This is the Powerful Microsoft Word Compared to Pages

Changing my opinions

Microsoft WordTen years ago I changed from a PC to a Mac. My mantra was “I have a Mac and I ain’t going back”. Then I got a client who wanted me to write an ebook for him. He insisted that I start by writing it in Microsoft Word and then change it to a PDF file.

So, I set aside my anti-Microsoft prejudice & bought Microsoft Office 365. That is a one-year license to use the Microsoft suite on my Mac.

It took a while to figure out Microsoft Word. But now I think it is more powerful than Pages for Mac.

Microsoft Word Features

Below are some of the things I had to figure out about Microsoft Word.

Bookmark & Link

Create bookmark first. Must have a letter & a number. Cannot have spaces but can have an underscore.  This is what to do:

  1. Select text
  2. Click Insert
  3. Click Links icon & then Bookmark
  4. Name it & click Add.

Click here to see how to create a link to that bookmark.

Bullet points

  • Microsoft WordInsert cursor on line that should have first bullet point
  • Click on the Home link.
  • See top icon to right of eraser
    • Clicking that will add first bullet point
  • Each time you push Return button, bullet point for next line will be added

Copy & paste

When copying from another source such as a web page, you may copy the formatting codes. Then, when you paste it, the new text may have a different font face & size from the rest of the text.

 To overcome this problem:

  • First paste into a text editing document (e.g., TextEdit)
  • Copy this text into clipboard
  • Then paste it into the document in front of a period at the end of a sentence
  • That way you will retain all of the font characteristics of your main document. 

Footer, to remove

Insert > footer > remove footer

Header, to remove

Insert > header > remove header

Headings

Microsoft WordTo change or create the heading:

  • Go to Home page
  • Select text you want to have as the heading
  • Click on appropriate heading icon
  • To see more choices, click the forward or the backward arrow.

Hyperlink to bookmark

  • Microsoft WordRight-click on text or picture
  • Click on Hyperlink
  • Click blue This Document tab
  • Microsoft WordIn front of Bookmarks click dropdown arrow
  • Click appropriate bookmark
  • Click OK.

 

Embedding video into Word

Microsoft WordIntuition would tell people to change a video to an MP4 file before embedding it into a Word document. However, In Word and Excel, sounds are linked, not embedded. Sounds can’t be embedded into Word or Excel.

So, a good way to show a video in a Word document is to insert a picture from the video. Then, hyperlink from the picture to a YouTube video. Have some text about it explaining what you are doing.

Move an inserted picture to the right of the text

Microsoft WordTo have a picture on the right-hand side  of text:

  • Click Insert tab
  • Click Insert Picture
  • Right-click on picture
  • Choose Wrap> Square
  • Drag picture to the right until you like its location

Internal links stopped working

My internal links suddenly started taking me to a grey page instead of the correct bookmark. An online search told me that Word was now using absolute links rather than relative links.

An absolute hyperlink contains the entire name of the target that Word needs in order link. For instance, if you have to link to C:\My Documents\April\Sales.doc, C:\My Documents\April\Sales.doc would be your absolute link. April\Sales.doc could be your relative link.

It can be useful to make sure you use relative links when moving a document to another computer. The links are ‘relative’, meaning relative to where the Word file is, not ‘absolute’, meaning where the original file was in the first computer.

I went online & read, “Unfortunately,  there is no RELIABLE way to use relative addressing within Word documents on Word for Mac.”

I decided to try the old standard fix and turn the computer off. Then log in again. The internal hyperlinks work again.

Many more Microsoft Word features

Microsoft WordWhenever it is not intuitively obvious how to do something new in Microsoft Word, just go to Google.com and ask “How to ___  Microsoft Document”.

How to Quickly Upload Videos from Android to Secure Google Drive

Clear out videos to add memory

Google Drive

Suppose you are on vacation and have filmed a number of short videos with your Android smartphone. You are afraid that you may soon run out of memory. So, what do you do? Before you left home, I hope you created a Videos folder in Google Drive. Find your Android’s Google Drive icon.

You will upload your videos to Google Drive and then delete all of your videos from your smartphone. Then you can continue on your vacation confident that you have room on your smartphone for lots more videos.

Don’t see Google Drive icon?

Google DriveWhat if you can’t find a Google Drive icon?

    • Most likely be in a Google folder on Android screen
    • Hold your finger on Google folder icon.
    • It will open displaying a number of icons for different Google apps.
    • Hold finger on Google Drive icon
    • Drag it out of folder.
    • Tap Back icon to close folder.

Upload to Google Drive

  • Tap the Google Drive icon.
  • Find and tap Videos folder.
  • Then tap blue circle with white plus sign.
  • Tap Upload
  • Tap each video (MP4 file) you wish to upload.
    • (For reasons unknown to me, sometimes you have to tap Open at this point and sometimes you do not.)
  • You will see a moving blue progress bar.
    • As soon as it quits moving, your MP4 file will have been downloaded.

After you get home…

After you get home, go to Google Drive > Videos on your desktop and double-click on your various videos you see in Finder. That will automatically  open your  videos using QuickTime Player. If you do not have that program, download a free version of QuickTime Player from the Softonic website.

Edit with ScreenFlow

Google DriveIf you want to edit your videos, you can do that with ScreenFlow. You can add video clips together, add titles and add many other amazing features with ScreenFlow. Click on the blue Free Trial button on the image to the right.

 

Rotate video 90 degrees

Google DriveAfter you get home, you open the MP4 files in Google Drive. And some of your videos are sideways. If you have ScreenFlow, there is a simple way to rotate those clips.

Go to your ScreenFlow timeline and select a clip that needs rotating. In the panel to the right:

  • Click video icon
  • Go down to Z rotation
  • Change number to 90 degrees as you see on the animated GIF here.
  • Press Tab key to save the number 90.

 

 

 

Google Drive

How to Set Up a Twitter Account for a New Client

Setting up Twitter advertising for a customer

Twitter account

You are starting the social media marketing for a new customer. Your customer does not want to do any technical work. So, you will set up your customer’s new Twitter account on your own computer.

You will use your own credit card to pay for the advertising. You have arranged for the customer to reimburse you in such a way that the bookkeeping is very simple.

Your first step is to set up a new account withTwitter.

This is how to set up that Twitter account in 7 steps

  1. Twitter accountLog into your own Twitter account
  2. Click on your profile picture and then Log Out
  3. Ideally you will have your own email address that relates to your client but is forwarded to your personal address. (E.g., myname@customerURL.com)
  4. Twitter accountAfter you log out, you will see a form where you can set up a new Twitter account
  5. Enter your email address. (Preferably it is the email address from point #3 above)
  6. Create a password
  7. Respond to everything Twitter emails you.

Twitter advertising

To help you set up your Twitter advertising, here are two official Twitter pages that can help you:

  1. Optimizing
  2. Conversion tracking

Ineligible to participate

Twitter account

As soon as I set up the account and created my first tweet, I clicked on my profile picture and then Twitter Ads. That took me to a new page saying that I was ineligible to do any advertising on Twitter.

I found the Twitter Eligibility page and found this: The most successful advertisers on Twitter tend to be those who are avid Twitter users. This means they have a history of sharing exceptional content and engaging with their followers. If you are interested in advertising but your account is fairly new, be sure to complete your account’s Twitter profile and spend a few weeks familiarizing yourself with Twitter’s best practices.

Twitter accountSo, I guess that means I’ll have to make lots of Tweets before I can set up my client’s advertising.

 

How to Be Successful with Twitter Advertising

Increasing sales of a product

This post is about how to increase sales of a product using Twitter advertising.

The Twitter Tweet we will talk about later links to an article on your website. So, write a compelling promotional page for your product. Read How to Increase Chances of Web Page Being Read.

Setting up Twitter Advertising in 4 steps

1. Join Twitter

Go to twitter.com, fill in the form & join Twitter. Create a difficult-to-guess password that has a combination of upper- & lower-cased letters, numbers & special characters.

Click the Get Started button and simply follow the instructions. Write out your username & password (possibly cryptically) in a place where you will find it when you need it.

2. Log into your new Twitter account

Go to your Twitter account. In the upper right-hand corner you will see a line inviting you to login. So, login with your new username & password.

While you are there, create a very effective tweet that promotes your product. Read these 8 tips. Also see the Headline Analyzer & the 180+ Power Words.

The sample tweet below is for a product called the TSC Side Sleeper. These are some reasons why it is a good tweet:

  • Opening phrase got a 76% Headline Analyzer score
  • It offers to help a common problem (getting a better sleep)
  • The line of text is short
  • It has a picture that grabs their attention
  • The TSC has a green check mark but will be unknown to most people. It will pique their curiosity
  • It links to a very informative page
  • People are asked to retweet it. They are more apt to retweet if they are asked to

3. Start first Twitter ads campaign

Click on your profile picture. Click on Twitter Ads.

Click on blue Create Campaign button the top. This blog post is about selling a product. So, you will click on the Website Clicks or Conversions link.

Give advertising campaign a descriptive name.

4. Set budget, Tweet & target market

Fill in everything as you see fit. If you are on a tight budget, set your start & end dates. Then click Next.

Click the check box in front of the tweet you wish to use in your ad. Decide where you want to place your ad. The search query Tweet is triggered by the user’s desire for information. So, you definitely want to include Search Results.  Twitter has a huge list of categories. In this example, I searched for “sleep”. Twitter showed me the closest related category in their list (sleep disorders).

To find your target market more precisely, click Return to Original Campaign Form. For geographical locations, I chose Import Multiple Locations. After I had written the countries on 2 separate lines, I clicked the Add Locations button.

For age I chose 50 and over. The rest of the audience features should be self explanatory. When finished, check your ad with the Audience Summary. It you are satisfied, click Save in upper right-hand corner.

 

Related pages

How to Build a Winning Twitter Ad Campaign

Twitter ad setup

How to Link from LinkedIn Timeline to a Special LinkedIn Article

Your LinkedIn timeline

LinkedIn timelineAfter you write a LinkedIn article, it may be good marketing to link to it from your LinkedIn timeline. This post tells you how to do just that.

Linking to your LinkedIn article in 3 steps

LinkedIn timelineLinkedIn timeline1. Copy article URL 

Copy (Cmd C) the web address of the article into your clipboard.

2. Find ideal picture

You want a  simple picture that relates to your subject. I usually use the picture from above the headline. Find where it is in your Finder. Look at information such as date. That will make it easier to locate it using LinkedIn.

From a LinkedIn page click on Home and then Images. Using information from the Finder in the above paragraph, double click on the name of appropriate image.

LinkedIn timeline3. Write message above picture

Above the picture you just inserted there is space for text. Type a message that will get the visitors’ attention. At the end of it paste (Cmd V) the URL form point #1 above.

Click Post. Notice that the URL has changed to a shortened form.

Curious about the picture?

In case you are wondering, the picture above represents an encryption tunnel. If you wish, you can go to that LinkedIn article entiled How to Increase Security & Go Through an Encryption Tunnel.

LinkedIn marketing

If you are selling to businesses, a good social media marketing idea would be to write LinkedIn articles that subtly promote your product. A good way to get people to read your articles is to link to them from your LinkedIn timeline.

Related pages

Don’t get hacked on free wifi
How to Protect Your Internet Browsing Privacy
LinkedIn article about Encryptions Tunnels
Free Wi-Fi Hotspots and How to Avoid the Evil Twin

 YouTube video

Watch this YouTube video to get a better idea of how to link from your LinkedIn timeline.

Don’t Get Hacked on Free Wifi — Affordable Secure VPN

Free wifi is everywhere

VPN

You don’t want to shell out the monthly expense of a data plan. So, you stand outside a coffee shop, hair salon or any place that has free wifi — but you have no VPN.

VPN

 

Perhaps you are at an airport waiting for your flight. You want to catch up on some business. So, you log into the free wifi.

 

 

Hacking Risk

VPN

What you may not realize is that you are at a definite risk of being hacked. A hacker could be sitting nearby with a laptop using a program that mimics the legitimate free wifi.

 

 

VPNVPNThe mimicking wifi has a name similar to the free wifi. If the free wifi is Paris Airport, the mimicking wifi could be called Airport Paris.  The hacker can see whatever you are doing online. He can steal passwords, credit card numbers and any other things you download or upload.

Eliminating the risk

 

The technology that eliminates the risk is called PrivateVPN (VPN stands for virtual private network). Log into the free wifi. Before doing anything that would expose private information, log into PrivateVPN. (You can get a free 7-day trial VPN now if you wish.)

 

 

When you login, your signal goes through  an encryption tunnel and gives you a completely different IP address.

 

VPNYou log into the free wifi from that new IP address. No hacker will be able to hack into your mobile device.

 

 

Enjoy a secure web experience with PrivateVPN

PrivateVPN, a Swedish-based VPN provider, offers:

  • The highest levels of security and privacy,
  • Stable connections from anywhere in the world
  • Uninterrupted VPN service — 24 hours a day — guaranteed.
  • A reasonable price!
  • First-rate service
  • Customer support that is second to none! They assist customers through live chat, email and remote desktop help through their TeamViewer system. They’re here to help you in any way they can.

PrivateVPN’s extra-secure online servers completely mask your online identity. You will stay anonymous the entire time you’re connected to the internet.

How to buy PrivateVPN

 Click PrivateVPN to buy it now.

 

Using this website

It takes a great deal of time & research to create blogs on this website. So, when you choose a VPN, please buy PrivateVPN from this web page.

I will make a commission each time you do. It will help repay me for my time & effort creating this blog.

Please do me a big favour:  Click PrivateVPN to buy it now.

Thank you very much.

Related pages

Government anti-terrorism actions could go beyond anti-terrorism


How to Avoid the Risks of Free Wifi

Always use protection

free wifiEvidence tells us that working with that free wifi is risky. There also is evidence that protecting yourself using a VPN (virtual private network) is foolproof. PrivateVPN is your answer to protecting yourself.

 

free wifi

You may consider logging into the free wifi from your hotel room. You may never consider that the guy down the hall may be using an evil twin.

 

 

Cybersecurity experts say that there are three types of people in the world:

  • People who have been hacked,
  • People who will be hacked, and
  • People who are being hacked right now but don’t know it yet.

By using the free wifi, you may inadvertently be allowing hackers to get passwords, account numbers, etc.

free wifi

Think about this statistic: The number of identity theft victims in the US rose to 15.4 million in 2016.

Evidence that people are using free wifi

It’s safe to say that delegates who attend political conventions are reasonably intelligent. They could represent a good cross section of the American population

Someone gather statistics from the 2016 Republican and Democratic National Conventions.  Around 70% of delegates connected to the nonsecure Wi-Fi networks at each of the conferences.

Here’s how it could work: You log on to the free Wi-Fi in the convention hall. You think you’re joining the hotel’s network. Somewhere nearby, a hacker is outputting a Wi-Fi signal off of their laptop. It has a name slightly different from the hotel’s signal. You are tricked into using it because it is labeled with the hotel’s name.

The hacker can see every username, password & credit card number you enter.

Avoiding that hacker

There is a simple way to avoid that hacker in the above scenario.  It’s called PrivateVPN. You install it on your desktop & mobile devices. (Buy it once & you can use it on 6 devices.)

free wifiBefore you log into the free wifi, open PrivateVPN. It will find an encryption tunnel to the country of your choice. In that country you will get a new temporary IP address.

You can use the free wifi at your heart’s content. The hacker will not be able to find you.

A real life example

The Harvard Business Review published an article in which they said:

In 2014 experts from Kaspersky Lab uncovered a very sophisticated hacking campaign called “Dark Hotel.” Operating for more than seven years and believed to be a sophisticated economic espionage campaign by an unknown country, Dark Hotel targeted CEOs, government agencies, U.S. executives, NGOs, and other high-value targets while they were in Asia. When executives connected to their luxury hotel’s Wi-Fi network and downloaded what they believed were regular software updates, their devices were infected with malware. This malware could sit inactive and undetected for several months before being remotely accessed to obtain sensitive information on the device. Read more.

Using this website

It takes a great deal of time & research to create blogs on this website. So, when you choose a VPN, please buy PrivateVPN from this web page.

I will make a commission each time you do. It will help repay me for my time & effort creating this blog.

Besides that, you will have the added benefit of being able to use free wifi with complete peace of mind.

 

Related web pages

Evil twin
Mobile devices & cybersecurity
Online fraud
VPN (virtual private network) overview, online privacy, etc.

YouTube

Watch the short YouTube video about how to avoid the risks of free wifi.

Pinterest




How to Post Other Powerful Pins onto Your Board

boardBest pinning practice

 

It is best practice to pin 5 to 10 Pinterest pins that other people have created for each of your own. There is a strong correlation between how often you pin other people’s content to your board and how often Pinterest will show your content to your followers. It’s built into Pinterest’s algorithm.

Pinning other people’s pins in 3 steps

1. Log into Pinterest

You must log into Pinterest so that your boards will show up.

2. Search for pins for your board

boardI wanted to add more pins to my cybersecurity board. I searched for cybersecurity pinterest. I saw titles such as 55 Best Cybersecurity Images on Pinterest. All I had to do was pin the best 5 – 10 images.

 

3. Find image & click save

boardWhen you find an image you want, hover over it. A red Save button will show up in the right-hand corner.

Click the Save button.

The names of your boards will show up. Click on the Save button on the board you want. In my case it was Cybersecurity.

That’s all you have to do. Just find 5 – 10 of the most attractive images & pin them to your board.

Free Wi-Fi Hotspots and How to Avoid the Evil Twin

What is an evil twin?

evil twinAn evil twin is a hotspot set up by a cybercriminal or hacker. It mimics a legitimate hot spot in just about every way.

The evil twin’s purpose is to eavesdrop on unsuspecting users and/or to insert themselves in the various data conversations happening between hotspot users and servers.

Once connected to you, the hacker or criminal may be able to:

  • Steal passwords, account names, etc.
  • View files that are being uploaded or downloaded.

The hacker could be sitting behind you in an airline terminal. The evil twin wifi signal could be emanating from their laptop with a signal that looks like the legitimate wifi signal. The name would just have been changed slightly.  More.

How to defend yourself against an evil twin

Avoiding evil twins may be as simple as using an inexpensive VPN (virtual private network). With a VPN, you would

  1. Log into the hotspot
  2. Use the VPN in your mobile device to use an encryption tunnel to find a temporary VPN server.
  3. Surf the web using the IP address of the temporary VPN server.

How PrivateVPN works

secure webAs soon as you log into a free wifi or any other unsafe site, open PrivateVPN. It will find an encryption tunnel to the country of your choice. In that country you will get a new temporary IP address.

You will have 55+ countries from which to choose. If the connection is too slow, try another country.

The hacker will be unable to find you. Your online data will be completely safe. You have a completely secure web event.

If you are using PrivateVPN for the first time, check out your temporary IP address. You can go online & search for what is my IP evil twinaddress? IP Lookup will give your IP address. Click on Get IP Details.

evil twinYou will see data telling that you are in Belgium (or whichever country you chose). You start accessing the Internet. You download & upload data to your heart’s content. The evil twin cannot find any of your data.

Buy now

Note that it is a great deal of work to produce these blog posts. Also note that I will get a commission if you buy PrivateVPN from this blog post. Please support me & buy PrivateVPN now.

YouTube

Related pages

Mobile devices & cybersecurity
Online fraud
VPN (virtual private network) overview, online privacy, etc.




How to Improve Cybersecurity for Mobile Devices

 Cybersecurity and your smartphone

cybersecurityA business person can often work more efficiently if they go online with their smartphones & other mobile devices once in a while. However, that does present a cybersecurity problem.

Links, files, photos, contacts and other company data are often stored in the mobile device. Using an Evil Twin phony hotspot or a Firefox Tamper Data plugin, it may just be too easy for hackers to download these data from the hotspots you are using.

Solution: PrivateVPN

Faithfully using PrivateVPN (virtual private network) can virtually eliminate this threat. PrivateVPN has servers in over 55 different countries. Before exposing any confidential information online, you open up PrivateVPN and select a country.

You are then given an IP address for that particular country. Then you go onto the Internet. PrivateVPN encrypts the data before it passes through the Internet. Then it decrypts it when it reaches your computer.

cybersecurityThis GIF is an illustration of a user in North America getting an IP address from Finland. Even if a hacker was able to decrypt your data (extremely unlikely), he would not know from which country you came.

PrivateVPN

cybersecurityI used PrivateVPN to find an IP address in Finland. Then I used whatismyipaddress.com to find a map and other details that tell where my temporary IP address is located.

I like PrivateVPN because:

  • They have a free 7-day trial VPN
  • They have servers in 55+ countries
    • If their service is too slow, I simply choose another country
  • Unlike some other VPNs, they keep no records about where you surf on the web
  • You pay for ONE account and can use it on a total of 6 devices
  • With PrivateVPN, mobile employees can securely connect to company resources from virtually anywhere in the world. This applies even with insecure Wi-Fi hot spots.

Summary

Cybersecurity will be at a high level when you faithfully use PrivateVPN with your mobile devices. Your company financial, customer and other sensitive information will be kept secure. Your employees can increase their productivity and keep things private at the same time.

Related pages

Evil twin
VPN (virtual private network) overview, online privacy, etc.

YouTube

Watch the video below to learn how to avoid the risks of free wifi.

 

It’s true! Some countries do NOT allow you to access Google, Wikipedia, Twitter, Facebook, YouTube & other common websites from their countries.

You can circumvent this problem by getting PrivateVPN before going to the restricted country.