20 minute read

Technology: Create an anonymous email to keep identity safe

Technology 5

Create an anonymous email to keep your identity safe

Advertisement

by Burton Kelso, The Technology Expert

By now, I hope you've figured out social media, search engines, and everyone, in general, is trying to collect as much information as they can about you. Privacy online is a hard thing to have in this digital world. Having a separate, anonymous email address is one of the best ways to keep a low profile online. When you have an anonymous email, it helps reduce the amount of spam you get in your inbox. It also allows you to shop online with electronic and brick-and-mortar stores and sign up for digital membership services without them collecting information about you or trying to sell you things you don't need. Also if you're dating online, it's best to have an email that can't be traced back to you. Check out these quick and easy tips to stay anonymous online.

1. Setup a Fake Account with a Free Email Service. When people consider setting up a fake or anonymous email account, they usually turn to a free email service such as Yahoo, Outlook.com, Gmail, or one provided by their Internet service provider and why wouldn't you? You can create countless email addresses with these services, but are you doing it right? Check out these steps to make sure you're keeping your identity safe. Use fake details. For starters, create an email address that isn't tied to you in any way. Avoid using your real first name or last name. Also, avoid using an email address that can be tied to your hobbies or interests. All free email account services require you to put in personal information like your name, date of birth, and sometimes address. You're probably thinking since your email name isn't tied to you, no one can find out who you are. Well, if you're entering your home address, it won't take someone long to put two and two together. Finally, don’t use any details in your password or security questions that someone could link to you either. Create an anonymous phone number. Some free email services, like Gmail, also ask for a phone number to set up 2 step verification for your new account. You can't just enter in a set of numbers, because your free email account service will call the number to verify it is real. Your best option is a virtual number when you set up new, anonymous email accounts. Services like Google Voice and WhatsApp let you set up free virtual numbers that can be used to keep your smartphone number safe. Enable Your browser's private mode for added protection. Many of the websites you visit track your cookies and keep a note of which IP address you're located. All browsers have an "incognito" or "InPrivate" mode that you can enable to keep them from tracking your cookies. As far as a VPN, consider switching to Opera (www.opera.com) or Tor (www.torproject.org). These excellent browsers allow you to block your cookies as well as use the built-in VPN to keep your location safe.

2. Use an Anonymous Email Service.

It might take a little more effort, but the best way to keep your online identity safe is to use an anonymous email service. Most of these free services allow you to create an account that is separate from you. As an added bonus, email services encrypt your mail so no one can snoop with what's in your messages. Mailfence. Mailfence is based out of Belgian which puts your email under the protection of their privacy laws and not the laws of the US. This service allows you to send and receive emails anonymously. There are no third-party trackers or ads like you see in other free email services. Your emails are encrypted so no one can read what you've sent. ProtonMail. ProtonMail is based out of Switzerland which means your email is protected by its privacy laws. This means your email is protected even if law enforcement or a government agency wants access to it ProtonMail is usually the popular choice because it's available from any web browser or smart device. Using anonymous email is a great way to keep your identity safe online as well as to cut down that annoying spam that you get in your inbox. If you don't want to take the time to create a new email, you can keep your email safe by making sure you don't share your email with everyone and don't sign up for any online services that require your email.

Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts organization can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829.

6 State News

Democrats say Missouri governor inflating cost of fixing website flaw found by reporters

by Rudi Keller, Missouri Independent

When Gov. Mike Parson last week angrily called for the St. Louis PostDispatch to be prosecuted for uncovering security flaws on a state agency website, he said the newspaper’s actions could “cost Missouri taxpayers up to $50 million.” That amount, two Democrats on the House Budget Committee said Tuesday, is an estimate for providing credit monitoring to protect against misuse of personal data and a call center to answer questions from educators whose private data may have been exposed. And, state Rep. Peter Merideth said, the estimate is not a very good one. “He pulled it straight out of his ass,” Merideth said in an interview with The Independent Tuesday. Merideth, the ranking Democrat on the committee, and Rep. Kevin Windham, D-Hillsdale, said in a news release that they asked nonpartisan appropriations staff to find out what Parson, a Republican, intended to do with the money. They were informed, Meridith said, that the governor’s statement was “a very rough and preliminary estimate,” the funds that would be tapped have not been identified and the timeline for doing anything was unclear. In the release, Meridith and Windham said the Post-Dispatch protected the state by holding the story until the data issue was fixed. If the person who found the data had bad intent, Windham said, the price could have escalated. “I remain concerned about potential costs to the state resulting from lawsuits and the like, however I’m far more concerned about the 100,000 educators whose sensitive information was handled with such negligence,” Windham said. “Our state is incredibly fortunate that the person who found this vulnerability reported it to the state as soon as they did.” The reason the estimate is questionable, Meridith said, is that it may duplicate something the state has already been forced to do to protect the data of educators. The state purchased 24 months of credit monitoring for potential victims of a data security problem at the Public School and Education Employees Retirement System, the Post-Dispatch reported Tuesday. The system notified its more than 128,000 active members and 100,000 beneficiaries of the Sept. 11 breach the same day that Parson lashed out at the story about teacher data. The data for about 100,000 active educators was accessible through the Department of Elementary and Secondary Education website. “I doubt it costs $50 million for 100,000 people to have credit monitoring,” Meridith said. In the story that enraged Parson, the Post-Dispatch reported a website set up for the public to search the credentials of individual educators exposed Social Security numbers. The numbers were visible embedded in the code that tells the computer how to display a page, which can be viewed by pressing the F12 key on both Apple and Microsoft operating systems. The reporter viewed three Social Security numbers, the newspaper reported. The Post-Dispatch informed the department and refrained from publishing a story about the issue until the data was no longer available. In the statement Parson read to reporters without taking questions, he said the reporter who found the issue was a hacker and that viewing the data see GOVERNOR on page 12

Plant Fall Flower Bulbs Now!

by Cathy Bylinowski, MU Extension Jackson County Horticulture Instructor

Spring bulbs add a splash of color to our spring gardens and to the beginning of the new gardening season. They can be planted among groundcovers and perennials. As these plants grow in the spring, they will hide the fading bulb foliage. Spring flowering bulbs need to be planted in the fall, in well-drained soil in areas that receive part shade to full sun. Planting the bulbs about 2-3 times the height of the bulb is a general rule for planting depth. The bulbs need exposure to cold winter temperatures in order to bloom next spring. You should have plenty of time to purchase and plant spring bulbs this month. Here’s a list of some of our favorite bulbs and tips for success:

Daffodils Narcissus spp.- Ranging from yellow, to white, to orange, daffodils’ unusual and variable flower shape and wonderful scent made them a good addition to our gardens. Daffodils last a long time and can be used to naturalize in flower beds and lawns. They need full sun and well-drained soil. A fertilizer high in phosphorus such as bone meal, helps the bulb develop a healthy root system. Plant bulbs 6-8 inches deep. Trim the old flower stems off. Daffodil foliage needs to photosynthesis to store food for next year’s growth. Do not cut off or bundle up the foliage.

Tulips Tulipa spp- Some tulips bloom well for one year and gradually lose vigor in subsequent years. Sometimes landscape managers use them like an annual. If you want beautiful perennial tulips, select a variety such as Darwin hybrids or a species tulip; they live and bloom for many years.

Crocus Crocus vernus- Crocus are diminutive and brightly colored flowers that surprise us with their blooms as early as February and March. Full sun and well-drained soil are essential for good performance.

Wild hyacinth- Camassia scilloides- Looking for a Missouri native flowering bulb? Wild hyacinth is a good choice. The pale blue spike of flowers blooms in April and May in glades, prairies, and savannas in many parts of Missouri. They need part sun to full sun to thrive. Many nurseries that supply native plants grow and sell this species.

Did you enjoy summer flowering bulbs and ornamentals this year? Cannas and caladiums were especially attractive this year. If you want to save money, try digging up cannas, caladiums, calla lilies, elephant ear caladiums, gladiolus, and dahlias after a light frost for next year. Let the roots or bulbs dry and then overwinter them in a cool, dark place, with good air circulation. A basement or room that does not get below freezing is a good place to store them. Trim off the foliage. Replant in late April or early May after the danger of frosts and freezes has passed. Plant in well-drained soil.

Cannas- Cannas are tall and vigorous, with attractive foliage and vivid flowers all summer long. There are tall varieties that work well in the background and shorter varieties that can be planted towards the front of a bed. Cannas flower colors range from deep red to pink, to yellow. In zones 7-10, cannas are left outside all year, but in the Kansas City region, it is safer to lift them up for overwintering in a dry medium such as vermiculite or peat.

Caladiums- Grown for their beautiful foliage, caladiums thrive in shade and part shade. They like moist, well-drained soil. They can be grown in containers or in flower beds.

For more information on a wide range of herbaceous ornamental plants, check out this publication from the Master Gardener Core Manual- https:// extension.missouri.edu/publications/ mg9 If you need more gardening information, contact Extension Master Gardeners of Greater Kansas City Hotline, 816-833TREE (8733) or email mggkc.hotline@gmail.com. Clockwise from top left: Daffodil Image by Capri23auto from Pixabay, Crocus flowers Image by Michael Gaida from Pixabay, Canna flowers on a variety named “Tenerife”. Image by Thomas G. from Pixabay, Wild Hyacinth Camassia scilloides, photo credit Dr. Thomas G. Barnes, U.S. Fish and Wildlife Service. Below: Wide variety of Caladiums. Image by Jan Haerer from Pixabay

8 Your Health

Become friends with fiber

by Tara Sallee, MS, RD, LD, Hy-Vee Corporate Dietitian

Fiber comes from plants like fruits, vegetables, legumes and grains. We use fiber for energy as it is not digested in our bodies. There are two types of fiber: insoluble and soluble fiber. Think of insoluble fiber as the janitor picking up our body’s waste, putting it into a pile, and pushing it out the door. Soluble fiber, on the other hand, is the slowrolling fiber that keeps us full and our blood sugar from rising. Consumption of a fiber-rich diet can show benefits of weight management, diabetes control and bowel function. Fibrous foods can positively affect weight management by keeping you fuller for longer, making you less likely to overeat. Individuals with diabetes can find an ally among fiber-packed foods since they have been shown to lower blood sugars by slowing the release of sugar from foods into the bloodstream. Once the meal is over, fiber gets to work in the gut by increasing the bulk of our stools, helping it move through the body and pass with ease. Everybody and every body may need different amounts of fiber. According to the Dietary Reference Intake (DRI), adults and children over the age of 4 are recommended to have around 25 to 38 grams per day. It is recommended that young children ages 1-3 have around 19 grams per day. Here’s an easy label-reading tip for finding fiber sources: A high-fiber item will have 5g or more per serving and an item that is a good source of fiber will have between 2.5g and 4.9g per serving. If you are looking for more fiberrich ideas, check out Hy-Vee.com for more recipes. Look into our Healthy Habits meal planning program or our monthly themed events for even more ideas. This recipe packs a heavy fiber punch of 21g in just 2 tacos. Take a look and try this fiber-rich Squash and Black Bean Soft Shell Tacos recipe.

The information is not intended as medical advice. Please consult a medical professional for individual advice.

Squash and Black Bean Soft Shell Tacos Serves 6

All you need: 2 tbsp Gustare Vita olive oil 1 tbsp Hy-Vee sriracha sauce 1 tbsp lime juice 3 cups cubed butternut squash (½-inch cubes) 1 large red bell pepper, seeded and cut into strips 12 (8-inch) Hy-Vee whole-wheat flour tortillas 2 (15-oz. each) cans Hy-Vee black beans, rinsed and drained cup Hy-Vee salsa 3 tbsp hot pepper peach spread, optional ¾ cup crumbled queso fresco cheese Fresh cilantro, chopped, to garnish

All you do: Preheat oven to 375 degrees. In a 9-by-13-inch baking dish, combine olive oil, sriracha and lime juice. Add squash cubes and pepper strips; toss to coat. Roast 30 to 35 minutes or until tender and lightly browned, stirring after 15 minutes. In a medium skillet over medium heat, toast tortillas for 30 to 60 seconds per side or just until light brown spots appear. Fold in half and cool on platter. In a medium microwave-safe bowl, heat beans and salsa, covered, in the microwave on HIGH for 2 minutes. Heat hot pepper peach spread, if desired, in a small microwave -proof bowl on HIGH for about 15 seconds or until melted. To assemble, spoon ¼ cup black bean mixture, ¼ cup squash mixture and 1 tablespoon cheese into each tortilla. Drizzle with melted peach spread, if desired. Garnish with cilantro, if desired.

How to ensure social media doesn’t harm your teen’s self-esteem

(StatePoint) Recently made public internal research from Facebook reveals that its photo-sharing app Instagram can have harmful impacts on young users, particularly girls. Many in the U.S. and U.K. study say they feel “addicted” to these apps, while at the same time, attributing depression and anxiety to their use of them. While the research is still evolving, one thing is certain. Adolescence can be a time period for many young people that’s already rife with body image issues, insecurities and emotional and mental health challenges. However, experts say that for parents looking to better protect their teens from the negative impacts of social media that can exacerbate these issues, the key is not to prohibit teens’ use of these tools, but to strike a healthy balance. “Of course, not everything about social media is harmful. Many young people are using such apps to communicate with friends and share art, music and information,” says Michele Havner, director of marketing at Eturi Corp., a company with a mission to empower parents to guide their children through a balanced use of technology. “That’s why we encourage parents to help their teens develop healthier relationships with their devices and the apps they use most frequently.” Here are a few strategies to consider: • Alternatives: When it comes to the way young people pass their time outside of school, there are limitless alternatives to social media. Whether it’s sports, playing in a band or taking a pottery class, you can encourage your child to both embrace hobbies and interests outside the world of their screens, as well as to spend more time with friends in person. • Real talk: One of the major aspects of social media is that what people choose to share publicly is not always a reflection of reality. Have a conversation with your kids about the many ways that influencers and other social media users apply filters, photo editing software and other tools to create impossible goals for their followers. This might also be a good time to discuss what sort of content they’re engaging with so you can try to steer them in a more positive direction. • New tools: Attempts to set social media boundaries can be easier said than done both for the primary user (your teen) and you. Apps designed for this purpose can help. For example, the parental guidance app OurPact allows you to install a profile on your child’s device. Then, you can remotely set up automated schedules for when internet and apps are unavailable, or block access manually to the device for a specified period of time. Features like URL whitelisting and blacklisting and daily screen time allowances can help you stay engaged with how your child uses their device. Available at the iOS App Store and Google Play Store, parents can also sign up for an account at www.ourpact.com.

“While social media apps are not going away any time soon, parents can take concrete steps to help ensure teens are using them in ways that make them happy,” says Havner.

Make Halloween less scary by avoiding financial tricks

(StatePoint) Make the season of spooks a little less scary for the older people in your life by brushing up on ways to stay safe and secure off and online. “I wish scary characters were only make believe, but unfortunately, there are real ones lurking in the digital realm and sometimes in our lives. All too often, we hear of elder financial abuse cases where these bad actors manipulate unsuspecting souls out of their savings and possessions,” says Lauree PetersonSakai, strategy leader for Wells Fargo Aging Client Services. Imposter scams use a variety of tricks to gain a person’s trust and steal their sensitive information, but they often start with a simple call, email or message impersonating a person or company they know to trick them into giving away their money. This Halloween, avoid tricks. Instead, treat yourself and those you love to five tips that may help thwart tricky fraudsters: 1. Beware of Trick or Treat callers. Don’t pick up calls from unknown numbers. The IRS and other government or financial institutions rarely make outbound calls and never ask you to provide personal information. 2. Don’t be ghosted by a money mule scam. Avoid helping strangers with cashing checks, delivering packages or receiving goods. 3. Beware of calls from tricksters claiming to be your grandchild in urgent need of money. Hang up immediately to avoid falling for this common trick. 4. Family skeletons may bring out the worst. Speak to another family member or trusted person in your life before lending large sums of money to family members or new acquaintances. 5. Ghoulish actors are everywhere today, including in internet searches, emails and texts. Don’t be tempted to click on something that could hurt you or expose your personal information and log-in credentials. “The best things you can do for yourself are know how to recognize potential scams and keep an open dialogue with your family and loved ones. Encourage each other to share if something sounds suspect,” says Peterson-Sakai. “What we’ve found to be really protective against scams is running a situation by someone you trust before making a decision that could impact you financially.” For a guide to identifying and preventing elder abuse, visit wellsfargoadvisors.com.

THEME: ON AN OLD MAP

ACROSS 1. *Core of Persia today 5. *Belgian village where Roman soldiers enjoyed warm mineral springs 8. Pitch symbol 12. More luminous star 13. Abbott and Costello or Rocky and Bullwinkle 14. Eurasian goat-like antelope 15. Team's ranking 16. Make someone angry 17. Mix in 18. *Formerly Ceylon (2 words) 20. What tide does half the time 21. Reggae subgenre 22. Back then 23. ____ profundo 25. Depleted (2 words) 28. Wet firecracker 29. Catch in a net 32. Hip bones 34. Dormer without D 36. Schiller's poem 37. "It is silent" in sheet music 38. Discharge 39. Admirer 41. Earlier in time than, archaic 42. Not out (2 words) 44. Pinocchio and his kind 46. Evergreen creeper 47. "A League of Their Own" member, e.g. 49. Command to a fly 51. *Formerly Siam 54. Rain forest ruminant 55. Irish for Ireland 56. It's under a fig leaf? 58. Shockingly graphic 59. Impersonator 60. Manlike man-eater of fairy tales 61. Crunchable information 62. Popular '60s drug 63. A ____ ____ move DOWN 1. Opposite of outs 2. Fish eggs, pl. 3. Affirm solemnly 4. Lowest points 5. Seeking damages 6. Kenosha Kickers' music 7. On the sea 8. *Once named Kampuchea 9. Trunk appendage 10. Shining armor 11. Facsimile machine 13. Fire-starter in fairy tales 14. Trojan War military action 19. Red-dot pointer, e.g. 22. Cigar residue 23. *Myanmar, formerly 24. "____ One" on a ticket 25. Consumer 26. Stomach sore 27. Boat stops 28. John's and Jane's last name? 30. Pie a la ____ 31. *Tokyo, formerly 33. Absorbed, as in a cost 35. *Abyssinia, now 37. Jury duty event 39. Comedian Schumer 40. Has more elm trees 43. Roundish 45. Not digital 47. Ox prod, pl. 48. Propelled like Argo 49. Arctic jaeger 50. '80 TV series "____ to ____" (1 word) 51. Bluish green 52. Canceled 53. "American ____," Jeanine Cummins' bestseller 54. Like one of the Testaments 57. Modern, prefix

This article is from: