T.R. Robinson's Blog, page 22

March 27, 2018

Computer Viruses – Summary

[image error]Regular visitors to, and readers of, this website and integrated blog will have noted several computer virus (malware) related articles have been published over the last couple of months. The overall intention was to provide fellow users of electronic devices (computer, tablet, e-readers, smartphones, etc.) with some insight into the topic and to try and reassure, no matter how serious an attack may appear, it may almost always be dealt with by one means or another.


The topic is a vast and complex one with many variations making it unrealistic to have tried to deal with every type of possible infection. Consequently, only the more well known/frequently heard of ones have been discussed including ransomeware, spyware, trojan, etc. Just like storms and hurricanes each new malware (virus) is given a label/title/name. In general, the majority of malware impact devices in similar ways and therefore the advice given within the articles should be sufficient to enable users to detect and deal with most. In addition, the recommended preventative actions should help users protect their devices from all types of attack.


Because the articles have been spread across a number of weeks it is thought readers may appreciate having all the information available in one, clearly entitled, article (this article). A complete list of previous articles, together with links, is provided further down.


Before setting out the list it may be useful to remind readers of the need for constant vigilance and caution. Cyber criminals (what else may they be called?) are constantly developing new malware and, consequently, users should never let their guard down. Very frustrating but it has to be accepted this is the world today. In addition, new anomalies may come to light e.g. recently (January 2018) it was discovered intel computer microchips created since the 1990s had a built-in vulnerability. Thankfully, this had not been previously spotted by those intent upon exploiting the issue and the anomaly was quickly secured. Therefore, though in danger of boring readers with the constant repetition, here, again, is the list of suggested preventative actions users should exercise in their daily online routines:



Avoid opening unverified e-mails or clicking upon links contained in them.
Avoid visiting unknown websites (includes blogs) or following links to one if it has been provided by someone not known or not from a recognised group.
Check social media sharable items are from a recognised/validated source.
Do not download software from an unknown company or source.
Do not download anything from an unconfirmed website or contained in an advertisement by unknown company or person.
Carry out regular scans. (Antivirus software usually contains the option for both full and quick scans.)
Do consistently backup files. (Suggested at least two or three backups on different devises that are stored in separate locations e.g. USB, Hard-drive backup devises, CD (for older computers), etc.)
Do regularly update software: programmes, applications, antivirus systems, etc. (New versions of malware are constantly devised and detected and most software companies update their programmes to counter attacks from them (each new virus requires a new resolution). Not to regularly update the computer software may leave it vulnerable to attack from the newer viruses.)
Ensure the latest browser versions are being used.

Published articles

Click on article title to read the full transcript.


Computer Viruses – Overview

As implied, this provides an introduction to the topic of malware (computer viruses) including: Defining what they are; Explaining cyber criminal’s intentions; Overview of how malware may impact a device; Suggested possible resolutions.


Computer Viruses – Ransomeware & Scareware

Explains what these are; How they impact devices; How they spread; Actions to deal with them.


Computer Viruses – Spyware, Keylogger, Adware

Outlines the function of each; Shows how some may actually be legitimate; Suggests how malicious ones may be detected; Provides insights into what to do when infection discovered.


Computer Viruses – Trojan & Worm

Describes how these are different to the usual malware (viruses); How they impact and manipulate a device; What the purpose is; How to detect; How to deal with.


Computer Viruses – Antivirus & Cleaner Software

Provides a concise overview of available antivirus software and details of software that may be used to clear a device of unwanted programmes and files.


Conclusion

Regrettably, cyber criminals and computer viruses are here to stay. Along with the constant development of computer programmes and systems, cyber criminals are devising new and increasingly devious malware.


Preventative actions should always be part of a users daily routine. Users may never relax: that seemingly friendly contact may just be another attempt to gain control of a device; to obtain personal information; or to extract finances. The days of being able to trust without question have passed meaning every connection should be carefully examined before any positive action is taken.


It is necessary to continually bear in mind new malware are constantly in development. Cyber criminals are not about to disappear. If anything, they are likely to be on the increase.


It is sad that there have to be so many negative comments above but that is now the reality of online life. Of course, people should continue to seek out the best, after all not everyone is a crook. It is just there should also be an awareness of the possibility of attack.


It is hoped those reading this article will be spared the indignity of such attacks as have been mentioned throughout this series; that they may enjoy a peaceful and fearless life.


Disclaimer: The writer is not a computer programmer or in any other way a computer software expert. What is shared has been learnt through limited personal experience and/or through research. Consequently, though every effort has been made, total accuracy of all the above information cannot be guaranteed.

 •  0 comments  •  flag
Share on Twitter
Published on March 27, 2018 09:11

March 23, 2018

Are You A Reader?

[image error]

 


Some statistics

Note: It is understood the following information has been obtained through the medium of surveys.


 



In the United Kingdom (UK) the percentage of people who read went down over a four year period from 79% to 72%.
In the United States of America (USA) 27% of those surveyed stated they had not read a single book in the last year.
In the UK it is now estimated 15% of adults are ‘functionally illiterate’. (Literacy level below what is expected from an eleven year old.)

Note: Though the above statistics are shown by national identity it would seem reasonable to accept the figures reflect the situation generally, irrespective of territory or country.


These figures are disappointing and rather a sad reflection of modern society. Possible reasons:


Note: The following are simply a matter of conjecture without (beside the statistics quoted above) any research into the topic having been carried out.



The Internet. (Most simply scan trough items and it has been proven many are more influenced by visual, as opposed to textual, material.)
Computer Gaming. (Reading not a requirement with most games.)
Eduction systems/styles. (More emphasis upon ‘project’ work rather than straight studying. Of course, there are varying opinions but the concept has to be considered. And of course, large classes do not help.)
Texting. (Abbreviated codes are not conducive to learning actual words.)
Social Media in general. (Few engage in actual conversations with most communication being abbreviated as it now tends to be in most places.)
Parental influence. (Children used to learn much of their language from parental discussions however, many parents no longer seem to engage their children in such conversations.)
Smartphones. (Reduce actual face to face conversation and of course there is also the abbreviated messaging factor.)

As stated, the above simply comprise some thoughts/ideas which no doubt many, at some stage or other, will have contemplated for themselves. However, this article is not intended to be about these issues but it was thought worthwhile to mention them considering the impact upon reading.


Reader Help Appreciated

Before continuing, in case some have developed a slightly off-kilter concept, authors are, or at least should also be, readers.


Readers! Authors, as well as other readers, could really do with your help. Did you enjoy the book you have just read? Perhaps you did not and feel it would help others to say what you did not like. On the other hand, if it was a good book, would you not like others to know about it? No doubt you appreciate others pointing out something they have enjoyed especially as it is increasingly difficult, with so many thousands of books being published most days, to find your next read. In addition, many authors, especially independent ones, find it difficult to let readers know their book is available, again part of so many being self-published these days. They, together with other potential readers, would appreciate readers commenting on their works not only in conversation with friends and family but also by means of social media and particularly reviews.


Of course it is understood many find the idea of writing a review a little daunting (hopefully not authors) for a variety of reasons. However, a review does not have to be a long exegesis, it may simply consist of a couple of sentences stating what was liked/not liked about the book as a whole; whether the story itself was liked or not; what the writing style is like; etc. Of course, it may be longer with a little more detail. Whatever it contains, authors and readers would really appreciate people leaving a review.


A few articles have been previously published in this website which may help those who remain diffident. Click on each title to read full article.


Reviews – What Wanted


Covers: What are reviews. Who reviews are for. What is wanted from a review.


Writing Reviews


Looks at: Why readers do not write reviews. What to include in a review. How to present a review.


Authors & Reviews


As the title implies, this is primarily aimed at authors though those writing reviews may also be interested.


Discusses: Whether authors should respond to reviews. Principles of dealing with different types of review. Requesting reviews. Author to author reciprocation.


Assessing book review ratings


Considers: Star rating values between different sites. How ratings have been distorted by suggested misuse. How ratings may influence sales.


The intention behind this article is to assist reviewers, especially the inexperienced, with determining a valid rating and to clarify how books are rated within this website.


Conclusion

Reviews are a valid and very useful, for all, means of sharing opinions and facts about products. Both reader and author benefit from them though reviews are primarily for potential readers.


Readers should be assured, in most instances, their generosity in writing a review, is very, very much appreciated.


It will be appreciated if readers who, up-to-this-point, have not contemplated writing reviews, did consider doing so. As already stated, these do not have to be lengthy; just a few sentences that convey an overall ‘personal’ assessment would be welcome and helpful.


Thank you for taking time to read this. Please feel free to ask if there is anything else you would like to know about reviewing.

 •  0 comments  •  flag
Share on Twitter
Published on March 23, 2018 10:15

March 20, 2018

Computer Viruses – Antivirus & Cleaner Software

[image error]


Within each of the recent Computer Viruses series of articles there is consistent advice and recommendations upon preventative actions users may take to protect their systems from infection and attack. Among these is the sensible requirement to have appropriate, valid, antivirus software incorporated. In this article not only will reference be made to some of the more notable suppliers but also to the availability of ‘Cleaner’ software (explanations will be included). However, prior to dealing with these, the matter of erroneously downloaded programmes and the subject of firewalls will be considered.


Downloaded Programmes (Erroneous – Malicious)

As explained in previous articles a lot of malware operates by adding erroneous malicious applications and/or programmes to computer systems. (Guidance upon how to clear and restore an ‘infected’ computer system has been provided in those articles.) What has not been previously mentioned is that web browsers (the software used to search and retrieve information from the worldwide web (the Internet)) may also be targeted. Naturally, if a user finds their computer has been the subject of an attack they will deal with it before considering any other anomalies. Once done and access to the computer system has been regained, users are advised to undertake two further tasks:



Check the computer/system installed programme list for any that have been installed without their knowledge or authority. If any are located they should be uninstalled. Programme lists may be found via the computer’s control panel or settings or equivalent. There should be a simple ‘uninstall’ option available.
After doing the above users should also check browser programmes for any malware installed in them (these will not show in the computer’s own programme list). Where more than one browser has been used, even if only once, ALL should be checked. From the browser menu the user selects the appropriate option: ‘Tools’; ‘Add-ons’; ‘Extensions’ or a combination. In Chrome it is Tools>Extensions. In Firefox it is Add-ons>Extensions. In Safari (Mac) Preferences>Extensions. In Microsoft Edge it is Extensions. Within each there is the facility to uninstall unwanted or erroneous software.

Firewalls

As implied by the name, a computer firewall has a similar function to a physical firewall. The one prevents fire spreading from room to room. The other inhibits malware spreading from computer to computer, system to system.


There are many aspects to firewalls including the availability of different types. However, as far as the average user is concerned, there is no need to go into a lot of unnecessary, technical detail.


Note: Firewalls may be configured within both the software and hardware of a computer. It is the software version under consideration here.


In principle a firewall is a software application/programme that protects a computer system from intruders (cyber criminals). Each firewall has a predetermined set of security rules/policies that operate in the background by monitoring traffic to and from the system and are usually capable for recognising whether a site is ‘trusted’ or not. In essence a firewall acts as a barrier between the computer and external activity by controlling and filtering connections (internet and others). Firewalls are normally configured to protect against unauthorised interactive logins which also helps prevent hackers from logging into the computer and are also designed to alert the user to any attempted intrusion. Firewalls will sometimes block a site/link and display an appropriate descriptive message. When confronted with such messages, users should be careful because, as outlined in Computer Viruses – Ransomeware & Scareware, it is possible for these to be a source of malware.


Preinstalled Firewalls

These days all devices (computer, tablet, smartphone, etc.) come with built-in firewalls that are turned on by default. These are normally sufficient for the average private user. If someone is building their own computer or system they should ensure a firewall is built-in. Would be very foolhardy and careless not to do so.


Users, if they deem it really necessary, may alter the function of firewalls by going to the computers ‘Tools’; ‘Control Panel’; ‘Settings’ or equivalent. However, they should make sure they really do understand what they are doing because an erroneous change could result in the computer/system becoming more vulnerable to attack.


For the majority of users, the preinstalled firewall is normally sufficient.


Important: Some malware are capable of manipulating firewalls consequently, the presence of a firewall alone is not sufficient. Users should ensure antivirus software is also included in their computer system.


Now to the main focus for this article.


Antivirus Software

No matter what software, hardware or anything else, a user has installed with/in their devices the presence of some antivirus software is an essential. Without it the computer/system will be vulnerable to a variety of attacks/infections.


Note: What follows is inclined toward Windows computers and systems. (Apple devices (Mac, iPad, iPhone, etc.) tend to have their own effective antivirus software preinstalled though, in most instances, there are versions of the following a user may also utilise for their Apple product, if they wish).


There are many antivirus software programmes available and which to choose is very much down to user preference. To help get started here are some of the more well known ones.


Norton: Perhaps one of the most well know worldwide. Established in 1991 Norton is probably the one used most by private individuals.


McAfee: Again one that many will have heard of. It commenced in 1987 and over the years emerged, through merger and sells into its current existence. McAfee claims to be the world’s largest security technology company.


Kaspersky: Perhaps not as well known as the two above though there appears to be increasing awareness of them. It is a Russian company operated by a United Kingdom holding company. It was established in 1997.


Panda: A Spanish company, established in 1990, that many may well not have heard of. It does operate worldwide though those living in Spain will undoubtedly be more familiar with them than those living elsewhere.


This list is obviously very limited. A search against ‘Antivirus Software’ will bring multiple results enabling users too choose for themselves.


Note: One company is NOT being recommended over another: the order they appear in is incidental. As said, the list is just intended to give those reading this article, and who may not have previous knowledge on the subject, somewhere to start.


As with everything where there are multiple choices and limited knowledge it can be difficult for users to make a final decision. Here are a couple of things which may help users to reach a final decision:



Most devices come with built-in, free trial, antivirus software packages. The view may be taken that if the company who built the computer consider it a reliable antivirus software package than it may be worth while sticking with them and paying for the appropriate version when the trial period ends; and/or
Have a look at what major technology retailers recommend. They are unlikely to chance their reputation by promoting a company that is suspect.

There are normally a variety of different packages a user may purchase. Naturally, dependent upon financial constraints, users should opt for the most robust they can afford. Most companies also offer packages specifically tailored for business which come at a premium and really do not need to be considered by private individuals.


Whatever the final decision it is imperative all devices have antivirus software packages incorporated.


Cleaners

Though not strictly correct in all instances the term ‘Cleaner’ is bing used to identify types of software which help clean a device from (remove) malicious malware and/or unwanted files. Only two will be mentioned here though others are available. (A search against the name of either of those mentioned below will display others in the righthand margin under ‘People also search for’.)


Malwarebytes

A scanning system that removes malicious software including some of those viruses mentioned in previous articles e.g. adware; spyware; etc. as well as fake security software. (As always, even when considering security software, care must be exercised.)


There are free and paid options available for home users as well as business solutions. (This article is aimed at the individual rather than businesses – anyone interested in the latter will need to contact the company to obtain a quote.)


Free: The free option is a good place for the individual user to start and many simply stick with this. The system complements a computers existing antivirus software.


Paid: For those looking for a more enhanced system that also covers three devices there is the Premium for Home package. Currently (March 2018) at £49.99 per annum for three devices (£16.66 each) it appears to be very good value. This also replaces existing antivirus software thereby saving the annual fee that would have been payable to the alternative company.


Instructions on how to download and use the software (for Windows) may be located within the support section. There are separate instructions for downloading to a Mac.


CCleaner

A programme designed to clean potentially unwanted files including temporary internet files which may contain malicious items (programmes, codes, etc.). As a computer ages, files and settings collect and take up hard drive space causing the computer to become slower and slower. Cleaning these files should, almost immediately, result in the device becoming faster. CCleaner will also erase browser search history and cookies (advertisers and websites tend to use cookies to track a user’s behaviour) meaning internet browsing should stay confidential. The program is simple to download and run.


Free and paid options are available.


Free: Easy to download and run. Useful for the average user who is simply looking to clear their systems from unwanted files and to improve functionality.


Paid: There are two paid options: Professional and Professional Plus.


Professional: currently (March 2018) £19.95 includes: Realtime monitoring; Scheduled cleaning; Automatic updates and Premium support. For the individual this would probably be sufficient.


Professional Plus: All that is included with the free and professional packages plus disk maintenance; file recovery; etc. Currently (March 2018) £29.95.


Note: The CCleaner service does NOT replace antivirus software.


Conclusion

It is vital all users ensure valid, up-to-date, antivirus software is installed in all devices utilising the best package they can afford.


As with anything new, care should be exercised when choosing a supplier: recommendations from established, trusted, sources may be considered along with proper research.


With both antivirus software and browsers, users should ensure they are using the latest versions. Cyber attacks are a daily occurrence meaning technology companies are/have to constantly update their system to deal with them. Using older versions may allow newer malware to get through.


Prevention is better than cure.’: Users are recommended to constantly bare in mind the need for care and awareness, especially when encountering a new site or source or downloading something from an unrecognised source.


Disclaimer 1: The writer is not a computer programmer or in any other way a computer software expert. What is shared has been learnt through limited personal experience and/or through research. Consequently, though every effort has been made, total accuracy of all the above information cannot be guaranteed.


Disclaimer 2: Neither T. R. Robinson Publications nor T. R. Robinson are affiliates of, or have any connection with (other than as a user), any of the companies or suppliers mentioned. The aim has simply been to try and help fellow users (and authors) safeguard their devices.

 •  0 comments  •  flag
Share on Twitter
Published on March 20, 2018 10:11

March 16, 2018

The Importance of Research for Writers

This is a guest post from Pamela King.

 


[image error]Introduction

Most people would agree research is essential for non-fiction work. It is obvious you must have your facts straight. How much research is necessary? Is it enough to simply check facts? Is it necessary for fictional work?


Non-fiction stories must also hold the reader’s interest. That means building your background images as much as presenting facts and developing the personalities of the characters.

In the case of fiction, your readers need clear images of time and place. If your story has a place or time, you need research to paint clear and accurate word pictures.


Example:


In the biography I am currently writing, the subject of the story grew up during the Great Depression and World War II. I felt it was important, for readers to understand what it was like in Australia and included additional detail of that time. That meant doing my research.


What research should you do?

Here are some points you should consider for your story.



Facts – getting your facts wrong will destroy your credibility as a writer. Check and double check your facts.
Images – both graphics and the images you build with your words. This applies to scenery, fashion, transport, architecture etc.
Destination history and industry – you can’t put a space age industry in a 1925 cotton farming district – unless you are writing science fiction. If your location has an outstanding historical feature or relies on a specific industry you should also be familiar with related facts.
Writing science fiction? – Having made my previous point, and this is far from my field of expertise, don’t think you can avoid research. It may have come from your imagination, but many sci-fi readers are also science geeks, so you better bone up on current scientific advancements, research, and innovation.

Where to find research resources
Internet

Google and Wikipedia are a first stop for research but don’t let them be the last. There is a wealth of information on the internet and it is growing daily.


A word of warning about Wikipedia – Because it can be updated (information added, changed etc) by anyone, its accuracy is not necessarily reliable. I recommend using more than one source to confirm your facts.


Examples:


When I was writing Angel with Drumsticks about an Italian rock band, Wikipedia, and many other websites stated the band undertook a world tour. This is incorrect and my source for the truth came from band members.


I had to research local Aboriginal history for an article I wrote. I am familiar with the topic and was surprised to read a significant event involving the massacre of hundreds of aborigines was wrongly located.


Travel and tourism websites

If a travel destination, accommodation facility or attraction does not have a website it might as well close its doors.


If you are writing about a destination the best research is a personal visit. If this is not viable, or affordable, travel and tourism websites can be valuable sources to help you develop a ‘feel’ for your setting with information and images.


Photos and images

If you are struggling to describe your characters or need some prompting, Google images can help.


Example:


Your leading lady has red hair, but you can’t imagine her other features. A simple search in Google Images for ‘red hair lady’ will return an amazing collection for your consideration.


Word of warning – many photos on Google images are copyrighted. Check if they are labelled for reuse.


The same approach applies if you need a visual image to describe a location, building, architectural style etc.


Specialist organisations including Historical Societies and Government Archives

Historical societies, government archives, libraries, and newspapers are progressively digitising their records. Here, in Australia and most countries, State and Federal Governments also make archival collections available for viewing and, in some cases, copied.


Most historical societies do not put their full collection of photos on the internet (and I don’t blame them) but you may be surprised at what they have in their archives. They usually ask a small research fee or charge for copies of images. Please remember these people are mostly volunteers caring for our heritage. Income sources like this may be their only means to continue their work.


Examples:


I needed to clarify a local term used for what is now a major arterial road in Sydney. Due to the efforts and assistance of the local historical society, I found out what road the term referred and some interesting history behind its name.


Another historical society was able to provide me with photos important to the biography I am writing.


Another great source of historical information is https://archive.org/. Many records on this site are copyright free.


Libraries – physical and online

I love libraries but, in my little town the local library resources are limited. That doesn’t mean I don’t bother them – and often.


One of my favourite websites is Trove. Trove is a website set up by the National Library of Australia containing comprehensive data on Australian resources held in libraries across Australia including books, images, historic newspapers, maps, archives and more. I am sure other countries have similar data bases.


Once I find something of interest, I print out the information, take it to my local library and they request a copy as an interlibrary loan.


If the publication or document is not available, I can request copies (within the bounds of copyright).


Example:


When researching additional information for Angel with Drumsticks, I knew a newspaper in Rome had covered the Messa dei Giovani. I was able to obtain a copy through a major library here in Australia.


People

Ask an Expert: Writers, even if not well known, can open doors by saying “I’m a writer, and I’m trying to get the facts right.” If you have a question about a police procedure, ask your local police, if you have a medical question, ask a doctor.


Example:


I needed to check information about aboriginal history and legends in my local area. I contact a couple who are Elders and Knowledgeholders of the Dharawal people and only too happy to tell me all I needed to know.


Your Friends: Let them know what you are writing about and what you are trying to find out. You may be surprised at their knowledge of the topic and resources you can access.


Problems and Distractions

It can be tempting, in the name of research, to get distracted or spend undue time on specific topics.


Example:


I discovered a memorial had been erected to a dingo at an animal reserve in an inland NSW town. The animal park had closed, and I wanted to know what happened to the memorial. I spent many fruitless hours trying to solve the mystery. It would have been a nice inclusion, but it wasn’t essential to my story and my time might have been better spent.


So, advancing the writing of my book had been hindered, or at least distracted, because of my intense interest in the secondary topic of my book; dingoes.


Filling in the Gaps

Regardless of the sources available, there will always be gaps; questions you feel need to be answered. It is hard, but we must pull ourselves back. Ask ourselves ‘how important is this information?’ or ‘can I get around it another way?’. Often there is a solution.


********************


Thank you Pamela for sharing your knowledge of and experiences in this topic. Undoubtedly this will prove a resource all will find useful, especially other authors and writers.


[image error]


Pamela King is the biographical author of some very interesting books.


For more information about Pamela and her books:


Author Interview


Pamela’s website


[image error]


 


Review


 


 


[image error]


 


Review


 


 

1 like ·   •  0 comments  •  flag
Share on Twitter
Published on March 16, 2018 10:14

March 13, 2018

What In Book?

[image error]


 


What do authors tell people when they ask what their book is about, (what is in it)?


What should authors say about their book’s content when marketing/publicising?


 


To some the above may appear to be odd questions; Of course, they know what they should be saying – can there be any doubt?


Well yes there can be.


A strange concept some have put forward is to NOT say what the book is actually about. What do they mean by that?


Their take is to focus upon how social attitudes have changed, at least to some degree, to the point a majority now simply want to know what is in a product (book in this instance) for them. What is really being pointed out is how much more self-centred people have become in modern-day society. The moral rights and wrongs of such an attitude are not under discussion here.


So what should authors be saying about their books, whether in: person to person discussions; on-line interactions; or in publicity and marketing material?


Whether liked or not, it must be accepted everyone, yes even authors themselves when considering a purchase, wants to know if a product will be of interest or use to them. That is only common-sense. No one wants to part with their hard earned money for something that is not going to meet their requirements or at least fulfil some desire or other. Consequently, to that end, it makes sense for an author to highlight aspects that may benefit or interest the prospective reader.


Now, still acknowledging the truth of the above, it merits looking at the aspect of authors telling people what is actually in the book whether it be fiction, biography, non-fiction, etc. How many of those reading this article would consider purchasing a book without some idea of what it is about? What the likely content will be? Whether it would be of any interest to them? For example: readers who favour biography may not have the least bit of interest in a science fiction story or someone who loves romance will probably not wish to purchase a book that is all about history. Just a couple of examples to help focus thoughts. Naturally, there are readers who enjoy a mix of genre though undoubtedly there will be ones they have absolutely no interest in. Unless there is some indication of a book’s content the prospective reader will have no idea if it is for them and may well simply turn away and go on to the next thing.


Logic, taking into account prevalent attitudes and desires, is to provide elements of both a book’s content and of how it may be of interest and possibly help, to a reader.


What an author decides to say about their book(s) will also have an impact upon their marketing and publicity campaigns. The majority of authors will know these are longterm activities/occupations. They cannot expect to simply make a few random statements of a book’s availability and think it will immediately hit the bestseller lists. Or, for that matter, that all readers will be aware of its existence or will want to purchase it no matter what. Most independent (indie) authors will acknowledge the excitement and anticipation they had when publishing their first book to only be disappointed that people seemed to be unaware of its existence or to show any interest in it. Therefore what is said about a book is very important.


So what do authors say about their books? What information do they need to impart? How are they to draw attention to their product? How are they to get readers interested?


Rather than just ramble on, a few examples of how some current authors go about the task will now be highlighted.


Pamela King


Pamela is currently in the process of researching and drafting the biography of an exceptional woman (now deceased) who promoted the case for Australia’s Dingos. Though this is a longterm project, anticipated at the start to take two or more years, various titbits of information (discovered during the research process) have been shared. Some are amusing while others are informative and some are personal. These certainly build anticipation and interest and give a clear indication of what readers are to expect from the eventual publication. Pamela has used her website, multiple blogs and varied social media outlets to good effect. Some examples (each link will take the reader to different posts highlighting varied amusing, informative and interesting aspects):


Main website – books page: Contains information of how some research material came into her possession.


Random Jottings blog: Pamela shares some of her own personal Dingo experiences.


Dingo Lady Blog: Specifically set up for the project and in which much is shared of the subject’s experience.


Facebook (Account for Dingo Lady): Bits and pieces from the Dingo Lady blog.


Goodreads: Besides reading and reviewing a variety of books, including ones relating to Dingos, Pamela has also enabled blog posts to be added to her profile thereby adding a further source of information for readers.


Personal Accounts: Though intended to be principally about her as an author, her interests and to share relevant topics posted by fellow members and authors Pamela does, again circumspectly, include some information about Dingos and her forthcoming book within her personal social media accounts (Facebook; Google Plus; Twitter; Pinterest).


By utilising all of the above Pamela has ensured readers are left in no doubt about the new book’s proposed content and, just as important, what will be in it for them e.g:



Increase their knowledge of the Dingo;
Understand historic attitude of Australia’s government;
Comprehend roots of existing laws;
See how modern-day attitudes toward the Dingo have changed;
Appreciate the purpose and reasons for campaigns and petitions to protect Dingos.

Note: As may be seen from her website Pamela has previously published For the Love of a Dingo which is a combination of her own and Berenice Walters (the subject of the biography) writings.


Lucinda E Clar ke


Lucinda has an ongoing fictional series (Amie) as well as a number of published memoirs. Her approach to sharing information is a little different to Pamela King’s. It is as effective but provides an example of how different authors approach the same objective.


In the Amie series (primarily based in Africa) Lucinda occasionally homes-in upon serious facts and historic practices that still impact people today. Her memoirs also highlight some serious matters.


Readers of this article need to note, though the serious side has been mentioned above Lucinda does have a great sense of humour that constantly comes through making her books very readable.


Lucinda principally uses a combination of her blog and Facebook account together with a newsletter to share up-to-date information about her books and to build anticipation.


Lucinda’s Blog: Lucinda likes to share a mixture of topics and information that will appeal to a variety of different readers with an occasionally mention of her books included. The link utilised for this paragraph is an example of a post that also contains an extract from one of her memoirs.


Facebook: Used to primarily help readers know her as an individual. However, there are occasional shares of posts and articles, notably by others, that relate to her books.


Google Plus: Used to share posts and comments about her books. Again, comprises a circumspect mixture.


Newsletter: Perhaps her most important and forthright sharing of book information. Within these monthly letters Lucinda frequently shares back stories, principally to the Amie series, as well as reader related topics and interviews. The letters are informative and entertaining and readers are encouraged to subscribe.


Naturally, details of books are also included in Lucinda’s website and her other social media accounts e.g. Twitter though she prefers to principally share new, up-to-date details and information through her blog.


T. R. Robinso n


T. R. will occasionally share information about books through social media though most is kept to the ‘Books’ page of this website and to the individual Book Landing Pages. In an attempt to incorporate both aspects of telling and not telling what is in a book and thereby hopefully meeting readers expectations and needs, landing pages use a variety of approaches: some give an idea of what is in it for the reader combining extracts from reviews to provide a fuller idea of book content as in this memoir landing page. In others, book synopsis’s combined with review extracts are used as with this biographical fiction landing page.


Conclusion

To meet present day reader desires it is probably best if authors adopt a combined approach of both telling what is in a book for the reader and of what the book is about.


The examples given above show how the regular, frequent, sharing of small portions of information, through websites, blogs and social media, help create interest, anticipation and an awareness of where the book is relevant to a reader’s interests, needs, desires., etc.


Of course, all the above require a time commitment that is always a challenge for authors.

 •  0 comments  •  flag
Share on Twitter
Published on March 13, 2018 10:11

March 9, 2018

A Personal History With Dignity by Trevor Hopeworth

[image error]


Identified as biographical fiction this purports to be an extract from a fifty-one years old woman’s diary. Without any further clarification it is difficult to know whether this is taken from an actual diary or if it has been fictionally constructed. Nevertheless, it touches on many aspects the reader will undoubtedly be able to identify with, well some if not all: hope; marriage; family; social conditions and other ‘now’ topics. It has a ring of honesty and authenticity about it and makes for a pleasant quick read (only 2,180 words).


With the busyness of modern life, readers sometimes enjoy a short, quick read that has the power to get them thinking about their own lives as well as about the social world they live in. May even prompt them to consider taking up a cause and/or help them consider ways they may be able to be a positive influence in this world.


As often commented, when reviewing short stories, this would suit anyone looking to pass time during a commute or while waiting for an appointment or perhaps something like waiting for a car repair or service.


Three stars (3*) – Not because it is not an enjoyable read but because it realistically falls within the general category. See Assessing Book Review Ratings for further information regarding how books are assessed in this website.


Available, free, from various retailers.


Smashwords.com (Formats to suit all devises including Kindle.)


iBooks


Nook


An Internet search against the book title will reveal other retailers/sources.

 •  0 comments  •  flag
Share on Twitter
Published on March 09, 2018 09:11

March 6, 2018

Computer Viruses – Trojan & Worm

[image error]
Trojan

The terms ‘Trojan’ and ‘Trojan Horse’ tend to be used interchangeably. There is no difference: they refer to the same thing. A Trojan is a form of malware.


Note: As will be mentioned a number of times ‘Malware’ is the correct ‘umbrella’ term when referring to computer viruses. However, as, colloquially, the term virus is more readily understood, both will be used throughout discussions that relate to the topic.


The name ‘Trojan/Trojan Horse’ has been adopted from Homer’s The Iliad, an ancient Greek tale that includes the story of how the Greeks gained access into the city of Troy be means of a wooden horse, within which some soldiers were hidden. It was secretive and devious just in the same manner malware is designed to be.


Trojan refers to any malicious computer programme that misleads users as to its true intent. They often look like a legitimate programme and may use the same name as a legitimate app (software application). All designed to trick a user.


Trojans are not viruses per se in that they cannot reproduce or self replicate by their own accord. Nor do they try to insert themselves into computer files. They are essentially just another type of programme that may be implanted into a computer. Trojans are rarely inserted individually but are usually downloaded along with some other virus.


What Trojans do

Note: Trojan infection is not limited to computers: other devices (smartphone, tablet, etc.) may also be targeted.


Though Trojans are not viruses in the conventional sense, they may be used to impact a devise and to collect similar information as most malware:



Obtain passwords.
Collect personal information.
Register bank and credit card details.
Control computer/device functionality.
Etc.

Trojan’s are particularly known to create ‘Backdoor’ access, enabling the person(s) behind them to control the computer/device. Though control is a Trojan’s primary purpose they also enable cyber criminals to:



See Everything. (Everything the user is doing.)
Control the computer webcam. (See the user!)
Hear everything user says. (Through speakers.)
Note the computer’s IP address.
Upload unpleasant/illegal material.
Use the computer as a proxy server. (See below.)

Proxy ServersThe last point in the above list: The cyber criminal behind the attack may, well probably will, want to access and deal with immoral, criminal, illegal, programmes and material. Not wanting to use their own computers or have them identified as the source, Trojan’s enable them, by stealing a computer’s IP address, to have the victim’s device identified as the source with the consequent dangers of law enforcement investigation and action. The Trojan can be programmed to cover its tracks so usage will not appear in the computer’s history list. Very nasty all round.


How Trojans infect a devise

As with most viruses, Trojans may be inadvertently downloaded by a variety of means:



E-mail attachments.
Text message attachments. (Mobile devices i.e. smartphones and tablets.)
App (software application) downloads. (May look legitimate but be ware if an unverified source.)
Malicious or compromised websites.
Infected software downloads. (May appear legitimate.)
Etc. (There are multiple sources a cyber criminal may use.)

Note: As already mentioned Trojans cannot reproduce or self-replicate in the way some other viruses can. Infection is reliant upon a user making some sort of mistake or visiting a malicious website.


Detecting a Trojan

Trojans can be remarkably hard to identify, especially as some of their impact may be similar to that of other identifiable malware.


Possible signs of infection:


Note: Remember some of these signs are similar to those encountered with the usual viruses. However, there are also a couple of others that are not normally encountered.



Computer acting in a strange manner.
Pop-ups appear when user not browsing the internet.
Messages (including pop-ups) stating computer infected.
Advertisement stating computer infected and offering security software.
Computer running very slowly.
Computer slows down during minor tasks.
Applications will not start.
Icons, unrelated to any program already installed, appear on desktop.
New icons appear when no new software has been installed.
Antivirus programme suddenly disabled and cannot be restarted.
Multiple advertisements appear immediately the users starts browsing.
System keeps going to a website not selected by user.
Computer operates as if someone else is controlling it.

Basically, any anomaly in the computer’s behaviour.


Worm

A computer worm is a standalone programme that replicates itself in order to spread from computer to computer. Primarily affects networked computers; mostly utilised within businesses or large conglomerates.


Note: Though this series of articles are principally directed toward individual, private, computer users it is worth mentioning computer worms because they could impact a user who has two or more personal computers/devices linked (networked).


What Worms do

Worms do not generally attempt to change computer systems or files but they do aim to:



Infect as many computers as possible, thereby damaging the network.
Create, in the same manner as a Trojan, a Backdoor into the computer enabling it to be remotely controlled.

In recent years, the function of some have been changed/augmented so that they may now also:



Attack a computer’s security systems. (Firewall and antivirus product.)

Though not designed to change systems and files, worms can cause a computer to work less efficiently because they take up system space meaning other programmes are unable to work at full capacity.


Worms may also be used to facilitate the spread of other malware (viruses).


How Worms infect a devise

Along with most viruses, worms can be inadvertently downloaded through:



E-mail attachments.
Text message attachments. (Mobile devices i.e. smartphones and tablets.)
Social Media. (Through shared images; audio and video files; messaging; etc.)
App (software application) downloads. (May look legitimate but be ware if an unverified source.)
Malicious or compromised websites.
Rogue advertisements.
Infected software downloads. (May appear legitimate.)
Connecting an already ‘infected’ external storage devise.
Etc. (There are multiple sources a cyber criminal may use.)

Once a worm has entered a network, it no longer requires any human action to spread. A Worm:



Is capable of replicating itself hundreds of times. (Includes each subsequent worm.)
Can spread from one computer to another by its own volition.
Can attach itself to an e-mail account.
Can send a copy of itself to e-mail contacts.
Frequently, also adds a Trojan to the computer system.

Detecting a Worm

Detecting a worm can be difficult. Some of the following occurrences may indicate one has entered a computer’s system:



Computer acting in a strange manner.
System freezes or crashes.
Programmes start or stop without user action.
Unusual sounds.
Icons, unrelated to any program already installed, appear on desktop.
New icons appear when no new software has been installed.
Icons or files disappear.
Antivirus warning messages.
E-mail sent to contacts without user action.

Resolution

Removing a Trojan or Worm can be difficult. In many instances it will probably be necessary to:



Reformat the system.
Carry out a full, clean, reinstallation of ALL software.

Note: Before attempting the above the computer should be disconnected from the internet and any network it is part of. Any external storage device should also be removed and, if possible, scanned separately.


It is accepted, having to take the above action is irritating but it is probably the only way to ensure the computer is completely cleared.


Note: If the type of Trojan or Worm is identified it may be possible (by searching the name or asking an antivirus company) to find specific instructions for removing it. Utilising the computer’s antivirus software scan facility may also help especially as they are being constantly updated to deal with new developments. There are also some, valid, software programmes a user may use to detect and clear a system. These will be discussed in more detail in a subsequent article to be published toward the end of this ‘Computer Viruses’ series.


Prevention

It is appreciated the following are consistently repeated within related articles but it is necessary to ensure users, for their own safety, continually bare the points in mind.



Avoid opening unverified e-mails or clicking upon links contained in them.
Avoid visiting unknown websites (includes blogs) or following links to one if it has been provided by someone not known or not from a recognised group.
Check social media sharable items are from a recognised/validated source.
Do not download software from an unknown company or source.
Do not download anything from an unconfirmed website or contained in an advertisement by unknown company or person (includes social media).
Carry out regular scans. (Antivirus software usually contains the option for both full and quick scans.)
Do regularly update software: programmes, applications, antivirus systems, etc. (New versions of malware are constantly devised and detected and most software companies update their programmes to counter attacks from them (each new virus requires a new resolution). Not to regularly update the computer software may leave it vulnerable to attack from the newer viruses.)

Roundup

Apologies for length of this article but thought it necessary to include sufficient detail to make it comprehensible.


Trojans and Worms are not conventional viruses but can impact a computer’s functionality and make it susceptible to theft of information and malicious use.


Removing these type of implants can be difficult and it may be necessary for the average lay user to obtain the assistance of a computer programmer or their antivirus software company.


As with all these issues, users should ensure they consistently follow the recommended precautions and take preventative actions.


Though worrying, and scary, users should not panic. One way or another all these issues can be dealt with, even if it does cause a bit of a headache in the meantime.


Disclaimer: The writer is not a computer programmer or in any other way a computer software expert. What is shared has been learnt through limited personal experience and/or through research. Consequently, though every effort has been made, total accuracy of all the above information cannot be guaranteed.

 •  0 comments  •  flag
Share on Twitter
Published on March 06, 2018 09:11

March 2, 2018

Goodreads – Ask the Author

[image error]

Goodreads

Just in case there is anyone who does not know what Goodreads is: In their own words:


‘Goodreads is the world’s largest site for readers and book recommendations. Our mission is to help people find and share books they love. Goodreads launched in January 2007.’


Some statistics – Goodreads currently has:



Sixty-Five (65) million members (worldwide);
Two (2) million books added;
Sixty-Eight (68) million book reviews.

It was originally, and remained for several years, an independent site but was bought by Amazon in 2013. Eventually, Amazon closed Shelfari, a competing site they had previously bought, in favour of keeping Goodreads.


Author opinions

Author opinions about Goodreads tend to be varied. Some state they do not find it very useful for marketing (selling) or publicising their books while others state they have found it useful.


Those who state they do not find the site helpful have perhaps forgotten Goodreads is principally for readers as identified by two top level statements displayed when someone visits the site: ‘Deciding what to read next?’ and ‘What are your friends reading?’ They may have also forgotten that authors really should also be readers. It is a little arrogant and shortsighted for authors to expect people to read their books without returning the compliment of reading other authors works. Professionals also argue an author cannot truly learn their craft without reading.


Those authors who state they do find the site helpful have probably realised the true nature of it and have understood it does offer additional means for them to communicate and share with readers in general and with their own readers, fans and followers in particular. Modern day readers do appear to be interested in the author as a person as well as in their writing and appreciate more direct contact than was perhaps normal in the past. This is part of the reason authors are recommend to build an author platform, especially online. This not only entails having a website and blog but also the maintaining of a social media presence. Goodreads is generally seen as forming part/being an extension of social media.


Communicating on Goodreads

Having made the above observations it is now appropriate to look at how an author may interact with readers etc. through the site:



Join relevant groups (e.g. those dedicated to genres they write in or enjoy reading);
Participate in discussions about individual books;
Share, within a relevant discussion, their writing knowledge and experience;
Publish reviews of books read;
Enable their blog posts (assuming they have a blog if not a website) to be published in Goodreads. (When published these appear under the author’s profile and a notification is sent to their Goodreads followers.)
Add information about new books. (Fans and followers may be waiting to hear.)
Watch for authors who are struggling with some concept and join in the conversation with any helpful information or knowledge they can impart.
Respond to reader’s questions. (Reader’s may raise a question within a discussion but there is also the more dedicated system of ‘Ask the Author’ the primary subject for this article: See below.)

All the above build a relationship with both readers and fellow authors. Accepted Goodreads may not be the place to gains sells but it is certainly a place to engage with other book orientated people.


Though, as already said, Goodreads is not principally an avenue for selling it does have the facility for arranging a giveaway promotion that could ultimately also result in some sells. However, that is not a subject for discussion in this article.


‘Ask the Author’

Now for the main subject to be considered: The Goodreads ‘Ask the Author’ facility. This, as implied in the label, provides opportunities for readers as well as fellow authors to ask an author whatever they wish whether it be about their books; writing habits; story idea sources; writing challenges; etc. It is certainly something authors should consider having as an additional resource for meaningful engagement.


Setting Up

First and foremost the author must have a Goodreads Author Profile. Setting one up is just as simple as setting up a reader profile. The only additional requirement is the author has a published book or one that has been added to the database ahead of publication e.g. on pre-order or with a future publication date. The system will then seek to validate the person is a genuine author. The other information required is the usual: name (Note: Name should be entered EXACTLY as it appears or will appear on book covers etc. (this includes stops, spaces, etc.). If not, the system will not be able to locate the book(s) and consequently validation may fail.); e-mail address; website/blog url (if have one – not a necessity); biography; etc. Further guidance may be located by searching ‘Author Programme’ in the Goodreads help section.


The ‘Ask the Author’ Question and Answer facility is located within the Author Dashboard. It remains turned off until the author chooses to activate it. Note: This is an optional facility and does not have to be used, though it could well prove a useful tool.


The facility may be set up to be continuously active or as a special limited time event or just simply for a designated time span. It is wholly at the author’s discretion.


Important: Before activation the author should ensure they are going to be available. It would not impress if they set it up and then are not there to answer questions.


Activation

The facility may be turned ‘On’ or ‘Off’ from the author dashboard by going to the ‘Ask the Author’ section and toggling between the on and off options.


Author’s should consider the option to add a personal message. It may help to include some idea of when they are going to be available if there are to be times when they are not. (E.g. T. R. Robinson makes clear, owing to other demands and factors, there may be a day or two delay in them answering questions.)


Author’s should also be aware, when the facility is turned off, any questions already submitted will remain in place to be answered or not as the author wishes. (Naturally, it would not be good public relations to leave questions unanswered but the decision is the author’s.)


Note: An author’s followers will NOT be notified when they turn the facility on. It will be up to them to let people know.


Answering Questions

When first activating the facility a list of readymade questions will be presented. The author does not have to answer all or any of these but it may help give visitors a feel for what to expect if some are. Additionally, some of these questions and answers may pre-empt some of the more obvious ones.


When a question is submitted the author will receive an e-mail notification. To answer:



Go to author dashboard;
Find question;
Click ‘Answer’;
Enter answer in box;
Click ‘Answer’ when sure answer is ready to be sent;
An e-mail notification will be sent to the person who submitted the question.

The question and answer will be displayed on the author’s profile and in the newsfeeds of those who follow the author in Goodreads. Questions and answers remain with the author’s profile enabling readers to view them whenever they wish.


Note: Authors do not have to answer all or in fact any questions but again it would not give a good impression to have the facility activated and to not respond.


Finding authors

How do readers find authors who are open to taking questions?



Click on the ‘Community’ tab in top bar;
Scroll down to and click on ‘Ask the Author’;
List of ‘featured’ authors as well as those the reader follows, who are open to taking questions, will be displayed;
Choose who to ask a question and click on the displayed ‘Ask’ tag;
Enter question and click ‘Ask’.

As indicated, authors do not have to utilise the ‘Ask the Author’ facility. Where they do not, their name will not appear in any ‘Ask the Author’ listings.


Authors should remember their followers, unless they have checked as indicated above, will not be notified when they turn the facility on. It will be up to them to let people know.


Readers may ‘like’ and/or comment upon an answer. Their response will be shown in both the author’s profile and in the author’s followers newsfeeds.


Conclusion

‘Ask the Author’ is a useful facility that provides an additional means for authors to communicate, meaningfully, with their readers, followers, fans and with fellow authors.


Authors should only activate the facility if they are sure they will be available to answer questions within a sensible timescale.


The facility may be used as an event or may be left permanently open. If an event, authors should ensure the open and close dates are clear.


When the facility has been turned off it would be wise to check for any outstanding unanswered questions.


Caveat: Those who truly do not like or appreciate the Goodreads site should really keep away because it is undoubted their negative and possibly critical viewpoint will be quickly detected.


*********


T. R. Robinson is open to questions: Click Here to ask.

 •  0 comments  •  flag
Share on Twitter
Published on March 02, 2018 09:14

February 27, 2018

Facebook – News Trust Survey

[image error]


 


As most users will know, Facebook has faced considerable criticism regarding the spread of misinformation as well as the prevalence of fake news items on the site. In an attempt to counteract and correct these the CEO (Chief Executive Officer – Mark Zuckerberg) announced changes are to be made to the newsfeed algorithm utilised for determining what to show to its users: see Facebook – News Feed Changes.


 




The Survey

To help with the above, Facebook also decided to survey users regarding which news sources they consider to be trustworthy. The survey consists of two questions:


Question 1: ‘Do you recognise the following websites?’


Q1 – Answer options: ‘Yes’ or ‘No’.


Note: This question principally asks if the user has heard of particular publications.


Question 2: ‘How much do you trust each of these domains?’


Q2 – Answer options: ‘Entirely’; ‘A Lot’; ‘Somewhat’; ‘Barely’; ‘Not at All’.


Participation is ONLY BY INVITATION. It is also understood, for now at least, the survey is limited to users within the USA though it may be extended to other territories in the future.


Survey Censure

Some have criticised and expressed concern regarding the nature of the survey and its potential, overall, effectiveness.


Concern 1: Several have expressed concern about the brevity of the survey stating trust in news is a far more complicated matter than may be dealt with by two short questions.


Response 1: Facebook acknowledge the issue but have stated it would be too complicated to have a long detailed list of questions that would probably confuse more than help. In addition: The survey results will be considered in conjunction with reader habits e.g. what they usually read. (Facebook already has a considerable database of each users habits.)


Concern 2: Some professionals have also commented that the matter would be better dealt with by surveying ‘experts’ rather than the general user.


Response 2: Facebook management considered the option of approaching professionals and experts for their observations but ultimately decided this would probably not provide ‘objective’ results. (Some critics said this was just because Facebook did not want to pay for ‘experts’ time and services through Facebook have argued against this.)


Note: Mark Zuckerberg also stated Facebook was ‘not comfortable deciding for itself whether news outlet is reliable.’


Concern 3: Result could be distorted by those who have partisan viewpoints e.g. left-wing v right-wing, etc.


Response 3: No specific response made. However, common sense would indicate, though, of course, there will be those who will favour a preferred site or publication, it is unlikely to be on such a scale as to overly distort the survey results.


Undoubtedly, there will be those who may have other concerns/criticisms. The above are simply some of those that were immediately expressed on a wide scale.


Survey Result Integration

These trust surveys are not carried out in isolation: they have been designed to form part of an overall reassessment of newsfeed algorithms. The aim is to enable Facebook to provide a far more relevant service. The overall intent is to help decide whether news may be considered trustworthy; informative; relevant to people’s local community; etc. (As already stated above, survey results are to be considered in conjunction with users reading habits.)


Note: News trustworthiness is a very real issue for users e.g. a recent survey in the UK (United Kingdom) indicated ONLY 24% of users trust news and information available through social media.


Of course, despite all their efforts Facebook, or any other social media source, can not guarantee though a source/site/publication has been marked as trustworthy by users, the news presented will be accurate. It would be unrealistic and outside the services mandate to expect them to be able to check the validity of each and every news item shared.


Facebook have also stated algorithm changes will not reduce the amount of news users see but will change the balance to give preference to news from sources determined trustworthy.


Those Surveyed

The purpose of this article is not only to inform readers about the survey and its content and purpose but to also request it is taken seriously by those who receive an invitation to participate (as previously mentioned, participation is only by direct invitation). Interviewees are asked to:



carefully consider each website/publication/news source they are asked about;
seriously consider/determine how much they trust information from them;
honestly give due thought and weight to the answer they give.

Though, as already indicated, there can be no guarantee as to overall accuracy and trustworthiness of news sources, interviewees responses will have a considerable impact upon how Facebook organises the algorithms they utilise for newsfeed content.


Conclusion

Though constant changes can be and are frustrating, users should be grateful Facebook is taking the issues of misinformation and fake news seriously. And also that they are involving users in the process.


There may be merits to the concerns some have expressed and perhaps there are other ways the matter could be dealt with but at least, if nothing else, this is a start. Undoubtedly, if the problems continue, which regrettably is likely considering the prevalence of cyber criminals and hackers these days, Facebook management will build upon the changes currently being incorporated.


Those who are invited to participate in the survey are asked to carefully and seriously consider the questions and their responses. The information they provide will have an impact upon all Facebook users.


It may help to read this article in conjunction with Facebook – News Feed Changes.

1 like ·   •  0 comments  •  flag
Share on Twitter
Published on February 27, 2018 09:12

February 23, 2018

A. L. Butcher – Interview

[image error]
Welcome A. L. Butcher

Author of Tales of Erana and many others.


(Links to where books may be found are at the end of this interview.)


Note: Alexandra prefers to utilise a mix of her book cover images etc. in place of an actual profile photograph. (She is not alone.)


Please tell us a little about yourself.

British-born Alexandra Butcher (a/k/a A. L. Butcher) is an avid reader and creator of worlds, a poet, and a dreamer, a lover of science, natural history, history, and monkeys. Her prose has been described as ‘dark and gritty’ and her poetry as evocative. She writes with a sure and sometimes erotic sensibility of things that might have been, never were, but could be.


Alex is the author of the Light Beyond the Storm Chronicles and the Tales of Erana lyrical fantasy series. She also has several short stories in the fantasy, fantasy romance genres with occasional forays into gothic style horror. With a background in politics, classical studies, ancient history and myth, her affinities bring an eclectic and unique flavour in her work, mixing reality and dream in alchemical proportions that bring her characters and worlds to life.


Her short novella Outside the Walls, co-written with Diana L. Wicker received a Chill with a Book Reader’s Award in 2017.


What first inspired you to write?

I’d been writing short stories, poems and role play game adventures for some years. I’ve written poetry and shorts for as long as I remember. The first novel was born from ideas for a game, a world I’d been creating for something else and grew as the work went on. I’d wanted to write a novel for a while, but I did need a lot of encouragement to publish it.


In what genre(s) do you prefer to write?

Mostly fantasy and fantasy romance but I also write poetry, short stories, horror and erotica.


How/Where do you get the ideas for your stories?

2 am in bed, in the bath…. Seriously though I often get them when I don’t want them or can’t do much about them. They just pop into my head, often spurred by random things.


Are you working on another book?

Of course. Currently, I am working on book IV of the Chronicles, a couple of short stories, two novellas and making notes for various other projects.


If your books have required research: What do you consider the best resources?

The internet! Best invention in the history of humanity (well except the wheel, electricity, sanitation, vaccines, modern medicine…). The short stories don’t often require much research, but the novels and novellas have involved me researching herb-lore, swamp flora and fauna, the air-speed velocity of dragons, some chemistry, historical battles, medieval weapons/armour, poisons, Roman and medieval cuisine, whether salamanders are edible, and mythology. I have a background in politics, sociology, classics and mythology so much of it was an expansion of this. I have various books on mythology, history and true crime all over the house so have resources to hand. Internet-wise Wikipedia is a good starting point, and Google is my friend. Mythic Scribes forum is a great place for fantasy resources, and there are several blogs I follow with useful info. Culpeper’s Herbal is handy for herb-lore.


I read a lot of history, crime, mythology and fantasy and the bibliographies can be a good writer resource. But I’ll say it again – Google is your friend.


Do you consider your books convey messages to readers?

The novels feature particular groups of people (elves and mages) being oppressed simply because they ARE elves and mages. There is a dubious historical reason but after centuries no one really remembers the specifics. So I guess there is a message about racism and hatred for the sake of it. Elves are much the same as the humans – they love, they fear, they cherish family and what is left of their culture and when it comes down to it they aren’t very different. There is also a message about ignorance – ignorance is dangerous. Blindly believing what the forces in power tell a person to believe is dangerous. That is how repression and tyranny become the norm.


Freedom is precious and worth fighting for, and love will conquer all.


What advice would you give to authors who are just starting out?

Write what YOU want to write, not what might be popular today.
Research the FAQs and TOS of the publishing sites (Amazon, Smashwords or where ever). Seriously. It’s not exciting but it is very useful. It never ceases to amaze me how many new writers publish on Amazon (for example) not having understood the contract, the royalty system, and the fact that Amazon does not market their book. There are always scores of newbies complaining that they are being ripped off, or their book is blocked because they didn’t take the time to learn the rules.
Research what you need for your world. I write fantasy which gives me scope to come up with some weird stuff or bend the rules with magic but a sword still hurts if it pokes in you; gravity still works; a horse can’t gallop all day; a person can still only travel so far on foot. If you decide to fiddle with reality as the reader knows it then prepare to back that up. I don’t necessarily mean you need to go into specifics about how your star drive works, or exactly what magic is doing to the space-time continuum but do keep it consistent and believable (to a degree).
Don’t expect the reader to know what you know about the world or the characters. Some explanations are needed. Work on that character building, and world building.
Bad reviews happen. Deal with it. Not everyone is going to like your work. Do you think every book you read is wonderful? Nope. So why should Joe or Joanne Reader necessarily think your work is the bee’s knees? You can’t please everyone – there will be too much sex/violence/romance/teen angst/vampires/description or not enough in the same book for two different readers. Sooner or later someone isn’t going to like your precious and that’s fine. Move on and celebrate the next person who does. Don’t reply to reviews and never ever argue. That will do your reputation far more damage than a couple of one-stars on Amazon.
Read. A lot. All the time.
Learn the craft. Take a course on grammar, creative writing, world building etc. There are loads of style and writing guides available and some are cheap or free. There are plenty of low cost or free courses.
Write because you can’t not.

Do you self-edit or do you think a book should only be professionally edited?

I self-edit for the short stories, but the novels I do hire an editor. I suppose it depends on your own skills. I think with editing you have to be more impassive and impartial – look for the flaws and errors, be picky and notice what doesn’t work (and what does), and of course be good at English. Many authors are able to self-edit, many aren’t. I do think it’s not always easy to see the errors in one’s own work. Personally, my brain sees what it thinks SHOULD be there, not always what is. I usually edit slightly as I go for obvious things, but once finished I will put the story aside for a while and work on something else. That will clear my brain so when I re-read I will hopefully spot issues. I’ll do several passes. I also have another couple of writer friends who will help, as I do for them.


An editor is a good resource, but often outside the budget of many, so ask around on forums and social media. Someone might be willing to help at a low cost, reciprocal work or beta read because they enjoy it. This is not ideal, but it is a start. I found my editor through another writer who had used her, and I know a few more now so I have maybe half a dozen options.


Even edited work contains issues (the last two books I have read have contained multiple errors and were traditionally published). Keep this in mind.


How do you go about marketing your books?

Marketing is the hardest aspect for me. I don’t like being pushy. It’s also one of those hit and miss things – what works for one person might not work for the next. Personally, I use blogging, Facebook, Twitter and a few other social media sites. I think Twitter and Facebook are useful. I am always open to trying new ideas. I use this site quite a lot  https://www.nnlightsbookheaven.com/ and it’s very good value.


Goodreads is not the best resource for authors. It’s useful to add one’s books and for reviews but it is primarily a readers site. There are a lot of the forums that do not allow author promo and a lot of readers who really don’t appreciate it.


How important do you think reviews are?

That depends. It has to be remembered reviews are JUST a person’s opinion of a product. People have their own prejudices and ideas about what a story should be like – it can’t be helped – and if the story isn’t that many people leave an unfavourable review. That said many people do read reviews – looking for similar opinions, or getting some idea of something they aren’t sure about.


Take a look at reviews for Fifty Shades of Grey – they range from being the best book in human history to the worst. Personally, I don’t like the books at all but many folks do, and whatever else can be said about the trilogy, they have made reading erotica more acceptable. Anyway, my point is a book can have a multitude of reviews from one star to five and so it’s hard to judge on reviews alone. There is also the fact that the majority of readers don’t leave a review.


Do I review? Yes, mostly but not all. But I review for myself, to remind me about a book and because I like discussing books. Do I read reviews – not often, at least not for books. I do for other products.


If you consider reviews important, how do you go about obtaining them for your books?

Part one of this see above. Part two if I knew the answer to that I’d have more…


Do you have a preferred genre for when you read?

I read a lot – fantasy, sci-fi, true crime, historical, classics, historical fiction, mystery (usually historical), books on language and words, mythic. I don’t tend to read romance, religious, or biographies.


This is an age old question but one I consider of interest. If you were stranded on a desert island, which three books would you like to have with you?

Only 3?


Complete Works of Shakespeare (maybe that’s cheating).

Lord of the Rings Trilogy

Count of Monte Cristo


Please share with us links to where readers may obtain more information and insight into who you are.

Library of Erana Blog


Amazon Author Page


Smashwords Author Page


Facebook Author Page


Twitter


Goodreads


Thank you Alexandra for sharing your considerable knowledge and experience with us.

[image error]


Alexandra’s book ‘Tales of Erana: Myths and Legends’ has been reviewed in this website.


Review

1 like ·   •  0 comments  •  flag
Share on Twitter
Published on February 23, 2018 09:14