right to be forgotten
Continue Reading

What Exactly is the “Right to be Forgotten”? Explanation and Full Text of Decision

This week the European Union Court of Justice in Luxembourg ruled that individuals have a “right to be forgotten” by search engines. While it was a Google listing which complainant M of Spain sought to have removed, and on which the EU Court of Justice ruling turned, the holding applies across a broad spectrum of search engines and other aggregators of personal data about individuals.

how to multiple authors google authorship
Continue Reading

3 Steps to Setting Up Google Authorship for Multiple Authors

Setting up Google authorship when you have a site with multiple authors is easy – once you know how. Here is a step-by-step tutorial in three steps for how to set up Google authorship for a site with multiple authors. For the purposes of this article, we are going to refer to the Wordpress CMS (Content Management System), but the steps should be similar for any CMS.

google special hiring non poach policy
Continue Reading

Employees Hurt by Illegal Non-Poach Agreement Between Apple, Google, Intel, IBM, eBay, Microsoft, and Others to Get Day in Court

Employees of more than a dozen high tech giants were subject to a secret agreement (see the smoking gun documents) between the companies to not poach each other’s employees. The deal, labelled “Techtopus” by journalist Mark Ames, included Apple, Google, Intel, Adobe, Dell, IBM, eBay, Microsoft, Comcast, Clearchannel, Dreamworks and Pixar, and British public relations company WPP (which stands for Wire and Plastics Products – they started out as a manufacturer of shopping baskets).

man in front of computer
Continue Reading

Make Your Email Client, Phone and Tablet Apps Work with Google 2-Factor Authentication

If you’ve set up Google two-factor authentication (also known as 2-step verification – the second step is an SMS text message) and can’t figure out how to get your email program, iPhone mail application (or any other iPhone or Android phone application) or your iPad or other tablet apps to work with Google services such as Gmail or Google Voice, here is a simple, step-by-step tutorial for how to set up an email client or any other app or application to work with your two-factor verification protected Google account.

wordpress rss the post appeared first on
Continue Reading

You Changed Your Google Password and Now Your Phone, Tablet or Mail Program Doesn’t Work?

If you’ve recently changed your Google password, only to find that your new password is not working with your email program, iPhone, Android smartphone, or iPad or Android tablet, so that you can’t access Google services such as Gmail, here may be your problem.

2-factor authentication
Continue Reading

Why to Set Up Two-Factor Authentication (“2FA”) Everywhere You Can – Here’s Where

Here is why you must set up two-factor authentication (also called 2-step verification, or simply “2FA”) wherever you can. Many places now offer it, including Facebook, Paypal, Twitter, and, of course, Gmail (Google). You may in fact remember the story of how Naoki Hiroshima lost their Twitter account, valued at $50,000, to a hacker. Basically the hacker managed to get into and redirect Hiroshima’s email domain, allowing the hacker to do password resets on some of Hiroshima’s accounts, and intercept the password reset emails. It’s very easy for someone to do a password reset on an account if they have the email address, however with 2-factor authentication is becomes a lot harder.

google is big brother watching you
Continue Reading

Google Acquires Smart Thermostat Company Nest

Google has just announced that it will acquire Nest Labs, the company that has put smart thermostats in homes. Meaning that Google will now be monitoring your home for you.

2-factor authentication
Continue Reading

How to Set Up Google 2-Step Verification, and Why You Should

Your eyes may glaze over when anybody mentions Google two-step SMS verification (also known in some circles as Google 2-Factor Authentication), but in reality, if you have any sort of Google account (Gmail, etc.), and a cell phone to get a text message, it’s easy as pie to set up. It is certainly far easier to set up than it is to deal with the aftermath of someone hacking into your Google account.

how to find google qr code barcode-1
Continue Reading

How to Find the Google 2-Step Verification QR Barcode to Set Up the App on Your Phone

If you are asking yourself “Where is the QR code to scan to set up the Google 2-Step Verification authenticator app”, you may be fairly frustrated at this point trying to find that lousy barcode. Don’t blame yourself, it is completely inobvious. Here’s how to find the QR code to set up the Google 2-factor authentication authenticator app.

Gmail logo
Continue Reading

Google Announces “Download All of Your Gmail Messages”

Google has announced that, starting now, you can download all of your Gmail email, and also your calendar data. The Gmail download will put your messages in “mbox” format (a standard email format which most email programs can use, or at least from which they can import).

key going into lock
Continue Reading

Millions of Facebook Passwords and Other Passwords Stolen in Massive Breach by Pony Botnet Controller

The Pony Botnet Controller virus – which may be on your computer – has stolen millions of Facebook passwords, Google passwords, Twitter passwords and Yahoo passwords, along with log-in credentials from email accounts and even FTP accounts. All told more than 2 million account usernames and passwords were stolen.

The Internet Patrol default featured image
Continue Reading

Digital Disobedience by Juries Leads to Mistrials, New Jury Rules Against Jurors Using Smartphones to Google and Tweet

We’re all familiar with the movies and stories about jurors who skirt or even violate rules in the name of “real justice” (one of our favorites is the little-known movie Suspect, with Liam Neeson, Dennis Quaid, John Mahoney (best known as Frasier’s dad), and Cher). But it’s become a serious problem as the confluence of Google, social media, and smartphones in the pocket of every juror has led to a phenomenon known as the “Googling juror”, or “digital disobedience”. Put simply, jurors are taking matters into their own hands, doing extra-curricular (and extra-legal) research, and also sharing information on social media, which is throwing trials, and even causing mistrials.

The Internet Patrol default featured image
Continue Reading

PRISM Whistleblower Edward Snowden of Booz Allen Hamilton Tells All in 12-minute Video – Transcript Here!

Edward Snowden has come forward as the whistleblower in the NSA and PRISM scandal in which it has been discovered that through the PRISM program, the NSA and other agencies have had access to user data at such major Internet companies as Google, Yahoo, Microsoft, Hotmail and Apple. In the 12+ minute interview, Edward Snowden explains why he did it, and admits that by outing himself, he puts himself in danger from agencies such as the CIA and the NSA itself.

The Internet Patrol default featured image
Continue Reading

The NSA PRISM Spying Program with Facebook, Apple, Google, Microsoft, Yahoo, Verizon and Others Explained in Plain English

The Internet, the country, and indeed the whole world is abuzz with the news of PRISM, the no-longer-secret program of the U.S. National Security Agency (NSA) first exposed by Glenn Greenwald of the British newspaper The Guardian, through which the United States federal government is accessing and mining all sorts of user data from the major ISPs and possibly cell phone companies. Data which is potentially about just about anybody and everybody, even you. The list of companies and ISPs alleged to be involved with PRISM, by which we mean allowing the government to data mine their users’ data, is impressive (read as “scary”) indeed, although most of them are quick to deny it. However, we have evidence (see screenshots below) that even though they are denying it, Apple, Microsoft, Yahoo, Facebook, PalTalk, YouTube, Skype, and AOL are all involved. There are rumours of DropBox and Amazon joining. And Verizon is also giving the Feds access to their user data. But as 1984 as this all is, we really only have one question: why is anybody surprised?

The Internet Patrol default featured image
Continue Reading

The Accidental Tourist Guide Acquisition: Google Buys Frommer’s, Shutters Frommers, Sells Frommers Back to Frommer

Last year, Google acquired the popular travel guide publication, Frommer’s. The deal included the print version of the Frommer’s travel guidebook, and the online version. Of course, what Google was really paying for was all of the reviews, so that they could incorporate them into their online reviews. Last month, Google announced that it would discontinue the beloved and venerated print version of Frommers book. But just this week it has been announced that Google has sold the Frommer’s brand back to Arthur Frommer, who will continue to publish the printed travel guidebooks, as well as the Frommers.com website.