Why Are You On Facebook?

CLICK HERE to access the presentation Isabel & I have created for high school students of how to be safe while using Facebook. The presentation discusses the different usages of Facebook while being in high school and the information we should keep private.

Make sure to be safe online in general, it doesn’t matter what social media app you are using!

Direct link to Prezi:


Why Are You On Facebook?

My NEW Real Estate App!

I never realized making an app may be this easy! Using a simple tool provided by “Appy Pie”, I was able to have my own app up and running. Using the free option gave me the opportunity to explore the tools I had available. I will surely be upgrading to the “Gold Account” sometime soon and make my app available across other platforms such as ‘Apple Store’ and ‘Google Play Store’.

CLICK HERE and explore my NEW app!

My NEW Real Estate App!

Privacy and Security Review

For the midterm review I will be focusing on Module 4 of the course. For those of you who need to refresh your memory, this module was about Privacy and Security. Today’s generation has access to variety of social media applications and due to the rapid advancement in technology; the online world is leaving loopholes, which a user has to be careful about. The only difference with the online world is you don’t recognize the person by the face unless you’ve met them but by what they post and their attitude online. It is very important to be careful about what you post on social media sites because once it’s uploaded, it may be impossible to take that content away from the public. When making social media accounts, be sure to be Authentic. Authenticity is making sure you are representing yourself online in the most accurate way but make sure not to post any information you wouldn’t want anyone to know or information that may harm you. While making sure to be authentic, it is important to not click anything you believe is a scam, it may leave a cookie in your browser. Cookies are placed in one’s browser to track online behaviors and sends your browsing information to third parties. Aside from authenticity and cookies, there many more security concerns such as the following:

Malware: Malware is unwanted programs or codes being installed on your computer. It can only be done if the user clicks install program without knowing what it really is. Such installed malwares can steal person information such as credit card information, pictures, and passwords. With the advancement in malware, programs are able to access your webcam or take control of your computer remotely.

Phishing: This is basically messages sent out to a user through an email, phone calls, texts, or website popups that prompt a user to login with personal information or click on a link, which takes them to a third party site whom installs malware on to the computer.

Spoofing: This is simply third party websites who create websites that look exactly like the ones you would want to access. For example, a third party can create a login website for your banking website; everything may appear the same but sometimes there is just a difference in the URL or some logos. This may lead to information being stolen or installation of malware.

Identity theft: In simple words, identity theft can be done by using someone else’s information online, stealing information through the malware that was installed, or stealing passwords by spoofing. Such identity thefts lead to frauds for various illegal actives.

Spam– Spam consists of sending out email messages with links to malware or spoofing sites embedded.

There are many ways to stay safe online in today’s world; the best way to be safe is make sure what you click and think twice before posting something anywhere online. To protect yourself from unknown cookies, use Firefox or any other cookie blocker. And in addition to all that, you may use Antivirus software, which would protect you from behind the scene third party software’s being installed.

Privacy and Security Review

Don’t Let Third Parties Outsmart You

Prior to attempting the Lightbeam activity I was aware of third party websites tracking a individuals pattern of browsing but it was only until I went through the activity to notice the amount of third party websites was much larger than I supposed. I had anticipated maybe a dozen websites keeping track, then came the shocking number of 234 third party websites from just 20 minutes of browsing, in which I only visited 5 websites. The scariest part of it all was there were websites I would never visit, which look like a total scam or threaten my online security. I realized Firefox gives you the option to block third parties but blocking them entirely won’t allow some websites to operate correctly. Now, having third parties does not always mean it is a bad thing, sometimes they are required in the sense that certain websites need to know what you’re doing in order to provide you with the online experience. Secondly, disabling third parties entirely wouldn’t be profitable for businesses. For example, I as a real estate agent operate a website that leaves a cookie in the individuals browser who goes on to my website. This is where the concept of “cookies” comes from the course, the cookies aren’t harmful in the sense it is stealing or reading information off the individuals hard drive but is only making the online experience better. In my case, a cookie that is left behind when someone visits my website, allows my ads to follow them around while browsing; it allows awareness of my brand and does not harm them in any way. A real estate agent like myself has to pay a good dollar amount to advertising companies who allow this advertising to happen. After all what can be a better advertisement method in today’s generation. Would you rather troll people with advertisement or pay thousands on newspaper ads, which probably won’t get much attention? The second concept I would like to touch on from class is “spoofing”, which is a dangerous type of third party. Since I have a lot of family into IT security for banks, I hear impersonation of online banking websites is very common. Online users don’t realize you have to be alert when being redirected from one website to another. The website design may look the same and URL may begin or end the same way but there is always something off with the URL. As an online user you have to make sure the URL is correct to be safe. IT people such as my cousins work on stopping such cybercrimes on a daily basis but with quick advancement of technology, it is not easy to keep up with all the loopholes. I simply believe there are pros and cons of being online and enabling third party websites. We cannot block all third party websites, so to make things simple online just be smart about what you click and don’t let third parties be smarter than you.

Don’t Let Third Parties Outsmart You

Outline for Final Project

For this blog I have attached a URL to a presentation I and Isabel Tan created for the outline of the final project. You will notice our topic is around ‘Social Media’, specifically ‘Facebook’. In our presentation we highlight some important topics and risks we will be considering in our final project. Thanks for viewing our presentation!

https://prezi.com/ks-msqpbc0jc/present/ follow=yeredwzsbyof&auth_key=gas5l2z#1_24309637

Outline for Final Project

Making Googling Easy

How would you search for an exact word or phrase?

Before typing anything into the search bar on Google, you should know what exactly you are looking for; make sure you have a short and simple phrase. Now, make sure the phrase is put in double quotations; this allows Google to only search for the exact phrase side by side and not find your words all over in the pages. For example, when searching “German Rottweiler”, you must put the phrase in double quotations so it only returns results with only information about German Rottweiler’s. Otherwise if not put in double quotations it would return results with information about “German’s” and any type of Rottweiler’s, German or American. To get exact results, the double quotations must be used.

How would you search for something on a specific site?

Searching for something on a specific website can be very simple if all tools are used the right way. The most simple method to do a search on a website is use ‘Command + F’ if you are using MAC or ‘Control + F’ if you are using Windows. This will make a small window pop-up, which will allow you to type in a specific word or words (also use synonyms if your word does not return any results) and the search will direct you to those specific words on the specific website. You would be able to browse through all the exact phrases in order.

How would you correctly search for a definition?

The easiest and correct way to search for a definition on Google is by using [define] followed by the word you want to get the definition of.

How would you search for a specific product available within a specific price range?

To search for a specific product available within a specific price range you would simply start off with inserting a [$] sign in your search bar followed by the price numerically typed with two periods splitting the price range, then followed by the name of the product itself. For example, if searching for a Samsung cellphone, I would search the following: [$400..$900 Samsung Note 5].

How would you search for a specific filetype?

To search for a specific file type on Google you simply insert [filetype] followed by the type of file you are searching for. To search a file on a specific phrase or company, you simply put the phrase in double quotations followed by [filetype] and type of file (ex. ppt or excel).

How would you include or ignore words in your search?

To include words in your Google search, you will have to add [~] followed by the word. For example, if you are searching on Google for Rottweiler’s but you want to see both, American and German Rottweiler’s, you simply insert the following [“Rottweiler’s” ~ German ~ American]. On the other hand if you want to exclude words from your search you simply insert [-]. For example, if you only want to see results of American Rottweiler’s, you insert the following [“Rottweiler’s” – German].

How would you find sites/pages similar to an existing one?

To find sites/pages similar to an existing one, you simply insert the following into Google search: [related] followed by the website URL you want similar results to.

How would you confirm the exact form of a quote even if you were missing some of the words?

To confirm the exact form of a quote even if you are missing some words from the quote, you simply insert the words you know from the quote in the Google search bar with an asterisk [*] replacing the words you think you are missing.

How would search for pages containing two connected words?

To search for pages containing two connected words, you simply add [AND] between the two words to find specific results or you simply insert the two words in double quotations, in which you don’t have to add [AND].

How would you search for social media content containing a specific tag?

To search for social media content containing a specific tag, you simply insert [#] followed by the tag you are looking for in your Google search.


Making Googling Easy