Privacy Policy

What information does this website collect?

You may visit this site anonymously.  If you voluntarily fill out a form on this website, personal information may be collected from you.  For example, you may be asked to enter your name, e-mail address, and other information which may serve to personally identify you.  In addition, this website may provide opportunities for you to provide comments or feedback, which will be anonymous unless you yourself include personally identifying information.

What may your personal information be used for?

Any personal information collected from you may be used in the following ways:

  • To improve the website
  • To respond to your individual questions or requests (e.g. via email)
  • To personalize your experience on the website
  • With your consent, to share your comments or feedback with other visitors to this website

Personal information you provide to this website will not be sold exchanged, transferred, or given to any other party for any reason whatsoever, without your consent, except as may be required by law enforcement agencies.

When your comments or opinions are collected with the intent of making those public on the website, you will be informed of that and asked to consent to such use.  No other personal information will be provided with such comments or opinions unless you yourself include such information as an integral part of the comments or opinions you provide.

Does this site use cookies?

This site uses third party services to allow collection of website usage statistics.  This may involve the use of cookies to collect anonymous information such as number of visitors to the website in a given day, pages visited, length of time spent on each page per visit, etc.

Does this site disclose any information to outside parties?

The owner of this website does not sell, trade, or otherwise transfer to outside parties either your personally identifiable information or anonymous information that may be obtained by software when you visit this website.  However, the owner of this website may release both personally identifiable and anonymous information when such release is appropriate to comply with the law, to enforce this site’s policies, or to protect the rights, property, or safety of any party.

Information provided by you or obtained through your use of the website may be available to third parties who provide the software or services required for operating this website, and their use of that information may be beyond the control of the owner of this website.  For more information regarding third party software and services used by this website, please see the About page. 

Third Party Links

This site may include links to third parties who provide information, products or services. These third party sites have separate and independent privacy policies. This site therefore has no responsibility or liability for the content and activities of these linked sites. Nontheless, your feedback is welcomed concerning malicious content or actions on the part of any third party site linked to by this site.

Online Privacy Policy Only

This online privacy policy applies only to information collected through this website and not to information collected offline.

Terms and Conditions

Please visit the Terms of Use section of this website  for information regarding the terms, disclaimers, and limitations of liability governing the use of this website.

Your Consent

By using this site you consent to this privacy policy.

Changes to This Privacy Policy

If this privacy policy changes, the new privacy policy will be posted on this page.

This policy was last modified on 11/1/2010.

Contacting Us

If you have any questions regarding this privacy policy, please use the form on the Contact Us page to send a message.

Website Conditions and Terms of Use

1. Terms

By accessing the this web site you are agreeing to be bound by:

You also are acknowledging that you are responsible for your compliance with any laws or regulations that may apply to you. If you do not agree with any of these terms, you are not authorized to use or access this site.

2. Copyright

The materials contained in this web site are protected by applicable copyright and trade mark law.

3. Use License

  1. Permission is granted to temporarily download one copy of the materials (information or software) on this web site for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:
    1. modify or copy the materials;
    2. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
    3. attempt to decompile or reverse engineer any software contained on this web site;
    4. remove any copyright or other proprietary notations from the materials; or
    5. transfer the materials to another person or “mirror” the materials on any other server.
  2. This license shall automatically terminate if you violate any of these restrictions and may be terminated at the discretion of this website’s owner at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.

4. Disclaimer

  1. The materials on this web site are provided “as is”. This website makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, the owner of this website does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on this Internet web site or otherwise relating to such materials or on any sites linked to this site.

5. Limitations

In no event shall the owner of this website or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on this Internet site, even if the owner of this website or that owner’s authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

6. Revisions and Errata

The materials appearing on this web site could include technical, typographical, or photographic errors. The owner of this website does not warrant that any of the materials on this web site are accurate, complete, or current. The owner of this website may make changes to the materials contained on this web site at any time without notice.  The owner of this website does not, however, make any commitment to update the materials.

7. Links

The owner of this website has not reviewed all of the sites linked to this Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by the owner of of this site. Use of any such linked web site is at the user’s own risk.

8. Site Terms of Use Modifications

The owner of this website may revise these terms of use for this web site at any time without notice. By using this web site you are agreeing to be bound by the then current version of these Terms and Conditions of Use.

9. Governing Law

Any claim relating to this web site shall be governed by the laws of the State of California without regard to its conflict of law provisions.

Computer Security

Overview

A well-protected computer will have the following installed, active and up-to-date:

  • firewall
  • anti-virus software
  • malware scanner

The computer will be set to automatically check for security updates to the operating system and all key software, and these updates will be installed either automatically by the computer or promptly by a diligent user. In addition, there will be a recent backup that will allow the computer to be restored to the state it was in at the time that backup was made. (Keep in mind that all changes made after the backup will be lost, so frequent backups are a good idea.)

f you don’t know how to protect your computer as described here, get someone experienced and trustworthy to help you.

Even with all the above, there are ways computer security can be breached.  As the use of computers and computer networks increases, so does the incentive to commit crimes by “hacking” into networks and the computers they connect.  In response to this, the security-conscious user will take further precautions:

  • encrypt sensitive data
  • keep a separate backup of your data
  • make periodic use of online virus scanners from sources you know to be reputable
  • use a browser with add-ons to block flash and scripts
  • don’t open email attachments unless the sender is trustworthy and knowledgeable
  • disconnect from the network if your computer begins doing something you don’t understand
  • have an action plan for computer failure or security breach

In addition, be on the lookout for scams and schemes that use YOU to get past the security protections on your computer.  Fake security warnings are a favorite tool of fraudsters who are trying to sell you a useless product or steal your personal information. If a security warning (e.g. virus alert) pops up on your computer, disconnect from the Internet and then examine the warning carefully before you take any further action.  A legitimate security program installed on your computer will provide clear instructions and should not need an Internet connection to function. 

Also be wary of email that claims to be from a bank, a credit card company, a government agency, etc. telling you about a “problem” that requires you to download something, open something, or click on something.  Before you take action, have someone knowledgeable help you determine if the email is legitimate.  For example, if the email claims to be from a credit card company, look up their phone number and call them to find out if there really is a problem.

Firewalls

A firewall monitors the traffic (data) going into and coming out of your computer when it is connected to any kind of network, whether this be a local network (LAN) or the Internet.  To organize such traffic, your computer uses a number of different “ports” for different kinds of traffic.  For example, one port may be used for incoming email, another for outgoing email, and yet another for web surfing.  If a firewall detects suspicious traffic, such as an attempt to use a port by unrecognized software, it will take some action.  In most cases, that action will be automatically determined by a set of rules.  Some firewalls, however, can be set up to notify you and ask you what to do when certain kinds of questionable traffic are detected.

A firewall can be implemented in hardware which resides outside your computer or in software on your computer.  This article will discuss software firewalls only. 

Firewalls for Windows

The more recent versions of Windows (e.g. XP or later) come with a firewall as part of the operating system.  By default, this firewall is turned on and operates automatically.  It provides decent protection and requires no action from you unless you have some reason to change its settings.  For ease of use, the Windows firewall is hard to beat.

For those who want more information about and more fine-grained control over network traffic, there are a number of alternatives to the Windows firewall.  Some of these are free for personal (i.e. non-commercial) use, and for my purposes these are more than adequate.  If you decide to use some of these, expect to spend some time learning how to use it.  In the first weeks  to months of use, these firewalls build up their rule set by asking you what to do each time one of the processes running on your computer tries to use a network connection  In the beginning, you are likely to get a LOT of alerts, and the answers you give will determine how well the firewall protects you down the road.

ZoneAlarm Personal Firewall

This is the most popular of the free firewalls.  It’s easier than most to set up and, at least in my experience, does not have conflicts with other software.  However, the recent versions of it do not work well on less powerful computers.  To get this free firewall to work, you have to get a registration key by email.  Following that, you will continue to get mail from ZoneAlarm advertising their paid products.

Comodo Internet Security 4.0

This is an anti-virus program and firewall bundled together.  When you install, take the option to install just the firewall — there are better choices for anti-virus.  Also, when you install pay attention and make sure you UNCHECK the boxes for changes to your home page, search preferences, browser toolbars, etc.

Online Armor Free

Said to be easy to install.  Includes keylogger guard, tamper protection, malicious script and worm protection, and limited autostart protection.  This has been popular recently on download.com, but doesn’t have many user reviews.

Anti-virus Software

If you have a computer running some version of Windows, there are several complementary approaches to anti-virus protection you may want to use:

Installed Software

Every Windows computer should have an anti-virus program installed, since Windows is the operating system targeted by most malware.  Due to the way in which anti-virus programs work, it is not a good idea to have more than one installed, even though the different programs have different strengths and weaknesses.  When changing from one anti-virus program to another, uninstall the old program and restart your computer before you install the new program.  Also keep in mind that some anti-virus programs are difficult to completely uninstall.  This is something you might want to look into before choosing your anti-virus solution. 

All anti-virus program rely on a database of virus definitions.  At present, there are two approaches to storing this database.

Cloud-Based Protection

This new approach uses a virus database that’s kept on remote servers rather than on the personal computer.  Initial testing shows this to be an effective form of protection for computers with an always-on connection to the Internet. Keeping the database in the Internet “cloud” removes the need for frequent checking and downloading by your personal computer.  The downside is that the virus database is not available when your personal computer is offline.  Panda offers a free anti-virus application based on this approach.  I plan to test this at some point, but have not yet done so.

Client-Based Protection

This is the traditional approach.  You install the anti-virus software and then update the virus definition database stored on your computer on a regular basis.  The initial update may take some time, but updates after than should go quickly if they are performed on a regular basis.  Keeping the virus database up to date is important, as is making sure that incoming email, downloaded files, etc. are scanned automatically.  There are a number of free anti-virus programs that provide reasonable protection.  At present, Avast is probably the most effective of these.  AVG tends to be highly regarded as well. 

From time to time, I evaluate the most recent versions of various anti-virus programs.  The effectiveness of these programs varies from year to year.  Also, a program that works well for a powerful desktop computer may not work well on a less powerful netbook.  So I often use different anti-virus programs on different computers.  This has the advantage of allowing me to scan my external hard drives, where I keep copies of my data, with more than one anti-virus program.

There are a number of free anti-virus programs that provide reasonable protection.  At present, Avast is probably the best pick, though AVG tends to be highly regarded as well. 

I’ve had good experiences with Eset in the past.  Their price is high, but they are one of the few companies that provide good customer support. I’ve evaluated G Data, which is highly rated, and I’ve not liked the drag is places on performance, nor have I been happy with the lack of customer support.  Also, the boot scan CD I created with G Data did not work.

Online Scanners

Online scanners offer a one-time scan from a website.  They don’t provide ongoing protection and should be regarded as a complement to installed antivirus software rather than an alternative.  Since no anti-virus application is 100% effective, it might be a good idea to use one or more of these online scanners from time to time.  Eset and Kapersky offer online scans.

Boot Level Scanners

There are certain kinds of viruses (i.e. rootkits) that either cannot be detected or cannot be removed once your computer has booted up from the operating system stored on your hard drive.  In such cases, you may be able to restore your computer by booting up from a CD or flash drive that bypasses your installed operating system and runs an externally controlled scan of your hard drive.  In addition, some anti-virus programs allow you to schedule a boot-level scan to be performed when you restart your computer.

Malware Scanners

The term “malware” refers to all undesirable software.  More specific terms are used to refer to the way software gets onto a computer or how it behaves once it’s there.  For example, a “virus” has the ability to copy itself from one computer to another, e.g. by attaching itself to files that a user may send to another computers.  Once a virus gets onto your computer, it can install various types of software, such as a “trojan,” which allows another party to control your computer without your being aware of it, or “spyware,” which sends information about your computer activities to another party without your knowledge.  Anti-virus programs have traditionally been designed to look for programs that spread by copying themselves.  Currently, most anti-virus programs also look for malware that works in other ways (such as being written directly onto your computer by a malicious web site).  However, since no anti-virus program is able to catch 100% of all malware, you might want to use one or more malware scanners as a complement to your antivirus program.

The most popular free malware scanner is Malwarebytes Anti-Malware (MBAM).  Once you have downloaded, installed, and updated this program, you can use it to scan your computer for malware that your anti-virus program might have missed.  One of the nice things about MBAM is that it doesn’t conflict with your anti-virus program.  Keep in mind that this free program does not have an automatic mode.  You have to start the program and initiate a scan.  You also have to request updates, which you should each time before you begin a scan.

Browser Security

Internet Explorer is the browser most targeted by malicious software.  For that reason, many security experts suggest using another browser for most web activity.  The browser I use most often is Firefox.  It works well on many different kinds of computers and it is well supported.  In addition, there are a number of add-ons available for Firefox that make web browsing more secure:

FlashBlock

When you have this add-on installed, you can view any flash that’s available with just a simple click, but flash is blocked from playing automatically.  Not only does this protect you from bad actors using flash for malicious purposes, it also keeps your browser from being slowed down by advertisements and useless flash animations.

BetterPrivacy

When you have this add-on installed, it deletes files known as LSOs that can be used to collect data from your computer.  These are mostly used in the same way as “cookies,” but they have the potential to be used in a more invasive matter.  BetterPrivacy removes LSOs after the browser closes.  You can selectively protect LSOs you want to keep, and you can time the deletion of the LSOs.  (BetterPrivacy also lets you delete something known as the DOM storage file, but I do not recommend using this feature unless you really know what you’re doing.)

NoScript

When you have this add-on installed, it blocks scripts as well as flash.  While scripts can be useful and, indeed, are necessary for some websites to function properly, they also can be used for malicious purposes.  The NoScript add-on lets you allow scripts for websites you trust and block them for all others.

For Further Information

There’s a wealth of helpful information and links in an online article from Issues in Science and Technology Librarianship (Fall 2002, Number 36) entitled Computer Security by Jane F. Kinkus (Mathematical Sciences Librarian, Purdue University).

The website of US-CERT (Unites States Computer Emergency Readiness Team) provides a wealth of information, including security tips for non-technical users.

The Computer Security Division of NIST has a Computer Security Resource Center (which I believe refers to the website), but it is more oriented towards researchers and members of government agencies — though they do have a link for Small Business.

Virtual Phone Numbers

Update: March 2022

Time has passed and things have changed — a lot. I’m in the process of updating this post, but you can’t rely on the information that’s here now.


A virtual phone number can be used for several purposes:

  • To provide a “disposable” phone number for use in a venue such as Craigslist or eBay, in order to protect privacy and prevent phone spamming.
  • To associate a unique number with an advertising campaign.
  • To create a sense of local presence for a company capable of conducting business from a distance, or to allow calling at local rates for distance customers

There are to be several sources for virtual phone numbers:

Google Voice

This video explains the Google Voice service:

You also can check out this web page Google provides about Google voice.

Vumber

Provides local number with forwarding with caller ID and voice mail.  Tiered pricing plans, with the lowest tier at $9.95/month (special prices are sometimes available). Can also be used to make outgoing calls. There are no per-minute charges, but there is an account limit per month. The company is based in New York City.

TossableDigits

Provides forwarding with do-not-disturb, voice mail, and call screening (based on caller being asked to provide their name). Extensions can be created that, I think, go to separate voice mail boxes. They cover a large number of area codes and support number porting. They also allow number changing. Tiered pricing plans, with the lowest tier at $6.99/mo for 60 minutes ($.10 per additional minute).

Virtual Phone Line

Provides USA and international numbers.  You can forward to a PSTN or cell phone, or to a VOIP number.  They also offer call recording, in addition to voice mail and fax-to-email.  Check their website for current rates and plans.

TollFreeForwarding.com

Provides USA and international numbers.  Calls can be forwarded to any number in the world, including multiple numbers which can ring simultaneously or sequentially. Features include voice mail, fax, call log, time-of-day routing, auto attendant with multiple extensions (can be forwarded to different phones). Check website for current rates and plans.  Based in Los Angeles.

Phone Number Bank

According to VOIP News (www.voip-news.com), they are a real phone company, and unlike companies that rent phone numbers from real phone companies, you can be sure of keeping your number.

Spoken Buzz Incognito

Spoken Buzz used to have a virtual phone number service that worked via a website and could be used with any phone.  That service is no longer available.  Now there is Incognito, which works only with certain smartphones.  Incognito assigns you a virtual number that will appear to callers as the number you are dialing from,  and it also will forward incoming calls (made to the virtual number) to your smartphone.  An Incognito virtual number can be retained for up to 1 week.  There is a per-minute charge for use of the service, but no other fees (so you pay only if you actually make or receive calls using he virtual number).

Voice Mailbox Only

Simple Voice Box

Free service, no credit card required. Provides simple voice mail (with email notification) or a voice messaging system with multiple voice mail boxes under a main extension.

eVoice

Aimed at small businesses, eVoice offers virtual phone numbers with forwarding and other features. Check their website for current rates and plans. Provides a number that can be used to receive voice mail for free or for $4.95/month (first month free) to get a local area code and some extra features. Also provides a virtual PBX service with three extension, forwarding, and per-extension voice mail at $29.95/month for 1000 minutes.

Call Forwarding with Analytics

As noted in the Update below, the company originally listed in this section was acquired and eventually became part of Invoca, which provides call forwarding with analytics as part of a sophisticated offering targeted towards businesses engaged in sales, marketing and e-commerce.

Update

The following have been removed from the original post:

J2

J2 has gone through a lot of changes, which I haven’t completely followed. They seem to have created a spin-off company, eFax, which is now a paid service — but does offer a free 14-day trial. Provides numbers that can be used to receive faxes or voice mail. These are sent to an email account rather than to a forwarding number. If you want to specify your area code, you need to subscribe to their paid service. If you are willing to take pot luck, you can get a free number.

Stealth Number

Appears to be no longer in business. Provides numbers for a very limited set of area codes (all East Coast). Unlimited in-bound calls for $7.95 (basic) or $11.95 per month. Premium plan allows something like whitelisting and blacklisting based on caller ID.

Smart Message

Appears to be no longer in business. Similar to J2, but only $8.95/month. Local and toll-free numbers available.

Mongoose Metrics – www.mongoosemetrics.com

Mongoose Metrics was acquired in 2014 by Ifbynumber, which rebranded to DialogTech in 2015 and was then acquired by Inova in 2021. Provides numbers that can be used in combination with other analytics to track the effectiveness of an online advertising campaign. Their blog (click on Resources) contains useful tips on making effective use of their service.

Empire State Views

This slideshow features photo I took in 2008 from open-air observation deck of the Empire State Building. We needed to take two elevators to get to the 86th floor, which is the flat level from which the spire arises. There’s now an enclosed observatory, with floor to ceiling windows, in the 102nd floor in the spire. I haven’t visited that, but I understand it also offers a 360-view from a smaller but warmer space.

This page previously showed a Flash video using the “Ken Burns” effect to create a more dynamic visual experience than the current slideshow. I was able to incorporate the video into the website (which was originally created with Google Sites) via a Google “gadget.” It was pretty cool while it worked.

It stopped working long before Adobe announced the coming demise of Flash, so I replaced it with the Google slideshow you see below. When I find time, I may try to create a new video from the original images.

Winter Color

This slideshow features images derived from photos taken in December 2007 at the Conservatory in Golden Gate Park, San Francisco, CA. The original photos did not quite capture the romantic atmosphere of the winter color, so I have applied an artistic filter to recreate the mood. Many of the plants you see here can be grown indoors in winter without requiring specialized conditions.

Royal Icing

8 oz. (weight) powdered sugar
2 1/2 tablespoons meringue powder or 1/8 cup pasteurized egg whites
3 teaspoons water
food coloring (optional)

Combine the powdered sugar and meringue powder or egg whites in a mixing bowl and add water drop by drop while beating on low speed. The amount of water you will need depends on whether you used the powder or the egg whites, and on the temperature and humidity in your kitchen. So add the water slowly and do not let the mixture get runny. Beat the mixture until it holds a trail on the surface for five seconds when you raise the mixer from the bowl. If you like, you can tint the icing with a few drops of food coloring. Makes 3 cups.

Note: Don’t use raw egg whites as they may carry Salmonella. Purchase a small carton of pasturized eggs whites from the refrigerator section of a grocery store or use meringue powder.