Website Search
Research Papers
plg_search_attachments
Articles
FAQs
Easy Profile - Search plugin
Courses & Exams
Pages
Specialized Search Engines
Events Calender
Upcoming Events
Barbara Larson

Barbara Larson

An NYC area IT consultant and MSP reviews the dangers of the dark web and how to stay safe online in a new article from eMazzanti Technologies.

The informative article first clarifies common misconceptions about the dark web then lists steps to protect personal data and business assets. Readers are urged to work with data security professionals to achieve the best results.

“Understanding the dark web is helpful in protecting valuable business data,”

stated Jennifer Mazzanti, CEO, eMazzanti Technologies. “Modern cyber-security technology and best practices are designed to keep sensitive information from falling into the hands of the bad actors lurking there.”

Dark Web vs. Deep Web

“Contrary to some reports, the dark web does not include over 90 percent of the internet. This common misconception arises from confusion between two related terms. In reality, the internet includes several layers.”

“Deep web – Also known as the invisible web, this is by far the largest layer of the internet, with over 90 percent of all internet content. The bulk of this information involves perfectly legal content that is not indexed by the standard search engines. Your medical records, banking information and other member-only websites live here.”

“Dark web – Sites on the dark web are accessible only with special software that allows users to communicate and transact business anonymously. While this creates a haven for criminals, it also serves a legitimate purpose for whistleblowers, activists, and victims who need to remain anonymous.”

Identity Theft and the Dark Web

“If the dark web includes only about three percent of the internet, do I need to be concerned? Yes. Remember Equifax and Target? Whenever a website experiences a data breach involving personally identifiable information, that information will almost certainly appear for sale on the dark web, likely within hours.”

Navigate the Web with Expert Guides

Business leaders should keep in mind that a breach of company systems means not only data loss but also potentially a loss of reputation. To guard critical data, employ multi-layer security. For merchants, if EMV chip technology not already been implemented for point of sale (POS) systems, they should do that now.

As with any potentially dangerous territory, the internet is a much safer place when working with an experienced guide. The experts at eMazzanti build strategies to keep personal and business data safe. Whether implementing secure cloud solutions or tapping into eMazzanti’s considerable retail security expertise, business leaders can count on getting the protection they need.

About eMazzanti Technologies

eMazzanti’s team of trained, certified IT experts rapidly deliver retail and payment technology, digital marketing services, cloud and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring and support to increase productivity, data security and revenue growth for clients ranging from law firms to high-end global retailers.

eMazzanti has made the Inc. 5000 list eight years running, is a 2015, 2013 and 2012 Microsoft Partner of the Year, 2016 NJ Business of the Year, 5X WatchGuard Partner of the Year and one of the TOP 200 U.S. Microsoft Partners! Contact: 1-866-362-9926, info(at)emazzanti.net or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.

 Source: This article was published prweb.com

It'll be the Chrome Web Store or nothing.

If you want to install Chrome extensions, Google's Chrome Web Store soon will be the only place to get them.

Extensions -- the software that lets you do things like block ads, manage your tabs better, explore art on your new-tab page or cover your screen with doge dogs -- can be useful and fun. Unfortunately, they can also be a conduit for malware that spies on you or cryptocurrency miners that let others profit off your computer's horsepower.

To try to squelch the problems, Google is removing an ability called "inline installation," which lets websites offer an installation button so you don't have to make a detour to the Chrome Web Store to add an extension to Chrome. Google, though, concluded that the Chrome Web Store offers necessary transparency. So it began a three-phase plan on Tuesday to make the Chrome Web Store the only way to get extensions.

It's a new example of Google sacrificing openness as it tries to reckon with the abuses that openness makes possible.

Google's initial extensions plan was to let people download them from anywhere, but it backtracked and offered the inline installation from the Chrome Web Store instead. Now even that's off the list. Similarly, Google initially promised a web-like Android Play Store, where good apps would rise to the surface on their own merits, but eventually adopted an approval process similar to Apple's approach with its App Store.

Inline installation lets websites add Chrome extensions that were hosted behind the scenes at the Chrome Web Store, but Google's shutting the technology down after abuse.

Inline installation lets websites add Chrome extensions that were hosted behind the scenes at the Chrome Web Store, but Google's shutting the technology down after abuse.
Google

James Wagner, Google's extensions platform product manager, explained the decision in a blog post.

"We continue to receive large volumes of complaints from users about unwanted extensions causing their Chrome experience to change unexpectedly -- and the majority of these complaints are attributed to confusing or deceptive uses of inline installation on websites," Wagner said. "The information displayed alongside extensions in the Chrome Web Store plays a critical role in ensuring that users can make informed decisions about whether to install an extension. When installed through the Chrome Web Store, extensions are significantly less likely to be uninstalled or cause user complaints, compared to extensions installed through inline installation."

Google's extensions crackdown will take place in three phases:

First, as of Tuesday, new extensions can't be installed inline.

Second, an inline installation will be disabled for existing extensions starting Sept. 12. Websites that offer inline installations will instead send people to the Chrome Web Store page for installation

Last, extension developers will have to update their websites by early December to get rid of inline installation code and simply point people to the Chrome Web Store page. That change will be necessary because Google will remove inline installation programming support with the forthcoming Chrome 71.

 Source: This article was published cnet.com

Even though computers have become a constant feature of modern life, many people still don't realize the enormous risks that come from constant interaction with technology. 

Computer viruses are one of the oldest forms of malware — in other words, malicious software designed to do harm — but their ability to avoid detection and replicate themselves means that these programs will always be cause for worry. Understanding just what a virus can do to your computer is the first step to securing your system and protecting your family from attack.

A Computer Virus' Potential

The only real qualification for a piece of software to be labeled a "virus" is that the program has the ability to replicate itself onto other machines. This means that not all viruses pose a direct threat to your computer, but often even latent viruses will allow cyberthieves and hackers to install more damaging programs like worms and Trojans. 
Regardless of the intention of the computer virus, the program will take up some system resources while it runs. This slows down your system, even bringing your computer to an abrupt halt if the virus hogs enough resources or if there are many viruses running at the same time.

More often, the computer virus has some kind of malicious intent, either written into the virus itself or from the other pieces of malware that the virus installs. This software can take a number of harmful actions, like opening up a back door to the computer where hackers can take control of the system, or stealing confidential personal information like online banking credentials or credit card numbers. It could also direct your Web browser to unwanted, often pornographic, sites, or even lock the computer down and ask for a ransom to open it back up again. In the most severe cases, viruses can corrupt important computer files, rendering the system useless. Windows OS products are often targets of these types of vulnerabilities so be sure you're secure whether you are running the newest OS , XP, or Windows 8 - security is essential.

How to be a Savvy Computer-User

So with all the damage that a virus can do, you're sure to wonder how you can protect yourself and your family from these threats. The first step is the most obvious, and it all comes down to using your computer in a smart way. 
Ensure all your programs have the latest version of antivirus software installed. This is especially true for things like your operating system, security software and Web browser, but also holds true for just about any program that you frequently use. Viruses often take advantages of bugs or exploits in the code of these programs to propagate to new machines, and while the companies that make the programs are usually quick to fix the holes, those fixes only work if they have been downloaded to your computer. 


It's also important to avoid taking actions that could put your computer at risk. These include opening unsolicited email attachments, visiting unknown websites or downloading software from untrustworthy websites or peer-to-peer file transfer networks. To ensure that the entire family understands the risks, these procedures should be taught to everyone, and children should have their Internet use monitored to ensure they aren't visiting suspect websites or downloading random programs or files.

How to Install Virus Prevention and Detection Software

The next important step in protecting your computer and your family is to install trusted computer security software that can actively scan your system and provide virus protection. You should be warned, however, that not all security solutions are the same. 
Free antivirus software abounds on the Internet, but much of it isn't robust enough to offer complete protection or updated frequently enough to be of much use. Horrifyingly, some of this free software doesn't do anything at all and instead installs viruses, adware, spyware or Trojans when you try to download and install the program. 
If the price is a factor, the best option is to find a competitively priced Internet security solution that offers a free antivirus trial, so that you can see the software in action, and how your computer responds after being cleaned, before you make a purchasing decision. 
The hardest part about all of this is that while each day many threats are neutralized, more are then created in their place. This means that as long as there's an Internet, computer viruses will continue to be a problem. Ignoring the issue or thinking that it won't affect you is a sure way to get your computer compromised, and put your family's information or peace of mind at risk.

Source: This article was usa.kaspersky.com

Internet professional responsibility and client privacy difficulties are intimately associated with the services offered by lawyers. Electronic attorney services result in data gathering, information exchange, document transfers, enhanced communications and novel opportunities for marketing and promotion. These services, in turn, provide an array of complicated ethical issues that can present pitfalls for the uninitiated and unwary.

Since the Internet interpenetrates every aspect of the law, Internet activity can result in a grievance filed against attorneys for professional and ethical misconduct when such use results in communication failure, conflicts of interest, misrepresentation, fraud, dishonesty, missed deadlines or court appearances, advertising violations, improper billing, and funds misuse. While specific Internet privacy violation rules and regulations are rarely applied to attorney transactions, attorneys are regularly implicated in unfair and deceptive trade practices and industry-specific violations which are often interspersed with privacy violation facts.

Attorneys have a professional-responsibility duty to use the Internet, and it is that professional responsibility which results in difficulties for doing so. More specifically, the Model Rules of Professional Conduct Rule 1.1 (competence) paragraph 8 (maintenance) has been interpreted to require the use of the Internet, and Rules 7.1 – 7.5 (communications, advertising and soliciting) specifically charge attorneys with malfeasance for using the Internet improperly.

Internet professional conduct standards and model rules/commentary cross the full range of Internet-related concerns, including expert self-identification and specialty description; the correct way to structure Internet personal profiles; social media privacy settings; the importance and use of disclaimers; what constitutes “communication”; and the establishment of an attorney-client relationship. Additionally, ethics rules address “liking,” “friending” and “tagging” practices.

The application of codes of professional conduct is faced with a two-fold difficulty. First, what is the nature of the attorney Internet activity? Is the activity of publishing, broadcasting or telecommunications? Determining the nature of the attorney Internet activity is important because different privacy and ethic cannons apply. Additionally, the determination of the nature of the attorney activity allows practitioners to apply analogies. For example, guidance with respect to attorney Internet-advertising professional conduct is likely to be judged by the same standards as traditional attorney advertising.

The second difficulty is the location where activity occurs. Jurisdictions have enacted contrary laws and professional-responsibility duties.

Options for protecting client privacy and promoting professional responsibility include technical, business and legal options. Consider the following specific legal transactions.

A lawyer seeking to use the Internet to attract new clients across multiple jurisdictions frequently is confronted with inconsistent rules and regulations. A number of jurisdictions have taken the position that Internet communications are a form of advertising and thus subject to a particular state bar’s ethical restrictions. Such restrictions related to Internet content include banning testimonials; prohibitions on self-laudatory statements; disclaimers; and labeling the materials presented as advertising.

Other restrictions relate to content processing, such as requiring that advance copies of any advertising materials be submitted for review by designated bar entities prior to dissemination, and requiring that attorneys keep a copy of their website and any changes made to it for three years, along with a record of when and where the website was used. Still, other restrictions relate to distribution techniques, such as unsolicited commercial emailing (spam). Spam is considered by some states as overreaching, on the same grounds as ethical bans on in-person or telephone solicitation.

To overcome these difficulties and thus permit the responsible use of the Internet for attorney marketing, both technical and business solutions are available. The technical solution employs selectively serving advertisements to appropriate locations. For this solution, the software can be deployed to detect the origin of an Internet transaction. This software will serve up advertising based on the location of the recipient. Thus, attorneys can ameliorate or eliminate the difficulties associated with advertising and marketing restrictions without applying the most restrictive rule to every state.

Alternatively, a business solution may be used. Such a business solution would apply the most restrictive rules of each state to every Internet advertising and marketing communication.

Another legal difficulty associated with attorney Internet advertising and marketing is the unauthorized practice of law. All states have statutes or ethical rules that make it unlawful for persons to hold themselves out as attorneys or to provide legal services unless admitted and licensed to practice in that jurisdiction.

There are no reported decisions on this issue, but a handful of ethics opinions and court decisions take a restrictive view of unauthorized practice issues. For example, the court in Birbower, Montalbano, Condon & Frank v. Superior, 949 P.2d 1(1998), relied on unauthorized practice concerns in refusing to honor a fee agreement between a New York law firm and a California client for legal services provided in California, because the New York firm did not retain local counsel and its attorneys were not admitted in California.

The software can detect the origin of an Internet transaction. Thus, attorneys can ameliorate or eliminate the unauthorized practice of law by identifying the location of a potential client and only interacting with potential clients located in the state where an attorney is authorized to practice. Alternatively, an attorney could use a net nanny to prevent communications with potential clients located in the state where the attorney is not authorized to practice.

Preserving clients’ confidences is of critical importance in all aspects of an attorney’s practice. An attorney using the Internet to communicate with a client must consider the confidentiality of such communications. Using the Internet to communicate with clients on confidential matters raises a number of issues, including whether such communications: might violate the obligation to maintain client confidentiality; result in a waiver of the attorney-client privilege if intercepted by an unauthorized party; and create possible malpractice liability.

Both legal and technological solutions are available. First, memorializing informed consent is a legal solution.

Some recent ethics opinions suggest a need for caution. Iowa Opinion 96-1 states that before sending client-sensitive information over the Internet, a lawyer should either encrypt the information or obtain the client’s written acknowledgment of the risks of using this method of communication.

Substantial compliance may be a technological solution because the changing nature of Internet difficulties makes complete compliance unfeasible. Some attorneys have adopted internal measures to protect electronic client communications, including asking clients to consider alternative technologies; encrypting messages to increase security; obtaining written client authorization to use the Internet and acknowledgment of the possible risks in so doing, and exercising independent judgment about communications too sensitive to share using the Internet. While the use of such technology is not foolproof, if said use is demonstrably more significant than what is customary, judges and juries have found such efforts to be sufficient.

Finally, both legal and business options are available to surmount Internet-related client conflicts. Because of the business development potential of chat rooms, bulletin boards, and other electronic opportunities for client contact, many attorneys see the Internet as a powerful client development tool. What some fail to recognize, however, is that the very opportunity to attract new clients may be a source of unintended conflicts of interest.

Take, for example, one of the most common uses of Internet chat rooms: a request seeking advice from attorneys experienced in dealing with a particular legal problem. Attorneys have been known to prepare elaborate and highly detailed responses to such inquiries. Depending on the level and nature of the information received and the advice provided, however, attorneys may be dismayed to discover that they have inadvertently created an attorney-client relationship with the requesting party. At a minimum, given the anonymous nature of many such inquiries, they may face the embarrassment and potential client relations problem of taking a public position or providing advice contrary to the interests of an existing firm client.

An acceptable legal solution is the application of disclaimers and consents. Some operators of electronic bulletin boards and online discussion groups have tried to minimize the client conflict potential by providing disclaimers or including as part of the subscription agreement the acknowledgment that any participation in online discussions does not create an attorney-client relationship.

Alternatively, the use of limited answers would be a business solution. The Arizona State Bar recently cautioned that lawyers probably should not answer specific questions posed in chat rooms or newsgroups because of the inability to screen for potential conflicts with existing clients and the danger of disclosing confidential information.

Because the consequences of finding an attorney-client relationship are severe and may result in disqualification from representing other clients, the prudent lawyer should carefully scrutinize the nature and extent of any participation in online chat rooms and similar venues.

Source: This article was published lawjournalnewsletters.com By JONATHAN BICK

Research on aspects related your business, such as your target customer, marketplace trends, production processes, and financial practices, can help you predict trends, project sales, spot opportunities, and avoid potential problems. Understanding the nature of different types of business research will help you use data to maximize your sales and profits.

Reasons for Business Research

Business research can help you determine what potential customers want, which can guide you toward the development of better products and services. It can keep you abreast of what your competition is doing and help you spot marketplace and industry trends. Research lets you analyze how your departments are performing, and then compare their performance against projections to determine if you need to make adjustments.

Types of Business Research

Employ a variety of business research types to maximize the benefit that data can provide your company. Conduct customer surveys and focus groups of potential customers. Join your industry’s trade association to access its research studies. Perform budget variance analyses every quarter to determine if your revenue and expense projections were correct or if you need to adjust your budget. Keep tabs on the competition to determine if they’ve changed their products, where they’re advertising, what they are charging, and where they are selling. Check your website traffic data to determine who’s visiting your site, what pages they’re accessing, and which keywords bring people to your site. Sites such as Quantcast and Alexa can give you valuable data about your competitors’ website traffic.

Choosing Methodologies

Depending on your budget, you can conduct research in a variety of ways. Online surveys can provide you with quick, easy-to-understand data. Websites such as SurveyMonkey let you administer short surveys for free, charging a fee for more expansive surveys. Telephone surveys of current customers let you spend more time and solicit open-ended questions. A focus group lets you get a small group of potential or current customers together to discuss their ideas, suggestions and thoughts in ways that produce the information you might not have considered. Mail surveys cost more, but let you reach a large number of highly targeted recipients, depending on what mailing list you use. Analyzing your sales by distribution channel, territory, sales rep, price point, margin and volumes helps you determine where you should focus your marketing efforts.

Outsourcing the Work

If you aren’t expert at conducting research or don’t have the staff to perform this type of work, consider hiring a research firm to assist you. They can give you a list of options, allowing you to increase your research effort as your budget allows. Research firms have access to tools such as databases, phone banks, and email programs that you might not be able to afford, helping you gather data you otherwise couldn’t.

 Source: This article was published smallbusiness.chron.com By Sam Ashe-Edmunds

Search Engines

Search engines on the World Wide Web are remotely accessible programs that let you do keyword searches for information on the Internet. There are several types of search engines and searches may cover titles of documents, URL's, headers, or full text. Keep in mind that the results you get from one search engine may not match the results you get from another search engine. In fact, they are often different due to the way each search engine behaves. Therefore, it may actually be beneficial to use more than one search engine on a regular basis.

In this section, we briefly look at Google and Yahoo!. Web pages are often dynamic and can change at any time. As a result, you may find that if either site changes, your experience with JAWS may be different than what is described here.

Google

EXERCISE: Use the link below to go to the Google Website and follow along with the instructions.

When you first go to the Google Website there is a blinking cursor in an edit box where you can type the word or phrase that you are interested in.

Google Instant is a search enhancement that shows results as you type. It is designed to predict a person's search by updating the page and showing results while you type. It is a time-saving feature. However, because the page is changing as you type this can sometimes cause problems for screen reader users. You may find a link on the page that reads "Screen reader users, click here to turn off Google Instant." If you choose this link it makes your searches using a screen reader much easier.

To change your preferences for Google you can do the following:

  1. Press INSERT+F7 to open the JAWS list of links.
  2. Choose the link Options, and then press ENTER. A links submenu opens on the Google site.
  3. Press DOWN ARROW to move to the link Search Settings, and then press ENTER.
  4. Beneath the heading Google Instant predictions is an On/Off slider bar. At the time of this writing, it does not read well with JAWS. Press ENTER on it to go into forms mode.
  5. Press DOWN ARROW on this slider bar to turn the feature off.
  6. Press NUM PAD PLUS to get out of forms mode.
  7. Press B to move to the Save button at the bottom of the page, and then activate it by pressing ENTER.

To begin searching, for users of JAWS prior to version 10.0, the first thing you need to do is press the ENTER key to go into Forms Mode with JAWS. Once you are in Forms Mode, you can then type in keywords that will define your search.

If you are using JAWS 10.0 or later, forms mode comes on automatically when you get to a Web page which has the focus set to a blinking cursor in an edit box. If for some reason forms mode does not come on automatically on your computer, you can also press ENTER to go into forms mode, or you can press INSERT+F5 to open the Select a Form Field dialog box for JAWS.

MAGic Tip: MAGic users, just click into any edit box and forms mode comes on automatically for you.

JAWS Tip: New since JAWS 10, JAWS users who use a mouse can also click into edit boxes and forms mode comes on automatically.

After you have typed in some text, press ENTER to activate the Search button.

Google only returns Web pages that contain all of the words in your query. If you find that you get too many "hits" or Web pages that match your search, you can enter more words in your search query to narrow the choices.

Using good keywords gives you better results. Be as specific as you can. For example, a search for the keyword "musicians" will yield far more results than a search for the keywords "Elvis Presley." You do not need to include "and" between terms, but the order in which you type your keywords will affect the search results. You can also search for a specific phrase by including words in quotation marks. Google searches are not case sensitive.

You can also use the following items within your keywords for Google searches:

  • - (minus) sign. Causes Google to exclude a word from your search. For example, "JAWS" can refer to a screen reading software or a famous movie. You can exclude many of the movie-related hits by searching for "JAWS -movie." (Be sure to include a space before the minus sign and no spaces between the minus sign and the word "movie.") Searches for JAWS with different conditions yielded the following results:
    • JAWS, about 50,600,000 hits
    • JAWS windows -movie, about 8,600,000 hits
    • "JAWS screen reader" (in quotes) about 62,000

As you narrow your search and use better keywords, you get more relevant results.

  • Putting a phrase into quotes tells Google to look for the exact words in that exact order.
  • You can search for something within a specific website by typing the word or phrase followed by site:FreedomScientific.com (where the dot-com changes to whatever site you are searching.

The I'm Feeling Lucky™ button takes you directly to the first Web page Google returned for your query. You will not see the other search results at all. For example, to find the home page for Stanford University, simply enter "Stanford" into the search box and choose the I'm Feeling Lucky™ button. Google takes you directly to www.stanford.edu, the official homepage of Stanford University.

Try typing different things such as names, phone numbers, and more to find people or things.

Try a search for Freedom Scientific. Use this link to go to the Google Web site. On the results page, there are a couple of things you can do to get more information about the results of the search:

  • The statistics of your search are typically placed between the search edit box and the search results. You can press DOWN ARROW a few times to find this line, or you can use the JAWS find command CTRL+F to look for the word "Results," and then read that line. For example, when testing this, the search found, "About 86,400,000 for freedom scientific. (0.22 seconds)." This can be useful if you need to narrow the search.
  • Google uses a "main" region to guide you to the search results. You can press R to move from one region to another.
  • The items found as a result of your search are placed on the page as both links and headings. You can press the navigation quick key H to move quickly among the headings that match your search. Since they are also links, you can press ENTER to activate them and move to those Web pages of interest.
  • Below each heading (and link) that match your search is a short synopsis of what that page is about. After pressing H to move to a heading (link), just press DOWN ARROW to read the text below it for more information.
  • Remember, you can also press SHIFT+H to move backward.
  • There is also a good structure to the headings. The heading level one on the page is the Google logo and link that will take you back to the main Google page. The search results begin to be listed after a heading level two. The matches found for the search are all level three headings.

EXERCISE: Google uses regions to make navigation easier. Explore them by pressing R to move from region to region, and then press DOWN ARROW to move into the next section.

You can also read through the search results page using normal reading keys or use INSERT+F7 to open the list of links and see what related links were found. Use the Move to Link button in the links list ALT+M) to move to a particular link and then down arrow through the associated text to find out if this might be what you are looking for.

In addition to the information displayed on the initial results page, there are often links to more pages of information that meet your search criteria. These pages are reached by activating the link for the number of the page. Usually, you will find links for additional pages 2 through 10 near the bottom of each page. Each page beyond the first page also contains a number of items that match your search.

NOTE: Look for a region called "content information" to move to these links quickly.

Google Search Tools

Google also provides easy-to-use search tools. For example:

  • "Weather Chicago" yields the current weather in Chicago
  • "25 kilometers in miles" convert kilometers to miles
  • "Define screen magnification" yields definitions for screen magnification
  • "Seafood restaurants 33716" yields restaurants that serve seafood in or near that zip code
  • And so on...

NOTE: For both the Google Website and the Yahoo! Website discussed in the next section, be sure to check out the other links on their sites for Advanced Search, Help topics, and more.

Yahoo!.com

Yahoo! is another search engine that many people use. The main Yahoo! the page also has more information on it, such as sports and news headlines, entertainment links, and links to many other items. This tends to cause the page to appear more cluttered than the Google site but may prove itself useful to you as well. As with Google, when you first go to the Yahoo! Website there is a blinking cursor in an edit box.

For users of JAWS prior to version 10.0, the first thing you need to do is press the ENTER key to go into Forms Mode with JAWS. Once you are in Forms Mode, you can then type in keywords that will define your search.

If you are using JAWS 10.0 or later, forms mode comes on automatically when you get to a Web page which has the focus set to a blinking cursor in an edit box. If for some reason forms mode does not come on automatically on your computer, you can also press ENTER to go into forms mode, or you can press INSERT+F5 to open the Select a Form Field dialog box for JAWS.

MAGic Tip: MAGic users, just click into any edit box, and forms mode comes on automatically for you.

JAWS Tip: New since JAWS 10, JAWS users who use a mouse can also click into edit boxes and forms mode comes on automatically.

After you have typed in some text, press ENTER to activate the Search button.

Yahoo! behaves very much the same way as Google and displays a list of hits of matching items. These are links to further resources, and each link here also has a text description taken from that source that matches your query.

After a Yahoo! results page loads, press the letter H to move to the different headings on the page. Below the heading Search Results, you find the main links that match your search. Each contains a short text synopsis below it and a link for a cached version. Since the headings are also links, pressing ENTER on one takes you to the Web page indicated. Beneath each heading/link is text that describes a little bit about that page. Press INSERT+F7 to use the list of links to explore the links, or you can also press TAB to move from one link to another.

NOTE: Yahoo now also uses regions on search results pages. Look for the "main" region to guide you directly to the search results area.

To find the number of matches, use the JAWS Find and look for the word "results" without the quotes. You should hear something like the following: "50,300,911 results."

Yahoo! also has links to other results pages, just as Google does. These links show as numbers 2 through 10 and are located near the bottom of the page.

Going Beyond the Search Engine Results Page

OK, so what happens when you choose one of the links you find on a search engine page? What strategies do you use to find the information you were initially searching for on the resulting page?

ANSWER: All of the strategies you learned in this series of Surf's Up lessons, including:

  • Use N to jump past a series of links to move to the next block of text that has at least 25 characters without a link.
  • Use the list of links (INSERT+F7) to look for links that begin with specific words.
  • Use the list of headings (INSERT+F6) to look for structure in the headings on a page.
  • Use the JAWS Find to search for words or phrases on a Web page.
  • Look for regions.
  • Use the Adjust JAWS Options list to change things as needed such as:
    • Stoppage refreshes
    • Search for attributes, acronyms, abbreviations, and more.
  • Use the Custom Label feature of JAWS to label unlabeled links or unlabeled form fields on pages that you visit often.

Read More...

Source: This article was published freedomscientific.com

Co-authored by Lakshmi, a Mobicip blogger who is just as passionately opinionated about the juxtaposition of technology, parenting, and education.

There are some basic ethical values that transcend the mélange of cultures and peoples sizzling in the melting pot of the Internet, and many of the maxims that define human society hold good, perhaps even more so, in the virtual world. “Thou shall not steal,” “Do unto others as you would have them do unto you,” and the mizaru, kikazaru, iwazaru apes that see, hear and speak no evil are three specific truths apt to this environment.

“Thou shall not steal” is a much clearer concept in the real world than in the virtual world. This is obvious; the real world deals with physical objects. It is easy to teach a child that stealing other people’s pencils, crayons — “stuff” — is unacceptable and, more importantly punishable. But in the online world, the idea of stealing becomes murky because there are no physical objects to steal. It is often not even clear what constitutes theft. 62 percent of online users were unaware of the legal status of movies, music, games or books they had downloaded. To complicate matters, the idea of punishments in online theft is vague - there are no virtual corners in which your child can be made to stand for downloading a movie without paying for it. A child must be taught that pirating is, as the name suggests, theft, although not quite as romantic as Hollywood makes it out to be, and is very much like walking into a video store and pocketing a DVD in stealth.

Pirate downloads are the more obvious of thefts. What is more subtle and almost invisible is theft of ideas and words. With the Internet becoming the veritable repository of almost all known human knowledge, A verbatim copy of a professional document, with claims of it being one’s own, starts with school homework reports copy-pasted from Wikipedia. Ctrl C, Ctrl V are probably the most widely misused shortcut keys in the history of the PC. Given the enormity of information available online, it is next to impossible to trace the theft without proper tools, but that does not legitimize it. Just as the child is taught that copying in an exam is wrong, she must also be taught the inconsonance of mindless copy-pasting of stuff from the net. It is also important to teach the child to offer credit where it is due, and the idea of referencing someone else’s work must be taught early on. This little lesson on acknowledgment is applicable to the big picture of life as well.

A child learns early, and sometimes painfully, that doing unto others what she does not want to be done unto her is not a wise move in the real world. However, the cushion of anonymity offered by Internet obviates this reciprocity clause. While the medium is virtual, its effect on reality is indubitable. The Internet allows us to live and interact across extensive physical spaces with no boundaries. Thus, while in the past, we shared our life with those geographically close to us, we are now part of, pardon the cliché, the Global Village, with unknown faces peeking into our lives.

While in the physical world, people who affected us were largely friends and family, in the online spaces that we inhabit, those who affect us are often people that we repeatedly observe without direct interactions —Stanley Milgram’s concept of Familiar Strangers could never be a better fit anywhere else. Thus, our ethics and belief systems are readily influenced by the strangers we “meet” online and in turn, we influence faceless people in ways we could not imagine. Anyone with a blog would have experienced at least once, trolls who topple their emotional balance. Contrary to the popular lore that words, unlike sticks and stones, need never hurt, they do, and this sentiment must be instilled in the child. Cyberbullying and anonymous harassment are actually crimes punishable by law, and the child must be aware of this, but beyond law enforcement, it is a basic human courtesy to “be nice” to people both on and off-line.

Of the three apes, the mizaru, the one that sees no evil, was probably created just for the Internet, either by fluke or with really far-sighted vision. The Internet is like a knife that can be used to cut that apple that keeps the doctor at bay or to inflict pain. The choice is not easy, even for an adult; it is hardly surprising that the child needs mentoring to use and not abuse the net. The net is the source of knowledge (if not wisdom), but not all knowledge is good. While we are still a long way from being consumed by “all the knowledge”, like Irina Spalko, age-inappropriate information can cause just as much damage to the child’s psych. The “good touch bad touch” talk to every child must necessarily be accompanied by the “good site, bad site” advice.

There are no generalized censors in the Internet, just as in real life. That, however, does not justify anarchy. While customs, beliefs and ethical laws may vary across geographic boundaries, there are some universal truths that are essential for order and balance. It is up to us to use the right tools and techniques to instill such a balance in our children.

Source: This article was published huffingtonpost.com By Suren Ramasubbu

Buffer has just released its State of Social 2018 report. It is based on interviews with over 1,700 social media marketers.  The use of live video is growing year over year. The report features insights into why some social media managers reported success with live videos while others did not.

Live Video is a Growing Trend

Publishing the live video on social media platforms is not mainstream. However, the practice is growing. This is what Buffer says about it:

Live video hasn’t yet caught on (only 31 percent of marketers have broadcast live video)

In our last State of Social report, 26 percent of marketers said they had created live video content. In 2017, 31 percent of marketers said they had broadcast live content—just a 5 percent increase…

While a 5% increase may not sound like much of an increase, that’s still an upward trend. This is a new way of communicating with customers and potential customers, but the evidence is that it is becoming more and more mainstream.

How Effective is Live Video?

According to Facebook, live video is six times more effective at generating interactions than non-live videos. Buffer’s 2018 State of Social Report indicates that of those who used live videos 60% reported they found them effective, while only 10% found live videos ineffective. That’s a remarkable statistic.

That feedback doesn’t tell the whole story, however. If you dig down into the data and count up how effective live video was, you get a different picture.

As you can see, of those 60% that found live video effective, the majority, 36%, found it to be somewhat effective, while only 24% found it to be very effective. This may be a normal distribution of success as in any marketing activity. It could also be a reflection that live videos are more appropriate for certain industries than others.

Why is Live Video Ineffective for Some?

Of the 10% who reported who reported that live video was ineffective, fully 92% of them indicated that they only rarely used live video as part of their social media strategy. Social media managers who reported a lack of success were using live videos only once every few months. That might indicate that those who found it ineffective weren’t putting much effort into live videos.

How Often Should Live Videos be Published?

While 55% of those who found success published live videos on a regular basis, 45% of those who found success published live videos every few months. However, if we break down those numbers by daily, weekly, etc. we get a different picture entirely. It turns out that only 1% of successful live video creators published videos on a daily basis. Below is a graph showing that the biggest group of successful publishers are actually those who published live videos every few months.  Below is a graph showing the breakdown of how often live videos were published by those who reported that live videos were effective.

Quality not Quantity of Live Videos?

What separates those who found success posting live videos every few months versus those who posted at a similar frequency but found them ineffective? The survey doesn’t tell us. One can guess however that the relevance to users and effective promotion may have something to do with the success of those who posted live videos every few months.

The takeaway is that how often live videos are posted isn’t a guarantee of success.  Like anything else, the quality and relevance to the audience may play a role. It may be that success with live videos may be similar to pay per click advertising, where context, relevance and answering the question of “What’s in it for me?” works best.

The full State of Social 2018 report can be downloaded here as a Google Sheet.

Images by Shutterstock, modified by Author

Graphs and bar charts by Author

 Source: This article was published searchenginejournal.com By Roger Montti

What would you do if your most private information was suddenly available online, for anyone to see? Just imagine: picturesvideos, financial information, emails...all accessible without your knowledge or consent to anyone who cares to look for it.  We've probably all seen news items come out about various celebrities and political figures who have been less careful than they should be with information that was not meant for public consumption.

Without proper oversight of this sensitive information, it can become available to anyone with an Internet connection.

Keeping information safe and protected online is a growing concern for many people, not just political figures and celebrities. It's smart to consider what privacy precautions you might have in place for your own personal information: financial, legal, and personal. In this article, we're going to go over five practical ways you can start protecting your privacy while online to guard yourself against any potential leaks, avoid embarrassment, and keep your information safe and secure.

Create Unique Passwords and Usernames for Each Online Service

Many people use the same usernames and passwords across all their online services. After all, there are so many, and it can be difficult to keep track of a different login and password for all of them. If you're looking for a way to generate and keep track of multiple secure passwords, KeePass is a good option, plus it's free: "KeePass is a free open source password manager, which helps you to manage your passwords in a secure way.

You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish)."

Don't Assume Services are Safeguarding Your Information

Online storage sites such as DropBox do a pretty good job of keeping your information safe and secure. However, if you're concerned that what you're uploading is especially sensitive, you should encrypt it - services like BoxCryptor will do that for you for free (tiered pricing levels do apply).

Be Careful Sharing Information Online

We're asked to fill out forms or log into a new service all the time on the Web. What is all this information used for? Companies make a lot of money analyzing and using the data that we are freely giving them. If you'd like to stay a little bit more private, you can use BugMeNot to avoid filling out unnecessary forms that ask for too much personal information and keep it for other uses.

Never Give Out Private Information

We should all know by now that giving out personal information (name, address, phone number, etc.) is a big no-no online. However, many people don't realize that the information that they are posting on forums and message boards and social media platforms can be put together piece by piece to create a complete picture. This practice is called "doxxing", and is becoming more of a problem, especially since many people use the same username across all of their online services.

In order to avoid this happening, be extremely cautious in how much information you're giving out, and make sure you don't use the same username across services (see the first paragraph in this article for a quick review!).

Log Out of Sites Often

Here's a scenario that happens all too often: John decides to take a break at work, and during that time, he decides to check his bank balance. He gets distracted and leaves the bank balance page up on his computer, leaving secure information out for anyone to see and use. This kind of thing happens all the time: financial information, social media logins, email, etc.

can all be compromised extremely easily. The best practice is to make sure you're on a secure computer (not public or work) when you're looking at personal information, and to log out of any site you might be using on a public computer so that other people who have access to that computer will not be able to access your information. 

Prioritize Online Privacy

Let's face it: while we'd like to think that everyone we come in contact with has our best interests at heart, this is sadly not always the case — and especially applies when we're online. Use the tips in this article to protect yourself from unwanted leaks of your personal information on the web. 

Source: This article was published lifewire.com By Jerri Collins

Google advanced search lets you cut through internet clutter – and there’s no shortage of clutter on the internet – to zero in on exactly the search results you are looking for.

Google advanced search has applications for web users of all stripes, and especially for ecommerce entrepreneurs: Simple google search tricks make it easier to identify opportunities, scope out competitors, and understand how Google (and Google users) sees your store.

After all, you don’t always want Google to give you 5,010,371 pages to choose from. Sometimes you want to know something precise. For example, which websites are linking to your store. Or how easy it is to find products in your store. Or what your competitors are selling.

Now, not all advanced Google searches are relevant for ecommerce. For example, Google Search’s nifty “timer” feature – which opens up a timer if you type something like “15 minutes timer” – probably isn’t going to help you scale. But there are a number of Google advanced searches that will turn Google Search into your personal market research lab.

This post will go over the most useful advanced Google search features, and look at how you can use them to optimize your ecommerce business.

What is Google Advanced Search?

Google advanced search is a way to customize your Google searches with a set of special instructions. Known as operators and commands, these advanced Google search instructions tell Google that you don’t want to search the entire internet, front to back and top to bottom, and are instead interested in more specific queries.

Your parents probably wouldn’t ever use advanced Google search. A couple reasons why. First off, the commands that you have to feed Google are simple but not necessarily obvious; it would be hard to guess Google advanced search commands. Second, your parents probably wouldn’t need to use advanced Google search. These searches are designed to run very specific, particular queries.

This might all make more sense once we look at some examples, so let’s dive in.

Exact Search

What it is: Exact search is the most basic advanced Google search. (Your parents actually probably could pull this one off.) All you’re doing with this Google search trick is putting quotation marks around your search terms. This tells Google that you want results for exactly what’s inside the quotes. Google is already pretty good at mind-reading, but these quotes let you remove any confusion and ensure the most relevant results.

When to use it: Use this advanced Google search when you only want results that contain a precise phrase.

What it looks like:

Exact search in Google

OR Search

What it is: Using OR (it has to be upper-case!) lets you search for multiple separate search terms. Unlike the exact search, which narrows your results, this advanced Google search broadens your query to bring you more results.

When to use it: There are a couple scenarios where you might want to use this Google advanced search. First, it is great for when you are looking for information that might be found with multiple search terms, like “french press” and “cafetiere”. It’s also good if you don’t know the best phrase to find the info the info you’re looking for.

NOTE: If the OR isn’t upper-case, then Google might think you’re trying to figure out a linguistic question, like whether you should use towards or toward. This will bring up results explaining how British English and American English differ. So remember – OR!

An

Exclusion Search

What it is: This advanced Google search lets you exclude certain items from your search results. It’s like ordering a cheeseburger and telling the chef to hold the ketchup. This way you can conduct an internet-wide search but ignore results containing your excluded terms.

When to use it: This Google search trick is great for when a word has multiple meanings. If you want browse plants on Amazon, for instance, and don’t want Google to think that you are researching ecological diversity in the Amazon rainforest, then this is the Google advanced search to use.

Exclusion search on Google

Site Search

What it is: This is an advanced Google search that lets you zero in on a specific website or domain. With site search, you are telling Google that you don’t want to search the entire web, but instead just a particular site.

When to use it: This is an awesome Google advanced search trick with multiple applications. Ecommerce entrepreneurs can use it to scope out competitors’ websites. Let’s say you’re in the yoga niche, and you want to know if your competitors over at yogastuff.com are selling a certain item. You can tell Google to search only that competitor’s website. You can also use this Google search trick to look for certain words and phrases on your own site. This is especially helpful if you want to search for potential duplicate products or content.

What it looks like:

Site search with Google advanced search

NOTE: Oh! This Google search trick has an opposite – instead of typing site:yogastuff.com, you type -site:yogastuff.com. Then you’ll be searching the entire web with the exception of that one site.

Related Search

What it is: The related search advanced Google search lets you find websites that are similar to one another. When you do a related search, Google will spit out results for sites that are in the same ballpark as the one you have singled out.

When to use it: For ecommerce aficionados, related search is perfect for scoping out competition. You can plug in your site to a related search, and then Google will automatically pull up other sites on the web that are similar. This would let you do some market research on the products they are selling, prices, and more.

What it looks like:

Related search in Google

Price search

What it is: Price search is an advanced Google search command that lets you tell Google to find a specific product at a specific price. So instead of going to an online store to look for something, you can use Google to search the entirety of the web. You just type in a product, followed by a price (use a dollar sign to specify that you’re looking for a price).

When to use it: As an ecommerce store owner, you can use this Google advanced search to see how products in your niche are priced. If you are in the pet niche and you want to add a dog sweater to your store, then use the price search to find a range for dog sweater prices around the web.

What it looks like:

Price search with Google

NOTE: There’s a hack you can add to this advanced Google search: Make it a price range instead of an exact price. This price range Google search trick lets you dig a little deeper as you investigate how to price your products. To use a range instead of an exact number, simply add two periods between the prices in your price range. Like so: dog sweater $13..$17.

Link Search

What it is: Unlike a normal search, where Google scours the web for certain terms, link search is an advanced Google search for finding links between websites. If any website links to the site in your search, you’ll see it in the search results.

When to use it: Use this advanced Google search when you want Google to know that you’re not interested in content, but rather the links contained within that content. So if you want to know, for example, which websites are linking to your website, use link search. You might also use it to look at which websites are linking to your competition so that you can reach out and get a link of your own.

What it looks like:

A link search with Google

 All In Text, and All In URL

What it is: We’re lumping these three advanced Google search tricks together because they perform the same function – just on different parts of the page.

All in title lets you track down pages that have a specific set of words in the title, and discard pages that don’t have the magical text in the title. All in-text does the same, but instead of scanning titles, it’s an advanced Google search that scans the text of posts and pages. Finally, all in URL lets you-you guessed it. You can find pages that have certain terms in the URL.

When to use it: These advanced Google search tricks are awesome for determining the most common phrasing that your competition uses for certain products. You could try to outrank them on those same phrases, or you could combine advanced Google search results with keyword research to identify low-hanging fruit. For example, if you sell smartphone accessories, and you notice that there are thousands of titles, pages, and URLs that contain “smartphone case” but very few that contain “smartphone holder,” you might have just identified a micro-niche that is underserved.

What it looks like: (“allintitle” can be swapped out for “allintext” and “allinurl”)

The

NOTE: You can ditch the “all” in any of these advanced Google searches to combine search queries. For example, if you want to know whether “durable” is a big selling point for other stores selling iPhone cases, you could do a search like this: iphone cases intext:durable. That would give you a Google search for iPhone cases, and limit things to iPhone cases that are described in the text as being durable. You could do the same search but use intitle instead of intext, showing you which iPhone case providers think durability is important enough to mention in the title of a page.

Autocomplete

What it is: Autocomplete – yes, that same autocomplete that we use to find song lyrics and movie titles – can be used as part of your advanced Google search arsenal. Google knows which terms and phrases people use in combination, and will fill in the blanks whether you are looking for elusive words to an early-90s chorus or doing market research for your ecommerce store.

When to use it: Ecommerce merchants can use autocomplete for a variety of functions. For example, you can compare products; determine which products often appear together; and figure out the keywords and phrases that Google most commonly associates with your products.

What it looks like:

Autocomplete results from Google

Google offering suggestions to complete a search

Missing Words

What it is: This is a more formal way of doing the same sort of thing that you’d do with autocomplete. Instead of starting a search query and then letting Google suggest ways to finish it, you tell Google exactly which piece of the puzzle you’re missing.

When to use it: If you want Google to fill in a blank for you, then you’ll want to use the missing words advanced Google search. This Google search trick is often used to finish a phrase. For example, cry over * milk.

What it looks like:

Google search with missing word

Bonus! Funny Google Advanced Searches

Before we wrap things up, here are three goofy Google search tricks that will help you kill a minute or two.

Google “do a barrel roll” and the Google search page will literally spin in a circle.

Google “google in 1998” to see what Google search looked like a decade ago.

Google “define anagram” – which is a word or phrase created by moving around the letters from different words or phrases – and Google will ask, “Did you mean: nerd fame again”. Get it?

Source: This article was published oberlo.com By David Vranicar

Page 1 of 29
Newsletter

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.
Internet research courses

airs logo

AIRS is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Subscribe to AIRS Newsletter

Receive Great tips via email, enter your email to Subscribe.
Please wait

Follow Us on Social Media