Addicted to Technology?

Image courtesy of David Castillo Dominici /

Image courtesy of David Castillo Dominici /

By Karen Hendricks

We use the word “addicted” in association with drugs, alcohol, cigarettes, coffee (caffeine) and—sometimes in a teasing way—decadent foods like chocolate. But do you think it’s possible to become addicted to technology?

More and more research is pointing in that direction, saying that we are impulsively checking our phones and other devices as soon as emails “ping” into our inboxes or texts light up our screens. What do you think? Are there times when you feel addicted? Do you ever feel as though your children or spouse are “too connected?” Do you have rules or boundaries set for phone usage in your house?

I brought up this topic over the dinner table a few nights ago. Yes, we try to have dinner together as a family every night… it’s not always possible with sports schedules and other activities, but the majority of the time, we are successful! I think it’s one of the keys to family communication and connectedness. It’s also a sacred time, meaning that devices are not allowed at the dinner table. Rarely, there are exceptions, such as when my husband gets an emergency call from his phone service… or when we’re expecting a call from our college age daughter… but face-to-face dinner conversation is more important.

So, over dinner, we talked about Sundays and how they are probably the day when we use phones and devices (iPods, Kindles, etc.) the least. Sundays have a family feel to them, with our day typically beginning at church, progressing into our Sunday noontime tradition—brunch—usually with pancakes or waffles, and always bacon. Always. Afternoons are spent getting together with friends, watching sports together on TV, catching up on homework, doing fun projects around the house, taking walks or bike rides around our neighborhood, cooking Sunday dinners or baking special treats. It’s a day to recharge our batteries, but unplug from devices.

We don’t have a strict rule about phone or device use on Sundays, but we talked about how it’s just kind of evolved that way. And for that I am grateful. I cherish Sundays for their enriching family moments and want to preserve and protect these special days. Being unplugged allows us to unwind and reconnect with each other in some of the most binding ways: talking, sharing, laughing, touching, hugging and… loving each other.

Tell me what you think… I’d love to hear about your strategies and tips for keeping phone/device use in check. Feel free to leave a comment below!

Preserving Old Scrapbooks: Taking your grandmother’s baby pictures into their next century

SCAN Venetian Alley

By Chris Little

My great-grandmother Ethel was an intermittently devoted scrapbooker—in high school she clipped and saved newspaper articles detailing school activities and local events she’d attended. In the early years of her marriage she created beautiful scrapbooks of her honeymoon trip to Europe and her children’s infancies and childhoods.

SCAN Amalfi Coast

Today these scrapbooks are more than a century old! They’re in pretty good shape, but they won’t always be. I have been at a loss as to how to preserve them—what’s the best way to store them? And what about acids in the paper pages—were they slowly destroying the photographs? Meanwhile, I’d like to make good digital copies of the old photographs to preserve them—but the scrapbook pages are bigger than my scanner bed. Should I disassemble the scrapbooks, scan the images, and then reassemble them in archival-quality albums? That sounds like a risky proposition, and I’d lose all of Ethel’s charming inscriptions.


Enter my new Flip-Pal mobile scanner! Battery-operated and completely portable, the scanner is set up so that I can just place it over the scrapbook page (or the old family Bible record page, or any document I can’t drop onto my full-size scanner bed), press a button, and scan the image to an SD memory card for upload to my hard drive later.

The scanner’s software even digitally “stitches together” multiple images of a large scrapbook page into one image. Below are six scans I quickly took of one page as an example:

SCAN upper left SCAN upper right SCAN middle left SCAN center center SCAN lower right SCAN lower left

And here’s the final digitally “stitched” version of a scrapbook page my great-grandmother made celebrating the birth of her daughter, my grandmother:

scrapbook page

Yes, that top left corner is a little tight. When I do this for real I’ll loosen the string binding so I can get a better scan of each corner. Still, pretty awesome! So the Flip-Pal will take care of digitally preserving Ethel’s scrapbooks. But what about preserving the scrapbook itself?

Old scrapbooks are tricky because they typically contain so many different types of materials—everything from newspaper clippings to hair ribbons to pressed-flower corsages. These materials each have their own storage requirements, and some of them, like newspaper, are highly acidic and therefore can damage other materials in the scrapbook. And then there’s the glue, tape, and other adhesives that also can be hard on the items they affix to the scrapbook. Even worse, the paper pages of the scrapbook itself can be destructively acidic.

Storage. The key to stewarding old scrapbooks into their second century is keeping them cool, dark, and dry—no more than 65 degrees and 40 percent humidity. Temperature and humidity fluctuations cause scrapbook contents to absorb moisture and expand, then dry out and contract—increasing damage to bindings, adhesives, and the materials themselves. For this reason, beware of keeping your old scrapbooks in damp basements or attics with poor insulation. I just moved all of my great-grandmother’s scrapbooks to the guest room closet—it’s dark, cooler than the other rooms in the house, but pretty much stays the same temperature all year. It’s not perfect, but it’s the best I’ve got.

Rehabilitation? I’m pretty sure my great-grandmother’s scrapbooks are constructed of paper boiling with acid that’s slowly eating away at her photographs. My first impulse on discovering them was to deconstruct them and rearrange their contents into nice new bindings, on archival paper, with inscriptions copied in acid-free ink. The National Archives, however, cautions against doing that in most cases—and never before making good-quality photocopies or scans of each page. It turns out that the old black-paper scrapbook albums aren’t all that bad, and even disassembling those old self-stick albums we used to use can be tricky. The key here is to proceed with caution, and only after researching the alternatives. Sometimes the best way to preserve an old scrapbook is just to store it safely.

Want to learn more? Happily, there are many, many resources out there. For instance, the National Archives provides excellent guidance on preserving all kinds of family artifacts. The Library of Congress offers information on caring for and storing old photographs. And the Smithsonian Institute even provides a list of purveyors of archiving supplies! So do some reading and equip yourself to preserve your valuable family artifacts for your children and grandchildren. Then tell us about them!

Keeping Your Family Safe, Online: Avoiding CryptoLocker is Key


Image courtesy of scottchan /

Brrr… it sure is cold out there! Well, at least for those of us who live in states where this winter has been particularly harsh. For those of us (like me!) who are not snow bunnies, venturing out into these frigid temperatures is not appealing. Whereas there are many worthwhile indoor activities, many people find themselves spending more time watching television, playing video games, or trolling the World Wide Web.

Cybercrime: Online Thieves Hit Target 

Given that computers are such an integral part of our lives, this is a good time to take a look at how secure your computer and its contents really are. Many of us have received exaggerated emails, forwarded by friends or family, warning of the latest computer virus. Although such dramatic occurrences do not happen on a regular basis, viruses and other kinds of cybercrime do indeed happen. In mid-December, Target learned that criminals forced their way into their systems and took guest information, including debit and credit card data; as well as the names, mailing addresses, phone numbers and email addresses of their customers. Some of you may have been affected by this serious breach of security as my family was through our online account.

The Buzz About CryptoLocker

No matter what concern you have about your personal information or data, the time to protect your computer is before it is infiltrated. There is no such thing as too much protection or backup for your computer, documents, and email. Recently, there has been a lot of buzz about a type of “ransom ware” called CryptoLocker Trojan. Yet according to technology experts, CryptoLocker Trojan is only an evolution of “ransom ware,” as this type of crime ware can be traced back as far as 1989. Although CryptoLocker, which first appeared in early 2013, is not a revolutionary new ransom ware, it has generated more attention than any of its predecessors. It has built upon similar previous ransom ware programs, yet used new tactics and techniques to extort money from users.

Ransom ware is a type of malware that encrypts files on the system’s hard drive, or restricts access to an infected computer system – demanding that a “ransom” be paid to the creator of the malware for the restriction to be removed, and files decrypted, so they can once again be opened. Referred to as “scare ware,” sometimes the messages displayed on a user’s computer screen can be quite threatening and are intended to be so – intimidating or scaring the user into paying.

Ransomware 2

Ransom Ware: The Dirty Details

Details of how ransom ware typically works to infect a computer system are disturbing. Ransom ware often enters a computer system when a user clicks on a questionable website or email/attachment, downloads an infected file, or has an unprotected network. It then multiplies as a trojan or conventional computer worm and runs a payload such as one that will begin to encrypt personal files on the hard drive. The ransom ware payloads then display notices that appear to have come from legitimate companies or law enforcement agencies, including the FBI. The notices falsely claim that the system has been used for illegal activities or contains illegal content – for example pornography, and pirated software or media. Some ransom ware payloads even imitate Windows XP’s product activation notices, falsely stating that the user’s computer Windows installation is counterfeit or needs to be reactivated to work effectively. In some cases, the virus uses your webcam to take a picture of you and display it back – even more frightening!

Through a complex system called public-key cryptography, only the malware writer knows the needed private decryption key to lift the “restrictions.” In a common scenario, the cyber-criminals tell you your computer will be permanently locked, or you may even be arrested, if you don’t pay a $200 fine. The ransom ware will demand payment and threaten to delete the “private key” if payment is not received within 3 days. Sometimes ransom prices can reach into four figures. Users must pay to obtain the private key and begin decrypting files, which computer analysts have said is very difficult to repair due to the extremely large key size CryptoLocker uses. It may even be impossible to remove if it locks up your PC.

Virus Alert: Green Dot Moneypack 

A frightening example of this form of scare ware was presented in an article by John Matarese, published on the website SearchSecurity as part of the “Don’t Waste Your Money” series. As a woman sat down at her PC early last year, an unknown web page with the FBI logo appeared on her screen – along with an alert stating that she had visited an illegal website. Therefore, she was being locked out of her web access until she paid a $200 fine through a Green Dot Money Pack card.

What aroused her suspicion, though, is the mode by which the “FBI” wanted payment delivered – through a reloadable debit card from a drugstore. It was then that she knew this was online extortion at its worst. Fortunately, the woman and her husband were able to Google search on their smartphones for a way to remove what is being called the “FBI Green Dot Moneypack Virus.”

Ransomware 1

Recovering from a Computer Virus

Although this couple was fortunate they were able to conduct a self-clean, system restore on their own, this is not always the case in such ransom ware situations. If this happens to you, do not touch your computer or manipulate it in any way until you have searched on another computer for the fix. Better yet, call a computer repair shop for assistance from a trained expert. It is reported by security experts that removing CryptoLocker now requires a full wipe of your hard drive and, therefore, losing all your files.

Stories such as this one remind us that it is very important to be absolutely sure of the email, attachment, downloadable file, or website source with which you are about to interact. It takes just one wrong click to wipe out scores of valuable personal and business data from your computer system. CryptoLocker can even search for files to encrypt on USB sticks and shared network drives. CryptoLocker’s encryption capabilities are much more sophisticated than previous versions of ransom ware and therefore more difficult, if not impossible, to repair and restore.

Any email or online notice from the government is a scam, especially if it does not include your name in the notice. That is not how government agencies such as the FBI or IRS operate. They will not email you or post notices on your computer screen accusing you of wrongdoing, violating laws, or committing a crime. Rather, they will write – or even show up at your door!

Tips to Share with Your Family and Friends:

• Never wire money or pay by Pay Pal, Green Dot card, or any other payment method to a threat.
• Never open strange, unexpected attachments to any email you receive.
• Put protective measures in place on your computer system to avoid any form of ransom ware or malware in the first place.
• Conduct regular computer system backups.
• Use a reputable technology company to protect your computers through security-based programming.
• Add another layer of authentication to sensitive files, or encrypt and password-protect them.

Businesses usually have protective security measures and defenses in place, including robust spam filters, attachment blocking and multiple layers of security. These type of ransom ware viruses are actually a greater threat to the everyday PC user – to consumers, since often they don’t have those kinds of protection tools. Unfortunately, users facing CryptoLocker likely have few options for successful restoration of their files. While the malware itself can be relatively easily scrubbed from the system, the already-encrypted files will remain encrypted since it is nearly impossible to crack the encryption.

If your computer system does become infected:

• Unplug your computer immediately. On a desktop PC, quick action may limit the damage because it takes time for the malware to encrypt every file it has targeted.
• Do not use the infected computer to search for ways to repair the damage.
• Contact a computer store or technology expert for restoration assistance.

How Do I Know So Much About This Anyway?

Ransomware 6I am thrilled to be a technical writer for Provident Technology, a Philadelphia-based IT company, which also performs computer services remotely. Provident Technology offers solid protection and security through their Managed Services, and is worth looking into for peace of mind. You may think that occasionally backing your computer up on a “zip” drive preserves your data. However, as mentioned above, the files on USB sticks can become encrypted as well. Additionally, zip drives can “go bad” and need replacing.

For my peace of mind, I recently purchased backup and monitoring services for my computer through Provident Technology for a very low monthly fee. With these services in place now, I know that my computer and its data is monitored 24/7, and protected from viruses and cybercrime. I also know that in the unfortunate event that something disastrous should occur, all my data is backed up and I can never lose it. For this writer, having all of the projects I have worked so hard on permanently protected is invaluable!

Have you ever had your computer infected by a virus, or your personal data compromised in another way? If so, what did you do about it? Do you have additional tips for our readers on how to protect your computer system? Please share your thoughts and advice with us!