Passwords. We all hate ’em (but we all need ’em)  

January 16, 2107 Meeting:  Mark Wirganowicz, Facilitator


Passwords!  We all hate ’em (but we all need ’em)

The good, the bad, & the ugly…

  • Sequential #s: 12345678
  • Repeating sequences (1111, aaaa, bbbb, etc.)
  • “password”, “password”, “1lov3u”, “whatever”, “qazwsx”
  • Don’t use common names or words that can be looked up in a dictionary
  • Don’t use any personal info that can easily be found on the internet

Click here to see the full notes for his presentation!

Tips & Tricks to Keep Your Mac Running Smoothly  

October 16, 2107 Meeting:  Mark Wirganowicz, Facilitator


Everything stored on your Desktop is kept active and running by your computer at all times.  This can be a significant drain on your computer’s resources, and will slow your computer.

If there are file/folders that you absolutely need on your Desktop, create aliases for them.  Aliases behave exactly like any other file or folder on your Desktop, but they do not tax your computer’s resources.  Here’s how to make an alias:

  • Drag the file/folder from the Desktop to its final destination (e.g., Documents folder, Pictures folder, your Home folder).
  • Select the file/folder you just moved, go to the File menu, click Make Alias.
  • Rename the alias, if desired, and hit the Return key on your keyboard.
  • Drag the alias back to the Desktop.

Click here to see the full notes for his presentation!

Finding Security in an Insecure World

September 18, 2107 Meeting:  Nonnie Markeset, Facilitator 

There are two types of risk we face

  • Outside our control
  • A hack has occurred on a company or organization that has our sensitive information.
  • It could be the IRS, Equifax, a bank, a credit card company, a lending company, a mortgage holder, an investment institution. Any entity we deal with and to which we have given our name, address, and social security number.
  • The use of this information by the hackers can be difficult to find and can last for years.
  • Some of what hackers can do with this information is take out credit cards in our name, apply for loans or mortgages, commit crimes and even be convicted, and change our address so that we won’t receive any notifications of what has been done.


  • Within our control. This list is long!
    1. Have weak passwords for websites we visit
    2. Use the same password for multiple sites
    3. Visit suspicious sites
    4. Download apps , movies, from unauthorized sites
    5. Click links in emails and enter our sensitive information on the website without ascertaining it is a valid site
    6. Post too much information about ourselves on social networks
    7. Use public wifi networks to visit sites that have our sensitive information
    8. Not secure our computers, phones, iPads with strong passwords
    9. Not have “Find My iPhone/Mac/iPad on in our iCloud account
    10. Not install the latest updates to our operating system
    11. Not install the updates to our applications

Click here to see the full notes for her presentation!

How to Use Google Search More Efficiently

September 19, 2016 Meeting:  Derek Burrows, Facilitator


Here are some tips to use Google search more efficiently.

  1. Use the tabs

The first tip is to use the tabs in Google search. On the top of every search are a number of tabs. Usually you’ll see Web, Image, News, and More. Using these tabs, you can help define what kind of search you need to do. If you need images, use the Image tab. If you are looking for a recent news article, use the News tab. It’s rudimentary and most people use the tabs already. If you are not, then it’s highly recommended to get associated with them. They can cut search times dramatically if utilized properly.

Continue reading


August 15, 2016 Meeting:  Carol Snyder, Facilitator


“By giving people the power to share, we’re making the world more transparent.”

                                  Mark Zuckerberg


What we’re going to talk about today:

  • What you might want to use Facebook for, and why thinking that through matters
  • Setting up your Personal Page and controlling your presence and Privacy
  • Recent changes and updates on Facebook
  • Taking control of your News Feed
  • Facebook pages for Business

Continue reading