VISITOR COUNT

Showing posts with label TIPS. Show all posts
Showing posts with label TIPS. Show all posts

Part One: Why Your Passwords Are Hackable

This post is Part One of Three. Part One will discuss passwords and password formulas and basic hacking. Part Two will talk about the most used (not the most common) pet names. Part Three will show you how to make a good password that you don't have to remember.

As much as you have read that you shouldn't use your passwords more than once, it's human nature. Everyone does it.    

By the time you are done reading all three parts, if you don't want to change the passwords that you use on your websites, then we can only assume that:

  • you feel 100% safe because you have chosen the perfect passwords OR
  • you already use your passwords only once, OR
  • you are lazy, OR 
  • the job is too big because of how many passwords you have to change, OR
  • you don't care about your online security


Hackers are able to hack so many accounts because users choose weak guessable passwords
Hackers are able to hack so many accounts
 because users choose weak guessable passwords


When users think that their chosen password is the absolute best password ever that no one will ever guess, this makes them feel so secure so that they are more likely to use it on more than one website.  

The longer they go without an intrusion or a hacking scare, the more likely they are to not change them for long periods of time because they assume if nothing bad happened all this time, then there is no reason to change their passwords.  


  
The Top Reasons Why People Re-Use Passwords

People re-use passwords for a variety of reasons, the most common one is that it's easy to remember.  The average online user:

  • changes their password every three to five years 
  • will not make up a new password and instead will re-use one that they have used in the past
  • often keeps a list of five or more passwords they have used for years and they recycle them whenever they change their password  
  • likes to pick a new password from something old, something that is familiar

Humor us and take a look at these lists of passwords and password formulas. 

If your password (or a variation of it) is on any of the lists, and if you have used it on more than one website, then you seriously need to consider changing it or, at the very least, enhancing it to make it stronger.  


These lists are commonly used passwords as defined by experts which are the most hackable.  We admins have seen these passwords used by hacked accounts that we have helped to recover.


In no particular order, both with or without capitalization and with or without a mixture of numbers, letters or symbols:


Examples of Bad Passwords

  • the word "password" in any format
  • username or myusernameis
  • 00001234
  • yournamehere
  • password123456
  • qwerty 
  • letmeinnow
  • asdf_jkl; 
  • numbers in sequences:  987654321 or 123456789
  • abc123
  • dragon
  • admin1234
  • starwars
  • helloitsme
  • mypasswordis
  • JFK11221963
  • 11111111
  • charlie tuna
  • youvegotmail
  • barack obama
  • the word "welcome"
  • donald trump
  • mactheknife
  • facebook1234
  • hilary clinton
  •  q1w2e3r4t5y6 
  • abcdefg or abcd1234
  • the words "iloveyou"
  • the words "your name here"

Examples of Bad Password Formulas  

  • city of birth (belonging to you or a family member) and a birth year
  • a pet's name, no matter if it is your pet or not
  • your first, middle, maiden or divorced name or an immediate family member
  • your child's name - first, middle or last
  • a favorite sports team's name or mascot's name
  • dates that are important to you with or without a year - an anniversary, a birthdate of you, a child, a spouse, pet's birthdate, a relative's death date, a graduation date
  • a favorite holiday of the year
  • a favorite vacation spot
  • your honeymoon destination
  • your present city
  • a present or former street address of yours or a close family member 

Geez, I guess you're thinking that there's nothing left.    

There is, but you have to put on your thinking cap.  

Before we go further, we want to point out the obvious and that is how a hacker gets any of the above information in the first place. 

As much as we don't like to blame the distraught Facebook user who has been hacked, it's usually his own fault that he has been hacked because of his privacy settings, or lack thereof. Leaving personal information exposed - like a present city of residence, locations of past schools jobs -  these give the hacker enough information to steal the user's whole identity.  

Remember: Facebook doesn't "need" to know where you went to school, where you work, and the names of relatives, which by the way, they connect to you with 'live' links to their Facebook accounts.  Facebook will ask, but they don't need it.    

So take a look at your Facebook settings, and hide or remove any information in the bio, introduction, "about" section, timeline posts, and comments that provide personal information so that a hacker can pick you out among a list of people with your same name.  


How People Find You

When anyone wants to know information about you, the first thing they usually do is check to see what you have exposed on social media. They will check for accounts on Facebook, Instagram, Tumblr, and other social media accounts.  Then they will type your name in Google's search box with your zip code or city.

You would be amazed at the wealth of information in the search returns.  Sometimes there's stuff you thought no one knew because you kept it private.  

The results also give them links to your social media accounts and any websites or blogs you might own, have contributed to, wrote as a guest blogger, or left comments.

There is one site, Radaris dot com that provides far too much information, including your current phone number and email address. Their terms of service states that the info can only be removed from their site by you after you prove your identity to them.  

A word to the wise.  You might be motivated to follow their process to prove your identity because your eye is on the prize of having your information removed from their website.  But you have to keep in mind that these websites also sell information which means you don't know how many times your info has been sold or how many sites already have it.  

Don't get conned by believing they will remove your information from their site because sometimes the hoops you have to jump through to get them to do that are not worth it.  I looked into it to see what they would require as proof and I chose not to follow through because proving my identity meant uploading my photo driver's license. That is the one piece of information you should be guarding with your life because it irrevocably links your information to the picture on Google and other search engines as well as facial recognition programs.

Since the photo driver's license was one piece of information I pretty much knew they did not have, I wondered what they would be comparing it to in order to verify my identity.  

So guard it with your life and don't give it to any website so they can further link you to their search results or sell it as a "premium" with other information.

Besides, if they do remove your information from their site, there's no guarantee they won't put it back on their site again, so tread lightly.

Within the search results, there are always advertisements but they are usually advertisements with an ulterior motive.  While most users skip over the ads, sometimes there's a fact in one of the ads that might catch your eye enough to raise your curiosity.  That's because the ads are geared to show certain key facts about you that are absolutely true, to persuade a user to click on it to investigate. Nine times out of ten, it is a con, but most people are curious and will click on the  ad.

Once you do, the webmaster or website moderator can see who you are, where you are located and all the information that is attached to the account you are using.

If you are new to their website, a login box will popup to ask you to create an account. It goes directly into their database and is compared against any info about you that they already have and if they see anything different, they will use it to update their records.

This is another reason why we always teach that you should Google yourself once or twice every month to see what Google is telling searchers about you.  If there are any surprises, you might be able to take action.


After the ads, the rest of the results will include tracking sites like ancestry.com, truthfinders.com, radaris.com, and intellius.com.  These sites provide a lot of information about you and they didn't even have to hack you to get it. It is all available online for free - compliments of the Freedom of Information Act (which in our opinion is one of the worst infringements on our privacy). 


This law allows anyone to see key details about your life such as your credit rating, important dates like birthdates (with or without the birth year) email addresses, former residences, etc. for not only you but sometimes your immediate family members too, your past and present employment, schools attended, and graduation years, if you have a mortgage and with whom, etc. 


This law is how most of those sites collected your information so they could use it to populate their websites. Without it, they'd have to resort to other tactics to gather the information or they wouldn't have a website anyone would want to use. 


The search results from Googling your name are similar to the information that we showed above for a password formula:

  • your birthdate, some portion of your social security number with the rest "blacked out;"  
  • any other names you now use or have used in the past, your credit rating, dates like birthdate or just the birth year, your schools and graduation years, your mortgage company, if you have a car loan or lease and whom you pay;
  • your marriage and divorce date;
  • names and/or birthdates of your children, their ages, their names and addresses of spouses or significant others where they have had mail sent to their addresses;  
  • your former and present phone numbers and mailing addresses; (Two sites have a list of all your neighbors, their addresses and their phone numbers)
  • your former and present employment including dates and addresses;
  • if you are affiliated with any websites.


A hacker doesn't need all of the information found in search results. He can target his next victim with minimal information such as:   

  • your birthdate OR
  • a phone number (as seen on your Facebook account)
  • your present location with or without an actual street address (a zip code or city is enough) OR
  •  the name and location of your high school.


All hope is not lost. You do have some options to protect yourself which we will explain in the next two parts of this series.  


Please share our link with your friends so they can enjoy our websites too. Thank you for stopping by. 





Part Two: Most Used Pet Names Passwords

This post is Part Two of Three. We will discuss the use of pet names as passwords and give you a list of the most used pet names. 

Many people use their pet's name, or some variation of it, as their password.  When they change their password, they stay "with the theme" which means they keep using their pet's name but may change it slightly, for example, adding symbols or numbers to the name.  t 

There are users who keep a short list of "My Frequently Used Passwords" so when they change their passwords, all they do is rotate or shuffle them so that those are the only passwords that they ever use.   

We all love to show pictures of our pets on our social media accounts, especially when they do funny things.  But using a pet's name as part of your password is not the best idea, especially if you mention the pet's name when you are flashing their pictures.  

An alternative is to add numbers and symbols to make the password harder to hack which is good, but in some cases this is also not the best solution because people tend to add 12345, or their address, their phone number, birthdate, pin number or other significant number.

Don't do that.


The following list is not a list of the most common names that people name their pet.   It is a list of pet names that are most used as passwords and are also the most hackable. 


<img src="Hacker.png" alt="successful hacks">
It's a happy day when a hacker has guessed a password




If your pet's name is on the list, you should consider not using that name anymore and make a different password.  We'll give you some more examples in Part Three. 


In alphabetical order, the most popular pet names used as passwords are:


  • Apollo
  • Atticus
  • Baby or Babe
  • Bailey
  • Bandit
  • Bear
  • Beau
  • Bella
  • Benji or Benjy
  • Benny or Bennie
  • Biscuit
  • Blade
  • Brady
  • Brandy
  • Brutus
  • Bubba
  • Buddy
  • Buffy
  • Buster
  • Butkus
  • Caesar
  • Cat 
  • Champ
  • Charlie
  • Chico
  • Chloe
  • Cinnamon
  • Coco
  • Cookie
  • Cooper
  • Cowboy
  • Daisy
  • Dakota
  • Diesel
  • Dog or Doggie
  • Dollar
  • Dolly or Dollie
  • Drax
  • Duchess or Duchy
  • Duke
  • Elvis
  • Fido
  • Fred or Freddie
  • Ginger
  • Gizmo
  • Gracie
  • Gunner
  • Harley
  • Harry
  • Izzy
  • Izzy
  • Jack
  • Jake
  • Jaws
  • King
  • Kitty
  • Kono
  • Lady
  • Ladybug
  • Lex
  • Lily
  • Logan
  • Lola
  • Lucky
  • Lucy or Lucie
  • Lulu
  • Luna
  • Maddie or Maddy
  • Maggie
  • Manny
  • Max
  • Maya
  • Micky 
  • Midnight
  • Milo
  • Minnie
  • Missy
  • Misty
  • Molly
  • Monk or Monkey
  • Muffin
  • Oliver
  • Oscar
  • Peanut
  • Pearl
  • Penny
  • Pepe
  • Pepper
  • Plato
  • Prince
  • Puff or Puffy
  • Queen or Queenie
  • Quinn
  • Ranger
  • Raven
  • Rocco
  • Rocky
  • Romeo
  • Rover
  • Roxy or Roxie
  • Rusty
  • Sadie 
  • Sam or Sammy or Samantha
  • Sandy
  • Scooter
  • Scout
  • Shadow
  • Sheba
  • Simba
  • Smoky or Smokey or Smokie
  • Snow or Snowy
  • Sophie
  • Spike
  • Stella
  • Sugar
  • Sully
  • Sushi
  • Sweetie or Sweety
  • Taco
  • Tank
  • Teddy
  • Tiger
  • Tigger
  • Tracker
  • Truck
  • Tucker
  • Widget
  • Willie
  • Yugo
  • Zeus
  • Ziggy
  • Zoe or Zoey


 Is your pet's name on the list?  

Continue to Part Three where we will show you how to make a good password that you don't have to remember.

Please share our links with your friends so they can enjoy our websites too. Thank you.



Part Three: Making Passwords You Don't Have To Remember

In Part Three, you will learn how to make a good password with a little trick to do so that you don't have to remember it.    


<img src="Make Good Passwords.png" alt="">
How to make a good password 



Tracking Visitors


Many websites track their visitors in some way, but it is usually confined to their activity while on their website.  You'll know this is true when you see a banner or sidebar box showing the products or topics you just viewed, or when you get an email that you left an item in your cart that you chose not to purchase, or that the product was all of a sudden reduced in price.

Some sites slip extra permissions in the clauses of their terms of service (TOS), which most people don't read.  They'll say by accepting the TOS that you are giving them access to your friends list. If they don't tell you this up front, you'll find out when your friends say they are getting many more popup and sidebar ads.  It's all legal, as long as each visitor accepts their terms of service.

A strong password is not going to help you on those kinds of websites.  The best you can do is to leave the site as soon as they tell you they want to access your friends list or if their TOS requests or permissions goes beyond the scope of using their site.  

It is almost impossible not to accept cookies but you can and should customize your preferences and restrict their access to the least amount of your personal information.

How Did They Know That?

Some websites want their new visitors to create an account. When they come back on their next visit, usually they are required to verify their identity using multiple-choice security questions. The correct answer will always be one of the choices and the website will know if you select the wrong answer because they only choose questions with answers that are already public information, like the year/model/ or color of your first car; the street you lived on in a particular state; or the name of your grade school.  

Just know if they used public information for their security check questions, then even an amateur hacker knows that information too and can hack your account in a heartbeat. 

Passwords are also tracked on many websites. To remember screen names and passwords, many people tick the "Remember Me" box.  It really is so easy - too easy  - because if your computer is remembering your login information, then so is the website.  How else will they know if you entered the correct login information?

Make It Long and Strong

A hacker assumes that you re-used the same password, or a variation of it, from site to site. Stop doing that because you are making the hacker's job very easy. The one thing that will make a hacker move on to other victims is if he has to waste too much time trying to crack your password.   

Internet security experts say that the best passwords are between 18 and 26 characters long, with a combination of upper and lower case letters, sprinkled intermittently with numbers and symbols. Don't use a real word as any part of your password. If you do, then mix it up by inserting numbers and symbols after each letter.  

If you use a short personal password that defines you, think about which of your friends and associates know that about you too. Then go change it to something else.

Your password box on each login screen shows an asterisk for each letter or number which tells the length of your password. If a hacker sees a lot of asterisks, he will know your password is a combination of random letters and numbers, will give up, and find someone else to hack. 

Hacking is a time-sensitive activity. He must get into your account, steal it and get away as fast as possible. 

Choosing Passwords

The most common passwords are the names of your pets, so it should go without saying that you should never use the names of your pets as a password on any website and certainly not on multiple websites.  It's too easy to forget that you mentioned their names on a photo, or you talked about them on a blog, or in a comment on Facebook. 

A hacker who figures out one password for one of your accounts will keep trying it because he hopes you used it on other websites too.  Don't give him that satisfaction; use different passwords.  If you must use familiar names and passwords, then add digits or symbols up to 26 characters.

Most people generally have a harder time choosing the beginning of their password, but adding numbers and symbols seems to be much easier.  

So you might be thinking "How will I ever remember so many different passwords?"

There's an app for that! 

In the early 2000s, the advice to remember passwords used to be to make up a sentence so the first letter of each word corresponded to each character in your password.  The sentence idea wasn't the best because people who couldn't remember a password were expected to remember the sentence they used for each site.

Gone are the days when you had to write down your passwords in a notebook, or forward your newest change of password to your email for safekeeping, most likely put in a dedicated folder. 

By the way, keeping your passwords in one of your email folders is not as safe as it used to be because emails tend to get hacked much more often than Facebook accounts.

The best way to remember your passwords is to let something else do the remembering for you - a password manager.  

Some people shy away from this idea because they don't understand how they work or they don't want to learn something new.  You will see that password managers are easier to use than you might think.

Password Managers 101

Anyone who has been hacked in the past may think they need to buy an expensive password manager, but it really isn't necessary. 

Some add a few bells and whistles to make them more attractive or to validate their price. Some have built-in password generators to offer stronger passwords. Others protect your credit card and bank account numbers by offering encryption.

Today's most popular internet security measure is requiring two-step authentication where a code is sent to your email or cellphone before granting access to your information. This only works well if you have the same cellphone or email at the time they send the code.  

We know one guy who set up his Facebook account with one phone number and ten years later when someone reported him so that his identity was called into question, the code was sent to a phone he no longer owned. He got his account back by answering security questions.  

We know a gal who was locked out of her Facebook account because it was hacked. The phone number and security questions were no longer valid because the hacker changed them when he took over the account. She had to make a new Facebook account and try to get back hundreds of friends.

So for the two-step authentication to work, you have to change the information each time you get a new phone number or email address.

For purchasing password managers, the prices range from free to $100 and some are sold by yearly subscription. By the way, if you have a Norton virus protector, one of the features is a Password Vault which is free with your Norton purchase.

We don't like to wait for a code to get access to our information so for us, a password manager has to be simple and free.  We don't think that paying for one makes it function any better. It either works or it doesn't. Your money isn't going to make it work any better.  

The main idea is to keep all your "different" passwords in ONE place guarded by ONE master password. 

So the first thing you'll need to do is to make one really terrific master password, preferably using 26 characters.  After that, every time you create a new account or change a password, you will be prompted to save the login information to your password manager.  

Which password manager you use depends on what you want it to do, how easy it is to use, and the way you want to access your passwords.





Review of Password Managers

In no particular order, here's a little info about the most popular password managers.  



CHROME



https://www.google.com/chrome/dr/download


 

If you use CHROME web browser, you don't need anything else. 

The Perks:  it has a built-in password manager that prompts and remembers your passwords as soon as you type them. All you have to do is sign-in to CHROME with ONE password. Then when you go to any website, your password will be auto-filled.

 

Another advantage of using CHROME is that your password manager and your bookmarks are available across all your devices as long as you are signed in to the same CHROME account. 

 

The only downside is if more than one person uses your device, they will already be signed in to your CHROME and can access your password manager.  So if you are the only user of your device, CHROME is a good choice. The link gives you step-by-step instructions. 



LASTPASS



Last Pass Password Manager & Generator
LASTPASS





LASTPASS is a password manager and password generator.  There are extensions available in your App stores for Chrome, Firefox, Edge, Safari, Opera, and Microsoft.  


The Perks: It has two-factor authentication, automatic password capture as soon as you create a new password, auto form-filling, and a separate Secure Notes feature that stores bank account and social security numbers, etc.  As with all password managers, you have to create an account.




Keeper


Keeper Password Manager
Keeper Password Manager


Keeper is available for Windows, Linux, MacOS, Android, IOS and has extensions in your App stores for various web browsers.  

The Perks:  Unlimited passwords, storage of your payment details and a built-in auditing tool that alerts you when passwords are used more than once, or if a password is particularly weak and needs to be made stronger.





Symantec Norton Identity Safe



Symantec Norton Password Manager and Generator
Norton Password Manager and Generator






You don't have to buy a Norton Anti-Virus to get the Symantec Norton Identity Safe password manager because it is free in your App Store. It is both a password manager and a password generator. 
 

The Perks: besides the security of having Norton's name on it, this password manager and password generator helps you to make strong passwords using prompts. It has a Safe Web feature to alert you to malicious web pages and an automatic password prompter to change a password whenever it is used on more than one website.   You can either download the program or go to your Extension store to add it as an extension.



Enpass Password Generator



Enpass Password Manager and Generator
Enpass 





Enpass supports these operating systems: Windows, Mac, Linux, IOS, Android, Chrome OS, and about seven others. 

There is a pay version, but here are the Perks for the free version:  Offers cloud backup, fingerprint support, password generator, web form autofill, and data import. It has separate vaults for personal, work, and family passwords.  


The downside:  Enpass limits storage for Android device users to 20 passwords, so if you are a heavy website user, you might want to skip this one.




LogMeOnce Password Manager




LogMeOnce Password Manager
LogMeOnce 



LogMeOnce password manager has a free and a paid version. 

The Free Perks:  Gives emergency access to photos only. There is a kill switch for wiping off data stored on any device that is stolen, and a secure wallet for storing credit card and banking information. 


An automatic password changer prompts you to change passwords at timely intervals. LogMeOnce also allows you to add a person as a beneficiary who can take control of your account if something happens to you.





True Key (owned by McAfee)


True Key Password Manager
True Key Password Manager





True Key password manager supports Windows, MacOS, IOS, and Android. It supports CHROME, Firefox, and Edge web browsers.  

The Perks: You can sign in using 1) a password, 2) facial recognition, 3) fingerprint , 4) Windows Hello, or 5) two-step authentication. 

 

You aren't required to have a master password if you use two-step authentication. It has a password generator to help you make stronger passwords, a digital wallet to store financial information, and it encrypts your login credentials if you use the manager on more than one device. 

 

The downside:  The free version only allows you to save 15 passwords, while the paid version allows you to save unlimited passwords.  So if you have more than 15 passwords to store, True Key isn't for you unless you want to pay for it.


 


Dashlane



Dashlane Password Manager
Dashlane Password Manager





The free version of Dashlane password manager stores 50 passwords but only for ONE device. You will need to put a separate Dash Lane password manager on each device.

 The paid version (about $5/month in 2019) allows access on unlimited devices, an unlimited number of passwords, cross-syncing, and cloud backup. 

The Perks: Dashlane is available for Windows, Mac, IOS, and Android operating systems. It has a strong password generator tool to help you make the best passwords, and emergency contact option if you forget the master password. Dashlane uses Secure Notes to store bank and credit card information. 

The downside: the free version is only for one device, so if you only have one device, this is a good choice.



We know this three-part tutorial was a lot of information to digest at one time, so please read it over once, then come back later for another read.  
We hope this tutorial will discourage you from using the same password on multiple websites 

Please let us know how we are doing in the comments.  Thanks for stopping by. 

 

WHAT TO DO IF YOU THINK YOU HAVE BEEN HACKED

 We have other tutorials on our site with step-by-step directions on how to remove a hacker from your account, how to regain your account if you lost it, and how to guard against being hacked.  




This tutorial addresses what you can do if you think someone else has been on your account (or still is).  


Before starting this tutorial, go to SETTINGS>>>WHERE YOU ARE LOGGED IN to make sure you are the only one on your Facebook account right now.  


If you see ANY location that is not you, click END SESSION or LOG OUT on all of them except the one you are using now.  



Then change your password.  If you get logged out, log in again with the new password. Then continue this tutorial.  



You need to have access to your Facebook account in order to perform Facebook's self-guided tutorial at this link. It is very easy to follow the directions.


On the first screen, select the choice that is closest to your situation. 


<img src="Facebook.png" alt="help steps">
Facebook offers help steps






Caution:  If you choose "I don't see the right option on this list" - Facebook will assume you have been hacked. You will immediately be redirected to this screen to secure your account. 




<img src="Facebook.png" alt="help steps">






If you select any other choice on the above list, Facebook will hold your hand and walk you through the steps.  




If you think you ended up in the wrong place or if you change your mind and want to quit, click on your name on the blue Facebook bar at the top of your screen. This will stop the process and send you back to your regular Facebook desktop.  


It will not save any of your progress. 


If you want to try again, you will need to start from the beginning.


If you get logged out, log back in again.


If you are learning stuff from our blog, please tell your friends so they can come read our posts too.   Thank you.



WHEN YOUR DEVICE ACTS UP

Something rather unusual happened yesterday morning.  An elderly neighbor who lives ten doors down the street knocked on my door shortly after 9am.  It is only unusual in that she has never done it before, has only spoken to me once in the year that I have lived here, and rarely waves back when my husband and I walk by her house when we take our daily walk.



I was cordial and invited her in, immediately noticing that she had her cellphone in hand and its flashlight app was beaming the brightest light on my kitchen floor.



About 30 seconds after coming in, her cellphone rang and she told the person she would call them back. She told me she was told by a neighbor that I might be able to help her. She couldn't figure out how to turn off the flashlight because when she got the phone, it had no manual or directions. It was a recycled flip phone that her senior center gave out for free and she got it to replace her Walmart Tracfone that she bought herself for Christmas.










After two days of fooling around with the flip phone, she still had no idea how to use or edit the few gadgets that came with it, but she thought it looked simpler than her old Tracfone.



It wasn't. 


The flashlight had been stuck in the "On" position for two days now and she wanted me to show her how to turn it off because the phone was hot.   



I opened the flip phone and went to the settings, figuring this was an easy fix by simply going to the flashlight app and turning it off.



But there was no flashlight app in the phone's settings. In fact, the only app was the Weather Channel.


Next, I went to the factory installed list and again, no flashlight app.



While I was there, I double-checked to make sure the ringtone was the one she wanted and asked if she wanted to change anything in her address book.  I showed her how and after she added her son's work phone number in the address book and changed the home phone number of another entry, she said she had the hang of it.



But that damn flashlight was not shutting off because I couldn't find a setting for it.  I was looking pretty dumb for a geeky lady.



It was a former AT & T flip phone so I went to their website and it said they had discontinued support for it about six years ago. There were no online user manuals available.  


There were three factory pre-sets that had "edit" capability so a user could change how long the keypad light stays on, change the ringer, and make a new PIN for voicemail.


But no flashlight setting.  I asked her if the flashlight came on right away when she turned it on today?  She said she keeps the phone on 24/7 because it is her only phone line; she doesn't have a landline in the house. She said she charges her cellphone while it is 'On' and that it hasn't been turned off since she got the phone from the senior center.


I told her my best advice whenever any device isn't doing what I want it to do is to turn it off for about 90 seconds, then turn it back on.


Success!  The flashlight turned off.  


She thanked me and as she was going out the door, the phone rang again.  When she answered it, the flashlight came back on.


Then I immediately knew what was wrong.   When she was pushing the 'answer' button to answer a call, she was hitting the button next to the answer button - the night mode/emergency button which turns on the flashlight.   All I had to do was change the default to disable the flashlight.  




When I tested it by calling her from my house phone and the flashlight didn't go on when she answered her phone.


Now, we had Success!



So my best advice whenever a device acts up is to turn it off and wait 90 seconds, then turn it back on.  





Always charge any device while it is in the OFF position. You can spare 30 to 60 minutes before any separation anxiety kicks in and your device gets a chance to cool down. 





In addition to turning off to charge a device, always turn off the device you use for your internet and phone at least once every 24 hours for at least 30 minutes.  They aren't meant to be running 24/7 without taking a nap or they will get sluggish and very hot to the touch.


________________


On Tuesday of this week WINDOWS 10 did an update.  It is a forced update which users are required to install if they want to keep WINDOWS 10 running at its best.


I waited until yesterday to install it because I was running out to doctor appointments this week.  While it is installing, Microsoft says users can keep using their device until it needs to reboot. I usually do keep working and then I immediately forget there is an update installing which usually causes me a severe amount of lag.


Any other time, when a device lags badly, it is usually indicative that the device picked up some malware, crapware, adware, bloatware or a virus. 


Unless you remember that you allowed the updates to install in the background while you are working. Something that after a few hours, I tend to forget.

 


During our dinner time, my PC rebooted to accept the update change.  So after dinner, when I went back to work on my PC, I noticed that I was having some issues on Facebook that defied reasoning as to why they were happening.  




I lost the status box in three Facebook groups where I am a member, and on my own timeline so that I couldn't post or comment on reply of posts on Facebook.  I polled 3 Facebook friends who all said they had no issues.  Then I wrote to the admins of the Facebook groups I am in, asking if I was the only one disabled from posting in their groups and they said I wasn't disabled, in fact no one was disabled.  Since my friends had no problems and since I wasn't being restricted by group admins, now I wondered about the WINDOWS 10 update. How could it mess up only Facebook and no other websites?



Well, if I remember to take my own advice, it would save a lot of frustration and high blood pressure moments, but I sometimes get bogged down in the details by looking for a solution within the device itself so that I forget that a simple reboot would solve the problem.






When all else fails, undo the last action to go back to when the device was acting properly.


I also uninstalled the last WINDOWS 10  update and the problem was still not fixed.



So that usually means that something was going on with  Facebook but only for some users. 



I checked Facebook's website to see if they were reporting any issues with the platform at


https://developers.facebook.com/status/dashboard


But there wasn't anything reported since December 8, 2018.




Next I went to the site where users can report any issues they are having. I should go here first, but I don't, because they would know of problems long before Facebook ever owned up to an issue.

https://downdetector.com/status/facebook



And sure enough, there were some users with the same issue as me.  



My problem resolved itself within an hour but it was a long hour of being pissed off. lol


For regular problems with a device, reboot. 


If you still have the same problem after reboot, then it is probably a 'settings' issue.  Undo the last update or delete the last thing you downloaded, reboot and see if you still have the problem.




If it is a bigger issue - like if the device changes colors, blinks, flashes, shuts itself off without help from you, then it is probably a 'malware' or 'virus' issue. 




Your virus protector can't always pick up 'malware' so you need to download a special app to scan for malware  -  like the one week trial version of MalwareBytes to scan for malware. 


If you want to pay $49 to $99 to buy it, go ahead, but the trial version is good for a checkup, then you can uninstall their app before the trial period is up.    Even if the malware scan comes out clean, run your virus scan to make sure it doesn't find a virus. 





There are several free virus protectors online and there is no reason why your device should not have one.  If you have an Apple device, you may think you are exempt from picking up 'malware' or a virus, but you aren't.  No device is infallible.  


Although not common, Apple products can get viruses and malware and you can read about it here.





Please share this post with your Facebook friends so they can enjoy our websites too. Thanks!

SHARE OPTIONS