Reverse Image Search with Google

Did you know you can search a picture? If you ever wanted to find out information about an image, you can use Google’s “Reverse image search.” Google can then find related images and tell you what websites are hosting them. Images of a place can lead you to a more specific location. If your image contains people, it may pull up their social media profiles to tell you more about who they are.


There are two easy ways to search your image. If it’s a file on your computer, you can upload it to Google. Go to and click the camera icon in the search box. Click “Upload and image” and then “Choose file.” Select the file from your computer.



If it is on the web, you can right click and search for it if you are using Google’s browser, Chrome. Right click on any image you see on a website, click “Search Google for this image” and a new tab will bring up your search results.

Click to enlarge

Google Drive Collaboration Cheat Sheet

Even if you have been using Google Drive for multi-user collaboration since the day it came out, there is always more to learn. Below are a few tips and tricks I learned while researching the topic for a complete (but quick) guide to Google Drive Collaboration for Attorney at Work:

Using an Existing File to Share

If you upload a Microsoft Office document to Google Drive it automatically converts to a Google document,  sheet or slides (unless you are using the Office Editing for Docs, Sheets & Slides Chrome extension), but it can be downloaded to a .docx format when you are finished editing (go to the File menu and select “Download as” to see all of the options).  If you have a Microsoft Office document that is heavily styled or formatted, though, you will likely lose some or all of the formatting.

Turn on Sharing: The Invitations

If the invitee does not have a Google account she will be invited to create one. One wrinkle: If the invitee does have a Google account, but you used a different email address when inviting her to collaborate, she will need to request access to the document from the email associated with her Google account.

You might not want everyone to have editing rights. You can choose to give invitees edit capability, comment-only, or view-only rights. No matter what level of editing rights they have, they must log in to access the documents. If you click on the (tiny) “Advanced” link in the sharing dialog box you will see more options, such as “Prevent editors from changing access and adding new people” and “Disable options to download, print, and copy for commenters and viewers.” Toggle these on and click “Save changes” to further refine user rights.

Multi-User Editing

Once you have established permissions and invited collaborators, invitees can open the document and begin typing. If several people are in the document at the same time you will notice that their identities will appear at the top of the document as avatars. You can have real-time chat by clicking on the speech bubble icon next to their avatars. You can follow changes made by other users in real time, too, because each user is associated with a color. You can see a colored cursor with their name hovering over it, as their edits appear. If you want to see the last place another user edited, just click on their avatar and to jump to their last edit.

Comments and Suggestions

Like MS Word, comments are preserved with the document. Clicking on a comment in the comment pane will take you to the place in the document the comment references. Users in the document can respond to comments by clicking on the comment box and typing in the “reply.” Once a comment has been responded to and users want to dismiss the comment, simply mouse over the comment box and click the “Resolve” button that appears there to remove the comment thread and archive it. Resolved too soon? Click on “Comments” at the top of the screen, scroll to the closed thread and click to “re-open”.

Much like the Review features in Microsoft Word, Google has “Suggesting” (equivalent to Word’s Track Changes feature).  In the upper right, in the same toolbar as the editing features (like bold, italics, etc.) click on the arrow next to the pen icon and choose “suggestions”. Now, changes will show inline on the document, color coded to the user and also appear in the Comments pane on the right side of the document. There is no accept all/reject all workflow, instead users must accept or reject each change. Users with Comment-only permissions can make suggested changes to the document as well, though only users with edit rights can accept changes.

If you upload a Word document that already has tracked changes, those tracked changes will be converted to suggestions in the Google document. Likewise, suggestions in a Google Doc saved back to .docx and opened in Word will appear as tracked changes.

Version History

One last useful feature to mention in Google docs collaboration is the Revision history. Go to File – See revision history to open a panel that shows all edits and revisions to the document and who made them. You can click on the timestamp in the right panel to see previous version of the file and revert (restore) to previous versions. Restoring to a previous version doesn’t eliminate any versions, but merely moves it to the top of your revision history.

If you want to just see new changes since you last opened a document click on “See new changes” from the File menu. Like versions, added text is highlighted, and deleted text has a strikethrough. This feature is only available for docs.


Google Drive for collaboration with multiple people is as simple or as sophisticated as you need it to be. It reduces reliance on email, addresses version control and is a great way to get a project started.

Customize Chrome Start Pages

If you are using Google’s Chrome browser for the desktop (and why wouldn’t you?) did you know you can have it open to whatever page – or pages – you want? If you like to see your Gmail when opening the browser in the morning or headlines from Crain’s or the weather for the day you can set Chrome to open one or many pages to get you going. Or, perhaps you would like to continue where you left off from the previous browsing session? Read on to learn how!

By default the Chrome start page (the page Chrome shows you when you launch the browser) shows the Google search bar and thumbnails of the websites you most frequently visit. However, you can change that to open any page or pages that you want.

Click to Expand

Open Pages on Start in Chrome


To set the browser to open a specific page or pages when you launch you will need to be signed into Chrome. Then in the top right corner click on the Chrome menu (three horizontal lines stacked on each other). Click Settings – On Startup – Open a specific page or set of pages. Then click “Set pages” and enter the web address of the page(s) you want to see when you open Chrome. Then click “OK”.


Click to Expand

Continue Where You Left Off in Chrome

If you would like to see the last tabs you had open before you closed the browser click on the Chrome menu in the top right and then click “Settings”. Under “On Startup” select “Continue” where you left off.  If you allow cookies to be saved you will still be logged into any websites you were visiting before. If you do NOT want to be automatically signed into these pages in “Settings” go to “Show Advanced Settings” and under “Privacy” click “Content Settings”. Under the “Cookies” section choose “keep local data only until you quit your browser” and then click “Done”. When you close your browser you will be logged out of all the sites you were logged into. This is a good security measure, especially if you share you computer.

In addition to the start page, Google’s Chrome also has a Home page you can enable and customize. This is located next to the left of the address bar. In “Settings” go to “Appearance” and check “Show Home button” and below that click “Change” to choose your homepage.

Finally, the Bookmarks Bar in Chrome will link you directly to your favorite sites. When adding bookmarks click on the star icon in the address bar then choose “Bookmarks Bar” from the drop-down menu. You can add folders (and subfolders) to the bookmarks bar too! If you want to add a bookmark or folder of bookmarks just go to the Bookmark Manager (CTRL + Shift + O in Windows; CMMD + Shift + 0 in Mac) and drag and drop the icon or folder into Bookmarks Bar.  Be aware you have limited space in the Bookmarks Bar so choose wisely. If you can’t see the Bookmarks Bar go into “Settings” and under “Appearance” choose “Always show the bookmarks bar”.

Bookmarks Bar in Chrome

Bookmarks Bar in Chrome

Disaster Planning: Turn Off Email Address Autocomplete

February LPMT Tech Tip

Headline after headline after headline reveal attorneys suffering disaster because of mis-sending email. While slowing down and paying more attention can help, turning off some of the convenience features built into email applications can’t hurt. In MS Outlook (2010 & 2013) go to File – Options – Mail – Send Messages and uncheck “Use Auto-Complete List to Suggest Names when Typing in the To, CC, and BCC Lines”.






Then click on “Empty Auto Complete List”.

autocomplete button





If that seems a bit too nuclear you can selectively remove old or easy to abuse AutoComplete email addresses that appear in email by clicking on the X next to the name that appears. This will clear it from your auto-complete list.removefromlist






If you use keyboard shortcuts like <Cntrl + Enter> to send an email you can turn it off. Why? Because this method  is so quick that it can be dangerous! You can turn off that shortcut by unchecking the option box, which appears in the same options menu as turning off AutoComplete. Now you won’t be able to create a disaster in the blink of an eye.






For Gmail you must delete individual contacts for them not to show up in AutoComplete, though you can go to Settings and choose to add contacts youself instead of the default “When I send a message to a new person, add them to Other Contacts so that I can auto-complete to them next time”.



There are other remedies for common mistakes like the “Reply All” monitor from Sperry for MS Outlook or Google’s “Undo” option in Labs (which can also be done in MS Outlook and is actually just putting a short delay on the “send” time). However, the main way to having embarrassing, costly or worse things happen from misuse of email is just to slow down on the send button.


Email Encryption For Everyone

The recent confirmation that the US government, through the NSA’s PRISM surveillance, collects massive amounts of electronic data is really only the tip of the iceburg when viewed in light of all of the potential exposure email has to unauthorized access. From hackers to governments to law enforcement to targeted espionage to identity thieves, there are many who may want to access and view your email and its attachments.

Depending on the type of client you represent and the work you do unencrypted email exchange may not provide enough protection for confidential communication. The ABA’s formal opinion from 1999 on email encryption (99-413) generally allows for use of email to communicate with clients, but also provides the caveat that “when the lawyer reasonably believes that confidential client information being transmitted is so highly sensitive that extraordinary measures to protect the transmission are warranted, the lawyer should consult the client as to whether another mode of transmission is, such as special messenger delivery, is warranted..”

Much has changed since 1999. Commentary in the opinion states: “[t]he Committee believes that e-mail communications, including those sent unencrypted over the Internet, pose no greater risk of interception or disclosure than other modes of communication commonly relied upon as having a reasonable expectation of privacy. The level of legal protection accorded e-mail transmissions, like that accorded other modes of electronic communication, also supports the reasonableness of an expectation of privacy for unencrypted e-mail transmissions. ” Read in light of the known, legal interception of email transmission by the government and the increased use of webmail services that offer free service in exchange for access to the text of the email is it still reasonable to rely on an expectation of privacy and legal protection of email transmissions?

There are a variety of ways to encrypt email communications. For large firms working with corporate clients, firms representing governments, lawyers representing political prisoners and other circumstances may require an end to end encryption solution such as PGP to be set up and used by both parties. Once in place the process is relatively seamless. Lifehacker provides a great guide on end to end encryption for email clients and webmail..

However, lawyers who work with consumer clients including estate planning, family law, bankruptcy, criminal, real estate, civil rights etc. may not have a long term relationship with their clients or have the level of sensitivity in the communication that warrants a long term encryption key exchange. For those situations attorneys can still encrypt email on a short term or case by case basis by using some of the “on demand” email encryption options available. These tools are often free for limited use and while they do not provide the level of protection afforded by traditional email encryption they do provide some peace of mind. The article Easy Encryption for Email is Not an Oxymoron provides information on three such services that employ different models for protection. To see these easy encryption options in action check out the How To… video from the Chicago Bar Association’s LPMT.

Power up the free Google Calendar

There’s plenty to take advantage of in the free Google Calendar—features like creating and sharing multiple calendars, “quick add” smart appointments and the ability to make calendars public. In this article I dig in to unearth a few neat tricks to integrate your Calendar more tightly with Gmail and Tasks. With some exploring and clicking, you will find the free Google Calendar and productivity tools are quite robust, and with a little know-how, have more integration than meets the eye. Check it out … 

Want more? Watch the training video from the Chicago Bar Association and check out these articles and resources:

Chrome: The Browser That Works

Google’s Chrome web browser is a stable, fast, and functional piece of software used to access the Internet.  For many years Microsoft’s Internet Explorer dominated the browser market, followed by Mozilla’s Firefox.  Google released Chrome in September 2008, and now its usage has surpassed Firefox and Internet Explorer globally.  However, Internet Explorer is still the leader in North America according to StatCounter Top 5 Browsers in North America from Sept. 2008 to Oct 2012. This especially holds true for U.S. lawyers, who according to the 2012 ABA Legal Technology Survey Report Vol. II,  primarily use Microsoft Internet Explorer at 85%, followed by Firefox at 30%, and finally Google Chrome at 22%. So, what does the rest of the world find so appealing in Google’s Chrome? Let’s take a look!

Read more: Google’s Chrome Browser

Layering Security: Two Factor Authentication

“In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.”

Thus starts the story of Mat Honan, a writer for Wired Magazine. Mat’s story should be a cautionary tale for all, especially lawyers whose duties to maintain the confidentiality of client data extend the need for added security beyond just personal inconvenience.  Mat admits that much of what happened could have been avoided by using two factor authentication on his Google account and other security measures.  So, why didn’t he do it? Because adding layers of security means adding a layer of complication, and sometimes inconvenience. However, to unravel from a firm security breach or hack would be even more inconvenient.

Google’s Gmail, Google Chrome, LastPass, Dropbox, WordPress and many other popular services have added an extra layer of security that a user must enable called “two factor authentication”.  The concept of this security is that a person cannot access another user’s account without something she knows and something she has. In the case of these popular services the solution is a strong password plus a secondary code that is sent via text to a smartphone or mobile device.  Both are required to access the account. For two factor access to laptops there are devices like USB tokens and smart cards that must be plugged in for the machine to boot up. Likewise you can buy external biometric security devices, such as a fingerprint reader, which is a substitution for what the user has to what the user is.

The SANS Institute OUCH! newsletter this month provides further information and links on two factor authentication for popular online services. When enabling two factor authentication make sure to read all the instructions carefully. Matt Cuts blogs for Google on how the two factor authentication works with Gmail, and dispels some myths about any perceived difficulties this may add to accessing your email.

Want to learn more about security best practices for your law firm? Sign up for the CBA CLE (1.5 IL PR Credit)  “Lighting the Corners: Security Best Practices”  in person or webcast on November 20 at 12 CT.

Directory powered by Business Directory Plugin