!