Google Photos & Google Drive

If you have a Google account — and who doesn’t? — you may have discovered that there are various ways to upload photos to that account. You also may have noticed that there seem to be two different places where your photos can be stored: Google Photos and Google Drive. This post explains the basics of how each of these work and how you might use them to backup and work with your photos.  DISCLAIMER: Google has made many changes over the years and will continue to do so. This post describes how things work as of March 2022. As time goes by, things may no longer work as described here.

How They Work

Google Photos and Google Drive both let you upload photos to your account’s cloud storage, but their purpose is different. If you think of your cloud storage as being similar to a hard drive on a computer, Google Drive is like a file manager that allows you to see all your files, including photos, and organize them into folders. You can think Google Photos, on the other hand, as an application that not only stores your photos, but also lets you edit them and organize them for viewing in various ways. Depending on your needs, you can use either or both as cloud storage for your digital photos.

Data Limits

The free storage Google provides for photos and other information is generous, but not unlimited. Prior to June 1, 2021, Google did provide unlimited storage for photos 16 megapixels or less and videos 1080p or less. Such photos and videos uploaded prior to the June 1 date are not counted towards the 15G limit, but photos and videos uploaded after that date are. So when uploading to Google Drive or Google Photos, keep in mind that anything stored in these accounts, along with your stored Gmail messages, counts towards the 15G data limit.

Which to Use?

Advantages of Google Drive

Google Drive might be the right choice, if you just want to have a backup copy of photos in cloud storage to keep them safe. This is especially true if you already have your photos organized in a set of folders that also contain files such as text notes about your photos or files created by photo-editing software such as Photoshop. You can use Google Drive to upload an entire folder structure (subject to some size limits) with subfolders and files of various types. Your folder structure will be preserved and, for backup purposes, you can upload any type of file to Google Drive. This would allow you to have a backup that keeps photos and other related files (including thumbnails and metadata). In addition, Google Drive supports previewing for a variety of file types (.e.g txt, docx, pdf, psd). If, for example, you have txt files with notes, you can use Google Drive to look at those notes as well as your photos. If you later want to download the folder structure you’ve uploaded, Google drive will package your content into an efficient zip file (or multiple zip files for large amounts of data). The files and folders you extract from this will be identical to the originals you used for uploading.

Advantages of Google Photos

Google Photos might be the right choice if, in addition to backup storage, you want some tools for basic editing and organization of your photos. These are not as sophisticated or flexible as those you might find in a computer-based application or in a cloud photo service such as Flickr, but they provide some quick and easy ways organize, search, share and improve the appearance of photos.

Google also provides keyword searching with image recognition capability. This means you can find photos based on the nature of the photo itself, even if you have not give the photo a name or description that matches the keyword. In addition to terms like “birthday” and “flower,” the Google found a nice set of matching photos for “rock,” “ocean,” “bike,” “blue,”and “plaid.” It also correctly recognized that my collection contained no photos with elephants, though a search for “hat” missed party hats, military hats, women’s hats, and many instances of traditional men’s hats.

Strategies for Uploading

Uploading via Browser

Once you are logged into your Google account in a browser, you can upload photos either from the Google Drive ( or from Google Photos ( The main difference between the two is that you can upload either files or folders (which can include subfolders as well as files) to Google Drive, but you can upload only files to Google Photos. Another difference is that you can copy photos from Google Drive to Google Photos — a process Google refers to as “uploading from Google Drive”– but the process does not work in reverse.

One Copy or Two?

If you upload photos to Google Drive and then copy them to Google Photos as described above, keep in mind that each copy will count separately against the 15G data limit. This was not always the case, so if you used the tools Google provided to sync photos in the past, you might want to read the article that appeared in Google’s blog about Changing how Google Drive and Google Photos work together.

Uploading via App

An alternative to uploading via browser is to use an app that will automatically upload photos you put in specified locations to Google Drive or Google Photos. If you are using a Windows or Mac computer, there is a single app you can use, as is explained in the Google support pages on Back up photos & videos and Use Google Drive for desktop. If you a phone or tablet running Android or iOS, there are separate apps for Google Drive and Google Photos, and these usually can be found in the relevant app store for your device, but may not be available or fully functional on some devices (e.g. Amazon Fire tablets).

the app to use is Google Drive for Desktop, which can be set up to upload to Google . You can find information about how to use both methods on the official Google support page: Upload files and folders to Google Drive.

Uploaded vs. Original Files

Sometimes people find it so convenient to use Google Photos that they delete or lose track of the original image files. There are, however, some reasons why you should hang onto your original image files.

By default, Google Photos uses compression to reduce the storage space required for uploaded photos. The compression techniques are good, so you probably won’t see any difference on the screen of your computer, tablet or phone. However, you are likely to get better results with the original uncompressed image if you want to do things like enlarge and crop. Since you can’t always predict future uses for your photos, keeping the original files preserves details that might someday be useful or important.

After uploading photos, you may make changes with Google Photos editing tools. If you later download those photos, depending on the method you use, you may be given a choice between downloading the “original” version or the “edited” version. The “original” version in this case does not mean original quality, but rather means the photo as stored in Google Photos (i.e. perhaps compressed) before you did your editing. Also keep in mind that, while you can undo and redo edits in Google Photos, you cannot do this with edited photos that have been downloaded.

Multiple Backups for Important Photos

Ideally, for photos you value, you will keep three exact copies of your original image files: two on separate media locally and a third in a separate backup location. For example, you might copy your photo files to SD cards or an external hard drive for local backup. For offsite backup, there are a variety of cloud storage service you can use, including Google Drive. You also can change the settings on Google Photos to upload with original quality — but be careful about how you deal with images you have edited with Google Photos.

Additional Information

For additional information, check out Google Photos Help and Google Drive Help.

Ecological Correlation

An ecological correlation is a correlation based on group means, rather than measurements from individuals. For example, if we are interested in the relationship between urbanization and national prosperity, we might look across countries to see if there is a correlation between the percentage of people living in urban areas and GDP per capita. This is an ecological correlation because it is based on data about groups of people, i.e. countries, rather than individuals. If our interest is in national economies, then it’s appropriate to look at ecological correlations based on aggregate data for countries. However, if we find a correlation at the country level, we cannot assume we will find a similar correlation at the individual level or even for groups within countries. We cannot assume, for example, that people who live in urban areas are more prosperous on average than those who do not. Nor can we assume that urban areas within countries will be more prosperous than non-urban areas.

Consider another example. Suppose we find a positive correlation at the national level between life expectancy and Internet use. Can we conclude from this that individuals who use the Internet live longer than those who do not? No, we cannot.

Assuming equivalence between correlations derived from group means and correlations derived from individual data leads to the ecological fallacy.

From Wikipedia:

The term comes from a 1950 paper by Robinson (1950). For each of the 48 states in the US as of the 1930 census, he computed the literacy rate and the proportion of the population born outside the US. He showed that these two figures were associated with a positive correlation of 0.53 — in other words, the greater the proportion of immigrants in a state, the higher its average literacy. However, when individuals are considered, the correlation was −0.11 — immigrants were on average less literate than native citizens. Robinson showed that the positive correlation at the level of state populations was because immigrants tended to settle in states where the native population was more literate. He cautioned against deducing conclusions about individuals on the basis of population-level, or “ecological” data.

Wikipedia also notes that, according to a book by Gelman, Park, Shor, Bafumi, & Corina (2008), in recent elections wealthier states were more likely to vote Democratic and poorer states Republican.  At the individual level, however, wealthier voters are more likely to vote Republican, and poorer voters more likely to vote Democratic. This illustrates the need to be careful about what we conclude from ecological correlations.

As Lubinski & Humphreys (1996) have advised, however, there are times when an ecological correlation is the proper way to look at the relationship between two variables.  For example, to understand the impact of smoking on public health, looking at group-level relationships between smoking and lung cancer is more useful than looking at correlations based on data from individual smokers.


Gelman, Andrew; Park, David; Shor, Boris; Bafumi, Joseph; Cortina, Jeronimo (2008). Red State, Blue State, Rich State, Poor State. Princeton University Press. ISBN 978-0-691-13927-2.

Lubinski, D., & Humphreys, L. G. (1996). Seeing the forest from the trees: When predicting the behavior or status of groups, correlate means. Psychology, Public Policy, and Law, volume 2, pages 363-376.

Robinson, W.S. (1950). “Ecological Correlations and the Behavior of Individuals”. American Sociological Review 15: 351–357

A Farewell to Google Sites

There are different ways one can go about building a website, and the choice of methods should depend on the nature and purpose of the website. Years ago, I created a new website for using Google Sites, and it was a great choice at the time. As an early adopter of Google Apps, I was able to use Google Sites with my own domain and enjoy the synergy between Google Sites and other Google services.

In addition to providing free website hosting with ample storage, Google Sites allowed me to quickly add new content that would automatically be added to a navigation menu. I could do basic text formatting using a visual editor and then drop into an HTML editor for further tweaking. I could edit and then upload photos using (now defunct) Picasa, make a slideshow, then insert that into a page with a few clicks. I could select from a library of widgets to enhance my website — and if I needed something special, I could create a widget of my own. What I discovered over the years, however, is that Google Sites tended to require more monitoring and more unexpected maintenance than the websites I created using other methods.

People often assume that, once a website is working, it will continue to work unless you forget to pay your hosting fees or become the victim of hackers. In truth, websites depend on various technologies that continue to move forward. In some cases, those technologies are managed to provide maximum backward compatibility. In other cases, not so much. Indeed, there’s often a tradeoff between making big advances and maintaining backward compatibility.

So, for what I expect are good business reasons, Google has decided to discontinue the “classic” version of Google Sites that I enjoyed using for many years. That presented me with the choice of rebuilding my website with the “new” Google Sites vs. using some other method. For reasons I may explain some other time, I decided to rebuild this website using WordPres

Embedding a Google Doc

If you have Internet access and a Google account (and who doesn’t?), you may know that Google Docs is a handy way to create a document you can store on Google Drive, and also print or download if you wish.

A Google Doc can also be embedded into a website. The embed is dynamic and shows the current version of the Doc. That means you can change what a visitor sees on the webpage simply by editing the Google Doc. In theory, since Google Docs can be shared for collaborative work, this allows a group of people to participate in updating a website just by editing one or more Google Docs.

Unfortunately, embedding a Google Doc doesn’t work as well as one might hope for anything other than a Google Site. To the left you see a reduced size snapshot of a Google Doc that I created to experiment with embedding. As the snapshot shows, the document was formatted to center the title at the top of the page and to have the text wrap around the two included drawings.

Below I’ve added an embed of this same Doc. As you can see, the embed doesn’t preserve the formatting. Also, to get the embedded document to display in a frame large enough for viewing, I had to tweak the embed code Google provided, changing the HTML to add width and height parameters.

Google Docs also offers the option of sharing documents via a link. However, when documents are shared in this way, there are again problems with formatting in the web page that’s displayed when you follow the link Google provides. You can see this by clicking on this link for sharing the Sample Document.

Computer Security


A well-protected computer will have the following installed, active and up-to-date:

  • firewall
  • anti-virus software
  • malware scanner

The computer will be set to automatically check for security updates to the operating system and all key software, and these updates will be installed either automatically by the computer or promptly by a diligent user. In addition, there will be a recent backup that will allow the computer to be restored to the state it was in at the time that backup was made. (Keep in mind that all changes made after the backup will be lost, so frequent backups are a good idea.)

f you don’t know how to protect your computer as described here, get someone experienced and trustworthy to help you.

Even with all the above, there are ways computer security can be breached.  As the use of computers and computer networks increases, so does the incentive to commit crimes by “hacking” into networks and the computers they connect.  In response to this, the security-conscious user will take further precautions:

  • encrypt sensitive data
  • keep a separate backup of your data
  • make periodic use of online virus scanners from sources you know to be reputable
  • use a browser with add-ons to block flash and scripts
  • don’t open email attachments unless the sender is trustworthy and knowledgeable
  • disconnect from the network if your computer begins doing something you don’t understand
  • have an action plan for computer failure or security breach

In addition, be on the lookout for scams and schemes that use YOU to get past the security protections on your computer.  Fake security warnings are a favorite tool of fraudsters who are trying to sell you a useless product or steal your personal information. If a security warning (e.g. virus alert) pops up on your computer, disconnect from the Internet and then examine the warning carefully before you take any further action.  A legitimate security program installed on your computer will provide clear instructions and should not need an Internet connection to function. 

Also be wary of email that claims to be from a bank, a credit card company, a government agency, etc. telling you about a “problem” that requires you to download something, open something, or click on something.  Before you take action, have someone knowledgeable help you determine if the email is legitimate.  For example, if the email claims to be from a credit card company, look up their phone number and call them to find out if there really is a problem.


A firewall monitors the traffic (data) going into and coming out of your computer when it is connected to any kind of network, whether this be a local network (LAN) or the Internet.  To organize such traffic, your computer uses a number of different “ports” for different kinds of traffic.  For example, one port may be used for incoming email, another for outgoing email, and yet another for web surfing.  If a firewall detects suspicious traffic, such as an attempt to use a port by unrecognized software, it will take some action.  In most cases, that action will be automatically determined by a set of rules.  Some firewalls, however, can be set up to notify you and ask you what to do when certain kinds of questionable traffic are detected.

A firewall can be implemented in hardware which resides outside your computer or in software on your computer.  This article will discuss software firewalls only. 

Firewalls for Windows

The more recent versions of Windows (e.g. XP or later) come with a firewall as part of the operating system.  By default, this firewall is turned on and operates automatically.  It provides decent protection and requires no action from you unless you have some reason to change its settings.  For ease of use, the Windows firewall is hard to beat.

For those who want more information about and more fine-grained control over network traffic, there are a number of alternatives to the Windows firewall.  Some of these are free for personal (i.e. non-commercial) use, and for my purposes these are more than adequate.  If you decide to use some of these, expect to spend some time learning how to use it.  In the first weeks  to months of use, these firewalls build up their rule set by asking you what to do each time one of the processes running on your computer tries to use a network connection  In the beginning, you are likely to get a LOT of alerts, and the answers you give will determine how well the firewall protects you down the road.

ZoneAlarm Personal Firewall

This is the most popular of the free firewalls.  It’s easier than most to set up and, at least in my experience, does not have conflicts with other software.  However, the recent versions of it do not work well on less powerful computers.  To get this free firewall to work, you have to get a registration key by email.  Following that, you will continue to get mail from ZoneAlarm advertising their paid products.

Comodo Internet Security 4.0

This is an anti-virus program and firewall bundled together.  When you install, take the option to install just the firewall — there are better choices for anti-virus.  Also, when you install pay attention and make sure you UNCHECK the boxes for changes to your home page, search preferences, browser toolbars, etc.

Online Armor Free

Said to be easy to install.  Includes keylogger guard, tamper protection, malicious script and worm protection, and limited autostart protection.  This has been popular recently on, but doesn’t have many user reviews.

Anti-virus Software

If you have a computer running some version of Windows, there are several complementary approaches to anti-virus protection you may want to use:

Installed Software

Every Windows computer should have an anti-virus program installed, since Windows is the operating system targeted by most malware.  Due to the way in which anti-virus programs work, it is not a good idea to have more than one installed, even though the different programs have different strengths and weaknesses.  When changing from one anti-virus program to another, uninstall the old program and restart your computer before you install the new program.  Also keep in mind that some anti-virus programs are difficult to completely uninstall.  This is something you might want to look into before choosing your anti-virus solution. 

All anti-virus program rely on a database of virus definitions.  At present, there are two approaches to storing this database.

Cloud-Based Protection

This new approach uses a virus database that’s kept on remote servers rather than on the personal computer.  Initial testing shows this to be an effective form of protection for computers with an always-on connection to the Internet. Keeping the database in the Internet “cloud” removes the need for frequent checking and downloading by your personal computer.  The downside is that the virus database is not available when your personal computer is offline.  Panda offers a free anti-virus application based on this approach.  I plan to test this at some point, but have not yet done so.

Client-Based Protection

This is the traditional approach.  You install the anti-virus software and then update the virus definition database stored on your computer on a regular basis.  The initial update may take some time, but updates after than should go quickly if they are performed on a regular basis.  Keeping the virus database up to date is important, as is making sure that incoming email, downloaded files, etc. are scanned automatically.  There are a number of free anti-virus programs that provide reasonable protection.  At present, Avast is probably the most effective of these.  AVG tends to be highly regarded as well. 

From time to time, I evaluate the most recent versions of various anti-virus programs.  The effectiveness of these programs varies from year to year.  Also, a program that works well for a powerful desktop computer may not work well on a less powerful netbook.  So I often use different anti-virus programs on different computers.  This has the advantage of allowing me to scan my external hard drives, where I keep copies of my data, with more than one anti-virus program.

There are a number of free anti-virus programs that provide reasonable protection.  At present, Avast is probably the best pick, though AVG tends to be highly regarded as well. 

I’ve had good experiences with Eset in the past.  Their price is high, but they are one of the few companies that provide good customer support. I’ve evaluated G Data, which is highly rated, and I’ve not liked the drag is places on performance, nor have I been happy with the lack of customer support.  Also, the boot scan CD I created with G Data did not work.

Online Scanners

Online scanners offer a one-time scan from a website.  They don’t provide ongoing protection and should be regarded as a complement to installed antivirus software rather than an alternative.  Since no anti-virus application is 100% effective, it might be a good idea to use one or more of these online scanners from time to time.  Eset and Kapersky offer online scans.

Boot Level Scanners

There are certain kinds of viruses (i.e. rootkits) that either cannot be detected or cannot be removed once your computer has booted up from the operating system stored on your hard drive.  In such cases, you may be able to restore your computer by booting up from a CD or flash drive that bypasses your installed operating system and runs an externally controlled scan of your hard drive.  In addition, some anti-virus programs allow you to schedule a boot-level scan to be performed when you restart your computer.

Malware Scanners

The term “malware” refers to all undesirable software.  More specific terms are used to refer to the way software gets onto a computer or how it behaves once it’s there.  For example, a “virus” has the ability to copy itself from one computer to another, e.g. by attaching itself to files that a user may send to another computers.  Once a virus gets onto your computer, it can install various types of software, such as a “trojan,” which allows another party to control your computer without your being aware of it, or “spyware,” which sends information about your computer activities to another party without your knowledge.  Anti-virus programs have traditionally been designed to look for programs that spread by copying themselves.  Currently, most anti-virus programs also look for malware that works in other ways (such as being written directly onto your computer by a malicious web site).  However, since no anti-virus program is able to catch 100% of all malware, you might want to use one or more malware scanners as a complement to your antivirus program.

The most popular free malware scanner is Malwarebytes Anti-Malware (MBAM).  Once you have downloaded, installed, and updated this program, you can use it to scan your computer for malware that your anti-virus program might have missed.  One of the nice things about MBAM is that it doesn’t conflict with your anti-virus program.  Keep in mind that this free program does not have an automatic mode.  You have to start the program and initiate a scan.  You also have to request updates, which you should each time before you begin a scan.

Browser Security

Internet Explorer is the browser most targeted by malicious software.  For that reason, many security experts suggest using another browser for most web activity.  The browser I use most often is Firefox.  It works well on many different kinds of computers and it is well supported.  In addition, there are a number of add-ons available for Firefox that make web browsing more secure:


When you have this add-on installed, you can view any flash that’s available with just a simple click, but flash is blocked from playing automatically.  Not only does this protect you from bad actors using flash for malicious purposes, it also keeps your browser from being slowed down by advertisements and useless flash animations.


When you have this add-on installed, it deletes files known as LSOs that can be used to collect data from your computer.  These are mostly used in the same way as “cookies,” but they have the potential to be used in a more invasive matter.  BetterPrivacy removes LSOs after the browser closes.  You can selectively protect LSOs you want to keep, and you can time the deletion of the LSOs.  (BetterPrivacy also lets you delete something known as the DOM storage file, but I do not recommend using this feature unless you really know what you’re doing.)


When you have this add-on installed, it blocks scripts as well as flash.  While scripts can be useful and, indeed, are necessary for some websites to function properly, they also can be used for malicious purposes.  The NoScript add-on lets you allow scripts for websites you trust and block them for all others.

For Further Information

There’s a wealth of helpful information and links in an online article from Issues in Science and Technology Librarianship (Fall 2002, Number 36) entitled Computer Security by Jane F. Kinkus (Mathematical Sciences Librarian, Purdue University).

The website of US-CERT (Unites States Computer Emergency Readiness Team) provides a wealth of information, including security tips for non-technical users.

The Computer Security Division of NIST has a Computer Security Resource Center (which I believe refers to the website), but it is more oriented towards researchers and members of government agencies — though they do have a link for Small Business.

Virtual Phone Numbers

Update: March 2022

Time has passed and things have changed — a lot. I’m in the process of updating this post, but you can’t rely on the information that’s here now.

A virtual phone number can be used for several purposes:

  • To provide a “disposable” phone number for use in a venue such as Craigslist or eBay, in order to protect privacy and prevent phone spamming.
  • To associate a unique number with an advertising campaign.
  • To create a sense of local presence for a company capable of conducting business from a distance, or to allow calling at local rates for distance customers

There are to be several sources for virtual phone numbers:

Google Voice

This video explains the Google Voice service:

You also can check out this web page Google provides about Google voice.


Provides local number with forwarding with caller ID and voice mail.  Tiered pricing plans, with the lowest tier at $9.95/month (special prices are sometimes available). Can also be used to make outgoing calls. There are no per-minute charges, but there is an account limit per month. The company is based in New York City.


Provides forwarding with do-not-disturb, voice mail, and call screening (based on caller being asked to provide their name). Extensions can be created that, I think, go to separate voice mail boxes. They cover a large number of area codes and support number porting. They also allow number changing. Tiered pricing plans, with the lowest tier at $6.99/mo for 60 minutes ($.10 per additional minute).

Virtual Phone Line

Provides USA and international numbers.  You can forward to a PSTN or cell phone, or to a VOIP number.  They also offer call recording, in addition to voice mail and fax-to-email.  Check their website for current rates and plans.

Provides USA and international numbers.  Calls can be forwarded to any number in the world, including multiple numbers which can ring simultaneously or sequentially. Features include voice mail, fax, call log, time-of-day routing, auto attendant with multiple extensions (can be forwarded to different phones). Check website for current rates and plans.  Based in Los Angeles.

Phone Number Bank

According to VOIP News (, they are a real phone company, and unlike companies that rent phone numbers from real phone companies, you can be sure of keeping your number.

Spoken Buzz Incognito

Spoken Buzz used to have a virtual phone number service that worked via a website and could be used with any phone.  That service is no longer available.  Now there is Incognito, which works only with certain smartphones.  Incognito assigns you a virtual number that will appear to callers as the number you are dialing from,  and it also will forward incoming calls (made to the virtual number) to your smartphone.  An Incognito virtual number can be retained for up to 1 week.  There is a per-minute charge for use of the service, but no other fees (so you pay only if you actually make or receive calls using he virtual number).

Voice Mailbox Only

Simple Voice Box

Free service, no credit card required. Provides simple voice mail (with email notification) or a voice messaging system with multiple voice mail boxes under a main extension.


Aimed at small businesses, eVoice offers virtual phone numbers with forwarding and other features. Check their website for current rates and plans. Provides a number that can be used to receive voice mail for free or for $4.95/month (first month free) to get a local area code and some extra features. Also provides a virtual PBX service with three extension, forwarding, and per-extension voice mail at $29.95/month for 1000 minutes.

Call Forwarding with Analytics

As noted in the Update below, the company originally listed in this section was acquired and eventually became part of Invoca, which provides call forwarding with analytics as part of a sophisticated offering targeted towards businesses engaged in sales, marketing and e-commerce.


The following have been removed from the original post:


J2 has gone through a lot of changes, which I haven’t completely followed. They seem to have created a spin-off company, eFax, which is now a paid service — but does offer a free 14-day trial. Provides numbers that can be used to receive faxes or voice mail. These are sent to an email account rather than to a forwarding number. If you want to specify your area code, you need to subscribe to their paid service. If you are willing to take pot luck, you can get a free number.

Stealth Number

Appears to be no longer in business. Provides numbers for a very limited set of area codes (all East Coast). Unlimited in-bound calls for $7.95 (basic) or $11.95 per month. Premium plan allows something like whitelisting and blacklisting based on caller ID.

Smart Message

Appears to be no longer in business. Similar to J2, but only $8.95/month. Local and toll-free numbers available.

Mongoose Metrics –

Mongoose Metrics was acquired in 2014 by Ifbynumber, which rebranded to DialogTech in 2015 and was then acquired by Inova in 2021. Provides numbers that can be used in combination with other analytics to track the effectiveness of an online advertising campaign. Their blog (click on Resources) contains useful tips on making effective use of their service.

Firefox Add-ons

These are some Firefox add-ons that I find useful:


ColorZilla is a Firefox add-on that provides tools for web page color analysis.  (As of September 2010, ColorZilla does not work with any other browsers.)  Once installed, ColorZilla provides an eyedropper and a pull-down menu in the lower left corner of the browser frame.  The eyedropper can be used to find and copy (in various formats) the values for any color on a web page.  In addition, the pull-down menu can be used to access a color picker, palette tool, and webpage DOM color analyzer.

Now Obsolete

Most of the add-ons I described in the original version of this post are no longer available or no longer relevant. For historical purposes, these are described below.


Flashblock was a Firefox add-on that prevented automatic execution of Flash objects. Since Adobe has ended all support for Flash Player (as of December 31, 2020) the best way to prevent execution of Flash objects is to uninstall all Flash Players.


BetterPrivacy was a Firefox add-on that removed files created by Flash to store certain kinds of user data.


Xmarks, first known as Foxmarks, was a browser add-on that synchronizesd bookmarks across browsers and computers.  In addition, Xmarks stored the same bookmarks online for web access from any computer.  I really liked Xmarks, and I was happy when LastPass took steps acquire Xmarks in 2010 in order to keep it from going under. I was sad when LastPass decided to discontinue Xmarks in 2018.