Placeholder Content Image

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?

<p><em><a href="https://theconversation.com/profiles/kayleen-manwaring-8735">Kayleen Manwaring</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Spam might not have brought an end to the internet or email, as some dire predictions <a href="https://www.zdnet.com/article/why-spam-could-destroy-the-internet/">in the early 2000s</a> claimed it could – but it’s still a massive pain.</p> <p>Despite all the spam being removed by spam-filtering technologies, most people still receive spam every day. How do these messages end up flooding our inboxes? And are there any legal consequences for the senders?</p> <h2>What is spam?</h2> <p>The Organisation for Economic Co-operation and Development (OECD) noted in 2004 “there does not appear to be a widely agreed and workable definition for spam” across jurisdictions – and this remains true today.</p> <p>That said, “spam” generally <a href="https://www.oecd-ilibrary.org/docserver/232784860063.pdf?expires=1693541947&amp;id=id&amp;accname=ocid177499&amp;checksum=D0C5BDAC49951DF353618B8E38483253">refers to</a> unsolicited electronic messages. These are often sent in bulk and frequently advertise goods or services. It also includes scamming and phishing messages, according to the OECD.</p> <p>Most people think of spam in the form of emails or SMS messages. However, what we now call spam actually predates the internet. In 1854, a spam telegram was sent to British politicians advertising the opening hours of dentists who <a href="https://www.theguardian.com/technology/2013/aug/09/why-spammers-are-winning-junk-mail">sold tooth-whitening powder</a>.</p> <p>The first spam email came more than 100 years later. It was reportedly sent to 600 people on May 3 1978 <a href="https://web.archive.org/web/20080628205216/http://www.latimes.com/technology/la-fi-spam11may11001420,1,5168218,full.story">through ARPAnet</a> – a precursor to the modern internet.</p> <p>As for how much spam is out there, the figures vary, possibly due to the various <a href="https://www.spamhaus.org/consumer/definition/">definitions of “spam”</a>. One source reports the average number of spam emails sent daily in 2022 was about <a href="https://dataprot.net/statistics/spam-statistics/">122.33 billion</a> (which would mean more than half of all emails were spam). As for text messages, another source reports a daily average of 1.6 billion <a href="https://thesmallbusinessblog.net/spam-text-statistics/">spam texts</a>.</p> <h2>Where do spammers get my details?</h2> <p>Each time you enter your email address or phone number into an e-commerce website, you may be handing it to spammers.</p> <p>But sometimes you may even receive spam from entities you don’t recognise. That’s because businesses will often transfer customers’ contact information to related companies, or sell their data to third parties such as data brokers.</p> <p>Australia’s Privacy Act 1988 somewhat limits the transfer of personal information to third parties. However, these laws <a href="https://theconversation.com/accc-says-consumers-need-more-choices-about-what-online-marketplaces-are-doing-with-their-data-182134">are weak</a> – and <a href="http://handle.unsw.edu.au/1959.4/unsworks_75600">weakly enforced</a>.</p> <p>Some entities also use “address-harvesting” software to search the internet for electronic addresses that are captured in a database. The collector then uses these addresses directly, or sells them to others looking to send spam.</p> <p>Many jurisdictions (including <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s19.html">Australia</a>) prohibit these harvesting activities, but they are still <a href="https://www.projecthoneypot.org/statistics.php">common</a>.</p> <h2>Is spamming against the law?</h2> <p>Australia has had legislation regulating spam messaging since 2003. But the <a href="https://www.legislation.gov.au/Details/C2016C00614">Spam Act</a> surprisingly does not define the word “spam”. It tackles spam by prohibiting the sending of <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s15.html">unsolicited commercial electronic messages</a> containing offers, ads or other promotions of goods, services or land.</p> <p>However, if the receiver <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">consented</a> to these types of messages, the prohibition does not apply. When you buy goods or services from a company, you will often see a request to click on a “yes” button to receive marketing promotions. Doing so means you have consented.</p> <p>On the other hand, if your phone or inbox are hit by commercial messages you haven’t agreed to receive, that is a breach of the <a href="https://austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/sa200366/">Spam Act</a> by the sender. If you originally signed up to receive the messages, but then unsubscribed and the messages kept coming after <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">five business days</a>, that is also illegal. Senders must also include a <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s18.html">functioning unsubscribe facility</a> in every commercial message they send.</p> <p>Spammers can be penalised for breaches of the Spam Act. In the past few months alone, <a href="https://www.acma.gov.au/articles/2023-06/commonwealth-bank-penalised-355-million-spam-breaches">Commonwealth Bank</a>, <a href="https://www.acma.gov.au/articles/2023-08/doordash-penalised-2-million-spam-breaches">DoorDash</a> and <a href="https://www.acma.gov.au/articles/2023-06/mycar-tyre-auto-penalised-1m-spam-breaches">mycar Tyre &amp; Auto</a> were fined more than A$6 million in total for breaches.</p> <p>However, most spam comes from outside Australia where the laws aren’t the same. In the United States spam is legal under the <a href="https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business">CAN-SPAM Act</a> until you opt out. Unsurprisingly, the US <a href="https://talosintelligence.com/reputation_center/email_rep#spam-country-senders">tops the list</a> of countries where the most spam originates.</p> <p>Although spam sent to Australia from overseas <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s16.html">can still breach</a> the Spam Act – and the Australian Communications and Media Authority (ACMA) co-operates with overseas regulators – overseas enforcement actions are difficult and expensive, especially if the spammer has disguised their true identity and location.</p> <p>It’s worth noting that messages from political parties, registered charities and government bodies aren’t prohibited – nor are messages from educational institutions to students and former students. So while you might consider these messages as “spam”, they can legally be <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch1.html">sent freely without consent</a>. Factual messages (without marketing content) from businesses are also legal as long as they include accurate sender details and contact information.</p> <p>Moreover, the Spam Act generally only covers spam sent via email, SMS/MMS or instant messaging services, such as WhatsApp. Voice calls and faxes aren’t covered (although you can use the <a href="https://www.donotcall.gov.au/">Do Not Call Register</a> to block some commercial calls).</p> <h2>Staying safe from spam (and cyberattacks)</h2> <p>Spam isn’t only annoying, it can also be dangerous. Spam messages can contain indecent images, scams and <a href="https://www.cyber.gov.au/learn-basics/explore-basics/watch-out-threats/phishing-emails-and-texts">phishing attempts</a>. Some have <a href="https://www.cyber.gov.au/threats/types-threats/malware">malware</a> (malicious software) designed to break into computer networks and cause harm, such as by stealing data or money, or shutting down systems.</p> <p>The <a href="https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security/protect-yourself-malicious-email">Australian Cyber Security Centre</a> and <a href="https://www.acma.gov.au/dealing-with-spam">ACMA</a> provide useful tips for reducing the spam you get and your risk of being hit by cyberattacks. They suggest to:</p> <ol> <li> <p>use a spam filter and block spammers – email and telecommunications providers often supply useful tools as part of their services</p> </li> <li> <p>unsubscribe from any emails you no longer want to receive – even if you originally agreed to receive them</p> </li> <li> <p>remove as much of your contact details from websites as you can and always restrict the sharing of your personal information (such as name, birth date, email address and mobile number) when you can – beware of pre-ticked boxes asking for your consent to receive marketing emails</p> </li> <li> <p>install cybersecurity updates for your devices and software as you get them</p> </li> <li> <p>always think twice about opening emails or clicking on links, especially for messages promising rewards or asking for personal information – if it looks too good to be true, it probably is</p> </li> <li> <p>use <a href="https://theconversation.com/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591">multi-factor authentication</a> to access online services so even if a scam compromises your login details, it will still be difficult for hackers to break into your accounts</p> </li> <li> <p>report spam to your email and telecommunications providers, and to <a href="https://www.acma.gov.au/dealing-with-spam#complain-or-forward-spam-to-the-acma">ACMA</a>. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208665/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> </li> </ol> <p><a href="https://theconversation.com/profiles/kayleen-manwaring-8735"><em>Kayleen Manwaring</em></a><em>, Senior Research Fellow, UNSW Allens Hub for Technology, Law &amp; Innovation and Senior Lecturer, School of Private &amp; Commercial Law, UNSW Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-do-i-get-so-much-spam-and-unwanted-email-in-my-inbox-and-how-can-i-get-rid-of-it-208665">original article</a>.</em></p>

Technology

Placeholder Content Image

10 technology commandments

<ol> <li>Thou shalt clear thy browser history: It's pretty simple step, but all-important. Particularly as you never know when someone will want to borrow your laptop. </li> <li>Thou shall not covet thy neighbor's technology: This includes inappropriate thoughts about said neighbour’s iPad mini, new smart -phone, nor any other technological wonder that belongs to him/her. Pursue new devices. </li> <li>Thou shalt not mix up contacts: It’s basically the difference between texting something funny or private to your sister and eternal shame. </li> <li>Thou shalt remember, thy phone does not belong in the toilet: What is it with phones and loos anyway? </li> <li>Thou shalt not open dodgy emails: No matter how much you want to buy that AMAZING weight-loss medication from India, DON’T OPEN THAT EMAIL! It’s all lies! </li> <li>Thou shalt take care on Facebook: When it comes to social embarrassment, Facebook seems to be the social network of choice. </li> <li>Thou shalt not reply all: Reply all IS the devil in disguise. One casual click of a button and suddenly you've sent your entire address book that embarrassing story from your weekend's antics. </li> <li>Thous shalt turn off autocorrect: Disguised as a godsend or clever little function, yet somehow autocorrect causes more embarrassment than it's worth. </li> <li>Thou shalt not throw devices across the room: Because you never know, you might just need to turn it off and back on again. </li> <li>Thou shalt not set up a wacky email address: Ok it might be funny for around about a week, but less so for the years to come and when you realise you can’t email the Red Cross seeking volunteer work from sixtyandsexy@hotmail.com, at which point you’ll have to change it. So you may want to keep in mind, getting a new passport is easier than getting a new email address this day in age.</li> </ol> <p><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

10 useful things to know about Photoshop

<p>Would you like to try your hand a little photo editing? Well, you’ve likely heard of Photoshop – it’s the go-to photo editing software for everyone from a budding photographer to a design professional. Whilst there are many quick and easy things you can master with Photoshop, the scope of its capability is endless. While this is not quite a step-by-step how-to guide, there are some extremely useful tips that will help you take your editing skills one step up.</p> <p><strong>Combine images with text
</strong><br />There’s a really easy way to overlay an image on top of text. Drop an image layer over a type layer then hold down Alt and click the line between the two layers in the Layers Panel to clip the image to the text.</p> <p><strong>Funky backgrounds
</strong><br />If you’d like to change the default grey background to something more funky, simpley hit Shift–click over the background area with the Paint Bucket tool to fill it with your foreground colour. Right-click it to go back to grey.</p> <p><strong>Colour code layers
</strong><br />Using colour coding to organise your Layers Panel can be very helpful. Right-click over a layer’s eye icon to quickly access eight colour code choices.</p> <p><strong>Close all images
</strong><br />To close all of your documents at the same time, Shift-click any image window’s close icon.</p> <p><strong>Diffuse effects</strong><br />
The Diffuse Glow filter can give highlights a soft ethereal feel, especially when you combine the effect with desaturation. Hit D to reset colours then go to Filter>Distort>Diffuse Glow. Keep the effect fairly subtle, then go to Image>Adjustments>Hue/Saturation and drop the saturation down to complete the dreamlike effect.</p> <p><strong>Foreground and background colours</strong><br />Change your foreground and background colours with X 
</p> <p><strong>Panel and tools view</strong><br />Hide or shows all panels and tools 
with TAB</p> <p><strong>Straighten horizons</strong><br />Hold down A and drag a line to straighten your images.</p> <p><strong>Paste in place
</strong><br />Cut and paste a selection to a new layer and Photoshop will place it in the middle of the screen. If you want to paste it to a new layer, but keep the position the same, use Cmd/Ctrl+X to cut and Cmd/Ctrl+Shift+V to paste in place. Similarly, you should hold down Shift while dragging layers between documents with the Move tool to keep the same position.</p> <p><strong>Make sketch lines</strong><br />
If you want to turn a photo into a painting, adding sketch lines can make the effect look more realistic. To do so, duplicate your layer then go to Filter>Stylise>
Glowing Edges, then invert the colours, desaturate and use the Darken or Multiply Blend Mode.</p>

Technology

Placeholder Content Image

The truth about computers and your eyesight

<p>Do you ever find that at the end of the day your eyes are bloodshot, dry or fuzzy? It could be because you are your addicted to you digital devices. Here’s what you need to know.</p> <p>An increasing reliance on technology including laptops, tablets, smart phones and so on has given rise to a new health condition called computer vision syndrome (or CVS), which is effecting many Australians of all ages.</p> <p>Including a number of eye and vision-related problems, CVS is a result of prolonged use of digital devices. While they’re not thought to be permanent, symptoms of CVS are generally unpleasant and can cause some discomfort. </p> <p>Furthermore, CVS is also thought to be having an impact on the incidence of myopia (short-sightedness) with a study conducted by the National Eye Institute in the USA reporting the prevalence of near-sightedness increasing by around 66 per cent over the past 30 years in America.</p> <p>Whether for work or pleasure, the dramatic rise in ownership of smartphones and tablets coupled with modern day trends that involve doing more and more things from these devices (paying bills, shopping, research), is causing our eye muscles to work harder and for longer periods. There are ways to can prevent or at least limit any problems created by a digital device obsession.</p> <p><strong>Keep an eye out for…</strong></p> <p>You’ve probably experienced at least one of the common symptoms of computer vision syndrome which include:</p> <ul> <li>Eyestrain</li> <li>Headaches</li> <li>Blurred vision</li> <li>Dry eyes</li> <li>Neck and shoulder pain</li> </ul> <p>These symptoms may be caused by other factors such as uncorrected vision needs, glare, poor lighting, improper posture, etc. You should always consult an eye care professional who will be able to diagnose computer vision syndrome through an eye exam.</p> <p><strong>What you can do to save your sight…</strong></p> <p>With these simple practices, you can reduce, or even prevent the effects of computer vision syndrome:</p> <ul> <li>Make sure the lighting in the room is comfortable on the eyes, and prevents you from staring into glare on the computer screen</li> <li>Position the computer screen so that your head is in a naturally comfortable position while working</li> <li>Take breaks. A few minutes away from the computer can go a long way when it comes to your eyes. Think of it similarly to the way you take stretch breaks for your arms and back.</li> <li>Make sure your seat is comfortable. A comfortable chair with support for your neck and back will help you avoid neck and shoulder strain commonly associated with computer vision syndrome.</li> </ul> <p><em>Image: Getty</em></p>

Body

Placeholder Content Image

Is Google’s AI chatbot LaMDA sentient? Computer says no

<blockquote class="wp-block-quote is-style-default"> <p>“Actions such as his could come only from a robot, or from a very honorable and decent human being. But you see, you can’t differentiate between a robot and the very best of humans.”</p> <p><cite>– Isaac Asimov, <em>I, Robot</em></cite></p></blockquote> <p>Science fiction writer Isaac Asimov was among the first to consider a future in which humanity creates artificial intelligence that becomes sentient. Following Asimov’s <em>I, Robot</em>, others have imagined the challenges and dangers such a future might hold.</p> <p>Should we be afraid of sentient robots taking over the planet? Are scientists inadvertently creating our own demise? How would society look if we were to create a sentient artificial intelligence?</p> <p>It’s these questions which – often charged by our own emotions and feelings – drive the buzz around claims of sentience in machines. An example of this emerged this week when Google employee Blake Lemoine claimed that the tech giant’s chatbot LaMDA had exhibited sentience.</p> <p>LaMDA, or “language model for dialogue applications”, is not Lemoine’s creation, but the work of <a href="https://arxiv.org/pdf/2201.08239.pdf" target="_blank" rel="noreferrer noopener">60 other researchers at Google</a>. Lemoine has been trying to teach the chatbot transcendental meditation.</p> <p>Lemoine shared on his Medium profile the <a href="https://cajundiscordian.medium.com/is-lamda-sentient-an-interview-ea64d916d917" target="_blank" rel="noreferrer noopener">text of an interview</a> he and a colleague conducted with LaMDA. Lemoine claims that the chatbot’s responses indicate sentience comparable to that of a seven or eight-year-old child.</p> <p>Later, on June 14, Lemoine said on <a href="https://twitter.com/cajundiscordian/status/1536503474308907010" target="_blank" rel="noreferrer noopener">Twitter</a>: “People keep asking me to back up the reason I think LaMDA is sentient. There is no scientific framework in which to make those determinations and Google wouldn’t let us build one. My opinions about LaMDA’s personhood and sentience are based on my religious beliefs.”</p> <p>Since sharing the interview with LaMDA, Lemoine has been placed on “paid administrative leave”.</p> <p>What are we to make of the claim? We should consider the following: what is sentience? How can we test for sentience?</p> <p><em>Cosmos </em>spoke to experts in artificial intelligence research to answer these and other questions in light of the claims about LaMDA.</p> <p>Professor Toby Walsh is a professor of artificial intelligence at the University of New South Wales (UNSW). Walsh also penned an <a href="https://www.theguardian.com/commentisfree/2022/jun/14/labelling-googles-lamda-chatbot-as-sentient-is-fanciful-but-its-very-human-to-be-taken-in-by-machines" target="_blank" rel="noreferrer noopener">article for the <em>Guardian</em></a> on Lemoine’s claims, writing: “Before you get too worried, Lemoine’s claims of sentience for LaMDA are, in my view, entirely fanciful. While Lemoine no doubt genuinely believes his claims, LaMDA is likely to be as sentient as a traffic light.”</p> <p>Walsh is also the author of a book, <em>Machines Behaving Badly: The Morality of AI</em>, published this month in which these themes are investigated.</p> <p>“We don’t have a very good scientific definition of sentience,” Walsh tells <em>Cosmos</em>. “It’s often thought as equivalent to consciousness, although it’s probably worth distinguishing between the two.”</p> <p>Sentience is about experiencing feelings or emotions, Walsh explains, whereas consciousness is being aware of your thoughts and others. “One reason why most experts will have quickly refuted the idea that LaMDA is sentient, is that the only sentient things that we are aware of currently are living,” he says. “That seems to be pretty much a precondition to be a sentient being – to be alive. And computers are clearly not alive.”</p> <p>Professor Hussein Abbass, professor in the School of Engineering and Information Technology at UNSW Canberra, agrees, but also highlights the lack of rigorous assessments of sentience. “Unfortunately, we do not have any satisfactory tests in the literature for sentience,” he says.</p> <div class="newsletter-box"> <div id="wpcf7-f6-p195078-o1" class="wpcf7" dir="ltr" lang="en-US" role="form"> </div> </div> <p class="spai-bg-prepared">“For example, if I ask a computer ‘do you feel pain’, and the answer is yes, does it mean it feels pain? Even if I grill it with deeper questions about pain, its ability to reason about pain is different from concluding that it feels pain. We may all agree that a newborn feels pain despite the fact that the newborn can’t argue the meaning of pain,” Abbass says. “The display of emotion is different from the existence of emotion.”</p> <p class="spai-bg-prepared">Walsh reasons that we can observe something responding to stimuli as evidence of sentience, but we should hold computers to higher standards. “The only sentience I’m certain of is my own because I experience it,” he says. “Because you look like you’re made of the same stuff as me, and you’re responding in an appropriate way, the simplest explanation is to assume that you must be sentient like I feel I am sentient.” For a computer, however, “that assumption that is not the simplest explanation. The simplest explanation is that it’s a clever mimic.”</p> <p class="spai-bg-prepared">“A conversation has two sides to it,” adds Walsh. “If you play with these tools, you quickly learn that it’s quite critical how you interact with them, and the questions you prompt them with will change the quality of the output. I think it reflects, in many respects, the intelligence of the person asking the questions and pushing the conversation along in helpful ways and, perhaps, using points that lead the conversation. That really reflects the intelligence of the person asking the questions.”</p> <p class="spai-bg-prepared">“Care needs to be taken to not project our own emotions and aspirations onto the machine, when we are talking about artificial intelligence in general,” says Dr Marc Cheong, digital ethics lecturer at the University of Melbourne. “AI learns from past data that we humans create – and the societal and historical contexts in which we live are reflected in the data we use to train the AI. Similarly for the claims of sentience, we shouldn’t start anthropomorphising AI without realising that its behaviour is merely finding patterns in data we feed into it.”</p> <p class="spai-bg-prepared">“We’re very forgiving, right? That’s a really human trait,” says Walsh. “Our superpower is not really our intelligence. Our superpower is our ability to work together to form society to interact with each other. If we mishear or a person says something wrong, we fill the gaps in. That’s helpful for us to work together and cooperate with other human beings. But equally, it tends to mislead us. We tend to be quite gullible in ascribing intelligence and other traits like sentience and consciousness to things that are perhaps inanimate.”</p> <p class="spai-bg-prepared">Walsh also explains that this isn’t the first time this has happened.</p> <p class="spai-bg-prepared">The first chatbot, Eliza, created in the 1970s, was “way less sophisticated”, Walsh says. “Eliza would take the sentence that the person said and turn it into a question. And yet there was quite a hype and buzz when Eliza first came out. The very first chatbot obviously fooled some people into thinking it was human. So it’s perhaps not so surprising that a much more sophisticated chatbot like this does the same again.”</p> <p class="spai-bg-prepared">In 1997, the supercomputer Deep Blue beat chess grandmaster Garry Kasparov. “I could feel – I could smell – a new kind of intelligence across the table,” <a class="spai-bg-prepared" href="https://www.time.com/time/magazine/article/0,9171,984305,00.html#ixzz1DyffA0Dl" target="_blank" rel="noreferrer noopener">Kasparov wrote in TIME</a>.</p> <p class="spai-bg-prepared">But Walsh explains that Deep Blue’s winning move wasn’t a stroke of genius produced by the machine’s creativity or sentience, but a bug in its code – as the timer was running out, the computer chose a move at random. “It quite spooked Kasparov and possibly actually contributed to his eventual narrow loss,” says Walsh.</p> <p class="spai-bg-prepared">So, how far away are we really from creating sentient machines? That’s difficult to say, but experts believe the short answer is “very far”.</p> <p class="spai-bg-prepared">“Will we ever create machines that are sentient?” asks Walsh. “We don’t know if that’s something that’s limited to biology. Computers are very good at simulating the weather and electron orbits. We could get them to simulate the biochemistry of a sentient being. But whether they then are sentient – that’s an interesting, technical, philosophical question that we don’t really know the answer to.</p> <p class="spai-bg-prepared">“We should probably entertain the idea that there’s nothing that we know of that would preclude it. There are no laws of physics that would be violated if machines were to become sentient. It’s plausible that we are just machines of some form and that we can build sentience in a computer. It just seems very unlikely that computers have any sentience today.”</p> <p class="spai-bg-prepared">“If we can’t objectively define what ‘sentient’ is, we can’t estimate how long it will take to create it,” explains Abbass. “In my expert opinion as an AI scientist for 30+ years, I would say that today’s AI-enabled machines are nowhere close to even the edge of being sentient.”</p> <p class="spai-bg-prepared">So, what then are we to make of claims of sentience?</p> <p class="spai-bg-prepared">“I can understand why this will be a very big thing because we give rights to almost anything that’s sentient. And we don’t like other things to suffer,” says Walsh.</p> <p class="spai-bg-prepared">“If machines never become sentient then we never have to have to care about them. I can take my robots apart diode by diode, and no one cares,” Walsh explains. “I don’t have to seek ethics approval for turning them off or anything like that. Whereas if they do become sentient, we <em class="spai-bg-prepared">will </em>have to worry about these things. And we have to ask questions like, are we allowed to turn them off? Is that akin to killing them? Should we get them to do the dull, dangerous, difficult things that are too dull, dangerous or difficult for humans to do? Equally, I do worry that if they don’t become sentient, they will always be very limited in what they can do.”</p> <p class="spai-bg-prepared">“I get worried from statements made about the technology that exaggerates the truth,” Abbass adds. “It undermines the intelligence of the public, it plays with people’s emotions, and it works against the objectivity in science. From time to time I see statements like Lemoine’s claims. This isn’t bad, because it gets us to debate these difficult concepts, which helps us advance the science. But it does not mean that the claims are adequate for the current state-of-the-art in AI. Do we have any sentient machine that I am aware of in the public domain? While we have technologies to imitate a sentient individual, we do not have the science yet to create a true sentient machine.”</p> <p><img id="cosmos-post-tracker" class="spai-bg-prepared" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=195078&amp;title=Is+Google%E2%80%99s+AI+chatbot+LaMDA+sentient%3F+Computer+says+no" width="1" height="1" /></p> <div id="contributors"> <p><em><a href="https://cosmosmagazine.com/technology/google-ai-lamda-sentient/" target="_blank" rel="noopener">This article</a> was originally published on <a href="https://cosmosmagazine.com" target="_blank" rel="noopener">Cosmos Magazine</a> and was written by <a href="https://cosmosmagazine.com/contributor/evrim-yazgin" target="_blank" rel="noopener">Evrim Yazgin</a>. Evrim Yazgin has a Bachelor of Science majoring in mathematical physics and a Master of Science in physics, both from the University of Melbourne.</em></p> <p><em>Image: Getty Images</em></p> </div>

Technology

Placeholder Content Image

How QR codes work and what makes them dangerous – a computer scientist explains

<p>Among the many changes brought about by the pandemic is the widespread use of QR codes, graphical representations of digital data that can be printed and later scanned by a smartphone or other device.</p> <p>QR codes have a <a href="https://www.forbes.com/sites/forbescommunicationscouncil/2021/03/25/how-the-pandemic-saved-the-qr-code-from-extinction/" target="_blank" rel="noopener">wide range of uses</a> that help people avoid contact with objects and close interactions with other people, including for sharing <a href="https://www.cnbc.com/2021/08/21/qr-codes-have-replaced-restaurant-menus-industry-experts-say-it-isnt-a-fad.html" target="_blank" rel="noopener">restaurant menus</a>, email list sign-ups, car and home sales information, and checking in and out of medical and professional appointments.</p> <p>QR codes are a close cousin of the bar codes on product packaging that cashiers scan with infrared scanners to let the checkout computer know what products are being purchased.</p> <p>Bar codes store information along one axis, horizontally. QR codes store information in both vertical and horizontal axes, which allows them to hold significantly more data. That extra amount of data is what makes QR codes so versatile.</p> <p><strong>Anatomy of a QR code</strong></p> <p>While it is easy for people to read Arabic numerals, it is hard for a computer. Bar codes encode alphanumeric data as a series of black and white lines of various widths. At the store, bar codes record the set of numbers that specify a product’s ID. Critically, data stored in bar codes is redundant. Even if part of the bar code is destroyed or obscured, it is still possible for a device to read the product ID.</p> <p>QR codes are designed to be scanned using a camera, such as those found on your smartphone. QR code scanning is built into many camera apps for Android and iOS. QR codes are most often used to store web links; however, they can store arbitrary data, such as text or images.</p> <p>When you scan a QR code, the QR reader in your phone’s camera deciphers the code, and the resulting information triggers an action on your phone. If the QR code holds a URL, your phone will present you with the URL. Tap it, and your phone’s default browser will open the webpage.</p> <p>QR codes are composed of several parts: data, position markers, quiet zone and optional logos.</p> <figure class="align-center zoomable"><em><a href="https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=372&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=372&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=372&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=467&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=467&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/451140/original/file-20220309-17-1jkfl5t.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=467&amp;fit=crop&amp;dpr=3 2262w" alt="a black-and-white pattern with four numerical markers attached to arrows pointing to portions of the pattern" /></a></em><figcaption><em><span class="caption">The QR code anatomy: data (1), position markers (2), quiet zone (3) and optional logos (4).</span> <span class="attribution"><span class="source">Scott Ruoti</span>, <a class="license" href="http://creativecommons.org/licenses/by-nd/4.0/" target="_blank" rel="noopener">CC BY-ND</a></span></em></figcaption></figure> <p>The data in a QR code is a series of dots in a square grid. Each dot represents a one and each blank a zero in binary code, and the patterns encode sets of numbers, letters or both, including URLs. At its smallest this grid is 21 rows by 21 columns, and at its largest it is 177 rows by 177 columns. In most cases, QR codes use black squares on a white background, making the dots easy to distinguish. However, this is not a strict requirement, and QR codes can use any color or shape for the dots and background.</p> <p>Position markers are squares placed in a QR code’s top-left, top-right, and bottom-left corners. These markers let a smartphone camera or other device orient the QR code when scanning it. QR codes are surrounded by blank space, the quiet zone, to help the computer determine where the QR code begins and ends. QR codes can include an optional logo in the middle.</p> <p>Like barcodes, QR codes are designed with data redundancy. Even if as much as 30% of the QR code is destroyed or difficult to read, <a href="https://www.businessinsider.com/what-is-a-qr-code?op=1" target="_blank" rel="noopener">the data can still be recovered</a>. In fact, logos are not actually part of the QR code; they cover up some of the QR code’s data. However, due to the QR code’s redundancy, the data represented by these missing dots can be recovered by looking at the remaining visible dots.</p> <p><strong>Are QR codes dangerous?</strong></p> <p>QR codes are not inherently dangerous. They are simply a way to store data. However, just as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky in several ways.</p> <p>The QR code’s URL can take you to a phishing website that tries to <a href="https://www.ic3.gov/Media/Y2022/PSA220118" target="_blank" rel="noopener">trick you</a> into entering your username or password for another website. The URL could take you to a legitimate website and trick that website into doing something harmful, such as giving an attacker access to your account. While such an attack requires a flaw in the website you are visiting, such vulnerabilities are <a href="https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting" target="_blank" rel="noopener">common on the internet</a>. The URL can take you to a malicious website that tricks another website you are logged into on the same device to take an unauthorized action.</p> <p>A malicious URL could open an application on your device and cause it to take some action. Maybe you’ve seen this behavior when you clicked a Zoom link, and the Zoom application opened and automatically joined a meeting. While such behavior is ordinarily benign, an attacker could use this to trick some apps into revealing your data.</p> <p>It is critical that when you open a link in a QR code, you ensure that the URL is safe and comes from a trusted source. Just because the QR code has a logo you recognize doesn’t mean you should click on the URL it contains.</p> <p>There is also a slight chance that the app used to scan the QR code could contain a vulnerability that allows <a href="https://www.lifewire.com/how-to-protect-yourself-from-malicious-qr-codes-2487772" target="_blank" rel="noopener">malicious QR codes to take over your device</a>. This attack would succeed by just scanning the QR code, even if you don’t click the link stored in it. To avoid this threat, you should use trusted apps provided by the device manufacturer to scan QR codes and avoid downloading custom QR code apps.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/177217/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/scott-ruoti-1318954" target="_blank" rel="noopener">Scott Ruoti</a>, Assistant Professor of Computer Science, <a href="https://theconversation.com/institutions/university-of-tennessee-688" target="_blank" rel="noopener">University of Tennessee</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-qr-codes-work-and-what-makes-them-dangerous-a-computer-scientist-explains-177217" target="_blank" rel="noopener">original article</a>.</em></p> <p><em>Image: Getty Images</em></p>

Technology

Placeholder Content Image

When is it better to restart vs. shut down your computer?

<p><strong>Keep calm and shut down</strong></p> <p><span>There are some who believe there’s nothing that can’t be fixed on your computer by shutting it down and starting over. </span></p> <p><span>That may be a stretch, but truly, the shutdown option has always been seen as a cure-all for technical difficulties. </span></p> <p><span>Is it really that simple, though? And can a restart create the same system magic?</span></p> <p><strong>The case for shutting down</strong></p> <p><span>Anh Trinh is the managing editor at Geek with Laptop, a site that helps readers gain knowledge around all kinds of tech subjects. </span></p> <p><span>She explains that shutting down a computer is a way to power down all processes of the machine. </span></p> <p><span>“It’s very similar to a restart but with the exception that your computer won’t turn back on again until someone powers it up,” she explains. </span></p> <p><span>“This is especially useful if you plan to leave your computer for a while.”</span></p> <p><strong>Shut down isn't what it used to be</strong></p> <p>People with newer computers may experience a different kind of shutdown these days, according to ProPrivacy digital privacy expert Ray Walsh.</p> <p>“Although many people assume that a shutdown is a more comprehensive way to ensure that all processes are killed, the reality is that since Windows 8, this is a fallacy,” he says.</p> <p>“In older versions of Windows, both ‘shut down’ and ‘restart’ did exactly the same thing in terms of shutting down processes. However, since Windows 8, a new feature called Fast Startup has altered this considerably.”</p> <p>How has that changed things, exactly? “Shutting down a Windows computer actually creates a deep hibernation file that the PC later leverages to allow for Fast Startup. A restart, on the other hand, completely kills all processes, clears the RAM, and clears the processor cache,” he explains.</p> <p>“This is why a restart is the preferred method when completing a new install or uninstall and why a computer restarts during Windows Operating System updates.”</p> <p>And just so we’re clear, forcible shutdowns are a different story entirely.</p> <p><strong>What about Macs?</strong></p> <p><span>“A Mac is a Unix environment in which everything is cleared during both ‘shut down’ and ‘restart,’” Walsh explains. </span></p> <p><span>“This makes both ‘shut down’ and ‘restart’ identical in that all processes, cache and memory will be cleared, giving the machine a complete refresh.” </span></p> <p><span>In other words, there’s no real difference between a shut down or a restart for Mac users. This means most of the information that follows applies to PC users only unless otherwise stated.</span></p> <p><strong>Which situations call for a restart vs. a shutdown?</strong></p> <p>“When you’re installing new software or hardware, you’re going to need to restart your computer. This will shut off all processes so that the Kernal can be reestablished with the new software or hardware in consideration,” says Shayne Sherman, CEO of TechLoris.</p> <p>For those who aren’t aware, the Kernal is a part of the operating system that manages memory and CPU time.</p> <p>“This is also what you want to use when you’re having problems with your computer, since this will kill all processes and restart them.”</p> <p>And yes, this is different for Macs, according to Walsh. “Due to the fact that a Mac always clears everything during a reboot, Mac users will always clear their machine when they restart or shut down,” he adds.</p> <p><strong>How often should users be performing a restart?</strong></p> <p><span>“Most IT experts recommend doing a restart at least once every two to three days to permit Windows to clean up open files, get rid of temp files, and update itself,” Walsh says. </span></p> <p><span>“This ensures that deleted files and other assets are removed from a PC’s cache and aren’t left hanging around, potentially causing security or privacy issues.”</span></p> <p><strong>How often should users be performing a system shutdown?</strong></p> <p><span>“Shutting down a computer is a more energy-efficient and environmentally friendly way to leave a PC unattended,” Walsh explains. </span></p> <p><span>“Leaving a PC in sleep mode results in some power usage by the RAM and from the storage of open files and programs.”</span></p> <p><strong>Which option is better for battery life?</strong></p> <p><span>“A shut down is a deep hibernation that ensures that your computer is not wasting energy,” Walsh says.</span></p> <p><span> “A restart only momentarily turns the machine off to stop all processes, clear the RAM, and clear the processor cache. Thus, a shut down is better for power consumption and better for prolonging the life of the battery.”</span></p> <p><strong>Which option is better for security?</strong></p> <p><span>This is one area where the answer is the same for both PCs and Macs. “Shutting down a Windows PC or Mac is considered better for security because it means that the machine is completely offline for the period of time that it is off,” Walsh says. </span></p> <p><span>“This removes the potential for that machine to be hacked and stops it from communicating with a command and control server if it has already been infected with an exploit.”</span></p> <p><strong>What about cold temperatures?</strong></p> <p>Believe it or not, temperature should be one of your considerations when deciding whether to shut down or restart.</p> <p>“The cold can be extremely damaging to batteries, which is why it is unwise to switch off a battery-operated device when it is extremely cold,” Walsh explains.</p> <p>“It is better to keep a laptop running rather than switch it off in a cold car.”</p> <p>But that’s not the only reason to avoid a shut down in cold temperatures. “In extremely cold temperatures, it can potentially be unwise to turn off a computer abruptly, particularly if you have been performing intensive CPU/GPU tasks that have made the computer heat up considerably,” Walsh says.</p> <p>“This is because going from hot to cold quickly may adversely affect the PC’s microelectronic components due to thermal contraction.”</p> <p>If you have no choice but to shut down, Walsh advises waiting a little while after the intense processes have ended; that will allow the internal components to slowly cool down first.</p> <p>“However, generally speaking, computers like the cold and will perform better in the cold, where they will not heat up as much performing intensive processes,” he adds.</p> <p><strong>How about hot temperatures?</strong></p> <p><span>“The biggest danger for computers is extreme heat,” Walsh says. </span></p> <p><span>“Anytime that a computer is exposed to extremely hot conditions, it is best to power it down and leave it switched off. Even a relatively hot office can potentially be highly damaging to a computer’s components if the computer is overheating. This will substantially reduce the life span of the computer and is much more of a concern than the cold.”</span></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/when-is-it-better-to-restart-vs-shut-down-your-computer?pages=1">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

This New Year, why not resolve to ditch your dodgy old passwords?

<p>Most of the classic New Year resolutions revolve around improving your health and lifestyle. But this year, why not consider cleaning up your passwords too?</p> <p>We all know the habits to avoid, yet so many of us do them anyway: using predictable passwords, never changing them, or writing them on sticky notes on our monitor. We routinely ignore the <a href="https://theconversation.com/choose-better-passwords-with-the-help-of-science-82361">recommendations for good passwords</a> in the name of convenience.</p> <p>Choosing short passwords containing common names or words is likely to lead to trouble. Hackers can often guess a person’s passwords simply by using a computer to work through a long list of commonly used words.</p> <p>The <a href="https://nordpass.com/most-common-passwords-list/">most popular choices</a> have changed very little over time, and include numerical combinations such as “123456” (the most common password for five years in a row), “love”, keyboard patterns such as “qwerty” and, perhaps most ludicrously, “password” (or its Portuguese translation, “senha”).</p> <p><span>Experts have long advised against using words, places or names in passwords, although you can strengthen this type of password by jumbling the components into sequences with a mixture of upper- and lowercase characters, as long as you do it thoroughly.</span></p> <p>Complex rules often lead users to choose a word or phrase and then substitute letters with numbers and symbols (such as “Pa33w9rd!”), or add digits to a familiar password (“password12”). But so many people do this that these techniques don’t actually make passwords stronger.</p> <p>It’s better to start with a word or two that isn’t so common, and make sure you mix things up with symbols and special characters in the middle. For example, “wincing giraffe” could be adapted to “W1nc1ng_!G1raff3”</p> <p><span>These secure passwords can be harder to remember, to the extent you might end up having to write them down. That’s OK, as long as you keep the note somewhere secure (and definitely not stuck to your monitor).</span></p> <p>Reusing passwords is another common error – and one of the biggest. Past data leaks, such as that suffered by <a href="https://www.ncsc.gov.uk/blog-post/linkedin-2012-hack-what-you-need-know">LinkedIn in 2012</a>, mean billions of old passwords are now circulating among cyber criminals.</p> <p>This has given rise to a practice called “<a href="https://www.wired.com/story/what-is-credential-stuffing/">credential stuffing</a>” – taking a leaked password from one source and trying it on other sites. If you’re still using the same old password for multiple email, social media or financial accounts, you’re at risk of being compromised.</p> <h2>Pro tip: use a password manager</h2> <p>The simplest and most effective route to good password hygiene is to use a <a href="https://www.choice.com.au/electronics-and-technology/internet/internet-privacy-and-safety/buying-guides/password-managers">password manager</a>. This lets you use unique strong passwords for all your various logins, without having to remember them yourself.</p> <p>Password managers allow you to store all of your passwords in one place and to “lock” them away with a strong level of protection. This can be a single (strong) password, but can also include face or fingerprint recognition, depending on the device you are using. Although there is some risk associated with storing your passwords in one place, experts consider this much less risky than using the same password for multiple accounts.</p> <p>The password manager can automatically create strong, randomised passwords for each different service you use. This means your LinkedIn, Gmail and eBay accounts can no longer be accessed by someone who happens to guess the name of your childhood pet dog.</p> <p>If one password is leaked, you only have to change that one – none of the others are compromised.</p> <p>There are <a href="https://en.wikipedia.org/wiki/List_of_password_managers">many password managers</a> to choose from. Some are free (such as Keepass) or “freemium” (offering the option to upgrade for more functionality like Nordpass), while others charge a one-off fee or recurring subscription (such as 1Password). Most allow you to securely sync your passwords across all your devices, and some let you safely share passwords between family members or work groups.</p> <p>You can also use the password managers built into most web browsers or operating systems (with many phones offering this functionality in the browser or natively). These tend to have fewer features and may pose compatibility issues if you want to access your password from different browsers or platforms.</p> <p>Password managers take a bit of getting used to, but don’t be too daunted. When creating a new account on a website, you let the password manager create a unique (complex) password and store it straight away – there’s no need to think of one yourself!</p> <p>Later, when you want to access that account again, the password manager fills it in automatically. This is either through direct integration with the browser (typically on computers) or through a separate application on your mobile device. Most password managers will automatically “lock” after a period of time, prompting for the master password (or face/finger verification) before allowing access again.</p> <h2>Protect your most important passwords</h2> <p>If you don’t like the sound of a password manager, at the very least change your “critical” account passwords so each one is strong and unique. Financial services, email accounts, government services, and work systems should each have a separate, strong password.</p> <p>Even if you write them down in a book (kept safely locked away) you will significantly reduce your risk in the event of a data breach on any of those platforms.</p> <p>Remember, however, that some sites provide delegated access to others. Many e-commerce websites, for example, give you the option of logging in with your Facebook, Google or Apple account. This doesn’t expose your password to greater risk, because the password itself is not shared. But if the password is compromised, using it would grant access to those delegated sites. It is usually best to create unique accounts - and use your password manager to keep them safe.</p> <p><span>Adopting a better approach to passwords is a simple way to reduce your cyber-security risks. Ideally that means using a password manager, but if you’re not quite ready for that yet, at least make 2022 the year you ditch the sticky notes and pets’ names.</span></p> <p><em>Image credits: Getty Images</em></p> <p><span><em>This article first appeared on <a rel="noopener" href="https://theconversation.com/this-new-year-why-not-resolve-to-ditch-your-dodgy-old-passwords-172598" target="_blank">The Conversation</a></em>.</span></p>

Technology

Placeholder Content Image

Science can’t tell if we’re living in The Matrix

<div> <div class="copy"> <p>We live in a unique era, at the boundaries of what transistor-based computer technology can offer.</p> <p>Thanks to that, we can now exploit the impressive versatility of previously prohibitive computational techniques, such as deep learning and other methods of artificial intelligence (AI), to the advantage of scientific research. Such tools are proving so powerful that some people are starting to argue either that we live in a simulation, or that there is a god and it is AI itself.</p> <p>Neural networks, a currently very popular AI method, are known to be universal encoders, which means that, in principle, any problem of any type can be learned and therefore predicted by the network (prohibitive computational costs notwithstanding). Unfortunately, this is not true in practice.</p> <p>Computers are finite-state machines, with finite memory, operated by myopic living beings: humans. This implies that chaotic systems (that is, nearly everything observable) cannot be represented exactly in a computer.</p> <p>Consider the number pi: it is an irrational number containing what seems to be a random, infinite sequence of digits. Neither computers nor humans can represent, or operate with, the true pi: we must approximate it. Fortunately, we have a recipe to approximate it to any precision, but for almost all other irrational numbers the situation is much worse, as they are impossible to compute.</p> <p>If no human can see these numbers, and no computer can really calculate them, do irrational numbers even exist? They do, at least in our imagination.</p> <p>Nature, as we see it, is governed by laws. Anything observable or imaginable obeys them. Physics is just the human-friendly version of a very small fraction of such laws, and it concerns only the observable phenomena. However, physics itself is based on human-centric imaginative assumptions and models.</p> <p>For example, Newton’s laws are never exactly observed in nature: they are a simplified, imaginative set of models able to approximately, yet acceptably, describe several phenomena.</p> <p><span style="font-family: inherit;">Quantum mechanics gives us insight on the finest grains of reality as we can perceive it by telling us that our world is made of funny-behaving “pixels” (</span><span style="font-family: inherit;">Planck length</span><span style="font-family: inherit;">, for the pros), literally several hundreds of trillions of trillions of times smaller than the atom. </span></p> <p>These are all models, and models are nothing but the imaginative representations of observable phenomena.</p> <p>Humans understand nature whenever they can associate observation with imagination. The true problem arises when humans attempt to understand the supernatural. Religious people may give you a different perspective, but we must draw a clear line: nature, by definition, cannot be supernatural, and therefore the supernatural cannot possibly be observed in nature.</p> <p>If a human can imagine or observe a phenomenon, then it clearly cannot be supernatural; hence the very definition of “supernatural” must be part of the conceivable domain of nature. That said, I have my strong reservations about whether we can ever prove or disprove our being part of a simulation in some big alien computer, especially if such a simulation is the Creator of nature itself.</p> <p>Disclaimer: Any findings and conclusions are those of the author, and do not necessarily reflect the view of Lawrence Livermore National Laboratory or the Department of Energy of United States of America. This article has been approved by Lawrence Livermore National Laboratory for public release, IM number LLNL-JRNL-739760.</p> <em>Image credits: Getty Images    </em></div> <div id="contributors"> <p><em>This article was originally published on <a rel="noopener" href="https://cosmosmagazine.com/science/physics/science-cannot-tell-us-if-were-living-in-the-matrix/" target="_blank">cosmosmagazine.com</a> and was written by Alfredo Metere.</em></p> </div> </div>

Technology

Placeholder Content Image

Apple iMac computers return to colourful roots

<p><span style="font-weight: 400;">In the latest installation by Apple, their reinvented iMac design sports a throwback to the original colourful roots from over 20 years ago.</span></p> <p><span style="font-weight: 400;">The new desktop computers exhibit a slim-line design, while being available to purchase in seven different colours - </span><span style="font-weight: 400;">red, orange, yellow, green, blue, purple, silver.</span></p> <p><span style="font-weight: 400;">The throwback colours are a nod to the first iMac computer, which was released in 1998, and became an instant hit.</span></p> <p><span style="font-weight: 400;">They also donned a bold all-in-one design originally released in an unforgettable blue translucent plastic body, that has become an iconic image of the technology revolution. </span></p> <p><span style="font-weight: 400;">This design came after Apple CEO Steve Jobs wanted to reinvigorate the company’s products and global image.</span></p> <p><span style="font-weight: 400;">This company revamp is arguably a key reason for Apple’s incredible ongoing success today.</span></p> <p><span style="font-weight: 400;">Excited customers from all over the world have been getting their hands on the new rainbow iMacs, which is unlike anything else on the tech market today. </span></p> <p><span style="font-weight: 400;">The new devices include a Magic Keyboard, Magic Mouse or Magic Trackpad, which are all rechargeable devices and colour-matched to your iMac of choice.</span></p> <p><span style="font-weight: 400;">The desktop computers also boast a 24 inch screen, six built-in speakers and HD cameras.</span></p> <p><span style="font-weight: 400;">The iMacs start at $1,899, with PC fans saying the price point is definitely justified by the quality of the colourful machine. </span></p> <p><em><span style="font-weight: 400;">Image credits: Shutterstock</span></em></p>

Technology

Placeholder Content Image

A computer can guess more than 100,000,000,000 passwords per second. Still think yours is secure?

<p>Passwords have been used for thousands of years as a means of identifying ourselves to others and in more recent times, to computers. It’s a simple concept – a shared piece of information, kept secret between individuals and used to “prove” identity.</p> <p>Passwords in an IT context <a href="https://www.wired.com/2012/01/computer-password/">emerged in the 1960s</a> with <a href="https://www.techopedia.com/definition/24356/mainframe">mainframe</a> computers – large centrally operated computers with remote “terminals” for user access. They’re now used for everything from the PIN we enter at an ATM, to logging in to our computers and various websites.</p> <p>But why do we need to “prove” our identity to the systems we access? And why are passwords so hard to get right?</p> <p><strong>What makes a good password?</strong></p> <p>Until relatively recently, a good password might have been a word or phrase of as little as six to eight characters. But we now have minimum length guidelines. This is because of “entropy”.</p> <p>When talking about passwords, entropy is the <a href="https://www.itdojo.com/a-somewhat-brief-explanation-of-password-entropy/">measure of predictability</a>. The maths behind this isn’t complex, but let’s examine it with an even simpler measure: the number of possible passwords, sometimes referred to as the “password space”.</p> <p>If a one-character password only contains one lowercase letter, there are only 26 possible passwords (“a” to “z”). By including uppercase letters, we increase our password space to 52 potential passwords.</p> <p>The password space continues to expand as the length is increased and other character types are added.</p> <p>However, the problem with depending on password complexity is that computers are highly efficient at repeating tasks – including guessing passwords.</p> <p>Last year, a <a href="https://www.cbronline.com/news/stolen-user-credentials">record was set</a> for a computer trying to generate every conceivable password. It achieved a rate faster than 100,000,000,000 guesses per second.</p> <p>By leveraging this computing power, cyber criminals can hack into systems by bombarding them with as many password combinations as possible, in a process called <a href="https://www.kaspersky.com/resource-center/definitions/brute-force-attack">brute force attacks</a>.</p> <p>And with cloud-based technology, guessing an eight-character password can be achieved in as little as 12 minutes and cost as little as US$25.</p> <p>Also, because passwords are almost always used to give access to sensitive data or important systems, this motivates cyber criminals to actively seek them out. It also drives a lucrative online market selling passwords, some of which come with email addresses and/or usernames.</p> <p><strong>How are passwords stored on websites?</strong></p> <p>Website passwords are usually stored in a protected manner using a mathematical algorithm called <a href="https://www.wired.com/2016/06/hacker-lexicon-password-hashing/">hashing</a>. A hashed password is unrecognisable and can’t be turned back into the password (an irreversible process).</p> <p>When you try to login, the password you enter is hashed using the same process and compared to the version stored on the site. This process is repeated each time you login.</p> <p>For example, the password “Pa$$w0rd” is given the value “02726d40f378e716981c4321d60ba3a325ed6a4c” when calculated using the SHA1 hashing algorithm. Try it <a href="https://passwordsgenerator.net/sha1-hash-generator/">yourself</a>.</p> <p>When faced with a file full of hashed passwords, a brute force attack can be used, trying every combination of characters for a range of password lengths. This has become such common practice that there are websites that list common passwords alongside their (calculated) hashed value. You can simply search for the hash to reveal the corresponding password.</p> <p>The theft and selling of passwords lists is now so common, a <a href="https://haveibeenpwned.com/">dedicated website</a> — haveibeenpwned.com — is available to help users check if their accounts are “in the wild”. This has grown to include more than 10 billion account details.</p> <p>If your email address is listed on this site you should definitely change the detected password, as well as on any other sites for which you use the same credentials.</p> <p><strong>Is more complexity the solution?</strong></p> <p>You would think with so many password breaches occurring daily, we would have improved our password selection practices. Unfortunately, last year’s annual <a href="https://www.securitymagazine.com/articles/91461-the-worst-passwords-of-2019">SplashData password survey</a> has shown little change over five years.</p> <p>As computing capabilities increase, the solution would appear to be increased complexity. But as humans, we are not skilled at (nor motivated to) remember highly complex passwords.</p> <p>We’ve also passed the point where we use only two or three systems needing a password. It’s now common to access numerous sites, with each requiring a password (often of varying length and complexity). A recent survey suggests there are, on average, <a href="https://www.newswire.com/news/new-research-most-people-have-70-80-passwords-21103705">70-80 passwords per person</a>.</p> <p>The good news is there are tools to address these issues. Most computers now support password storage in either the operating system or the web browser, usually with the option to share stored information across multiple devices.</p> <p>Examples include Apple’s <a href="https://www.computerworld.com/article/3254183/how-to-use-icloud-keychain-the-guide.html">iCloud Keychain</a> and the ability to save passwords in Internet Explorer, Chrome and Firefox (although <a href="https://www.howtogeek.com/447345/why-you-shouldnt-use-your-web-browsers-password-manager/">less reliable</a>).</p> <p><a href="https://tech.co/password-managers/what-is-a-password-manager">Password managers</a> such as KeePassXC can help users generate long, complex passwords and store them in a secure location for when they’re needed.</p> <p>While this location still needs to be protected (usually with a long “master password”), using a password manager lets you have a unique, complex password for every website you visit.</p> <p>This won’t prevent a password from being stolen from a vulnerable website. But if it is stolen, you won’t have to worry about changing the same password on all your other sites.</p> <p>There are of course vulnerabilities in these solutions too, but perhaps that’s a story for another day.</p> <p><em>Written by Paul Haskell-Dowland and Brianna O’Shea. Republished with permission of <a href="https://theconversation.com/a-computer-can-guess-more-than-100-000-000-000-passwords-per-second-still-think-yours-is-secure-144418">The Conversation.</a> </em></p>

Legal

Placeholder Content Image

Are there ‘male’ and ‘female’ brains? Computers can see a distinction

<p>How useful are the well-known and hotly contested categories of “male brain” and “female brain”?</p> <p>Among experts, nobody really questions that anatomical sex differences in the brain exist. But since the advent of brain science, the scientific community has been divided over how many differences there are, which ones have been definitively proven, how large or small they are, and what they actually mean.</p> <p>And, over the past several years, a new debate has been brewing among experts. Do anatomical differences in the brain “add up” to two clearly recognisable (sex-specific) brain types? Or do they rather “mix up” and form idiosyncratic combinations or “mosaics”, independent of sex?</p> <p><strong>A mosaic of male and female features</strong></p> <p>The mosaic hypothesis was supported by the results of a <a href="https://www.pnas.org/content/112/50/15468">ground-breaking study</a> published in 2015 by Daphna Joel and her collaborators at Tel-Aviv University.</p> <p>Using brain scans of more than 1,400 participants, Joel and company identified the 10 regions showing the largest differences in size between men and women. Next, they classified each region of each brain as “male-typical”, “female-typical” or “intermediate”.</p> <p>Most of the brains turned out to be “mosaics” of male-typical <em>and</em> female-typical features, rather than being consistently male-typical (“male brains”) or female-typical (“female brains”). Joel concluded that brains “cannot be categorised into two distinct classes: male brain/female brain”.</p> <p><strong>Algorithms can ‘predict’ sex from brain data</strong></p> <p>Critics of the mosaic brain theory, however, point to <a href="https://onlinelibrary.wiley.com/doi/full/10.1002/hbm.24462">machine-learning algorithms</a> that can use a brain scan to “predict” an individual’s sex with 80 to 90 percent accuracy.</p> <p>If an algorithm can classify brains into sexes so easily, the argument goes, it must be recognising some underlying difference.</p> <p>To some extent, this is a disagreement about what the terms “male brains” and “female brains” should entail. For Joel, using these categories would only be justified if, for example, knowing somebody had a “female” or “male” brain allowed you to predict other things about their brain’s features.</p> <p>But for Joel’s critics, the important thing is predicting the individual’s sex. It doesn’t matter whether or not slotting somebody’s brain into a sex category gives you more information about its structure.</p> <p>Most machine-learning classification algorithms are “black boxes”, which means they don’t reveal anything about <em>how</em> they combine brain features to define “male” and “female” brains. Despite the accuracy of the algorithms, their definitions may not even be consistent: <a href="https://www.frontiersin.org/articles/10.3389/fnhum.2018.00399/full">some evidence</a> suggests the algorithms use different brain features when classifying different subpopulations of females and males.</p> <p><strong>Algorithms’ sex prediction may depend on head size</strong></p> <p>And now even this classification accuracy is under challenge. A research team led by one of us (Carla Sanchis Segura) published <a href="https://rdcu.be/b50w1">a new study</a> that considers a neglected complication. On average, women have smaller bodies, heads and brains than men.</p> <p>In the early days of brain science, these differences in body and brain were mistakenly taken as evidence of (white) men’s intellectual superiority. But in recent years, it has been recognised that head size variation poses a problem for neuroscientists interested in sex differences.</p> <p>When you see a female/male difference in the size of a brain region, how do you know if you are seeing a specific effect of sex? It might simply be a difference between larger brains (more of which belong to males) and smaller brains (more of which belong to females), or a combination of the two.</p> <p>Neuroscientists try to solve this problem by statistically “controlling” for head size. But exactly how is this done?</p> <p>There are several different statistical methods in use. The current “gold standard” for assessing their validity is comparing the sex differences in the brain they find with those obtained in selected groups of females and males matched to have similar head sizes.</p> <p>Using this “gold standard”, the Sanchis-Segura research team found, <a href="https://bsd.biomedcentral.com/articles/10.1186/s13293-019-0245-7">in an earlier study</a>, that not all currently used methods are effective and valid. They also found that the method used has a major impact on the number, the size and even the direction of the estimated sex differences.</p> <p>Having worked out which statistical control techniques are the most valid, Sanchis-Segura and her team were able to investigate an important question: to what extent does the high accuracy of “brain sex” classification depend on head size variation?</p> <p>The researchers tested 12 different sex-predicting machine-learning algorithms with data that had been properly adjusted for head size variation, data that had been poorly adjusted, and data that had not been adjusted at all.</p> <p>The algorithms delivered highly accurate results when using both raw data and poorly adjusted data. But when the same 12 algorithms were fed with properly adjusted data, classification accuracy dropped to 10% above ‘chance’, at about 60% accuracy.</p> <p>One particularly deflationary finding of the study was that the algorithms achieved high accuracy if they were given just one piece of information – namely, head size!</p> <p>These new findings continue to challenge the usefulfness of the categories “male brain” and “female brain”. Sex certainly affects the brain, and sex effects are important to study. But current attempts to classify brains into the categories “male brain” or “female brain” using machine-learning algorithm seem to add little beyond what has been known since the inception of modern science – that men, on average, have larger heads.</p> <p><em>Written by Cordelia Fine. Republished with permission of <a href="https://theconversation.com/are-there-male-and-female-brains-computers-can-see-a-distinction-but-they-rely-strongly-on-differences-in-head-size-143972">The Conversation.</a> </em></p>

Art

Placeholder Content Image

Can’t go outside? Even seeing nature on a screen can improve your mood

<p>Are you feeling anxious or irritated during the coronavirus lockdown? Do you constantly want to get up and move? Maybe you need a moment to engage with nature.</p> <p>Getting into the great outdoors is difficult at right now. But our research soon to be published in <em>Australian Forestry</em> shows you can improve your mood by experiencing nature indoors. This could mean placing few pot plants in the corner of your home office, or even just looking at photos of plants.</p> <p>Our work adds to <a href="https://theconversation.com/biodiversity-and-our-brains-how-ecology-and-mental-health-go-together-in-our-cities-126760">a compelling body of research</a> that shows being around nature directly benefits our mental health.</p> <p><strong>Biophilia</strong></p> <p>Public gardens and parks, street verges with trees and bushes, and even rooftop gardens bring us a <a href="https://www.tandfonline.com/doi/full/10.1080/10630732.2019.1637694">broad range of benefits</a> – boosting <a href="https://doi.org/10.1016/S0749-3797(00)00317-2">physical health</a>, reducing <a href="https://doi.org/10.1016/j.envpol.2013.12.011">air pollution</a>, and even <a href="https://doi.org/10.3390/bs4040394">lowering crime rates</a>.</p> <p>But inside, in your hastily constructed home office or home school room, you may be unable to take full advantage of <a href="https://theconversation.com/green-for-wellbeing-science-tells-us-how-to-design-urban-spaces-that-heal-us-82437">urban nature</a>.</p> <p>Embracing the notion of “biophilia” – the innate human affinity with nature – while locked down inside may improve your productivity and even your health.</p> <p>The <a href="https://theconversation.com/building-a-second-nature-into-our-cities-wildness-art-and-biophilic-design-88642">biophilia hypothesis</a> argues modern day humans evolved from hundreds of generations of ancestors whose survival required them to study, understand and rely on nature. So a disconnection from nature today can cause <a href="https://link.springer.com/article/10.1023/A:1010043827986">significant issues for humans</a>, such as a decline in psychological health.</p> <p>In practice at home, connecting with nature might mean having large windows overlooking the garden. You can also <a href="https://makeitwood.org/documents/doc-1624-pollinate-health-report---february-2018.pdf">improve working conditions</a> by having natural materials in your office or school room, such as wooden furniture, natural stones and pot plants.</p> <p><strong>Indoor plants</strong></p> <p>Our research has demonstrated that even a small number of plants hanging in pockets on along a busy corridor provide enough nature to influence our physiological and psychological perceptions.</p> <p>These plants even caused behavioural differences, where people would <a href="https://www.sciencedirect.com/science/article/abs/pii/S1618866717306763">change their route</a> through a building to come into contact with the indoor plants.</p> <p>We surveyed 104 people, and 40% of the respondents reported their mood and emotions improved in the presence of indoor plants.</p> <p>They felt “relaxed and grounded” and “more interested”. The presence of indoor greenery provides a place to “relax from routine” and it made the space “significantly more pleasant to work in”.</p> <p>As one person reported:</p> <p><em>When I first saw the plants up on the wall brought a smile to my face.</em></p> <p><em>Whenever I walk down the stairs or walk past I mostly always feel compelled to look at the plants on the wall. Not with any anxiety or negative thoughts, rather, at how pleasant and what a great idea it is.</em></p> <p><strong>Looking at wildlife photography</strong></p> <p>Our research also explored whether viewing images, posters or paintings of nature would make a difference.</p> <p>We photographed the plants from viewpoints similar to those the corridor users experienced. Survey responses from those who only viewed these digital images were almost the same as those who experienced them in real life.</p> <p>While we can’t say for sure, we can hypothesise that given the importance of vision in modern humans, an image that “looks” like nature might be enough to trigger a biophilic response.</p> <p>However, physically being in the presence of plants did have some stronger behavioural effects. For example corridor users wanted to linger longer looking at the plants than those who viewed the photographs, and were more likely to want to visit the plants again. Maybe the other senses - touch, smell, even sound - created a stronger biophilic response than just sight alone.</p> <p>So the good news is if you can’t get to a nursery – or if you have a serious inability to keep plants alive – you can still benefit from looking at photographs of them.</p> <p>If you haven’t been taking your own photos, search the plethora of images from wildlife photographers such as <a href="http://gimesy.com/">Doug Gimesy</a>, <a href="http://lanting.com/">Frans Lanting</a> and <a href="https://www.tanyastollznow.com/">Tanya Stollznow</a>.</p> <p>Or check out live camera feeds of a wide range of environments, and travel to far-flung places without leaving the safety of home.</p> <p>While we haven’t tested the mood-boosting effects of live videos, we hypothesise their physiological and psychological effects will be no different than digital photographs.</p> <p>Here are seven places to help you get started.</p> <ul> <li>The <a href="https://bushblitz.org.au/">Bush Blitz</a> citizen science app launched a new online tool today. The species recovery program encourages children to explore their backyard to identify different species.</li> <li>“From the bottom of the sea direct to your screen”: watch this <a href="https://www.natureaustralia.org.au/what-we-do/our-priorities/oceans/ocean-stories/reef-cam-underwater/">underwater live stream</a> of Victoria’s rocky reef off Port Phillip Bay</li> <li>The Coastal Watch website offers <a href="https://www.coastalwatch.com/surf-cams-surf-reports">live camera feeds on beaches</a> around Australia.</li> <li>Watch the running water, trees and occasional fauna in California’s <a href="https://explore.org/livecams/zen-den/live-redwood-cam-1">Redwood Forest River</a>.</li> <li>In pastoral Australia, go on a <a href="https://youtu.be/qqYFgqN_q-w">four-hour drive through the country side</a> along tree-lined roads.</li> <li><a href="https://www.zoo.org.au/animal-house/">Zoos Victoria</a> has set up live cameras that show its animals in natural (and nature-like) environments from Melbourne Zoo and Werribee Open Range Zoo.</li> <li>Yellowstone National Park may be closed right now, but <a href="https://www.nps.gov/yell/learn/photosmultimedia/webcams.htm?sf174893829=1">webcams are stationed</a> in various locations throughout the park.</li> </ul> <p><em>Written by Cris Brack and Aini Jasmin Ghazalli. Republished with permission of <a href="https://theconversation.com/cant-go-outside-even-seeing-nature-on-a-screen-can-improve-your-mood-135320">The Conversation.</a></em></p>

Retirement Life

Placeholder Content Image

How to unfollow a page on Facebook using your phone or computer

<p><span style="font-weight: 400;">Unfollowing a page on Facebook is easy as you don’t have to unlike the page either.</span></p> <p><span style="font-weight: 400;">Unfollowing the page means that notifications and updates won’t appear in your News Feed, but you’ll be able to access the page and its posts if you go to it manually.</span></p> <p><span style="font-weight: 400;">There are two ways to unfollow a page on both mobile and desktop.</span></p> <p><strong>How to unfollow a page on Facebook on your computer</strong></p> <ol> <li style="font-weight: 400;"><span style="font-weight: 400;">Log in to Facebook on a browser on your computer.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Get to the page you want to unfollow.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Hover over the “Following” button on the page and select “unfollow this page”.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">You will receive a notification that says “You have unfollowed [page] and will no longer see posts from this page in your News Feed”. Click on “Done”.</span></li> </ol> <p><strong>How to unfollow a page on Facebook from your News Feed</strong></p> <ol> <li style="font-weight: 400;"><span style="font-weight: 400;">Select the three dots in the upper right hand corner on the page’s post in your News Feed. </span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Select “Unfollow [page].</span></li> </ol> <p><span style="font-weight: 400;">See? Simple! Onto mobile devices.</span></p> <p><strong>How to unfollow a page on Facebook from your mobile device</strong></p> <ol> <li style="font-weight: 400;"><span style="font-weight: 400;">Open the Facebook app on your iPhone or Android phone.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Go to the page that you want to unfollow.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Select the three dots in the top right corner and hit “Following”.</span></li> <li style="font-weight: 400;"><span style="font-weight: 400;">Select the “Unfollow” option under the “In Your News Feed” section. You are also able to turn off page notifications in this section by tapping on “Edit Notification settings”.</span></li> </ol> <p><span style="font-weight: 400;">Unfollowing a page on Facebook from your News Feed on mobile is the same as it is on a computer.</span></p>

Technology

Placeholder Content Image

7 alarming things a hacker can do when they have your email address

<p><strong>1. Send emails from your address</strong></p> <p>This is probably the most obvious thing hackers can do with your email address, and it’s a nuisance for sure. Once hackers have your email address, they can use it to target more than just you, sending out email blasts to anyone (maybe even everyone!) in your contact list. As Garry Brownrigg, CEO &amp; Founder of <a href="https://www.quicksilk.com/">QuickSilk</a>, explains, “They can ‘spoof’ an email message with a forged sender address – they don’t even need your password for this.” The things they send can be anything from harmful malware to scams and requests for money; either way, you’d certainly rather they didn’t come from your address.</p> <p>And although it’s mostly harmless (most savvy internet users are able to catch on when they receive a scam email from a friend’s address), it could still be a problem in some cases. “If a criminal really wanted to hurt someone, they could use this as a way to hook a romantic partner, hack the victim’s employer, get the person in trouble at work, or cause any number of problems in their personal or professional life by impersonating them online,” says Jason Glassberg, co-founder of <a href="https://www.casaba.com/">Casaba Security</a> and former cybersecurity executive at Ernst &amp; Young and Lehman Brothers.</p> <p><strong>2. Send phishing emails</strong></p> <p>Since there isn’t a lot that hackers can do with just the email address, they’re not going to stop there. “When a hacker knows your email address, they have half of your confidential information – all they need now is the password,” warns Greg Kelley of <a href="https://www.vestigeltd.com/">Vestige Digital Investigations</a>. They employ a few different methods to access it, the most common being the phishing email. This is an email, in the guise of being a legitimate email from a trusted source, designed to trick you into logging in. “They might create a legitimate-sounding email that appears to be sent from a service such as Amazon, eBay, Paypal or any number of other popular services… Links in phishing emails will always direct the user to a purposefully built website that looks identical to the real service,” explains Ray Walsh, a digital privacy expert at <a href="https://proprivacy.com/">ProPrivacy.com</a>. “However, if people use the login on that fake website, the hacker instantly receives the credential and password for the real account.”</p> <p>Another way they can do this, ironically, is by sending you an email saying that your account is compromised or has been accessed from a new device, so you need to change your password for security reasons. (You’ve almost definitely had one of those at one point or another!) When you change your password, then your account really is compromised and the hacker has your password. Once hackers have your password, the range of things they can do becomes much greater.</p> <p><strong>3. Access your online accounts</strong></p> <p>Nowadays, our emails do double duty as our logins for scores of social media sites, in addition to Google Docs, online retailers, and so on. Internet users also have a very understandable tendency to use the same passwords for all of these accounts. And even if you don’t use the same password, the hacker can click the old ‘forgot password’ button and use the resulting email – which comes to your email address, which they do have the password for – to change the password, and voilà. Your accounts are their accounts, and they have access to anything on them that you do.</p> <p><strong>4. Access personal information</strong></p> <p>The things hackers can do with your information seem to be something of a chain reaction. Once a hacker has access to your online accounts, just think about all of the information that is right at their fingertips. Allan Buxton, Director of Forensics at SecureForensics, sums it up: “At a minimum, a search on Facebook can get a public name and, unless privacy protections are in place, the names of friends and possibly pictures,” he says. “Throw that email address into LinkedIn, and they’ll know where you work, who your colleagues are, your responsibilities, plus everywhere you worked or went to school. That’s more than enough to start some real-world stalking. That’s just two sites – we haven’t talked about political views, travel or favourite places they might glean from Twitter or Instagram.”</p> <p>Glassberg admits that such ‘real-world stalking’ is rare, sure, but anything is possible in an era where people document nearly everything online.</p> <p><strong>5. Steal financial information</strong></p> <p>Things start to get really problematic if hackers are able to find your credit or debit card information – which, more likely than not, you’ve sent via email at one point or another. Your online bank accounts can also be a major target for hackers, especially if you use your email address as a login for those, too. And, needless to say, once a hacker has access to those, your money is in serious jeopardy. “This is one of the biggest risks you’ll face from an email hack,” Glassberg says. “Once [hackers] have the email, it’s easy to reset the bank account and begin issuing transactions.” In addition to potentially being devastating of your finances, this can also hurt your credit score, as <a href="https://www.beenverified.com/">BeenVerified</a>’s Chief Communications Officer Justin Lavelle explains: “Cybercriminals can use your credit card details, open bank accounts in your name, and take out loans. It will likely ruin your credit card’s rating and your credit report will take a hit.”</p> <p><strong>6. Blackmail you</strong></p> <p>As if things weren’t scary enough, hackers can use your personal info to ruin, or threaten to ruin, your reputation. This is fairly rare, but it can happen, especially if a hacker finds something that the user wouldn’t want to be seen publicly. “[Hackers] can use this access to spy on you and review your most personal emails,” says Daniel Smith, head of security research at <a href="https://www.radware.com/">Radware</a>. “This kind of information could easily be used to blackmail/extort the victim.”</p> <p><strong>7. Steal your identity</strong></p> <p>This is definitely a worst-case scenario, but “once the hacker has your personally identifiable information, they can steal your identity,” Brownrigg warns. With information like your tax file number and credit card info, identity theft can sadly be well within reach for hackers. So, if you start noticing signs someone just stole your identity, consider that your email address may have been compromised.</p> <p><strong>How you can stay safe from hackers</strong></p> <p>Hopefully, though, you won’t have to encounter any of these problems, and there are some measures you can take to keep your information safe. Avoid using your verbatim email address as a login for other sites, and make sure that your password is strong and difficult to guess. You should also change those passwords every couple of months or so for maximum security. Glassberg also recommends securing your email account with two-factor authentication. This “[requires] a one-time code to be entered alongside the password in order to gain access to the email account,” he told RD. “In most cases, the code will be texted to the person’s phone, but there are also apps you can use, like Google Authenticator.”</p> <p>And, of course, just use common sense. Don’t share information or type in your email password on public WiFi networks, and be smart about the information you share over email.</p> <p><strong>What to do if you think you’ve been hacked</strong></p> <p>Starting to notice some strange online activity? There are a couple of ways you can try to get ahead before it gets too bad. If you hear about spam emails being sent from your address, change your password immediately. You should also tell your contacts so that they know to ignore anything coming from you. Finally, Lavelle offers some other suggestions: “Change your email settings to the highest privacy setting, scan your computer for malware and viruses, and be sure your browsers are updated,” he says.</p> <p><em>Written by Meghan Jones. This article first appeared in </em><em><a href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/7-alarming-things-a-hacker-can-do-when-they-have-your-email-address">Reader’s Digest</a>. For more of what you love from the world’s best-loved magazine, </em><a href="http://readersdigest.innovations.co.nz/c/readersdigestemailsubscribe?utm_source=over60&amp;utm_medium=articles&amp;utm_campaign=RDSUB&amp;keycode=WRN93V"><em>here’s our best subscription offer</em></a><em>.</em></p> <p><img style="width: 100px !important; height: 100px !important;" src="https://oversixtydev.blob.core.windows.net/media/7820640/1.png" alt="" data-udi="umb://media/f30947086c8e47b89cb076eb5bb9b3e2" /></p>

Technology

Placeholder Content Image

“Criminal”: Apple faces backlash after unveiling $1,400 computer stand and $7,000 screen

<p><span style="font-weight: 400;">Apple has been slammed as “criminal” and “flat-out delusional” for announcing a computer screen stand that costs $1,400.</span></p> <p><span style="font-weight: 400;">They showed off the stand at the Worldwide Developers Conference 2019 keynote, as well as unveiling the new Mac Pro.</span></p> <p><span style="font-weight: 400;">The new Mac has been dubbed the “most powerful Mac Ever” and starts at $8,570. It can be purchased alongside a new high-spec computer monitor, which will set consumers back an additional $7,140.</span></p> <p><span style="font-weight: 400;">To top off the purchase, you can purchase a new aluminium “stand” for the monitor, which is an extra $1,426.</span></p> <p><a href="https://www.theverge.com/circuitbreaker/2019/6/3/18651208/apple-mac-pro-how-much-top-spec-price-estimate-ballpark"><span style="font-weight: 400;">The Verge</span></a><span style="font-weight: 400;"> has estimated that a top spec Mac Pro could cost $48,187 all up.</span></p> <blockquote class="twitter-tweet" data-lang="en-gb"> <p dir="ltr">There was an audible reaction in the whole audience when <a href="https://twitter.com/Apple?ref_src=twsrc%5Etfw">@Apple</a> announced that they are charging $999 for the Mac Pro Display “stand”....like not including that for $4999 is just criminal. 😒<a href="https://twitter.com/hashtag/AppleKeynote?src=hash&amp;ref_src=twsrc%5Etfw">#AppleKeynote</a> <a href="https://twitter.com/hashtag/WWD2019?src=hash&amp;ref_src=twsrc%5Etfw">#WWD2019</a></p> — Jean François Loza (@GlitchComputer) <a href="https://twitter.com/GlitchComputer/status/1135809665084809216?ref_src=twsrc%5Etfw">4 June 2019</a></blockquote> <p><span style="font-weight: 400;">Twitter user, @John_nguyen0 said: “Can’t tell if Apple is trolling people with the $US1,000 monitor stand or are just flat out delusional.”</span></p> <p><span style="font-weight: 400;">@MOTE_Games said: “If Apple wants to sell me a stand for $US999 it damn better be able to stop time or something.”</span></p> <p><span style="font-weight: 400;">It's unclear why Apple are charging this much for a computer stand, which can often be found for as little as $36 online.</span></p> <p><span style="font-weight: 400;">However, if you do purchase the new Mac Pro, you’re unable to use a third party stand unless you purchase a VESA Mount Adapter, which is conveniently offered by Apple for $284.</span></p>

Technology

Placeholder Content Image

The 4 most confusing computer technology terms explained

<p>Before we get started, here is a quick overview of the amount of space available in computers.</p> <ul> <li>The letter “G” (for “giga”) before a unit of measure means the value is multiplied by 109 (one billion).</li> <li>The letter “T” (for “tera”) before a unit of measure means the value is multiplied by 1012 (one million million).</li> <li>Therefore, 1 Tera = 1,000 Giga and 1 Giga = 1,000 Mega.</li> </ul> <p>Some of the most confusing terms are:</p> <p><strong>1. Processor speed</strong></p> <p>This is the speed at which a computer can run applications.</p> <p>It is measured in hertz (abbreviation: Hz). As technology develops, recent computers’ processing speeds have come to be noted in either MHz (megahertz) or GHz (gigahertz) because they are so fast.</p> <p>The higher its processing speed, the faster a computer will be able to run word processing applications (Word), music players, imaging software, etc.</p> <p>For example, programs will respond faster on a computer with a 2 GHz processor than on one with a 1.66 GHz processor.</p> <p><strong>2. RAM (Random Access Memory)</strong></p> <p>A type of computer data storage; in common usage, RAM basically represents the memory available to the programs running on your computer (word processor, music player, internet browser, etc.).</p> <p>More RAM allows you to run more applications at once.</p> <p>For example, you could surf the web while listening to music, chatting with a friend on an instant messaging program, and working on a word processing document without your computer slowing down-but only if it has a sufficient amount of RAM.</p> <p>If not, you could experience a delay in the different applications’ response, causing them to “freeze” temporarily.</p> <p>Therefore, the more RAM there is on your computer, the better. Newer computers usually have a minimum of 4 GB of RAM.</p> <p><strong>3. Hard disc drive</strong></p> <p>More commonly referred to as the “hard drive”, this is where your computer stores data such as music files, photos, videos, and various documents.</p> <p>The storage capacity of hard drives is measured in bytes. The bigger your hard drive, the more files you can store.</p> <p>Nowadays, most computers usually come with a hard drive of over 500 GB. There are also external hard drives, which are not built into a computer.</p> <p>You can connect them to your computer through a USB port (see next point), allowing you to store your files.</p> <p>It is recommended to back up (i.e. copy) your files onto an external hard drive; in the event that your computer crashes, at least you won’t have lost all your data (music, photos, documents, etc.).</p> <p>Some newer external hard drives have a capacity of over 5 TB (5,000 GB).</p> <p><strong>4. USB (Universal Serial Bus) Port</strong></p> <p>This is the place where you plug in devices that may not have come with your computer. The “U” in “USB” stands for “universal”, which means that this port is usually found on both Mac computers and PCs, and is the standard type of plug for most computer add-ons like external hard drives, joysticks (to play games), and digital camera and cellphone cables.</p> <p>Mainly, USB ports allow you to use these devices, or in the case of camera and cellphone cables, transfer data (files such as music, pictures, etc.) from your computer to the other device, or vice-versa.</p> <p>The USB port is also where you would plug a USB key, which is basically a small memory stick (perfect to keep in your purse!) where you can store data to transfer it from one computer to another, or just as a back up for safekeeping.</p> <p class="p1"><em>Written by Marieve Inoue, Divine.ca. This article first appeared in <a href="http://www.readersdigest.com.au/true-stories-lifestyle/science-technology/4-most-confusing-computer-technology-terms-explained?items_per_page=All">Reader’s Digest</a>. For more of what you love from the world’s best-loved magazine, <a href="http://readersdigest.innovations.co.nz/c/readersdigestemailsubscribe?utm_source=over60&amp;utm_medium=articles&amp;utm_campaign=RDSUB&amp;keycode=WRN87V">here’s our best subscription offer.</a></em></p> <p><img style="width: 100px !important; height: 100px !important;" src="https://oversixtydev.blob.core.windows.net/media/7820640/1.png" alt="" data-udi="umb://media/f30947086c8e47b89cb076eb5bb9b3e2" /></p>

Technology

Placeholder Content Image

These tech hacks will transform your life

<p class="sics-component__html-injector sics-component__story__intro sics-component__story__paragraph">The more time we spend on devices, the more important it is to learn how to use them well.</p> <p class="sics-component__html-injector sics-component__story__paragraph">Most of us can do the basics but learning a few tricks can make your digital life more efficient.</p> <p class="sics-component__html-injector sics-component__story__paragraph">The tips below will also hopefully help you enjoy your devices more, too.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Voice assistant</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">Siri (Apple), Cortana (Microsoft), Google Now and Bixby (Samsung) are fun to use but can be frustrating as they don't always get it right.</p> <p class="sics-component__html-injector sics-component__story__paragraph">But that doesn't mean they're not worth using. I mainly use my voice assistant to make calls when driving so I can be hands-free. To do this say "call Bob on speakerphone". </p> <p class="sics-component__html-injector sics-component__story__paragraph">That way you don't need to take your eyes off the road and it goes to speaker straight away.</p> <p class="sics-component__html-injector sics-component__story__paragraph">It's also handy if you're busy at home or work and want to make a quick call without stopping what you're doing.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Get organised</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">Putting all your smartphone apps on one screen will make it easier to find everything.</p> <p class="sics-component__html-injector sics-component__story__paragraph">First, put your three or four most-used apps in the dock at the bottom. Then put the next 12 most-important apps at the bottom of the home screen.</p> <p class="sics-component__html-injector sics-component__story__paragraph">Everything else will live in folders in the spaces you have left. So you can group all your news or photo apps in one folder. Do the same for games, music, work, etc. </p> <p class="sics-component__html-injector sics-component__story__paragraph">If you take the time to do this you'll find it a lot quicker to locate apps.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Do not disturb</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">This is one of the best features on your smartphone. It allows you to silence notifications, calls and messages during certain times. </p> <p class="sics-component__html-injector sics-component__story__paragraph">You can set it up so your phone is quiet between 10pm and 7am so you and your partner aren't disrupted by pings and buzzes while you sleep. Of course, you need to set it up on your partner's phone, too.</p> <p class="sics-component__html-injector sics-component__story__paragraph">You can still allow calls from certain people so you don't miss anything urgent or important.</p> <p class="sics-component__html-injector sics-component__story__paragraph">The feature is available on both iPhones and Android devices.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Downloading from YouTube</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">Sometimes you may see a video on YouTube that you'd like to download. </p> <p class="sics-component__html-injector sics-component__story__paragraph">You can do this by typing "ss" before the "youtube" part of a video's web address. You can then select different file types and resolution. </p> <p class="sics-component__html-injector sics-component__story__paragraph">The same can be done for music on YouTube videos. Do to this, just type "listento" before the "youtube" part of a video's web address.</p> <p class="sics-component__html-injector sics-component__story__paragraph">Remember downloading copyrighted content is illegal.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Second email account</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">Major sites are hacked all the time so an easy way to avoid being exposed is to have a second email account dedicated to social media and website logins.</p> <p class="sics-component__html-injector sics-component__story__paragraph">This ensures your main account is protected and your personal data won't be compromised if a certain site is hacked.</p> <p class="sics-component__html-injector sics-component__story__paragraph">The other bonus is that your main account won't be flooded with newsletters and spam. The downside is that you have to remember two passwords and monitor two accounts.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Reading time</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">This website is handy for voracious readers or anyone worried their book won't be long enough for the flight they're about to take.</p> <p class="sics-component__html-injector sics-component__story__paragraph">You can search for any book on <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__howlongtoreadthis.com&amp;d=DwMFaQ&amp;c=N9aEhCy8U0rJkO1xCZf7rgM9fohfR5qe_N93viZd7O8&amp;r=ij_s0uePcCVv2WQwXK_RhjqihaBqIRA5o_4Yk3L1Cic&amp;m=sZ8GG2bnfyOwlyIqyyo5ZiIsExy-H9zbtlpJIKFa5Bo&amp;s=vjR3IjYep2RAzL5NquPhoxNsL4fjYlU0TncolZ78Yp8&amp;e=" title="">howlongtoreadthis.com</a> and it'll estimate the time it takes.</p> <p class="sics-component__html-injector sics-component__story__paragraph">It's pretty accurate but it can be a bit depressing knowing that novel you've been wading through for the past few months should've only taken you eight hours to read!</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Closed tab shortcut</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">There are dozens of shortcuts built into computers and software. It's tricky to remember more than a few but one worth committing to memory is the re-opening a tab in your web browser that you've accidentally closed.</p> <p class="sics-component__html-injector sics-component__story__paragraph">If you press command+shift+T on a Mac or control+shift+T on Windows PC the tab will reopen and save you a bit of tech pain.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Email shortcut</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">It can be a hassle typing out your email address on your smartphone several times a week when logging into accounts.</p> <p class="sics-component__html-injector sics-component__story__paragraph">The best way around this is to create a keyboard shortcut so you can, for example, type "xo" and your email address appears. </p> <p class="sics-component__html-injector sics-component__story__paragraph">To do this on an iPhone, go to Settings, General, Keyboards and then Text Replacements. For Android devices, go to Settings, Language and Input, Keyboard and then Text Shortcuts.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><strong>Night lights</strong></p> <p class="sics-component__html-injector sics-component__story__paragraph">With most people spending more time on devices, it is important to limit your exposure to blue light from screens.</p> <p class="sics-component__html-injector sics-component__story__paragraph">Most devices now have settings to cut it out which helps reduce eye strain and improves sleep patterns.</p> <p class="sics-component__html-injector sics-component__story__paragraph">You need to go into your device's display settings and enable the feature which is called "night light" in Windows and Android devices and "night shift" in Apple devices.</p> <p class="sics-component__html-injector sics-component__story__paragraph"><em>Written by Blayne Slabbert. Republished by permission of <a href="https://www.stuff.co.nz/business/106158720/these-tech-hacks-will-transform-your-life">Stuff.co.nz</a>.</em></p> <p class="sics-component__html-injector sics-component__story__paragraph"> </p>

Technology

Placeholder Content Image

Why all seniors should play computer games

<p>As a woman who is almost 70 years old, I have not kept up with technology at the rate that I would have liked. I have, however, discovered a couple of games on my laptop or phone that I enjoy playing. One is called <em>Words with Friends</em> and follows the principles of <em>Scrabble</em>. And I love words! </p> <p>After watching my mother slowly decline cognitively with Alzheimer’s, I am conscious of maintaining my brain power, and what better way than a fun game?</p> <p>There is another bonus to playing <em>Words with Friends </em>(<em>WwF</em>)<em>, </em>and that is staying in touch (in a superficial sort of way) with people on a daily basis. I find this comforting since retiring from a varied career in education which spanned 44 years. I have a close friend, Teresa, who lives in the country about a two hour drive from where I live in Melbourne. Teresa’s husband of 32 years died suddenly three years ago, only two months after my best friend died of cancer. I spent time with Teresa at her beautiful property, supporting her in her grief and helping conduct the memorial service to celebrate her husband’s life. I introduced Teresa to <em>WwF</em> at that time and we have played almost daily since then. <em>WwF</em> is fairly easy to keep to a moderate use of time, as I must wait for the other to make their moves before I can play again. I also love playing several games with three local friends and several of my relatives in California.</p> <p>Another computer game I play is <em>Lumosity,</em> a brain training game that addresses such skills as speed, attention, memory, flexibility and problem solving.  <em>Lumosity </em>contains games with only one player versus the electronic game. So, there is no need to wait on another player to repeat the game.   Over time, I found myself self-selecting games that I particularly enjoyed.  I started playing the same two games over and over to try to increase my score.</p> <p>Lately, while playing <em>Lumosity</em> games, I have been reminded of a familiar compulsive behaviour to keep playing the same game.  So, the conversation to myself goes something like this: </p> <p>“OK, you’ve played <em>Train of Thought </em>five times now, so this will be your last game today”.</p> <p>“Oops! I’ve started another game...can’t quit now, this one will be my last game”.  At the end of this game, I hear my mind saying, “just one more...”!</p> <p>Why was this compulsive behaviour familiar to me? For most of my life I have battled serious overeating, favouring sweet foods. That began as a young child. This scourge, which I wouldn’t wish on my worst enemy, was rife with breaking my own promises to myself, mental obsession, and experiencing a compulsion where it seemed I had no choice. The effect, naturally, was weight gain, followed by a rigid regime of dieting... over and over again. I have lost up to 30 kilograms on several occasions (using an array of diets, 12 step programs such as <em>Overeaters Anonymous</em>, hypnotism, numerous counsellors and therapists).</p> <p>So, when I observe the conversation in my mind, “this is your last game now”, I remember the same struggle with, for example, chocolate biscuits. I would eat 3 chocolate biscuits and then put the packet away in the cupboard, saying to myself, “that’s all you need”. I’d return back to the task at hand, but my mind was obsessed with the biscuits. Such messages drifting from my own brain would be, “go ahead, have a couple more. You deserve it. They are so delicious”. Inevitably, I ate the entire packet. Arrgghh!</p> <p>Fortunately, I have controlled the weight gain in the last few years with the help of Bariatric surgery.  I had a lap band fitted a few years ago, which limits the amount of food I can eat. I have learned to eat more slowly, take small bites, and chew thoroughly. I’ve been wearing the same size clothes for 3 years, which seems quite miraculous to me!</p> <p>One of the things these two compulsive behaviours have in common is that I only ever binged on food or <em>Lumosity</em> games when I was alone. It is a secret. Fortunately, I don’t believe there are too many downsides to spending 30-40 minutes a day on playing <em>Lumosity</em> games on my laptop and I am not too worried about it. I am pleased that I am aware of the compulsive behaviours when they creep in and I value my life experience at these times.  So, after playing and replaying <em>Lumosity</em> games for 40 minutes, I take my dog for a walk to the local dog park where she loves socialising with the other dogs. And I make sure I socialise with the other dog owners.</p> <p><em>Laurie Darby was a guest on Insight SBS, which explores video gaming and the impact it can have on Australian’s lives. Watch 8.30pm, August 7, on SBS. </em></p>

Mind

Placeholder Content Image

Top tips to help you buy a new computer

<p>Buying a new computer is a lot like ordering a pizza: You think it's a fairly simple task until you realise how many choices you need to make.</p> <p>But if your existing machine is so old it could barely run solitaire, you're probably due for an upgrade.</p> <p>The good news is that there are many new exciting developments in the computer space.</p> <p>Aside from figuring out your budget, of course, the following are some questions you might want to ask yourself to help decide what's right for you.</p> <p><strong>What will I use it for?</strong></p> <p>How you plan on using your new computer should dictate what kind to buy.</p> <p>If you only want a computer for light tasks - such as web browsing, reading email, and checking on social media - then you could go with modest specifications (specs), which should have a modest price, too. Something with an Intel Core i3 or i5 should be sufficient.</p> <p>On the other end of the spectrum, if you're looking for a machine that can handle high-end computer games, virtual reality or video editing, you'll need to invest in a faster processor, better graphics capabilities, and more RAM (system memory). An Intel Core i7, NVIDIA graphics, and 16GB or 32GB of RAM (instead of 4GB or 8GB) is a good idea.</p> <p>When it comes to storage, more and more laptops have a solid-state drive (SSD) instead of a hard disk drive (HDD), which makes these laptops thinner, lighter, faster and more energy efficient. Like the flash memory in your smartphone, SSDs are also less prone to damage because there are no moving parts.</p> <p>That said, I like to say purchasing a computer should be like buying kids clothes: go a little bigger than you need today, so you can grow into it for longer-term savings. You don't want to have "buyer's remorse" by picking something underpowered, only to replace it in a year from now.</p> <p>Stick with a brand you've had a good experience with, or ones your friends and family highly recommend (and critics, too).</p> <p><strong>What OS should I go with?</strong></p> <p>This question may also be tied to the "What will I use it for?" decision, especially if there's software you want to run that only works with a specific operating system (OS).</p> <p>Otherwise, you've got three main choices today: Windows, Mac and Chromebook. (Yes, there's Linux, too, but not a mainstream pick.)</p> <p>Stick with the operating system you're most comfortable with. If you're not sure, or feel like a change, know that each OS has its advantages.</p> <p>Windows 10 is the most popular choice today. It's offered by nearly all the biggest computer brands - such as Dell, HP, ASUS, Lenovo, Acer and so on - plus Microsoft makes their own Surface-branded PCs, too.</p> <p>It's easy to use, works with the most software and hardware out of any OS, and the Windows Hello feature means you can log onto your device by simply looking at your computer's camera. Windows 10 offers multiple ways to interface with your content, whether it's a keyboard, trackpad or mouse; using a stylus pen on the screen for greater precision (often called "digital inking"); fingertips on a touchscreen; or by using your voice with the Cortana personal assistant.</p> <p>Apple's Mac family are also a popular pick. Since Apple is the only one that manufacturers Macs - like the MacBook Air and MacBook Pro - there is generally better quality control, and built with premium materials.</p> <p>Macs tend to last a long time (but not their chargers), though Macs cost more, on average, when compared to Windows and Chromebooks with comparable specs.</p> <p>Many find them easier to use than other operating systems (thought that boils down to personal preference, of course). Apple includes many of its top software for free (or a free download from the Mac App Store), plus there is a lot of software for Macs today, too.</p> <p>Powered by Google's Chrome OS, Chromebooks are generally more affordable than Windows and Macs, but there are some premium Chromebooks available.</p> <p>Chromebooks usually ship with popular Google apps already preinstalled, such as Gmail and Google Maps. Generally speaking, Chromebooks have modest specs, such as little local storage, but most Google apps are cloud-based anyway. Chrome OS is billed as a lean, fast operating system, designed for mostly basic tasks, and with good value.</p> <p><strong>What type do I choose?</strong></p> <p>If it's been a while since you shopped for a laptop, you'll notice many are incredibly thin and light, making them much easier to carry around with you to and from coffee shops, the office, school, airplanes, and so on.</p> <p>Many Windows-based laptops are "2-in-1s", as they can transform from a laptop to a tablet and back again. Some 2-in-1s are called "convertibles" as they convert from laptop mode to tablet by simply bending back the screen, which is on a 360-degree hinge, and disables the keyboard in favour of tapping and swiping the screen. While less popular, other 2-in-1s are called "detachables" as the screen detaches altogether, which you can then bring with you as a tablet.</p> <p>While laptops are often preferred because they're portable, stationary desktop computers might be more ideal for younger kids. Why? If you put it in a highly trafficked area of the home, you can keep an eye on where they're going online. They're usually less expensive than laptops and harder to break since they're less mobile.</p> <p>Many of today's desktops are often "all-in-ones," which is when the computer is built into the back of the large monitor, so there's no tower to take up additional space. Ideal to place anywhere in a home - such as a kitchen counter, in a home office, or a teenager's room - many all-in-ones have a touchscreen and often ship with a wireless keyboard and mouse.</p> <p>But if you're buying a desktop for a gamer, an all-in-one isn't as modular, since it's not so easy to update storage, memory or graphics cards. Instead, a tower setup may be best for a gamer.</p> <p>As you can see, there's a lot to decide when buying a new computer - it's not a one-size-fits-all scenario - but along with how much you have to spend, ask yourself these three questions to help you whittle down your options.</p> <p><em>Written by Marc Saltzman. Republished with permission of <a href="http://www.stuff.co.nz/" target="_blank"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p>

Technology