Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.

Feeds are simple, really. What's even more exciting is that they are extremely easy to use, and even better, they are completely safe from Viruses, being Spammed or receiving Junk Mail. How? Basically because there is no transfer of information to your computer.

Unlike e-mail, which is a transfer of information (data), feeds are read from files stored on someone's server out in cyberspace. There is no transfer of data to your hard drive at all.

Even better than e-mail, you control what information you read.

Here's an example of how you would find, add and use a feed.

Let's say you are browsing the web and you come across a site you are interested in, let's say a fashion site. Most sites are still using mailing lists, but will be using feeds in the very near future. If you sign up for their mailing list for example, because you may want to know when they have a sale, you will receive information via e-mail. But there could be a few problems with this.

First viruses, spyware, adware, etc. are transferred via e-mail, many times without the knowledge of the person who sent it.

Second, you may want to unsubscribe from the mailing list but the company may have made it difficult to do that.

Third, you may want to actually read their e-mail but it gets recognized as Spam or Junk Mail by your mail program and you may never see it, or you may delete it because you are not sure if you should open it.

Although many companies have used mailing lists successfully, they are now finding it frustrating because of Spam and Junk Mail filters, and unwanted Viruses, Spyware, Adware attachments, etc. Additionally the fewer places you leave you e-mail address, the better.

If the same fashion site has a feed however, you can use it to read their information any time you want, and you can delete the feed if you find that it's not want you want.

The first thing you will do is to use a reader. We have a free reader that is easy to set up, and easy to use. Once you have the reader set up you simply add feed URL's to your reader.

When you open your reader the top menu will have some options for you. With our free reader a small window opens when you start up the program. From that small window you can add a feed. The top menu as well will allow you to add a feed under the "File", "New" option.

If sites are offering feeds they should give you the URL of the feed. For example our "OneFeed" feed is http://1feed.com/onlyfeed.xml.

Simply copy the above URL, and paste it into "New Feed" window and name it. It is automatically added and updated. You can add categories such as sports, news, weather, fashion, and home decor, whatever you want. You can start to add feeds to the different categories. The reader will update the feeds each time you start the program so that you have the latest updated information. You can even choose to just update certain feeds instead of all of them at once.

When you are viewing the feed you are viewing a file, a RSS or XML file, on a someone's server. No information is transferred to your computer. The file contains information (items). Each item will contain a title, a short description and a link. A feed may contain one item or many items. For example one item may be titled "Lingerie Sale", the description ,may read "40% off our winter stock of brand name lingerie", and the link may point you to their home page or a sales page.

Another item may be an article on spring fashion, and yet another item may be a link to a top designer, etc.

You decide whether you view one item, some items or no items!

The best part is that the feeds are updated by the person or company on their server. When you view the feed tomorrow, it may contain different items or news of more sales, etc. You stay updated and you can receive information as it is posted.

You control the feeds in the reader. You can delete any feeds at any time. Unlike Spam or Junk Mail they never return because you have to add them to your reader yourself.

This is an example of the way I may use feeds in the near future. If I need to go shopping I will check my reader for feeds from my local grocery store for sales and specials, and other retailers in my community. If I want to know about registration for minor baseball for my kids or what winter programs my local continuing education organization is offering I can check the feed of those community organizations. If I want to book a trip I can check the best online deals from the feeds of travle companies I use. I will save time and money by using my reader to find the best prices on the products and services I want and need, in my community, and from anywhere around the world.

The best part is that I control what feeds I view. I can delete any feeds that I want at any time. This puts me, and you in control!

Once you start using feeds to gather information, whether from online only sources, or from business and organizations in your community that will be using feeds, you will not want to get your information any other way!

To get a free reader and see exactly what feeds are, how they work, and how they can benefit you as a consumer, for organizations or for busines, go to our web site at "1feed.com". You will find links to information on feeds and what they can do for you.

Bob Power has been an online entrepreneur for more years tha he would like to remmeber. Bob is the president of http://1feed.com and http://ClubRSS.com, sites dedicated to the education on the use of feeds for consumers and business.

The above article may be used for publication without revision or changes.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Politico

Bolton names Commerce official as his national security deputy
Politico
“I selected her as deputy national security adviser because her expertise is broad-based and includes national security matters related to our alliances, defense posture, technology security, foreign security assistance and arms control,” Bolton said ...
White House announces new deputy national security advisorDefenseNews.com
John Bolton begins to shape National Security Council staff - The ...Washington Post

all 9 news articles »

Fortune

Twitter Bans Ads from Russian Computer Security Company Kaspersky Lab
Fortune
Twitter has banned ads on its service from Russian security software maker Kaspersky Lab, after the U.S. government prohibited agencies from using its products because of alleged ties to the Russian government. The ban, confirmed by Twitter to Reuters ...
Twitter banned Russian security firm Kaspersky Lab from buying adsTechCrunch
Kaspersky banned from advertising on Twitter over security fearsTelegraph.co.uk
Twitter Ads policies - Twitter for BusinessTwitter for Business
Reuters -Homeland Security -Kaspersky Lab -Ars Technica
all 38 news articles »

CryptoSlate

Crypto Trade Group Pressures SEC to Exempt Ethereum From Security Classification
CryptoSlate
An alliance of lawyers, venture capitalists, and entrepreneurs have recently met with the US Securities and Exchange Commission to petition for the creation of cryptocurrency “safe harbors” for specific cryptocurrencies and tokens, including Ethereum ...
US Regulators Asked Not to Classify Ethereum as a Security: NYT ...CCN

all 20 news articles »

TechRepublic

Upcoming Windows Defender feature will tell you when security fails
TechRepublic
All of the attestation is done by the secure kernel, the end result of which is security validation that an attacker or malware in the Windows kernel can't alter. Microsoft gives an example where "an app could ask Windows Defender System Guard to ...
Windows 10: Microsoft to boost Linux app security with Windows Defender firewallZDNet
Hackers can bypass the Windows 10 S lockdown due to security flawDigital Trends
Google discloses 'medium-severity' security flaw in Windows 10 SWindows Central
Naked Security -Chrome - Google -Monorail - The Chromium Projects
all 59 news articles »

Brookings Institution (blog)

Development for security: Lending for peace?
Brookings Institution (blog)
Two World Development Reports tackled the security-development nexus. The WDR 2011 explicitly argued that investments in citizen security and justice reform can help countries break recurring cycles of violence. The WDR 2017 surmised that good ...


WFAA.com

Italy ISD increasing security after school shooting
WFAA.com
Italy ISD increasing security after school shooting. "Italy ISD will always be the school that this happened to. What we're going to do is focus on prevention and response." Author: Monica Hernandez. Published: 8:54 PM CDT April 20, 2018. Updated: 9:07 ...


Rutland Herald

Rutland Town eyes poll security at school
Rutland Herald
Rutland Town Clerk Kirsten Hathaway said the alleged threat of violence at Fair Haven Union High School and violence at schools in other parts of the country has her thinking twice about security at Rutland Town Elementary School during townwide voting ...

and more »

Assessing Server Security | CIO
CIO
Analysts at Chicago financial firm William Blair believe that Equifax's costs tied to dealing with last year's data breach could run between $200 million and $300 million1 – and that figure is after insurance coverage is applied. While this was a ...

and more »

NewsChannel5.com

Maintaining Cyber Security On Student Devices
NewsChannel5.com
FRANKLIN, Tenn. - In order to keep students without access to the internet from falling behind, students will be able to take laptops home. But some are questioning what that means for their cyber security. It's why several school districts have moved ...

and more »

Ars Technica

When you go to a security conference, and its mobile app leaks your ...
Ars Technica
A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the ...
No way, RSA! Security conference's mobile app embarrassingly ...The Register

all 7 news articles »
Google News

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More