TECH TALK: Human or A.I.? The Thin Blurred Line


by Eric Austin
Computer Technical Advisor

The land line rang at 5:29 p.m. Suspicious. I picked up the hand-set. “Hello?”

“Hello! Do you have a few minutes to talk this evening?”

It was a vivacious young lady. But something was off. I couldn’t put my finger on it. “What is this about?” I asked rudely. Vivacious or not, I was a repeat victim of dinner-time telemarketers.

“We’ve just started a new fund-raising campaign for breast cancer research and, um —”

It was the ‘um’ that did it. It didn’t sound natural. It sounded like someone had written ‘um’ into their script in order to trick me into thinking I was speaking to a real person.

“Are you a recording?” I said abruptly, in the middle of her spiel.

The lady’s voice broke off in mid-word. “Yes.” The answer came back immediately.

I hung up the phone with a little chill that traveled up my spine and prickled the hairs on the back of my neck. There is something slightly disturbing about thinking you are speaking to a living, breathing human being only to find out it was a computer instead.

And it got me thinking. Is there any law on the books requiring an Artificial Intelligence to tell you it is an artificial intelligence? After a bit of research, I found an article Time magazine published in 2013 detailing their encounter with a “robot telemarketer” named Samantha West that had refused to admit she wasn’t real.

That was in 2013. There have been major advances since then. Apple just had its World Wide Developers Conference where they announced a new voice technology for their computer assistant Siri. It leverages new advances in machine learning to create a computer-generated voice that is indistinguishable from the real thing. This isn’t a computer awkwardly parsing together pre-recorded words of a real human being. This is a voice generated on the fly by a computer that sounds as natural as yours or mine.

In fact, several companies, including Google, are using machine learning and advanced algorithmic programming to develop technologies that allow them to simulate real voices using as little as 60 seconds of data. In other words, feed in 60 seconds of dialog from George Clooney’s latest movie, and you’ll be able to make ole Georgie say anything else you like.

This means that soon you won’t be buying an audiobook read by the actress Meryl Streep. Instead Ms. Streep will simply license her voice and you’ll be listening to a simulation of Meryl Streep reading the book. And you won’t have famous actors doing voice-overs for the latest animated Pixar flick, rather you’ll be watching a movie with characters voiced by a computer simulating famous actors.

But don’t worry, you probably won’t even know the difference! That’s how good the technology has become. The upside is that actors will be able to lend their voices long after they are dead and buried. The downside is not knowing if that is creepy or cool?

But combine this new voice synthesis technology with recent developments in artificial intelligence and you start to have a combination that sounds ripe for abuse.

Think telemarketers are bad now? What happens when companies no longer need to hire real humans to make the calls?

In fact, it’s likely that you have already had a conversation with an artificial intelligence and not even known it. If you’ve ever gone online to “chat” with technical support, there is a good chance you were speaking with a chatbot and not a real person.

Chatbots are artificial intelligence-driven conversation generators that simulate real human interaction. There are online chatbots designed to be your girlfriend (Julie), your psychiatrist (ELIZA), your doctor (Dr. A.I.), technical support assistants and many other things. Since 1991, there is even an annual award, the Loebner Prize, given out to the best chatbot.

Siri and Google Assistant are both based on research into chatbots. The technology to create an artificial intelligence that can carry on human-like conversations has long been in development, but it’s only recently started to be used in mainstream electronics like Amazon’s Echo or Apple’s just announced Homepod.

Personally, the idea of speaking to a computer doesn’t bother me. But a computer that uses “um” in an effort to make me think it’s human? That’s disconcerting.

Eric W. Austin is a real, live human being. Or is he? To find out, email him at or leave a comment on this article at

Click here for a HUGE list of chatbots!

TECH TALK: How to get your news from the internet


by Eric Austin
Technical Advisor

Image Credit: Vanessa Otero, Facebook

Ah, information. The internet has so much of it! In this climate of political chaos, news breaks faster than most of us can keep up. Fortunately, the internet is here to fill our heads with all kinds of wrong information!

While the convenience of the internet is undeniable, information no longer comes with the guaranteed editorial oversight of a print newspaper or magazine. That means more of the responsibility is on us, as consumers, to discern good information from bad. This is particularly true of current news, as it is often reported before all the facts are in.

In this week’s column, I’d like to convey a few tips I rely on to sift through all the information on the internet and figure out what’s really going on!

Know Your Bias. Everyone has a bias, and every source has one as well. It’s inescapable and unavoidable, but as they used to say on Saturday morning cartoons when I was a kid: Knowing is half the battle. Be aware of how your own bias might color your perspective and dictate which sources of information you gravitate to. Purposely expose yourself to the other side — if for no other reason than so you can understand what information other people are using to reach their own conclusions.

There are a number of resources online that examine bias in the media. is a multi-partisan, crowd-sourced website that examines bias in the media and tries to present multiple perspectives of controversial issues., a site sponsored by the Pew Research Center, is another good resource.

Use Multiple Sources. The great thing about the internet is how easy it is to check multiple sources for a broader perspective. Once you’ve identified which way your preferred news outlet leans, take a look at a respected source that leans in the other direction!

But don’t just stop there! Check out some of the English-language news outlets from around the world, like BBC News and the Middle-Eastern Al Jazeera. It can be enlightening to hear what journalists and pundits outside America have to say about us and the conflicts in which we’re embroiled.

YouTube is a great resource for checking out a variety of sources, as most of the major networks have channels on Google’s video site. Everything is uploaded as three to five minute clips of a particular news item, so it’s easy to add news clips from multiple sources to your “Watch Later” playlist for back-to-back viewing.

Independent, internet-only news stations have also blossomed, especially if you’re interested in what the younger generation is talking about and listening to. The Young Turks and Democracy Now! are two of the most popular and each have channels on YouTube.

Image Credit:, Pew Research Center, “Trust levels of News Sources”

Don’t just get your news from Facebook! According to a recent article in Slate magazine, 44 percent of Americans primarily receive their news from the giant social media site. However, it’s easy to miss the source of an article when reading it on Facebook, and knowing the source of a particular bit of information is your greatest asset in determining if it is valid.

Facebook also tends to emphasize headlines and minimize context. This encourages us to have gut reactions to news rather than contemplating it thoughtfully, and encourages news sources to present the most salacious headline in an effort to capture more clicks.

And your Facebook feed is designed to give you more of what you ‘like.’ Facebook has a vested interest in showing you things in which you’re interested and will cater to your existing views. Every time you ‘like’ a news item someone shares, that preference factors back into Facebook’s algorithms in order to more finely tailor your feed. This subtly warps your views based on the news Facebook assumes you most want to see.

Bookmark some fact-checking sites. If you follow my advice, you might be dismayed to find a lot of conflicting reports, based on where you go for your information. Enter fact-checking sites. is a website maintained by the Tampa Bay Times in which reporters and editors evaluate statements made by politicians, pundits and media outlets. They were awarded the Pulitzer Prize for National Reporting in 2009, and have a great format that allows you to fact check by politician, news channel (ABC, CBS, NBC, CNN, and Fox), or political pundit. But prepare to be shocked when you learn how often your favorite talking head makes inaccurate or outright false statements!

Like in everything else, checking multiple sources is your best bet in evaluating truth, so also visit, The Washington Post’s “Fact Checker,” and which looks at the veracity of rumors and urban legends circulating the internet.

Finally, know the difference between news and opinion. Good sources will make it clear which stories are straight news and which are opinion pieces. Know which is which before you start reading!

In this day and age, separating true information from false can be challenging. But if you follow these tips, you’re more likely to have an informed and balanced view of the world around you! Good luck!

Have a comment on something you read? Know of a resource I failed to mention? Let your voice be heard on or email me directly at!

TECH TALK: “13 Reasons Why” you should talk to your kids


by Eric Austin
Technical Advisor

So, there’s this thing called Netflix. It used to be you rented DVDs from them. They came in these little red envelopes. Now it’s out with the DVDs and in with the streaming video.

One of the new ways kids have found to stay inside during beautiful summer days in Maine, is with a new activity called “binge-watching.” Essen­tially, binge-watching is the practice of watching multiple episodes of a single TV show in one sitting.

The convenience of video streaming options like Netflix have made it easy to watch episode after episode until you’ve watched a show’s entire season over a single weekend. It’s like the Frito Lays of TV.

In the past, to binge-watch a television show, you had to wait for the season to be available on DVD so you could buy or rent it.

But in recent years, Netflix has cut out the middleman by producing original content themselves, starting with the critically acclaimed “House of Cards” starring Kevin Spacey in 2013. As of 2016, they had over 120 original series or films available.

Netflix must be keenly aware of the addictive attraction of binge-watching as they have, since their first original series, released all episodes of a show simultaneously.

Their latest offering is the 13 episode series, “13 Reasons Why,” based on a bestselling young adult novel by Jay Asher. The series has earned positive reviews from critics and been insanely popular on Netflix, especially with younger, teenage viewers.

It’s an interesting show that deals with some weighty subjects like rape and suicide. The young cast does a stellar job and the acting never feels artificial or contrived.

Perhaps the most contrived aspect of the production is the central plot device. We learn in the first episode that a young teenage girl has committed suicide. The girl’s best friend is delivered a box, which turns out to contain 13 cassette tapes dictated by her before her death — the eponymous 13 reasons why.

Each episode deals with a single cassette tape, which involves a revelation about how one of her fellow classmates has wronged her, leading to her ultimate decision to kill herself.

Much of the time is also spent on the various relationships between the characters and how they each handle their classmate’s death. (I give it a seven on the teen-angst meter.)

Netflix rates the series TV-MA (mature) for some heavy petting, a few shots of naked male derriere, and a fair amount of crude language. More concerning are the emotionally graphic scenes of two rapes (one explicit, one implied), and the depiction of the central suicide in the last episode of the show.

Everything portrayed in this series — bullying, underage drinking, fitting in, and yes even rape and suicide — are issues that a lot of teens encounter in real life or are exposed to on the web. Some reviewers have criticized the central plot device for sending the wrong message to teens — that is, a teenage girl who puts enormous effort into recording messages blaming her classmates for what was ultimately her decision: to end her own life.

While I agree with this sentiment, it’s not a central theme in the story and serves primarily as the literary structure from which the events unfold.

The series does bring up some interesting questions such as, what does it mean to give sexual consent? Are people responsible for their actions when they’re drunk? Is suicide ever the answer?

These are important questions and ones that teens are bound to ask. Parents should create a safe and fertile environment for such discussion.

“13 Reasons Why” is not a perfect TV show, but I enjoyed my time with it and appreciate the opportunity to understand a bit of the many social issues modern teens deal with.

The show has seen such success that Netflix has already announced it will return with season two next year.

Have a comment or an idea for a column? Visit or email me directly at!

TECH TALK: Why you can’t afford to be neutral on Net Neutrality


by Eric Austin
Technical Advisor

Net Neutrality is — arguably — the most important legislative issue in the world of technology right now. And it’s an issue that will affect the lives of every single person reading this column.

Today, the Internet is like a super highway where every destination is the same distance from you. You decide where you want to go based on the content you are interested in, not the time it takes to get there. In Internet terms, this means that no particular website is given bandwidth preference (distance) over another. They are all equally accessible to you as the consumer.

You decide which websites to visit. You decide which video services you subscribe to.

But some people want to allow Internet Service Providers (ISPs) to restrict those choices. They want to allow your ISP to determine which services on the Internet you have access to. So, if you get your Internet from Time-Warner, you might only be allowed to stream video through Hulu. But if your service provider is Comcast, you might be required to use Netflix instead. This would become true of many of the services you use on the web. No longer would it be your choice. Instead it would be dictated by your service provider.

That doesn’t sound like much fun, does it? Why would anyone want an Internet that works this way?

As Internet-based companies grow larger, they seek new ways to capture even more of their market share. One way of doing this is by paying (bribing) Internet Service Providers to give their content bandwidth preference.

If opponents of Net Neutrality get their way, big companies like Amazon, Hulu, Netflix and others would be able to pay (bribe) ISPs to give preferential treatment to their web platform over their competitors, similar to how a restaurant today will offer Pepsi or Coke — but not both.

Do we want that to become the norm on the Internet? So that picking an Internet Service Provider also means restricting our Internet content options to the ones that have paid the most to our ISP for exclusivity? It’s starting to sound more like picking a cable package than accessing the Internet.

In the early days of the Internet, the web was widely touted as a “level playing field” where small companies like Google and Amazon could compete equally with huge, established corporations like Microsoft and Blockbuster.

Although, that time has come and passed, the barrier to a successful web business is still much lower than it is to open a traditional brick-and-mortar store. But suppose that, aside from needing to build a website and supply it with original content, you also had to pay Internet Service Providers to “allow” traffic to come to it? How would you compete against the likes of Google, Microsoft, and Facebook?

From a business perspective, it means that smaller, newer businesses could be discriminated against in favor of bigger, wealthier and more established corporations. Good news for Big Business. Bad news for promising young entrepreneurs.

From a consumer perspective, it means fewer choices for Internet content.

In 2015, the FCC (Federal Communications Commission) decided to reclassify Internet providers as “common carriers” under Title II of the Telecommunications Act of 1996. This classification is reserved for “necessary” utility services like telephone, electricity, gas and water. These types of services are subject to greater regulation and oversight to prevent discrimination and price gouging of vulnerable consumers.

This was a huge victory for Net Neutrality, and recognition that the Internet has become an essential part of many people’s lives. It also meant that ISPs could not restrict or throttle bandwidths based on content, but had to make all (legal) content equally accessible to everyone. Simply put, this meant that Amazon, Hulu, Netflix – and your next-door neighbor Dave’s 24-hr livecast of his boring life – all have an equal right to the Internet’s bandwidth.

But the fight is far from over. With a new administration comes new policies, and the recently appointed chairman of the FCC (and former attorney for Verizon), Mr. Ajit Pai, only last Wednesday announced his plans to reverse this classification and rollback current regulations protecting Internet neutrality.

If you have any doubts about which side of the debate you, as an average consumer, should be on, simply consider those that are fighting for and against this issue.

On the pro-Net Neutrality side, we have numerous consumer advocacy and human rights groups such as Article 19, Free Press, the Electronic Frontier Foundation, and the ACLU, to name just a few. Even web companies like Amazon, Microsoft, Yahoo! and Google have come out in favor of Net Neutrality. And it’s advocated by people like the co-founder of Apple, Steve Wozniak; inventor of the World Wide Web, Sir Timothy Berners-Lee; and President Barack Obama.

On the other side, you have the lobbyists of large communications companies like AT&T, Qualcomm, and Verizon, as well as (according to Wikipedia) certain noted “technologists” (whatever those are) and “economists.” And, really, when was the last time “economists” were on the side of the little guy?

Have you ever gone to a restaurant and ordered Coke only to be told that all they serve is Pepsi?

Well, if you don’t want to be stuck drinking Internet Pepsi when you really prefer Coke (or vice versa), call your Senator and Representative in Washington today and tell them you want an open and free Internet, where access to content is decided by you, the consumer, rather than big communication companies!

For more information about Net Neutrality or to get involved, visit

Eric W. Austin is a marketing and technology expert, and an advocate for a free and open Internet. As long as email remains free, he can be reached at

Further reading:

TECH TALK: Firewalls and VPNs, Oh my!


by Eric Austin
Computer Technical Advisor

This week I’ll talk about two networking related topics that every modern computer user should know about.

You’ve likely heard the term “firewall” thrown around in the dialog of movies or television shows during a computer hacking scene — as in, “They’re breaching the firewall, Jack!”

What exactly are they talking about? Simply put, a firewall is a set of computer programs that work together to monitor and control network connections coming and going on your PC. Typically, this is the Internet traffic that happens as you browse, send emails and watch videos online.

Certain other applications will also transfer data between the Internet and your computer, like games being played online, programs downloading updates, or certain programs that have specific network functions such as FTP programs for updating websites, or P2P (Peer-to-Peer) file-sharing applications for downloading large files.

All these different activities are happening constantly as you use your computer. A firewall program sits and watches this traffic to make sure it’s all legit.

Malicious hackers, or malware your computer could be infected with, might also attempt to communicate across your network and you want to stop that from happening.

A computer without a firewall is like a border crossing without an armed checkpoint.

Fortunately, beginning with XP, Windows comes with a built-in Firewall app included and turned on by default. So, most likely you are already protected!

Apple has also built a firewall into Mac OSX with version 10.6 (Snow Leopard) onwards.

There are a number of 3rd party security suites on the market if you feel you need something more robust, but the firewall protections already built into modern operating systems should be sufficient for most users.

However, you should never turn off your firewall! If you experience problems allowing certain network traffic because of a Windows/Mac firewall, it’s worth learning how to set incoming and outgoing “rules” correctly rather than turning it off completely. Email me if you’re having problems and I can direct you to some web pages that show how to do this.

So, let’s move on to our second topic today: VPNs. “VPN” stands for Virtual Private Network. As the name implies, it refers to a virtual network within another network, and the word “private” should tip you off that security has something to do with it.

The term, Virtual Private Network, in the technical world, can apply to a number of different networking situations, but for us, we will think of it in its most typical usage. That is, a method of obscuring the source of network traffic by funneling that traffic through another “virtual” server.

If that sounds confusing, its because you lack a little background. Stay with me and I’ll fill you in!

Normally, network traffic originates from your home PC, identified by your computer’s IP Address (Internet Protocol #). Whenever you do anything online, you’re sending information tagged with your identity (your IP#) through your Internet Service Provider (ISP) and out to the wider Internet. Everything you do is associated with that IP Address and can be linked directly back to you!

Sometimes this is not what you want.

A VPN service accepts your network communications, and then sends them back out to the Internet using its own IP Address in place of yours. In this way, none of your activities can be linked back to your personal computer. Instead, they would link back no further than your VPN server, which millions of other people also use.

Another reason to use a VPN is to by-pass geographical blocking. Some websites will block access based on the geographical location of the user. If you are trying to access the Japanese version of Hulu, for example, you could connect to a VPN server in Japan and trick Hulu into thinking you are actually Japanese!

Also, in countries that heavily restrict Internet content, like China or Saudi Arabia, VPNs help people to get around these restrictions to communicate with the wider world.

In the movies, when the heroes are tracking the hacker and they show the “link” hopping across a map of the world, this is an example of VPNs in action. Each of the points on the map is a different virtual server the hacker has used to mask his own identity. You’ll only need a single VPN yourself, but experienced hackers layer VPN upon VPN in order to further obscure the real source of the intrusion. (Although it’s never as easy to trace such a person as they make it seem on TV!)

You won’t be doing anything so nefarious, so for our purposes it’s much simpler. To use a personal VPN, all you’ll need is a subscription with an appropriate vendor, who will give you a small software program to run on your computer. This program redirects all your Internet traffic through the vendor’s servers and substitutes your IP Address for theirs. Simple as that!

Choosing a VPN can be difficult because services vary wildly, as do prices which range from $40 a year to $40 a month, depending on several factors, including: number of available servers, allowed simultaneous connections, P2P support, and guaranteed download speeds, among other bells and whistles most people won’t care about.

Personally, I can only recommend a service called Private Internet Access (, since it’s the one that I use. It costs $39.95/year and although bare bones, is very reliable and easy to use.

Most importantly, whichever VPN service you choose, you want to make sure they do not log network traffic. By default, servers will log any connections they receive, but since the objective of a VPN is to stay anonymous, recording your connection to it would defeat the purpose! Because of this, most VPN services purge their logs on a regular basis, but it’s worth checking before you sign up.

As they say in those after-school programs, abstinence is the best policy. But if you’re going to be a bad boy (or girl) on the Internet, make sure to use protection: always keep your firewall turned on and install a VPN for those times when you want full anonymity!

Eric W. Austin is a technical and marketing consultant specializing in helping small businesses succeed. When not writing for The Town Line, he exchanges advice for money and can be reached at

TECH TALK: 7 killer Ways to Get the Most Out of Our website


by Eric W. Austin
Computer Technical Advisor

*** THIS ARTICLE IS UP TO DATE AS OF APRIL 6, 2017. It may not reflect site changes after that date! ***

The Town Line launched its website back in 2016 and it’s been a huge success.

But for those of you who still haven’t made the digital leap, I’d like to point out a few reasons you should log on and give it a gander.

1. Get it first! The website is usually updated before the print edition is available. Generally, publishes the new edition by 5 p.m. on Wednesday, whereas you’ll have to wait until Thursday morning for the paper version!

2. Join the Conversation! Got a grievous grumble caught in your gullet? Unlike the paper, the website allows you to post your comments on every story! Just remember that we at The Town Line follow the BNBR (Be Nice, Be Respectful) policy, and any comments that breach this will not be approved!

3. Clickable links! Every link you see in the paper — including on the Our Town’s Report and Calendar pages! — is clickable on the website. No more squinting at the paper while typing a link into your browser. Just locate the article on and click the link to have it open in a new page!

4. Browse past issues! Did you miss last week’s issue? No problem! While our Homepage will always display the current edition of The Town Line, we’ve made it easy to find a past issue. Just hover your mouse over the first menu item at the top of the page that begins “Week of…”. A menu will pop open with a list of previous issues. It’s like traveling back in time, only without the math. Eat your heart out Einstein!

5. Save yourself a stamp! Have some local news to share, or want to send a Letter to the Editor? Do it straight from our website! Hover your mouse over the “About Us” menu item at the top of the page for an option to “Contact Us.” Just fill out the contact form (even attach a photo if you want) and click submit! There, you saved 49 cents! You’re welcome!

6. Share the Love! On, we’ve made it easy to share articles with your friends. At the bottom of every article, you’ll find share buttons for Facebook, Twitter, Google+ and other popular social media sites. Simply click the appropriate button, type some witty commentary and share it with the world!

7. Support your local businesses! All of the ads you see on are local businesses. The Town Line has always been a locally-supported newspaper. Clicking on one of our ads will take you to that business’ website. If you use an ad-blocker extension in your browser, consider turning it off when visiting Our ads are not obtrusive and without their support we would not be able to provide you with free community news and information!

And in the coming weeks we’ll be adding a new “Local Business Directory” to make it easier for you to find services and support your local merchants!

If you’re a business and would like to advertise on or want to be included in our new Local Business Directory, send us an email through the contact form on the website or call our resident ad-lady, Kathy Duhnoski, at 691-2332 or

Next time we’ll return to our topic of online privacy with a look at two essential technologies that you really can’t afford to live without!

Eric W. Austin is a marketing and technology consultant specializing in small business. He can be reached by email at

TECH TALK: One account to rule them all


by Eric W. Austin
Computer Technical Advisor

This week, in our continuing series on finding anonymity online, we’re going to address one of the most important ways to ensure your life online is a safe, secure and happy one.


Remember when the most you had to remember was your ATM pin? Those days are gone, and now pretty much every website wants you to log in with a username and password. If you are like many people, you might use the same combination for multiple sites (except for those sites where somebody already took my username! Arrgghhh!).

You also probably know just how insecure this practice is – hack that one password and a hacker will have access to all your other accounts!

So, it’s utterly important to use unique passwords for every site you visit — or at the least any site that has sensitive or important personal information about you, such as online banking, or places you use a credit card and with your address like Amazon or

Before we go any further, let’s review what makes a good password. Stay away from using personal information for your password, like a birthday or pet’s name, even though it would be easier to remember. Try to use numbers as well as letters and include a special character or two (@!#$% etc…). Make it at least eight characters long, the longer the better. According to Google, using numbers and special characters makes an eight character password 30,000 times more difficult to guess than one of lowercase letters alone!

But how do you remember all these passwords? There are a number of ways to go about this, and they each have their own pluses and minuses. Many people (including myself) use a password manager, which usually is an extension for your browser that automatically saves passwords for you.

There are a number of good ones available. Personally, I use LastPass, which is available for all platforms. My only quibble with it is that it is only free for the desktop version. The app for IOS or Android will cost you.

But any similar password manager will do. Just ensure it’s a company that has been in business for a while (you don’t want them going belly-up and taking all your passwords with them). And read through their policy FAQ to make sure they take security seriously. The benefit of a password manager is that many will also generate passwords for you, and being random, they are highly secure.

Of course, no one can remember dozens of completely random passwords, so if you lose access to your password manager you often lose access to your passwords as well.

If you don’t want to use a password manager service, you’ll likely have to write them down somewhere. I recommend that you don’t keep a password file online for obvious reasons, and if you use Word or Excel to store passwords locally, secure the file with a password so that it is encrypted and cannot be digitally scanned if you get hit with a virus.

Also, don’t name the file “passwords.doc”!

Surprisingly, the most secure way to store your passwords may be the old-fashioned way: with paper and pen. Keep a notebook next to your computer and write each one down. Just don’t leave your notebook somewhere carelessly like an airport or restaurant!

Assuming you’ve decided on the best way to st
ore your passwords, and you do not want them to be randomly generated for you, how does one come up with so many secure, unique passwords?

While completely random passwords are the most secure, second best is a password that at least appears random. This is a tip a friend of mine suggested years ago and I have used it ever since.
Create a password “formula” that will look random to anyone else, and allows you to make it unique by tweaking only a single element of your formula. Let me show you what I mean.

For example: Let’s say my password for is “P48:bates!@AM” (without the quotes). It’s obviously not a completely random password, but because none of the elements directly relate to me it’s very difficult to guess. My formula for this password is simple: favorite bible verse [Philippians 4:8] + name of favorite movie villain [Norman Bates] + “!” + “@” + first two letters of the website name capitalized [AM].

Using this formula my password for would be “P48:bates!@TA”. Although the password looks complex, it’s made up of parts I can easily remember. This way we achieve a complex, unique password that is made up of numbers, symbols and lower and upper case letters, but is still easily generated and easily recalled.

Is it as secure as a completely randomized password? No. Is it better than using the same password on every site? Absolutely! How ever you define your password formula, use elements that are unique but unrelated to you and never — never ever — use any personal information like your name and address or birthday as part of that formula.

As a final piece of advice, and tying back to my headline, let me emphasize that not all accounts are created equal. If you have a Google or Microsoft account which ties all your other accounts together (the one where a password support request from other websites will be sent), give special care to the password you use for that account, and change it at lease every six months.

I hope this has been helpful, and please tune in next time when I’ll dig deeper into VPNs, proxies and firewalls, oh my!

Have a question or idea for a column? Eric W. Austin is a marketing and technical specialist and can be reached by email at

TECH TALK: Who are you again? How to be anonymous online, Part 1


by Eric Austin
Computer Technical Advisor

Part 1

Much of the convenience we get from the Internet comes from the fact that it stores so much about us online. This is both a positive and a negative. Sure, it’s nice to be able to order more laundry detergent without leaving the house, or to check on our bank balance without going to the bank. But the price for that convenience is personal exposure.

And that’s what it really comes down to: personal exposure versus convenience. There is no secret formula that will provide you with the latter without sacrificing the former. Any precautions you take online are guaranteed to impact what makes the web so convenient in the first place.

And as with most things in life, the answer to this conundrum is different depending on the person and the situation. How much exposure can you tolerate? Which is more important to you: personal privacy or convenience?

Because truly, the only way to be completely anonymous online is not to go online at all.

But knowledge is power. And knowing the risks, as well as how to protect yourself from them, is as essential to having a successful life online as anywhere else.

In this, and subsequent articles, I’ll discuss a few ways that you can limit your exposure while still getting the most from the benefits of online convenience.

Know your online behavior: Some online activities are riskier than others. Be aware of your level of risk before engaging in anything online, and limit your exposure based on the risk level of what you are doing.

How do you know which activities are risky and which aren’t? Easy. Just ask yourself: “Do I want everyone in the world to know what I’m doing right now?”

If the answer is “No”, then it’s risky.

http:// vs. https:// Every web address begins with “http,” which stands for “Hyper Text Transfer Protocol”. This is the data protocol that dictates how information is transferred across the web. The “s” in https stands for “secure” and means that the data is encrypted before being transferred. This is not such a big deal in 2017, as almost all websites now use the “secure” hyper text protocol for nearly everything. However, it’s worth noting that you should never transfer personal information across a non-secure “http” link.

Private Browsing: One of the easiest tools in your belt for staying anonymous online is “private browsing.” This is a feature in most modern browsers that automatically changes your settings to prevent your browser from saving information about your activities, including: which pages you visit, a record of your searches, cookies, passwords and cached content (like images), among other things. This is called “Incognito” in Google Chrome (Ctrl+Shift+N), and “Private Browsing” in Microsoft Internet Explorer (Ctrl+Shift+P) and Apple Safari (CMD+Shift+N).

While this option won’t safeguard any information you are sending over the Internet, it will prevent you from leaving any trace of your activities on the computer you’re using, which can be used by other websites and advertisers to track you. And you should always activate this feature when using a public PC.

Do Not Track option: The Do Not Track (DNT) option is a fairly recent addition to the settings in your browser which alerts websites and advertisers not to track you. While its effectiveness is entirely dependent on whether the website or advertiser chooses to pay attention to this flag, I still recommend you keep this set to “No” in your browser settings.

Well, this is the end of my column and I’ve barely scratched the surface of this topic. We haven’t talked about Proxies/VPNs, Firewalls, passwords and password managers, virus and malware protection and avoidance, alternative browsers and search engines, or ad blockers! Phew! Tune in next time for part two.

Have a question or idea for a column? Email me at, subject line “Tech Talk!”

TECH TALK: Tracking your every move

by Eric Austin
Technical Advisor

Remember that story about Hanzel and Gretel leaving breadcrumbs behind them so as not to get lost in the woods? Well, this week’s topic is kinda like that — if Hanzel and Gretel were actually everyone who used the web; the breadcrumbs are your credit card information, browsing and purchase history; and the wicked witch is actually hackers hell bent on screwing up your credit history.

So, basically the same.

The truth is that we leave breadcrumbs behind us wherever we go on the web. Sometimes those breadcrumbs are for our benefit and cause us no harm, but, unfortunately, often they’re left behind to benefit others.

In this article I’d like to briefly go over the different ways we can be tracked on the Internet.

Cookies. I’m sure you have heard of “cookies.” You may have seen a notification pop up on one of the websites you visit informing you that it uses cookies. But what are they?

Basically, cookies are small text files that websites create on your local hard drive which store bits of information about you. This information can be very basic, such as whether you have ever visited that site before, or as complex as what products are in your shopping cart, your login details, which ads you have clicked on and many other things.

There are three types of cookies. First-party cookies are ones which are left by the website you are currently visiting. This is the most common type of cookie, and generally is harmless and adds to your browsing experience.

Third-party cookies are left by advertisers running ads on the site you are visiting. For the most part, these cookies are also harmless. But since you have no control over who might be leaving them, they have a greater possibility of being malicious, so it is usually better to turn them off in your browser’s preferences. The only thing you’ll be missing out on is ads tuned to your buying preferences.

A final type of cookie is called a Flash Cookie because they are exclusive to websites that use Adobe Flash. Also called Local Share Objects (LSOs) or “supercookies,” since they cannot be gotten rid of by the most common efforts to delete browsing data, such as clearing your browser cache or deleting cookies. To remove these nefarious little devils, you’ll need to go to Adobe’s website and change your settings there.

For a long time, cookies were the lone way websites and advertisers had of tracking their visitors, but they had one major weakness: since the data resides on a user’s local machine, that user can delete them at will — and then all that carefully collected data was gone! Advertisers didn’t like this.

So websites and advertisers have recently found a way around this problem with a method called Device Fingerprinting. This allows websites to uniquely identify your device through a myriad of hardware and software characteristics. Rather than relying on local stored data to identify you, this fingerprint information is stored on the advertiser’s web servers instead. The advantage for advertisers is that, once your device has been fingerprinted, that information can only be removed by the company who created it. This method is almost impossible to subvert since it doesn’t rely on any locally stored data.

If you are curious just how your unique device fingerprint is created and what it’s based on, you can visit the site, and click the “Test Me” button.

Mobile devices shouldn’t be left out either. Device fingerprinting has evolved to include phones and tablets, as well as printers, game consoles, smart TVs and just about anything that connects to the Internet.

Further, your mobile device has its own identifier specifically for advertisers — Apple iOS’s Identifiers for Advertisers (“IDFA”) and Google Android’s Advertising ID.

Just be comforted in knowing that, on the Internet, you are never alone. Big Brother is always watching!

Feeling a little uncomfortable after reading this week’s column? Then you’ll definitely want to tune in to the next one where I’ll be talking about how to be anonymous on the web.

Have an opinion or question about this column? Stop by the website and leave a comment! Want me to cover something in a future column? Drop me an email at Until next time my fellow Mainiacs, happy computing!

TECH TALK: “I know who you are and where you live…” – The Internet

by Eric Austin
Computer Technical Advisor

In my first column, I wrote about the perils and pitfalls of shopping on the web. Over these next few weeks, I’d like to delve deeper into some of the new issues that face us now that we live in an online world.

Let’s face it. The internet is here to stay and it has been transformative. Things can’t go back to the way they were because they have been changed forever. For some of us, this is a bit scary. For others, not so much.

Part of the problem is that the internet has evolved faster than we have had a chance to adjust. To illustrate just how drastic this divide in generations is, let me give an example from my own life.

I have two sisters, one older, one younger. There is 14 years difference between them.

My older sister has a Facebook account, but you won’t find any pictures of her children there. Her main concern is that, unlike a physical photo, a photo on the web can be easily copied and shared without her being aware. This is a valid concern, and likely understandable to many of the parents reading this.

Now, in contrast, my younger sister recently had her first child, and his entire life is chronicled on her Facebook page. She and her husband share a huge amount of their lives online, and even used it to find a nanny. They harbor none of the fears of my older sibling.

So while online privacy will continue to be an important issue into the future, the discussion is going to change as the next generation, accustomed to life online, finds the open nature of the internet to be no more risky than walking through a busy mall. In fact, according to a recent report in U.S. News, online privacy barely registers on the risk radar of millennials.

Beyond individual privacy, the internet opens up interesting new ethical questions as well. My brother-in-law, who works for a company in New Hampshire, mentioned how he researches new job applicants on social media. “If they’re drunk and throwing up on the rug in every picture on their Facebook page,” he told me, “I might think twice about hiring them.”

Is it fair for a prospective employer to evaluate an applicant’s private life as part of the criteria for a job? Or is this a good thing, giving employers another tool for finding the right person for a job?

Over the next few weeks I’ll be looking at a number of these issues, what we can do about it, what we can’t, and why, in many cases, it’s not going to matter.

For my next column, I’ll explore how we are tracked on the web, what information we leave behind, and how that information is used to manipulate us. That’s right. Get ready, because I’m gonna scare the livin’ $@%& outta ya!

Have a tech question or idea you’d like to see covered in a future column? Email me at! Until next time, happy computing.