Update: Work has been completed and the main level has reopened.
We are having new carpet installed on the main level of the library starting Monday, May 13th. The main level will be closed while carpet is being removed due to dust and noise. We will reopen the main level as soon as we are able to do so. While the main level is closed, you can access the library through the Lower Level entrance.
From Saturday May 11th to Sunday June 2nd the library will have Intersession Hours. Hours are as follows Monday – Friday 9-5, closed on Saturdays and Sundays. We will open with summer semester hours on Monday June 3rd.
With so many resources at the library, it’s impossible to know about all the awesome and unique collections available. So, we’re highlighting some of our favorite lesser known collections in our Hidden Gems series. These are collections that are tucked away in larger library resources that you may not know exist.
This installment of the hidden gems series also comes from the HeinOnline legal database, and would be of interest to researchers of women and gender studies, history, sociology, anthropology, public policy, etc. To access these works, go to the HeinOnline database, and choose “Women and the Law (Peggy)” under the Browse Database by Name menu.
This collection brings together books, biographies and periodicals dedicated to the role of women in society and the law. This unique collection of materials provides a convenient platform for users to research the progression of women’s roles and rights in society over the past 200 years. Also included are more than 70 titles from Emory University Law School’s Feminism and Legal Theory Project which provide a platform to view the effect of law and culture on women. This valuable resource for women and gender studies, history, anthropology, and sociology contains over 2,000 titles with almost a million pages of information on these topics. Some of the subtopics or subjects include abortion; the feminism and legal theory project; legal rights & suffrage; women & education; women & employment; and women & society among others.
We hope that these last few days of the semester are going well. We realize that once your last final is complete, you may be packing a bag and heading off to places near or far. Your adventures may include locales where languages other than you own are spoken. If that’s the case, or if you are just interested in sitting on your couch and learning a new language, we’ve got you covered.
You may be wondering, “But how, Brookens Library Blog? How can you possibly help me with this?!” to which we reply, “You have access to a tool called Mango Languages.” Mango Languages is an online culture and language-learning resource that’s available to you 24/7 online or through their mobile app. So go now, visit the Mango Language site , create your free account, and start tracking your language-learning progress today.
In basic terms, network security can be defined as preventing and protecting the hardware/ software in your network from unwanted intrusions by outsiders. Without network security, you could experience malfunctions, modifications, misuse, and destruction of your computer. That’s why there is an immense importance in making sure that your network is safe and secure to avoid unwanted intruders from accessing your information.
Using a VPN
One way to protect your network activity is to utilize a VPN, or Virtual Private Network, on the network that you are using. A VPN works by connecting your device to a reliable server somewhere else which allows you to use that server’s internet connection. VPNs are especially important in protecting you from snooping on untrustworthy wifi in public spaces by encrypting your data from those attempting to access your network.
Free VPNs may not be the best tool in keeping your data secure or even keeping your data as safe. Some have very laid back privacy policies that do not guarantee their services are 100% safe. One that we recommend is Proton VPN which has consistent speed in most locations and a built in kill switch that protects your privacy if there is ever an issue.
Tor browsing allows you to browse privately without the thought of you possibly being tracked and surveilled. Tor makes it so that each website you visit is isolated so ads and third parties aren’t able to track your browsing. Within Tor, you are protected from any monitoring which means someone who’s watching what you’re doing will only know you’re using Tor and not the websites you visit. If interested, more information can be found at Tor Project which is a group hoping to inform people about Tor and how to use it.
Internet browsers have undoubtedly become more and more functional and easier to use as they’ve developed over time. Unfortunately, in many respects this has come at the cost of the privacy of the user’s information and the security of their browsing sessions, at least this is the case with many browsers’ default settings. On the bright side, between changing your browser’s settings and adding a few helpful extensions, you can greatly increase the privacy of your browsing habits both from companies seeking your information for advertising purposes and from potential snoopers on your network.
Main settings to change:
Disable third Party cookies.
Enable clearing cookies on exit.
Disable flash as automatically being allowed on websites.
Disable Java as automatically being allowed on websites.
Change default search engine – consider duckduckgo.com for privacy.
Ublock Origin – Prevents most ads and tracking networks. Works faster and better than the popular Adblock Plus or Disconnect.
HTTPS Everywhere – Automatically switch to secure TLS connections when supported. This helps protect against surveillance of the content that you’re browsing, though not which websites you visit. That is, unless it is mixed with a VPN or Tor browsing session.
Privacy Badger – Detects attempts to track your browsing behavior and blocks content from these trackers.
We often don’t bother to pay attention to the small, unnoticeable camera that stares back at us every time we open our laptops or smartphone. For many of us, the camera takes a backseat when it comes to more important things like taxes, Netflix, and late night assignments. However, the reason we should start being more aware of this tiny eye we constantly expose ourselves to is because it isn’t that difficult for potential hackers to watch you through your own camera, and they can do so while generally going undetected by disabling the light on the camera.
Though this thought may be unsettling, there are proactive measures that you can take to prevent yourself from being unknowingly spied on.
For Windows 7 Computers:
Go to the Start Menu
Search for “Device Manager”
Select imaging devices, and find the driver that matches your webcam.
Right click the device, and select disable driver.
Select “Yes” when prompted if you want to disable the device’s driver.
For Windows 10 Computers:
Go to the Start Menu
Select the Settings icon
Search for “Camera Privacy Settings”
Edit which apps you want to be able to access your camera, or deselect the option for apps to access your camera at all.
For Mac Computers:
Go to the Apple menu
Select System Preferences
Click Security & Privacy
Select the check-boxes next to the apps you want to have access to your camera, or deselect all check-boxes if you don’t want any apps to have access to your camera.
Check out Objective-See’s free utility: OverSight. OverSight monitors when your microphone and webcam are being activated and will issue a push notification telling you when they are and what application/process is accessing them.
The library will have webcam covers available at the front desk in honor of Choose Privacy Week.
Smartphone Security for Privacy
On more than one occasion you have probably given apps like Snapchat, Twitter, or Facebook more information about you than you think. These apps are able to access our camera, microphone, contacts, location, and more. One way we can guarantee apps aren’t wiggling their way into our private life is to analyze the access settings that we give them. Access settings allow you to see and edit what permissions are enabled for each app on your phone.
If you want to change access settings on an Android phone:
Head to the settings menu on your smartphone. On the screen you should see Apps which is where you want to go.
In apps, there will be three dots in a column in the right-hand corner where you will find App permissions.
App permissions will bring up a list of different options where you can find different apps and turn off whatever they have permission to do.
If you want to change access settings on an iPhone:
Head to privacy in the settings menu.
In privacy, you will be able to see location services which tells you which apps have access to your location. This can be turned off but may affect some apps that use location like ride share services and maps.
If you scroll to the bottom, there’s advertising which allows you to turn on limited tracking by advertisers
Within privacy, you can select apps and disable their access to your information