Tag Archive for Firefox

The Secret to F-Keying at Work

The Secret to F Keys at WorkWe use keyboards at home, work and the car. The first keyboard to feature function keys was the 1965 Singer/Friden 2201 Flexowriter Programmatic as a standalone word processing system. Each of the function keys was programmable. The familiar 12 F-Keys were introduced in 1984 with the second generation Model M keyboard for the original IBM PC. It had 12 function keys in 3 blocks of 4 at the top of the keyboard. Over the years, various operating systems and applications have made use of function keys in different ways.

After you learn this list of F-Key secrets, you can improve your fun at work by F-Keying around in your cube as you work on your project.

F1• F1 – Universal – Opens a help or support menu in most programs.
• F1 – Apple macOS X – Reduces the screen’s brightness.
• F1 – Some computers  – Used it to enter BIOS setup during startup.
• F1+WIN – Microsoft Windows –  Opens the Microsoft Windows help and support center.

F2

• F2 – Microsoft Windows – Renames a highlighted icon, file, or folder.
• F2 – Microsoft Excel – Edits the active cell.
• F2 – Apple macOS X – Increases the screen’s brightness.
• F2 – Some computers  – Used it to enter BIOS setup during startup (Acer, Asus, Dell, eMachines, Gateway, Lenovo, Sony).
• F2+CRTL – Microsoft Word –  Displays the print preview window.
• F2+ALT+CTRL – Microsoft Office – Opens the Documents Library.

F3

• F3 – Microsoft Windows – Opens desktop search feature.
• F3 – MS-DOS or Windows command line – Repeats the last command entered.
• F3 – Browsers (Firefox, Chrome and IE) – Launches the Find bar.
• F3 – Apple macOS X – Opens Mission Control.
• F3 – Other programs – Will find the next search value after an initial search is performed.
• F3+CTRL – Microsoft Word – will lowercase any highlighted text.
• F3+SHIFT – Microsoft Word – Toggles between capitalizing each word, lower case and upper case for the selected text.
• F3+WIN – Microsoft Outlook – Opens the Advanced find window.

F4

• F4 – Microsoft Windows 95 to XP – Open find window in Windows Explorer and Internet Explorer.
• F4 – Apple macOS X – Accesses dashboard.
F4+ALT – Boss key – Microsoft Windows – Immediately closes the current program without saving. It can be used in an emergency to close browser windows you don’t want others to see.
• F4+ALT – Microsoft Windows – When no program is running it launches the Shutdown dialog box.
• F4+CTRL – Microsoft Word – Repeat the last action performed.
• F4+WIN  –  Closes the open window or tab in the active window.

F5

• F5 – Microsoft Windows – Reload the page, document, or contents list in a folder.
• F5 – Microsoft Office – Open the find, replace, and go to window.
• F5 – Microsoft PowerPoint – Starts a slideshow in PowerPoint.
• F5 – Browsers (Firefox, Chrome, and IE) – Refreshes a web page from the cache.
• F5 – Apple macOS X – Increases the keyboard backlight.
• F5+CTRL – Browsers (Firefox, Chrome, and IE) – Forces a hard refresh of the web page from the server instead of the browser cache.
• F5+CTRL+SHIFT – Microsoft Word – inserts a bookmark in Word doc.

F6

• F6 – Microsoft Windows desktop – Tabs from desktop files to the taskbar and the system tray icons.
• F6 – Browsers (Firefox, Chrome, and IE) – Move the cursor to the address bar.
• F6 – Apple macOS X – Decreases the keyboard backlight.
• F6 – Reduce laptop volume (on some laptops).
• F6+CTRL+SHIFT – Microsoft Office – Opens to another document.

F7

• F7 – Microsoft Office Suite – Spell and grammar check a document.
• F7 – Mozilla Firefox – Places a moveable cursor in web pages, allowing you to select text with the keyboard (Caret browsing).
• F7 – Apple macOS X – Can be used to rewind media content.
• F7 – Increase speaker volume (on some laptops).
• F7+SHIFT – Microsoft Office Suite –  Runs a Thesaurus check on the word highlighted.

F8

• F8 – Microsoft Windows – Enter the Windows Start Menu, to access Windows Safe Mode (if pressed during the boot process).
• F8 – Apple macOS X – Can be used to pause media content.
• F8 – Used by some computers to access the Windows recovery system, but may require a Windows installation CD.

F9

• F9 – Microsoft Word – Refresh document.
• F9 – Microsoft Outlook – “Send and Receive All folders” email.
• F9 – Reduce laptop screen brightness (on some laptops).
• F9 – Apple macOS X – Can be used to fast forward media content.

F10

• F10 – Microsoft Windows – Activates the menu bar of an open application.
• F10 – Browsers (Firefox and IE) – Shows the Menu bar.
• F10 – Apple macOS X – Can be used to mute the speaker.
• F10 – Some computers – Increase laptop screen brightness.
• F10 – Some computers – Used it to enter BIOS setup during startup (Compaq, HP).
• F10+SHIFT – Microsoft Windows – The same as right-clicking on a highlighted icon, file, or Internet link pops out the context menu.

F11

• F11 – Microsoft Windows Explorer – Enter and exit full-screen mode.
• F11 – Microsoft Excel – Adds a graph of highlighted cells.
• F11 – Browsers (Firefox, Chrome, and IE) – Enter and exit full-screen mode.
• F11 – Apple macOS X – Can be used to decrease the speaker volume.
• F11+CTRL – Microsoft Excel – Adds a new macro to the workbook.
• F11 –  Used to access the hidden recovery partition when pressed during boot (Compaq, HP, Dell, eMachines, Gateway, and Lenovo).
• F11+SHIFT – Microsoft Excel – Adds a new sheet to the workbook.

F12

• F12 – Microsoft Office –  Open the Save as window.
• F12 – Browsers (Firefox, Chrome, and IE) – Opens browser debug tool.
• F12 – • F11 – Apple macOS X – Can be used to increase the speaker volume.
• F12 – Used to access the list of bootable devices on a computer when pressed during boot, allowing you to select a different device to boot from (e.g., hard drive, CD or DVD drive, floppy drive, USB drive, and network).
• F12+CTRL – Microsoft Word – opens a document.
• F12+SHIFT – Microsoft Word – Saves the Microsoft Word document (like Ctrl+S).
• F12+CTRL+SHIFT – Microsoft Office – Prints a document (Like Ctrl+P).

Newer Apple keyboards have F13, F14, and F15 keys for even more F-Keying around – in place of the Print Screen, Lock key, and the Pause key. They also have F16 – F19 keys above the number pad. Early IBM keyboards had F13 through F24 keys, but these keyboards are no longer used.

To access all the fun of F-Keying you may need to access Fn Lock key or the “Fn key”+“Fn Lock” key to strike F-Keying gold.

rb-

Even Superman uses a keyboardThere’s nothing like F-Keying at  work to make you more efficient. It may feel somewhat strange the first time you try to control your computer from the keyboard since we’re so used to navigating with the mouse. But, you can’t beat the ability to keep your hands on the keyboard.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Protect Yourself from Facebook

Protect Yourself from FacebookJust in case you have been sleeping under a rock the past couple of weeks, social media giant Facebook (FB) was hacked again. In a presser on 10/12/2018, the social networker admitted that nearly 30 million Facebook users were hacked. This is on top of the 50 million user accounts that Mark Zuckerberg’s company allowed Cambridge Analytics to steal.

Facebook did not apologize for exposing its users’ informationDuring the presser, Facebook did not apologize for exposing its users’ information but noted that it was cooperating with the FBI, the US Federal Trade Commission, the Irish Data Protection Commission, and other authorities on the data breach.

The attack involved the capture of Facebook “access tokens,” or digital keys that allow websites to recognize who someone is and keep them logged in. Using accounts they already controlled, the attackers used an “automated technique” to exploit Facebook’s “View As” functionality and steal access tokens for some 400,000 people. Hackers then used friend lists from those 400,000 accounts to obtain access tokens for another 30 million people (Here’s how to find out if you were hacked). Facebook tracked this hack to a change it made to its video uploading feature over a year ago in July 2017, and how that change affected View As.

Facebook confirmed on Friday that the hack compromised the personal and contact information of 30 million users. The compromised personal data includes:

  • Information sharingName
  • Phone number
  • Email address
  • Username,
  • Gender,
  • Locale/language,
  • Relationship status,
  • Religion,
  • Hometown,
  • Self-reported current city,
  • Birthdate,
  • Device types used to access Facebook,
  • Education,
  • Work,
  • The last 10 places they checked into or were tagged in,
  • Website,
  • People or Pages they follow and,
  • The 15 most recent searches.

rb-

Mozilla Firefox web browserI have been warning about the dangers of Facebook since 2011. I use the Facebook Container extension for Firefox to helps prevent Facebook from tracking me around the web. The Facebook Container is an extension to the Desktop Firefox 57 and higher (it does not work on Firefox for mobile).

The Facebook Container is a tool to limit what data others can obtain from you. It works by isolating your Facebook identity into a separate container that makes it harder for Facebook to track your visits to other websites with third-party cookies.

When you install the extension it deletes the Facebook cookies on the computer and logs you out of Facebook. The next time you navigate to Facebook it will load in a new blue-colored browser tab (the “Container”).

Facebook containerYou can log in and use Facebook normally when in the Facebook Container. If you click on a non-Facebook link or navigate to a non-Facebook website in the URL bar, these pages will load outside of the container.

Clicking Facebook Share buttons on other browser tabs will load them within the Facebook Container. You should know that using these buttons passes information to Facebook about the website that you shared from.

Because you will be logged into Facebook only in the Container, embedded Facebook comments and Like buttons in tabs outside the Facebook Container will not work. This prevents Facebook from associating information about your activity on websites outside of Facebook to your Facebook identity.

 Facebook Share buttons passes information to Facebook about the website that you shared fromIn addition, websites that allow you to create an account or log in using your Facebook credentials will generally not work properly. Because this extension is designed to separate Facebook use from use of other websites, this behavior is expected.

It is important to know that this extension doesn’t prevent Facebook from mishandling the data that it already has, or permitted others to obtain, about you. Facebook still will have access to everything that you do while you are on facebook.com, including your Facebook comments, photo uploads, likes, any data you share with Facebook connected apps, etc.

It is important to remember that other ad networks will try to correlate your Facebook activities with your regular browsing.

In addition to using the Facebook Container extension, you can further protect yourself from Facebook by changing your Facebook settings, using Private Browsing, enabling Tracking Protection, and blocking third-party cookies.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Browser Security Updates

Browser Security UpdatesIf you bank, shop, or work on the Intertubes your security is changing. Your browser Security is changing because Symantec is selling its Website Security and related PKI business to PKI encryption solutions to DigiCert for nearly $1 Billion.

SSL and TLS logoExperts estimate that Symantec (SYMC) owns 40% of the SSL certificate market. SSL/TLS certificates are used to encrypt the connections between browsers and HTTPS-enabled websites. The certificates are used to verify that users are actually visiting the websites they intended to and not spoofed versions. Certificates are issued by organizations known as certificate authorities that are trusted by default in browsers and operating systems.

As a result of the sale, many firms are going to have to reissue SSL/TLS server certificates. The reissued certs will ensure browser security and make sure there is no impact on your online experiences. These certificates are essential to ensure secure, encrypted communication for user interaction on the Intertubes.

Google Chrome browser security

Google (GOOG) has led the effort to decrease the disruption that could come along with this change. Google posted a plan back in July of 2017 regarding Symantec-issued SSL/TLS server certificates.

• In March 2018 Google Chrome (Chrome 66 Beta) will show a warning for sites secured with SSL/TLS certificates issued before June 1, 2016. Your security is at risk and data encryption will function normally, but your transactions will be disrupted by a warning in Chrome.
• Google has also stated that all SSL/TLS certificates that had been issued by Symantec before December 1, 2017, will not be trusted starting in September 2018 (Chrome 70 Beta). Doing transactions at sites that have not been updated will put your security at risk, and you will get a warning in Chrome.

Mozilla Firefox

Mozilla, publisher of the Firefox web browser says that it intends to follow the same timeline proposed by Google.

rb-
This change is a normal procedure for typical certificate renewal. There should be no service disruption when the new certificates are issued as long as your web browser is up to date. There is no reason to have an out-of-date browser anymore. All three major browsers will auto-update. Other keys to staying safe online include:

  • Always check for HTTPS when you plan on providing personal data to a website. Always check for HTTPS
  • Pay attention to any security warnings you receive when you visit a website. Although you can almost always trust the HTTPS you see in your browser URL, any additional warnings from your browser should show that there may be a problem with the connection, so you should proceed with caution.

Nearly 54% of all U.S. web browsers will be affected by these changes. Statista says that Chrome held almost 50% of the browser market share and Firefox held over 5% of the share in December 2017. 41% of Internet users are not covered by this change (Safari 32.7% and IE/Edge 9%).

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

UMich Helps Secure the Web with Let’s Encrypt

UMich Helps Secure the Web with Let’s EncryptThe University of Michigan is teaming up with leading Internet firms to help secure the web. UMichCisco (CSCO), Akamai (AKAM), Mozilla, the Electronic Frontier Foundation, and public key certificate authority IdenTrust, have launched a new free certificate authority (CA) called Let’s Encrypt.

The Let’s Encrypt CA, which will be available in the Summer of 2015. It aims to get people to encrypt their connections to their websites according to a recent GigaOM article. Let’s Encrypt goal is to make it easier to get a proper Secure Sockets Layer/Transfer Layer Security (SSL/TLS) certificate. That way the certs can be deployed to secure a Web server and its users.

Let’s Encrypt will help secure the Internet

Let’s EncryptAccording to the article Let’s Encrypt, comes as the tech industry scrambles to encrypt the web. This is more important after the mass surveillance revelations of NSA leaker Edward Snowden. The CA will aid other efforts to secure the Internet.

Let’s Encrypt is developing the Automated Certificate Management Environment or ACME protocol. The ACME protocol. will sit between Web servers and the CA. It includes support for new, stronger forms of domain validation.

University of MichiganLet’s Encrypt will serve as its own root CA. The nonprofit CA public benefit corporation, Internet Security Research Group (ISRG) will run the root CA. Josh Aas, the executive director of ISRG, explained securing the web is just not a simple thing to use Transport Layer Security (TLS), the successor to Secure Socket Layer (SSL). He explains that getting, paying for, and installing a certificate is too hard for many network administrators.

The anchor for any TLS-protected communication is a public-key certificate which demonstrates that the server you’re actually talking to is the server you intended to talk to. For many server operators, getting even a basic server certificate is just too much of a hassle. The application process can be confusing. It usually costs money. It’s tricky to install correctly. It’s a pain to update.

Electronic Frontier FoundationAccording to the statement, Let’s Encrypt’s certificates will be free. It will have an automated issuance and renewal protocol – an open standard. A step to reduce the need for input from the domain holder’s side. According to an EFF blog post, “switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.”

Records of certificate issuance and revocation will be publicly available. The organizations behind Let’s Encrypt are stressing that the system won’t be under any one organization’s control.

The EFF has been working on helping users take advantage of HTTPS for a while. The EFF worked with the Tor Project, to create the HTTPS Everywhere extension for Firefox, Firefox for Android, Chrome, and Opera browsers.

The Let’s Encrypt project will use Internet-wide datasets of certificates to make higher-security decisions about when a certificate is safe to issue. The data will include the EFF’s Decentralized SSL Observatory, the University of Michigan’s scans.io, and Google‘s (GOOG) Certificate Transparency logs.

In addition to the Let’s Encrypt project, some of the paths to secure the web include:

  • The next version of the HTTP protocol will likely be encrypted by default.
  • Mozilla and Firefox are collaborating with the EFF to bring Microsoft, Google, Opera, and others to add Let’s Encrypt to their list of valid CAs.
  • Google will rank up sites that use SSL/TLS encryption.
  • The content delivery and security outfit Cloudflare is offering free SSL encryption for millions of its customers.
  • And now Let’s Encrypt aims to equip websites with free certificates – the proof they need to tell users’ browsers that their public encryption keys are genuine and the connection is properly secured.

rb-

Many websites currently use the HTTP protocol, a standard that exposes site owners to a number of threats including cyber espionage, keyword-based censorship, account hijacking, and a host of web application attacks such as SQLi and XSS. Let’s Encrypt helps reduce these risks which I think it is a good step in the right direction.

argues on Wired that Let’s Encrypt does not go far enough. We want the project to not only encrypt data but also authenticate users. IMHO that is a pipe dream. Authentication will step on the toes of Symantec, Oracle, and other hugely funded firms that will squash anybody doing the right thing that threatens their profits.

Related Posts

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

HTTPS Everywhere Updated

The Electronic Freedom Frontier (EFF) has updated its HTTPS Everywhere security tool to enhance protection for Firefox browser users against webpage security flaws. The new version of HTTPS Everywhere is a response to growing concerns about website vulnerability in the aftermath of the October 2010 release of Firesheep.

MalwareFiresheep is an attack tool that could enable an eavesdropper on a network to take over another user’s web accounts on social networking sites like Facebook or webmail systems such as HotMail if the browser’s connection to the web application either does not use cryptography or does not use it thoroughly enough.

Since the first release of HTTPS Everywhere the Firefox plugin has been downloaded more than half a million times.

Other sites targeted by Firesheep that now receive protection from HTTPS Everywhere include

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.