Tag: 060116

Classifieds – June 8, 2016

THANK YOU
We would like to thank everyone for your prayers and support during JoAnn’s illness and passing. Your thoughtfulness and caring meant so much to us during this difficult time. The Family of JoAnn Yarrington   23-1-pd
FOR RENT
Spacious 3 bdrm, 2 bath home for rent. Back yard privacy fence. 809 Pine St., La Porte City. $450/month. Call 319-610-3592 after 5:00 P.M. 23-3-pd
HELP WANTED
OTR-DRIVERS – $1000 sign-on bonus. Dependable, Motivated, 23 yrs old+, 2 yrs Class A CDL experience. Good driving record, paid vacation, home weekly. 877-424-3136 (INCN)
Class A CDL Drivers/Tankers. Great Pay, Home Weekends, and Benefits! Potential of $60,000 plus per year! Contact Tony 608-935-0915 Ext 16 www.qlf.com (INCN)
DRIVER TRAINEES NEEDED! Become a driver for Stevens Transport! NO EXPERIENCE NEEDED! New drivers earn $800+ per week! PAID CDL TRAINING! Stevens covers all costs! 1-888-589-9677  drive4stevens.com (INCN)
MISCELLANEOUS
RECRUIT an applicant in this paper, plus 42 other papers in Northeast Iowa for one week for only $110! Includes 25 words and runs in all the newspapers at one time!  Call 800-227-7636 or order online: www.cnaads.com (INCN)
WANTED TO BUY OR TRADE
GUITAR WANTED! Local musician will pay up to $12,500 for pre-1975 Gibson, Fender, Martin and Gretsch guitars. Fender amplifiers also. Call toll free! 1-800-995-1217. (INCN)

Primary Election: Vote June 7

  County Auditor Grant Veeder has issued some reminders about the Primary Election to be held on June 7.
“While all eligible voters are welcome to vote, voters have only two options, either to vote in the Democratic primary or vote in the Republican primary,” said Veeder, “You need to be registered with the party whose primary you are voting in, but you have the opportunity to register with that party at the polls on election day.”
But Veeder recommends changing your registration ahead of time.
“To avoid long lines on election day we strongly encourage people to register to vote or to change their party before election day,” he said. Voters can register or change their registration online at www.sos.state.ia.us or www.co.black-hawk.ia.us or in person at the Election Office located in the Black Hawk County Courthouse.
Veeder says you may change back immediately after the election, and your party registration doesn’t affect your options in voting in other elections, including the November General Election.
As a reminder you can vote early now through Monday, June 6th by absentee in person at the Election Office. If you choose to vote by mail send an absentee ballot request form (found at www.sos.state.ia.us or www.co.black-hawk.ia.us ) to the Election Office at the above address and a ballot will be mailed to you. Absentee ballot request forms must be received in the Election Office by the deadline of 5:00 PM, Friday, June 3, or no ballot will be mailed.
Party designations currently allowed in Iowa are Democratic, Republican, Iowa Green, Libertarian and No Party, but only Republicans and Democrats hold primaries in the state.
Party selection of candidates varies from state to state. Iowa parties hold precinct caucuses to indicate presidential preference, but all other partisan offices are voted on in the primaries. Iowa law allows only those parties receiving 2% of the vote for president or governor in the last general election to hold a primary.
For questions, contact the Election Office at 319-833-3007 or election@co.black-hawk.ia.us. The Election Office is Room 210 of the Black Hawk County Courthouse, 316 E. 5th St, Waterloo, 50703.

Grillin’ on the Mountain in Mt. Auburn

  The Cedar-Mt. Auburn Fire Department invites the public to join them for Grillin’ on the Mountain, a cookout featuring grilled hamburgers with all the fixings, including French fries, beverages and homemade cookies (hot dogs also availble) on Saturday, June 11 at the Mt. Auburn American Legion Hall. The meal will be served from 5-8 PM and a freewill offering will be collected. All proceeds will go to the group’s Truck and Equipment fund.

Book Club: I Have Arrived Before My Words

 I Have Arrived Before My Words by Deborah Pugh, is the June Book Club selection at Hawkins Library. Anne, Georgia, Gayle, Dionne, and Angie (not their real names) are five women who either are or have been homeless. Through autobiographical essays they tell their life histories in their words – fond memories of childhood and young adulthood merge with descriptions of alcoholism, drug abuse, mental illness, and physical abuse. The voices are direct, uncontrived, and completely distinctive. Collectively, the essays are compelling, untouched portraits of homeless women as individuals.
Register at the library, check out a book, finish the book by the meeting date, and join this group on Tuesday, June 28, at 1 PM for the discussion. Stop at the library to sign up, or call 319-342-3025.

Staying Safe Online – June 1, 2016

[emember_protected for “2” custom_msg=’You must be a Digital Edition subscriber to view this content. SUBSCRIBE HERE‘]
 Protect Your “Cyber-Home” With a Solid Foundation

Simple steps to secure your computers and mobile devices for Internet banking and shopping
Your home has locks on the doors and windows to protect your family and prevent thieves from stealing cash, electronics, jewelry and other physical possessions. But do you have deterrents to prevent the loss or theft of your electronic assets, including bank account and other information in your personal computers, at home and when banking or shopping remotely online?
“Think about all of the access points to and from your computer- such as Internet connections, email accounts and wireless networks,” said Michael Benardo, manager of the FDIC’s Cyber Fraud and Financial Crimes Section. “These always need to be protected. Otherwise, it’s like leaving your front door wide open while you are away so that anyone could come in and take what they please.”
Consider these strategies.
For Banking by Computer or Mobile Device
Take extra precautions for logging into bank
and other financial accounts. These measures include using “strong” user IDs and passwords by choosing combinations of upper- and lower-case letters, numbers, and symbols that are hard for a hacker to guess. Don’t use your birthdate, address or other words or numbers that can be easy for con artists to find out or guess. Don’t use the same password for different accounts because a criminal who obtains one password can then log in to your other accounts. Keep your user IDs and passwords secret, and change them regularly. Make sure to log out of financial accounts when you complete your transactions or walk away from the computer.
Consider using a separate computer solely for online banking or shopping. A growing number of people are purchasing basic PCs and using them only for banking online and not Web browsing, emailing, social networking, playing games or other activities that are more susceptible to malicious software – known generally as “malware”- that can access computers and steal information. As an alternative, you can use an old PC for this limited purpose, but uninstall any software no longer needed and scan the entire PC to check for malicious software before proceeding.
Take precautions if you provide financial account information to third parties online. For example, some people use online “account aggregation” services that, from one website, can provide a convenient way to pay bills, monitor balances in deposits and investment accounts, and even keep track of your frequent flyer miles.
While these websites may be beneficial, they can also present potential issues related to the security of the account information you have shared with them. If you want to use their services, thoroughly research the company behind the website, including making sure that you’re dealing with a legitimate entity and not a fraudulent site. Also ask what protections the website offers if it experiences a data breach or loss of data.
Periodically check your bank accounts for signs of fraud. If you bank online, check your deposit accounts and lines of credit at regular intervals to spot and report errors or fraudulent transactions, just as you would review a paper statement. Online banking makes it easier and faster to monitor your accounts. This is important, because the sooner you can detect a problem with a transaction, the easier it should be to fix.
Federal laws generally limit your liability for unauthorized use of your debit, credit and prepaid cards, especially if you report the problem to your financial institution within specified time periods, which vary depending on the circumstances (see How Federal Laws and Industry Practices Limit Losses From Cyberattacks). A good rule of thumb is to check your accounts online once or twice a week. Also, many banks make it easier for customers to keep track of their accounts by offering email or text message alerts when balances fall below a certain level or when there is a transaction over a certain amount.
Basic Security Tips
Keep your software up to date. Software manufacturers continually update their products to fix vulnerabilities or security weaknesses when they find them. “All of your software should be checked and updated as generally recommended by the manufacturer or when flaws are found,” explained Kathryn Weatherby, a fraud examination specialist for the FDIC. “This advice goes for everything from your operating system to your word
processing software, Internet browsers, spreadsheet software, and even your digital photography applications. A vulnerability in one piece of software, no matter how insignificant it may seem, can be exploited by a hacker and used as a pathway into your whole computer.”
Some software manufacturers may issue “patches” that you need to install to update a program. Others may simply provide you with a completely new version of the software. “Before installing any update you receive, make sure it is legitimate, especially if it is emailed to you,” said Benardo. “Check the software manufacturer’s website or contact the company directly to verify the update’s validity. Criminals have been known to imitate software vendors providing a security update when, in fact, they are distributing malware. Once you confirm that an update is legitimate, install it as soon as possible to correct whatever security flaw might exist.”
Install anti-virus software that prevents, detects and removes malicious programs. Crooks and computer hackers are always developing new malware that can access computers and steal information, such as account passwords or credit or debit card numbers. These programs also may be able to destroy data from the infected computer’s hard drive.
Malware can enter your computer in a variety of ways, perhaps as an attachment to an email, a downloaded file from an infected website, or from a contaminated thumb drive or disk. Fight back by installing anti-virus software that periodically runs in the background of your computer to search for and remove malware. Also be sure to set the software to update automatically so that it can protect you from the latest malware.
Use a firewall program to prevent unauthorized access to your PC. A firewall is a combination of hardware and software that establishes a barrier between your personal computer and an external network, such as the Internet, and then monitors and controls incoming and outgoing network traffic. In simple terms, a firewall acts as a gatekeeper that helps screen out hackers, malware and other intruders who try to access your computer from the Internet.
Only use security products from reputable companies. Some anti-virus software and firewalls can be purchased, while others are available free. Either way, it’s a good idea to check out these products by reading reviews from computer and consumer publications. Look for products that have high ratings for detecting problems and for providing tech support if your computer becomes infected. Other ways to select the right protection products for your computer are to consult with the manufacturer of your computer or operating system, or to ask someone you know who is a computer expert.
Take advantage of Internet safety features. When you are banking online, shopping on the Internet or filling out an application that requests sensitive personal information such as credit card, debit card and bank account numbers, make sure you are doing business with reputable companies. You also can have greater confidence in a website that encrypts (scrambles) the information as it travels to and from your computer. Look for a padlock symbol on the page and a Web address that starts with “https://.” The “s” stands for “secure.”
Also, current versions of most popular Internet browsers and search engines often will indicate if you are visiting a suspicious website or a page that cannot be verified as trusted. It’s best not to continue on to pages with these kinds of warnings. Review your Internet browser’s user instructions and explore the “tools” and “help” tabs to learn more about the security settings and alerts offered.
Be careful where and how you connect to the Internet. A public computer, such as at an Internet cafe or a hotel business center, may not have up-to-date security software and could be infected with malware. Similarly, if you are using a portable computer (such as a laptop or mobile device) for online banking or shopping, avoid connecting it to a wireless (Wi-Fi) network at a public “hotspot” such as a coffee shop, hotel or airport. Wi-Fi in public areas can be used by criminals to intercept your device’s signals and as a collection point for personal information.
The bottom line, especially for sensitive matters such as online banking and activities that involve personal information, is to consider only accessing the Internet using your own computer with a secure, trusted connection, and to only connect laptops and mobile devices to trusted networks.

[/emember_protected]

Loading

Fostered on The Farm