May - ICON Computer Users Group
Transcription
May - ICON Computer Users Group
THE ICON-Newsletter of the Interactive Computer Owners Network MAY 2012 WHAT’S INSIDE Page May & June Program Schedules ………. 2 Interesting Sites to………… 3 Visit on the Internet Computer Terminology Windows Q & A p6 continued from last month ……………. 4 Windows Q & A …………… 5 Computer Tutor - SD Cards 6 Keyboard Shortcuts and Symbols…………………….. 7 April 14 Minutes ………..…. 8 FBI: Computers May Lose Internet on July 9 ..…….. 9-11 Memorial Day Wordsearch…………………...…..11 Time 3…………………….... 12 Accessing 1940 Census ... 13 Help Line Answers…………14 Cards Sent Basis Computer Classes ICON Membership ……….. 15 Applications ICON Officers, New Members & Renewals Announcements…………….16 Prez Sez: Here we are again, more computer / internet malware issues. As I write this Sophos Naked Security has reported that more than 1 in 5 Apple Macs ‘harbor’ some sort of malware (http:// nakedsecurity.sophos.com/2012/04/24/macmalware-study/). According to the article, this does not mean these computers are infected but that they have malware on them than can be transferred to another computer. Surprisingly, most of this malware would infect Windows computers, or Macs that use Windows. The article is interesting, I suggest you read it and share it with your “Mac Friends.” You might enjoy the comparison of rates of malware on Macs to rates of infection of a sexually transmitted disease. Oh my, zillions of computers will lose access to the internet on July 9, 2012! Or so some of the emails going around would have you believe. Yes, it is possible some computers may lose access to the internet on/about that date due to a specific virus infection (for more see: http://nakedsecurity.sophos.com/2012/04/25/internet-doomsdaydont-panic/). For more details as well as some instructions on how to check your computer for the malware, go to the FBI’s partner website for the “Domain Changer Working Group” www.dcwg.org. This website will allow you to test your computer as to see if it is infected and also provides advice on how to clean your computer. You will probably find this website to be very slow as it is being hit pretty hard these days so be patient. Remember, the best solution is to have up to date antivirus software installed and to (a) keep it up to date and (b) run a full system scan at least weekly. How this last part is done varies by software manufacturer. Also, the ‘free’ antivirus that came with your new computer may have expired if you are beyond the free trial period (normally 60-90 days) so you’ll need to either replace it or purchase a subscription. If you don’t want to pay, there are many free antivirus products available. These are just two of the recent ‘scares’ that have come out in recent weeks. There will be many more over the next few months as well as articles on malware infecting smartphones and tablets. If you have one of these devices you’ll need anti-malware software installed on them also. Just as for your computer, there are free and paid malware solutions for smartphones and tablets and their effectiveness varies. Research, research, research...that’s the answer. This will be my last article as ICON’s President. I’ve enjoyed this past year in the position but other obligations prevent me from carrying out the duties of President so I’m stepping aside. By the time you read this there will be a new slate of officers to carry ICON forward. I’ll still be at the meetings and will occasionally write an article for the newsletter in order to ‘keep my hand in.’ —Art Irish THE ICON May 2012 PAGE 2 Program Preparations for May 2012 Saturday, May 12, Brentwood Library 10:30 a.m. Digital Media SIG — Slide Shows with Sound (PowerPoint, Windows Movie Maker, Irfinview) 11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk 12:30 p.m. General Program — What’s in the Cloud? 1:45 p.m. General Membership Meeting 4:00 p.m. The Library Station (Frisco Room) Using the Linux Operating System Tuesday, May 15, The Library Center (Harrison Room 10:00 a.m. Open Group Discussion, BYOQ (Bring Your Own Questions) Saturday, May 19, The Library Center (Harrison Room) 3:00 p.m. Using the Linux Operating System Saturday May 26, The Library Station, (Story Hour Room) 10:30 a.m. Genealogy SIG — Aids to Family Research 11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk 12:30 p.m. Windows SIG — Windows 7 Tutorials — Devices and Networking, Windows Security 1:45 p.m. Advanced Technology Forum — Open Group Discussion Program Preparations for June 2012 Saturday, Jun 9, Brentwood Library 10:30 a.m. Digital Media SIG — Converting VCR Tapes to Digital Format 11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk 12:30 p.m. General Program — Using an Extra Hard Drive as an External Drive or For Backup 1:45 p.m. General Membership Meeting 4:00 p.m. The Library Station (Frisco Room) Using the Linux Operating System Tuesday, Jun 12, The Library Center (Harrison Room 10:00 a.m. Open Group Discussion, BYOQ (Bring Your Own Questions) Saturday, Jun 16, The Library Center (Harrison Room) 3:00 p.m. Using the Linux Operating System Saturday Jun 23, The Library Station, (Story Hour Room) 10:30 a.m. Genealogy SIG — To be announced See ICON website www.iconusersgroup.org 11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk 12:30 p.m. Windows SIG — Windows 7 Tutorials — Printing, and Backup and Troubleshooting 1:45 p.m. Advanced Technology Forum — Open Group Discussion THE ICON May 2012 Interesting Sites to Visit on the Internet Nancy Preffitt ICON Member ngpreffitt@juno.com These sites are all from old articles I wrote in 2005 and 2006 so some of them may be familiar to you. I had to restore my entire backup drive on my new computer to get last year’s tax form since I couldn’t find it in the lists. These old articles were an interesting bonus! Doo Wop Horses Wait for the entire screen to load up with all four horses and a fence in front of them. Then click on each horse. Make sure your sound is on. Re-click on any horse to make it turn off or turn it back on again. Somebody did some real wizardry of programming to coordinate this! Try clicking on the horses from left to right then right to left then just one or two at a time... Its fun and a good stress reliever. Have fun! Do them in random order for some weird songs. http://svt.se/hogafflahage/ hogafflaHage_site/Kor/hestekor.swf Cybertimes Navigator For more than 10 years, the Newsroom Navigator has been used by New York Times reporters and editors as the starting point for their forays onto the Web. Its primary intent is to give the news staff a solid starting point for a wide range of journalistic functions without forcing all of them to spend time wandering around to find a useful set of links of their own. The list is by its nature highly selective and constantly changing. http:// tech.nytimes.com/top/news/technology/ cybertimesnavigator/index.html Get a REAL Person Rather than wasting a whole day trying to get to a human being at a large corporation, try this useful site, created by Paul English. It has an alphabetical list of big companies and tips on how "to find a human". I could have saved 54 minutes the other day if I’d known about it then! http:// www.paulenglish.com/ivr/ THE SENSES CHALLENGE Put your senses to the test with this challenge. The twenty questions will not only test your PAGE 3 senses, but what you know about them as well. See how well you do! It’s fun, but harder than you’d think! http://www.bbc.co.uk/science/humanbody/ body/interactives/senseschallenge/senses.swf Lena Games I’m not sure that I’ve ever written about this one, but it’s a long time favorite of mine. There are a variety of shareware games on the site. Big Jig is one, but the difference is that there is a new FREE puzzle every week. The old one goes away every week, so you must remember to visit. I’ve got a collection of over a hundred puzzles. You can, of course, buy sets at very reasonable prices, too. Just in the past couple of weeks, Lena has put a new game up. It’s called Astra Jigsaw Art Edition and it’s very complex. It comes with a few paintings and several sets of cuts. You can do a few pieces of various shapes or a few hundred. You can set up rotation or not. This is also true of Big Jig. Try her mahjong game, Taipei, too. It’s a nice version of that. There are also many others on site that I’ve not tried, so it should keep you busy for a long time. www.lenagames.com Computer Stupidities We are not alone! Lots of people have had lots of non-understood problems with their computers. Browse through the list of "stupidities", some of which may be funny only to the geeks in our midst, but I think you’ll enjoy most of them. http://www.rinkworks.com/stupid/ COMPUTER TERMINOLOGY FOR THE MONTH OF JUNE “Overlaid Windows” Find the definition elsewhere in this issue THE ICON May 2012 Windows Q & A April 2012 Mary Phillips ICON Member mary@iconusersgroup. (Continued from page 5 of last month’s newsletter page 6) Backup and Restore: System Repair Disc – In the Backup and Restore window of Windows 7, Microsoft built a System Repair Disc option that works quite differently from the PC manufacturer’s System Recovery Discs. (Creating the System Repair Disc takes only a few minutes and it only takes up 142MB of space so a CD will work fine. Label the CD as Repair Disc Windows 7 32 or 64 bit.) PAGE 4 PC to the state it was when first purchased, scrapping all your data while along the way. The System Repair disc, by contrast, offers tools to help bring your ailing PC back to life, keeping all your valuable files safe. When in major trouble first try your System Repair, as it may solve your problem. Only use the System Recovery Discs as a last resort, as they wipe out everything you’ve created since buying your PC. When your PC no longer runs properly, insert Windows 7′s System Repair Disc into your PC, and press the On switch. Instead of returning your PC to its original condition, the System Repair Disc offers several menu options: Startup Repair. This examines Windows 7′s most integral files, then repairs any missing or damaged files that may be keeping Windows 7 from starting. System Restore. Just like the normal System Restore option, this restores your PC’s system files to an earlier point in time, hopefully fixing any recently developed problems. It doesn’t affect your personal files, like e‑mail, documents, or photos. There’s one key difference between this version of System Restore, though: When run from the System Repair Disc menu, System Restore doesn’t have an undo option. (However, you can run System Restore again and choose a different restore point, if one exists.) System Image Recovery. If you’ve created a “System Image” in Windows 7′s backup options, this option returns your PC to the condition it was in when you made the System Image backup. It’s truly a lifesaver, but only if you create System Image disks regularly. Windows Memory Diagnostic Tool. Designed to ferret out hardware problems, this examines your PC’s memory for errors. Command Prompt. This lets techies dig deep into Windows’ internal crevices. It’s designed for people comfortable typing in commands, not moving around a mouse. In short, the System Recovery discs return your What should I do about System Restore if I get a virus? If you know that your system is infected by a virus, you should temporarily turn off System Restore. Otherwise, the virus could be saved along with other system files in a restore point and reintroduced to your system during a restore operation at a later date. To turn off System Restore in both Windows 7 and XP, press and hold the Windows key and press the Break key to bring up the System Properties dialog box. Then, click on the System Restore tab, select the Turn Off System Restore check box, and click OK. In Win 7, as soon as you do, you'll see a confirmation dialog box warning you that turning off System Restore will delete all existing restore points. Click Yes to continue. You can now use your antivirus software to clean up your system. When the virus has been eradicated, access the System Restore tab again and clear the Turn Off System Restore check box. Click OK to re-enable System Restore. THE ICON May 2012 Windows Q & A May 2012 By Mary Phillips Icon member mary@iconusersgroup.org Q1. How do I zip or compress a file or folder in Windows 7. A1. Windows 7 has a built-in zip/unzip program that makes it easy to zip and unzip files. To compress (or zip) a file or folder: 1. Locate the file or folder that you want to compress. 2. Right-click the file or folder, point to Send to, and then click Compressed (zipped) folder. A new compressed folder is created in the same location. To rename it, right-click the folder, click Rename, and then type the new name. To extract (or unzip) files or folders from a compressed folder: 1. Locate the compressed folder that you want to extract files or folders from. 2. Do one of the following: a. To extract a single file or folder, doubleclick the compressed folder to open it. Then, drag the file or folder from the compressed folder to a new location. Or, double click on the file name to open a file, than Save As: with a new location or new name. The new file will not be compressed. b. To extract the entire contents of the compressed folder, right-click the folder, click Extract All, and then follow the instructions. Q2. Why would I want to compress or zip files? A2. Compressed files take up less storage space and can be transferred to other computers more quickly than uncompressed files. You can work with compressed files and folders in the same way that you work with uncompressed files and folders. You can also combine several files into a single compressed folder. This makes it easier to share a group of files. PAGE 5 Files or folders can be added to an already compressed folder by dragging and dropping the new files to the compressed folder. If encrypted files are added to a compressed folder, when they are extracted, the files will be unencrypted. Q3. Can I compress or zip .jpg pictures to make them smaller? A3. JPEG pictures are already highly compressed. If you compress several JPEG pictures into a folder, the total size of the folder will be about the same as the original collection of pictures. In Windows 7, if you want to make pictures smaller to send in e‑mail as attachments, it’s easy to do if you, 1) have the pictures on your computer, and 2) have an email program such as Outlook or Windows Live Mail on your computer. a. Click the Start button , then click Pictures. b. Double click to open the folder that contains the picture you want to send in e–mail, and then click the picture. To select more than one picture, press and hold the Ctrl key while you click the pictures. c. On the toolbar, click E‑mail. (This command appears only if an e‑mail program is installed on your computer. d. In the Attach Files dialog box, select a picture size from the Picture size list, and then click Attach. e. Windows opens a new e‑mail message and attaches your picture to the message using your e‑mail program. Keep in mind that too large a picture may be refused by some mail servers. f. When you have finished writing the e‑mail mes sage, click Send. Q4. Where can I recycle old CDs and DVDs? A4. Best Buy accepts old CDs and DVDs for recycling. They also accept old TVs, computers, DVD players, computer monitors, audio and video cables, cell phones, and about anything electronic.. THE ICON May 2012 Computer Tutor by Pamela Tabak, http://www.computertutorinc.net, Pamela@computertutorinc.net QUESTION: I cannot find a way to transfer the pictures on my camera to my computer. I would also like to transfer pictures to my iPad so that I can carry my photos with me. Can you please explain? ANSWER: If you are using a digital camera or camcorder it will have an SD card or similar. It also may have a USB connection cord so that you do not need to remove the “Card” from the camera in order to transfer your pictures to your computer. If you are using an SD Card in your camera there are many available. Some are pictured below. They do come with smaller and lar- PAGE 6 Double click on the card to open your pictures and then save them on your hard drive in your “Pictures” folder. To transfer pictures to an iPad you will need to purchase an iPad card reader. Alternatively, you can email them to yourself and then open the email on your iPad and save the pictures there. Definition of “Overlaid Windows” Windows that can overlap; when they do, one window hides the parts of others that are behind it. To bring another window to the front, move the mouse pointer into it and click the button. Contrast Tiled Windows Cascade ger GB’s. To remove the “card” from your camera you may need to push on the card to release it. Then insert the card into the card slot on your computer. After the “card” is firmly in the slot a dialog box will appear on your screen with options for installing the pictures. If nothing appears on your screen you can access the SD Card by clicking on “Start” and then “Computer.” You will see your “card” listed as another drive letter as shown at right. From: Grea at sangrea.net THE ICON May 2012 Shortcuts and How to Type Strange/ Odd Symbols on Your Computer by Tanya Mattson, Computer Users of Erie, Pennsylvania, http://www.cuerie.com, faith6860@verizon.net. Originally published in Horizons newsletter of Computer Users of Erie Ever wondered how people manage to type those ‘strange’ symbols (for instance ¶) that are seen — in emails, websites, letters? Generally, in many programs everyone knows (at least for Windows) these simple shortcuts. TO SELECT ALL (as in the complete document or page) Hold down the Ctrl key and press A TO COPY (as in the selected section) Hold down the Ctrl key and press C TO CUT (as in remove part of a paragraph or sentence) Hold down the Ctrl key and press X TO PASTE (the cut or copied selection) Hold down the Ctrl key and press V. These shortcuts work not only in documents, but in some drawing and photo applications. Now for the ‘odd’ ones: HOW TO TYPE CENT SIGN ¢ Hold down the ALT key and type 0162 on the numeric keypad HOW TO TYPE BULLET • (list dot) Hold down the ALT key and type 0149 on the numeric keypad. HOW TO TYPE COPYRIGHT © (copyright sign, copyright symbol) Hold down the ALT key and type 0169 on the numeric keypad HOW TO TYPE PARAGRAPH ¶ (paragraph symbol) Hold down the ALT key and type 0182 on the numeric keypad HOW TO TYPE REGISTERED SYMBOL ® (registered trademark) Hold down the ALT key and type 0174 on the numeric keypad PAGE 7 HOW TO TYPE TRADEMARK ™ Hold down the ALT key and type 0153 on the numeric keypad HOW TO TYPE HEART ♥ Hold down the ALT key and type 3 on the numeric keypad* To find more/other symbols, punctuation, accent marks—just search the web. “How to type symbols” search led me to these sites: Alt-Codes.org: http://alt-codes.org/how/ (they have pages for Mac, Linux, Windows, and Laptops). How To Type.net: http://www.howtotype.net/ (just click on the mark you want, and it will list the different formats). Wikihow.com: http://www.wikihow.com/ Type-Symbols-Using-the ALT-Key (uses the character map found in the computer). For Windows: 1. Click on the Windows Start menu. 2. Select “Programs”, “Accessories”, “System Tools”, then “Character Map”. (For Windows 7 just search for character map). 3. Choose a font. 4. Double-click the character(s) you want. It is important to select the exact font you’re using in your document before selecting the symbol you wish to copy. Not all font-faces contain all possible combinations of available symbols. 5. Copy 6. Return to your document. 7. And Paste. Font size of the character may need to be changed after you’ve pasted it into your document. For Macs: Hold the Option key and press any other key to get custom characters To get a second set of custom characters, hold down both the Option key and the Shift key. One can always do searches for not only symbols, but special characters, accent marks—or if you know the name do a search for “how to type infinity symbol” Good luck! *[Editor’s note: not all fonts contain the heart symbol. This shortcut will work with most word processors, but may not work with text editors or DTP applications] THE ICON May 2012 PAGE 8 Minutes of 14 April 2012 ICON General and Board Meeting (January 1 or ?) to allow fewer times for database changes. John Somers opened the meeting following a presentation by Mick Topping on Registering and Using ICON’s Forums. 5) Put missing page 6 of April 2012 NL on the Forum. (However, the Forum doesn’t accept graphics in the messages and attachments aren’t allowed. It’s there but missing the graphic.) Minutes of 10 March 2012 were read by Mary Phillips. Motion to accept by Shirley Emerson, second by Toni Somers. No objections. Motion carried. John appointed Mary Stewart, Mary Phillips, Margaret Schatz, and Anita Holstein to give a report on options at the May meeting. Treasurer's Report was presented by June Moore. Motion to accept by Toni Somers, second by Dick Preffitt. No objections. Motion carried. Motion was made by Nancy Preffitt to accept the slate of officers for the 2012 Election by acclamation. Second by Toni Somers. No objections. Motion carried. Darin K provided the address to ICON’s blog: iconusersgroup.wordpress.com and expressed a desire to post items there. All members should go to the blog and enter your email address (see example below), and click on the Follow Us button. New officers for 2012-2013 are: Vice President: Darin Kasterke Secretary: Mary Phillips Treasurer: Shirley Emerson Newsletter Editor: Mary Stewart Webmaster: Sarah Roberts Membership Chair: Mary Geise Offices of President and Program Chair or Cochair are open. Darin Kasterke serves as Acting President until such time as someone steps up and wishes to be President.* *Andrew Cummins has now accepted the position of President. Mary showed the new ICON Re-Member cards to be sent to members who don’t have email addresses and have not renewed. These were printed by Staples Copy and Print Instant service. John gave out several extra power strips that ICON had available. More discussion on making ICON’s newsletter available online in PDF format: 1) Where to host? ICON’s Blog? 2) Send all members with email a link to the NL each month, and continue hard copies to those who need/want it. 3) When the USPS mail processing facility closes in late 2012, how will bulk mail be handled? 4) Make all memberships due on same date Marion Garrett explained how the donated computer program works. The present computers he and DeLynn Bishop have available have had the memory removed so they’ve been buying memory for $20 and recovering that amount from members or others who need a desktop computer with Windows XP. If the individuals are not ICON members, it is suggested that they join ICON. There is presently a corner computer desk available, also. Contact either Marion Garrett (8875396) or DeLynn Bishop (732-7567).\ Respectfully submitted, Mary Phillips, Secretary P.S. Following the meeting, Mary P gave a demo of the screen capture program SnagIt 11 from TechSmith who has given us a special group price of $18.98. Several people took advantage of the special offer and gave Mary their order. Under each license, the program can be installed on two computers (One desktop and one laptop) as long as they belong to the same person and both are not being used at the same time. THE ICON May 2012 FBI: Hundreds of Thousands of Computers May Lose Internet on July 9 By Ira Wilsker WEBSITES: http://www.fbi.gov/news/stories/2011/ november/malware_110911 https://forms.fbi.gov/check-to-see-if-yourcomputer-is-using-rogue-DNS http://www.dcwg.org http://www.dcwg.org/detect DETECT IF COMPUTER IS AT RISK http://news.yahoo.com/hundreds-thousandsmay-lose-internet-july-181324701-finance.html https://www.techsupportalert.com/content/ how-check-if-your-computer-has-beeninfected-wide-spread-dns-hack.htm http://www.techsupportalert.com/content/howchange-dns-server.htm http://www.techsupportalert.com/content/howfind-best-dns-server.htm http://www.fbi.gov/news/stories/2011/ november/malware_110911/DNS-changermalware.pdf https://en.wikipedia.org/wiki/ Domain_Name_System https://code.google.com/p/namebench FIND FASTEST FREE DNS https://use.opendns.com HOW TO RESET DNS ON ANY OPERATING SYSTEM https://developers.google.com/speed/publicdns/docs/using HOW TO RESET DNS ON ANY OPERATING SYSTEM In case you have not heard the news, on July 9, 2012, hundreds of thousands of computers will lose access to the internet. This is not some hoax or urban legend, but a fact announced by the FBI. Following the arrest of an Estonian hacker group which had made millions of dollars from a fraud scheme that infected millions of computers worldwide with a "DNS Changer" malware that redirected legitimate commercial transactions to a series of scam websites. These cyber crooks created a sham company called "Rove Digital" to receive the revenues of the scam. DNS is an acro- PAGE 9 nym for a Domain Name Server, which serves somewhat like an internet phone book, which converts web addresses, also known as domain names (such as www.theexaminer.com), into an IP (Internet Protocol) address (theexaminer.com is really 50.116.108.205). By changing the Domain Name Server accessed by an infected computer, it is like replacing an authentic phonebook with a purloined one that has the correct names, but intentionally different phone numbers. Dialing a correct phone number will intentionally connect you to someone who pretends to be the person whom you called, and that person is a crook; this is what the DNS Changer malware does to an infected computer. As many as 500,000 American computers may have been infected by this DNS Changer malware, as were an estimated 4 million other computers around the world. In addition to modifying the computer's DNS, the malware also made the infected computers vulnerable to a variety of other malware. The rogue servers were hosted in Estonia, New York, and Chicago. This scam was very lucrative to the Estonian hackers who made an estimated $14 million in illicit fees. According to the FBI, this cyber-gang started infecting computers with the DNS Changer malware in 2007, successfully infiltrating millions of computers owned by individuals, businesses, schools and colleges, and government agencies, including NASA. The malware was able to penetrate many of the antivirus products in use, and prevented the installed antivirus and operating system software from updating, which would have likely enabled the antivirus software to detect and kill the DNS Changer. Since the security software would not be updated, there would be no protection from the thousands of new viruses, worms, and Trojans that appear every day, which allowed those computers to become infected with countless additional malware programs and other threats. According to the FBI, “They were organized and operating as a traditional business but profiting illegally as the result of the malware. There was a level of complexity here that we haven’t seen before.” Since DNS Changer redirected the unsuspecting victims to rogue internet servers, the crooks were able to manipulate the destination of the web connections. In one example of how this scam worked, the FBI said, "When users of infected computers clicked on the link for the official Continued on page 10 THE ICON May 2012 Continued from page 9 Rogue DNS Server website of iTunes, for example, they were instead taken to a website for a business unaffiliated with Apple Inc. that purported to sell Apple software. Not only did the cyber thieves make money from these schemes, they deprived legitimate website operators and advertisers of substantial revenue." The FBI announced the arrest of the "Rove Digital" Estonian hackers on November 9, 2011. Since there are likely millions of computers still infected with the DNS Changer malware, the sudden shutdown of those rogue servers would have prevented the victims from accessing many of their favorite websites. In order to allow the infected computers to continue to access the internet, but actually reach their intended websites. the FBI arranged for the rogue servers to be temporarily replaced with legitimate servers, such that the victims' internet access is not disrupted. It is these temporary replacement internet servers that will be shut down on July 9, meaning that anyone who still has a computer infected with DNS Changer as of that date may lose internet access. In order for users around the world to determine if their computers are infected with the DNS Changer malware, a consortium of academic, governmental, and private organizations created the DNS Changer Working Group (DCWG), which initially administered the servers that replaced the illicit Rove Digital servers. The DCWG consists of representatives from Georgia Tech, Internet Systems Consortium, Mandiant, National CyberForensics and Training Alliance, Neustar, Spamhaus, Team Cymru, Trend Micro, and the University of Alabama at Birmingham. The website for the DCWG, www.dcwg.org, is hosted at the Georgia Institute of Technology, under a research grant provided by the Office of Naval Research. The DCWG provides a quick method for users to determine whether or not their computers are infected with the DNS Changer malware that are using the clean servers maintained by the DCWG which replaced the Rove Digital servers. In order to quickly and safely test if a computer has been hijacked by the DNS Changer malware, the DCWG has created 11 international servers which will report back to the user if his computer is indeed hijacked by DNS Changer; in the U.S. the link for this test is www.dns-ok.us. The test can be run from any browser, and nothing is downloaded or installed on the computer during the test; it is simply a test to see if the computer PAGE 10 is connecting to a correct IP address. The results are almost instantaneous, with a "DNS Changer Check Up" result displayed in an IP graphic; if it is green, the user is possibly free of the DNS Changer malware, but the green graphic does not certainly prove that the computer is clean. When the green display appears, it also says, " Your computer appears to be looking up IP addresses correctly! Had your computer been infected with DNS changer malware you would have seen a red background. Please note, however, that if your ISP is redirecting DNS traffic for its customers you would have reached this site even though you are infected." If the display is red, then it is likely that the computer is one of the many that have been compromised by DNS Changer. For the computer that is "red", it will be necessary to clean the DNS Changer malware and then reset your DNS. Most of the current anti-spyware products such as the free versions of SuperAntiSpyware (www.superantispyware.com) and the free version of MalwareBytes (malwarebytes.org/products/ malwarebytes_free) can detect and remove the DNS Changer malware, but it will still be necessary to reset your DNS in order for the internet to properly function on your computer. Almost all ISP's (Internet Service Providers) offer telephone support that will help the user reset the DNS to the ISP's preferred DNS server. Gizmo's TechSupportAlert has instructions and links on how to find the best DNS server for you (techsupportalert.com/content/how-find-bestdns-server.htm), as well as detailed instructions on how to change or reset the DNS settings on your computer (techsupportalert.com/content/ how-change-dns-server.htm Google has a free DNS utility "Namebench" at code.google.com/p/namebench that can help the user find the fastest free DNS, with instructions on how to change your DNS at developers.google.com/speed/public-dns/docs/using . Another excellent DNS service, OpenDNS, has simple but detailed instructions on how to change your DNS at use.opendns.com. If you use Google's Namebench to find the best combination of DNS for your computer and connection, you can use those DNS on your computer by following the instructions given on Google or OpenDNS on how to change your DNS settings; while the default DNS listed on the Google and OpenDNS Continued on page 11 THE ICON May 2012 PAGE 11 Continued from page 10 Rogue DNS Server instructions are excellent and totally adequate, there may be some performance improvement by using the DNS recommended by Namebench. You can always change them again later. If you enjoy or depend on the internet, it is imperative that you go to www.dcwg.org/ detect and see if your browser is connecting to a legitimate DNS. If the results are "green" you are likely (but not certainly) safe from the DNS Changer Trojan, and can probably continue to use the internet after July 9. If you are "red" you must clean your computer of the DNS Changer malware and reset your DNS as instructed above. Regardless of "green" or "red" results, it is always a good practice to periodically scan your computer with a good third-party utility such as SuperAntiSpyware or MalwareBytes to verify that nothing slipped by your security software. Failure to check your computer prior to July 9 may mean no internet for you on July 10. ACKNOWLEDGE CEMETERY CEREMONY COMMEMORATE FREEDOM GRATITUDE HONOR MEDAL MILITARY MONUMNET OBSERVANCE RESPECT SALUTE SERVICE SOLDIER TRIBUTE TROOPS VETERAN WAR WREATH THE ICON May 2012 Time 3 E.M.Hazell Icon Member Adolescence, I understood, was that time when childhood was left behind and preparation for adulthood began. I was looking forward to parties, to music, to entertainment and to dancing. But I was taught that growing up female meant to enjoy cleaning house, washing dishes, and above all learning the art of cooking, along with the art of sewing, knitting, crocheting and embroidering. Hitler’s philosophy of womanhood was very simple. The woman was expected to be attractive without Schminke (makeup). She was chaste until she was married and in marriage she was expected to be submissive and to bear children; many children. Hitler’s model of womanhood was Goebbel’s wife who bore him eight children. Hitler awarded those couples who had many children with one family dwelling on the outskirts of town and with enough land for a small garden. For many Germans that was the dream of a lifetime. To make transportation possible, Hitler approved that Volkswagen design a small car for every family. To pay for the Volkswagen a small sum of money was taken out of the wages of the worker. Hitler had managed to put an end to unemployment. There was a new fortification being built between France and Germany. It was known as the Siegfried Line and the West Wall. All available man power was working on it. The French were building their own fortification known as the Maginot line. For the cars of the future, Hitler had approved the Autobahn. Whoever wasn’t working on the bunkers of the West Wall worked on the Autobahn. My father had taken me to see the Autobahn as it entered Mannheim. My father worked on the West Wall and came home on weekends. Then there was war. The war, we were told would be brief. Victory would be certain. As soon as the Germans in the Sudeten were safe from the cruelties of Czech-Slovakia the war would end. Nothing much was said about Poland except that we had conquered Poland. It was referred to as the Blitzkrieg. The radio was alive with special bulletins of battles won. And then there was that other special bulletin telling us that the little nations we had conquered had a treaty with France, that France honored the treaty and declared war PAGE 12 on Germany. Hitler welcomed the opportunity, he said. It was that dishonorable treaty of Versailles that had almost destroyed Germany. The French had taken our colonies in Africa, the Saar and the Ruhr west of the Rhine, rich with coal deposits and they had taken Alsace Lorraine. France had also demanded more money than Germany could pay in reparation for WWI. The Wehrmacht (German Army) that moved into Mannheim was now headed west, across the Rhine and into France. It was going to be a little war, nothing to worry about. There were no more festivities, no more dancing and singing in restaurants. There was now something called Verdunklung (Blackout) in the event that enemy air-craft could make it in to Germany. There was the Flak (anti-aircraft guns) on the top of many buildings. There were the air raid sirens and some shooting. My girlfriends and I had a new hobby; we collected shrapnel. We were told not do that while the air-raid was still in progress. It was dangerous. We used to roller skate in the streets. Now we spent time in the basement waiting for the air-raid to pass. We learned our own kind of Morse–code knocking against the wall of the adjoining basement. Hitler was right. We won the war with France, but again there had been a treaty with Great Britain and now we were at war with the English. Now there were soldiers dying, childhood friends, family and acquaintances. Laughter became a forbidden art. There was that one wonderful program on the radio that was known as “ Das Deutsche Wunschkonzert”. Songs could be requested by the soldiers and for the soldiers. The sound of music became the balm for so many wounded hearts. The Third Reich worried about running out of food supplies. Our borders were closed. Nothing came in and nothing went out. There were no more oranges or bananas. We received food ration tickets. A roast for Sunday dinner was only possible one Sunday of the month. Eventually everything that was needed, was rationed. Then there was that special bulletin that told us that Churchill had ordered a night air raid on the private sector of Berlin. Men women and children had been killed and houses, not factories Continued on page 13 THE ICON May 2012 Continued from page 12 Time 3 had been destroyed. War had been declared on all civilians. Cities could be bombed. I never understood why we were at war with America. We did not know about Pearl Harbor. We did not talk about that war with America. Many of us had relatives in America. It was Christmas and the year was 1942. The church bells were silent. They had been sacrificed, melted down for guns and ammunition. Aunt Antonia, my mother and I took my grandmother to midnight Mass. There was a bright moon and I could see the tears glistening on my mother’s face. Aunt Antonia took me aside and said: “You are not to ask why your mother is crying. And you are not to say anything to Grandmother. Your Uncle Moritz is missing in action in Russia.” Aunt Antonia remained with my mother, and I tried to keep my grandmother’s mind occupied. There had been a heavy snow and the snow on the sidewalk made sounds as we stepped on it. “Grandmamma, the snow is talking back at us tonight. Do you suppose that means we’re going to get some more?” I asked. It led to a conversation about snow in the village. In my mind’s eye I saw Uncle Moritz and heard the distant echo of his laughter. He was the seventh child and the youngest of my grandmother’s children and I knew that he would not return. No one returned from Russia. I was making small talk, shielding my grandmother from that dreadful news on Christmas. Inside of me I grieved for the joy that comes with Christmas. I learned to live with death and I learned not to cry. PAGE 13 Accessing the 1940 Census By Mary Phillips ICON member A few weeks ago, there was a 5-day webinar series called 1940 US Census Images and Indexing Updates with DearMYRTLE sponsored by RootsMagic.com. DearMyrtle had a number of participants that included: Amy Johnson Crow, archives.com; John Erickson, FamilySearch International; Stephen Morse and Joel Weintraub, creators of the Unified 1940 Census ED Finder tool; Russ Worthington of the Family Tree Maker User Blog and co-founder of the Better GEDCOM Project; Judy Russell, the Legal Genealogist; Dan Lynch, author of Google Your Family Tree and Google+ for Genealogists; and DearMyrtle’s granddaughter, Bree, a sixth-grader who was participating in the indexing along with her mother. The webinars were recorded and are available at http://rootsmagic.com/webinars. The records are each indexed by two different persons and any names that the two differed on were then arbitrated by a third person for accuracy. Indexers were being recruited and results reported. Results are being posted on three websites: Archives .com, FamilySearch.org, and Findmypast.com. Ancestry.com is doing their own indexing on all 50 columns of the 1940 Federal Census. The indexing will make it possible to search by name. Presently, the actual pages are viewable by Enumeration District only. The One-Step Unified 1940 Census ED Finder tool at http:// stevemorse.org/ makes it relatively easy to find the ED number if you know a street address. The specific instructions are in Webinar 4. Be sure to click on the See map link to find boundary streets and narrow the number of EDs to one. To locate ED numbers for rural areas, townships, etc. the National Archives Official 1940 Census Website http://1940census.archives.gov is the place to look. Click on Get Started, then click on Start Your Search. Enter the State and County names (unless the one City given is the one you want, leave it as All.) and click Search. Click on the Descriptions button. The townships, and villages with their ED numbers are listed pretty much alphabetically, but click on More to see all in each section. When the ED is identified, click on Census Schedules, then click View ED ____. My recommendation, watch the webinars first. THE ICON May 2012 PAGE 14 For help, you can also log onto ICON’s Forum at www.iconusersgroup.org and post your questions. Free registration is required in order to post questions and then you need to wait a day or so for an email confirmation to complete the registration. However, while you’re there, click on Search and enter the topic about which you’d like information and see if someone has already started a ‘thread’ — a series of question and responses. All questions and responses can be read without having to register. No cards were sent this month. If you know of someone in our group who is ill or has suffered a loss in the family, please contact Mary Phillips mary@iconusersgroup.org or Jerry Williams jerryddwilliams@gmail.com. BASIC COMPUTER CLASSES Basic computer classes are taught at St John’s Whiteside Clinic lab by ICON members Mary Phillips and Art Irish with ICON helpers for five sessions each month plus three sessions on Internet & email. Sign up by calling St John’s Seniors 841-0333. Need a refresher course or want to be a helper, now’s your chance. We guarantee you’ll learn something you didn’t know! PLEASE! Please Notify us of Change of Address. Each time the newsletter goes to the WRONG ADDRESS, the Post Office charges ICON a fee to notify ICON of a change of address. So when you move or go out of town, e-mail: sarah@iconusersgroup.org THE CONTENTS AND OPINIONS OF THE ARTICLES IN THIS NEWSLETTER ARE THE OPINIONS OF THE AUTHORS . NOT THOSE OF THE ICON USERS GROUP
Similar documents
July
Using a Story Board to Movie Making 11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk 12:30 p.m. Mini-Seminar — To Be Announced 2:15 p.m. Advanced Technology Forum — Open Group Discussion 4:00 p.m. U...
More information