SIG meeting October 13 at 1:00 to 3:00 PM Passwords, how do we

Transcription

SIG meeting October 13 at 1:00 to 3:00 PM Passwords, how do we
Hendersonville Area Computer Society Newsletter
http://hacs.org
Volume 5 No. 10
October 2011
Meetings are held twice a month, January through November. We meet
at the Opportunity House on the third Monday of the month with an
educational meeting at 6:30 pm followed by a featured speaker
presentation at 7:30 pm. Our SIG group normally meets the second
Thursday of each month from 1-3 PM at Opportunity House.
SIG meeting October 13th at 1:00 to 3:00 PM
At Opportunity House
Let’s Look Into ALL those Google Aps!
Moderator will be our own Jerry Liedl.
OUR NEXT REGULAR MEETING WILL BE ON
Monday October 17th
At Opportunity House
Education program 6:30 to 7:30 PM
Passwords, how do we remember them – storage??
By our own Brian Fifield
Main program 7:30 60 8:30 PM
How many ways can I use those flash drives?
By our own Joy Capps
Web site of the Month
Shoppers bite back!
http://consumerist.com/
1 of 14
HACS.exe Vol. 5 No. 10
Family Tree Maker 2011 (Part 1)
Review by Mary Phillips, Secretary, Icon Users Group, MO
February 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network
www.iconusersgroup.com
mphillip1.mary (at) gmail.com
Family Tree Maker 2011 has the same seven tabs as 2010 and the family sheets look and
work the same. However, a number of updates have been added.
Tab 1 Plan -- Let‘s you start a new tree in the program by any of three ways:
1) Entering what you know —begin with yourself),
2) Importing a tree from an existing file — Family Tree Maker (version 5 or newer); a
GEDCOM file (GEnealogical Data COMmunication, a standard proposed by the LDS that
can be exported from most if not all genealogy programs), Personal Ancestral File (free
program that can be downloaded from the LDS website at www.familysearch.org); Legacy
Family Tree; or The Master Genealogist.
3) Downloading a tree you‘ve created on Ancestry.com.
One addition that I feel is especially important is that when a file is imported, FTM 2011
makes a copy and leaves the original file as it was so it can still be opened in the other
program.
The program installs in its own folder and doesn‘t remove earlier versions of FTM.
When a tree has been created, a second tab is shown called Current Tree. It shows the
person designated as Home Person (usually the person with whom you start, but it can be
changed as desired by clicking on the Home Person button and in the Index of Individuals
window selecting a different person.
Tab 2 People — two tabs (Family
and Person.
The Family tab consists of four panels
that can be adjusted by either clicking to
open or close a panel, or clicking &
dragging to make a panel smaller or
larger. The ―buttons‖ to do this are
actually series of dots to adjust sizes or
eight dots with an arrow in the middle to
open or close the left panel or the lower
panel. (Note Red Arrows in the picture
below.)
Another feature I especially like is in
the upper right corner of the Family tab;
the relationship between the person
selected and the Home Person is
stated. Example: The selected person in
the above picture is James Jones and
2 of 14
HACS.exe Vol. 5 No. 10
he is the Great Grandfather of La... Jones, the Home Person.
Notice that there are open triangles at the right ends of grandparents of James S Jones
(one in circle); open triangles indicate that no additional persons are added on the pedigree
chart or that the person had no children. James Jones had children, 12 in fact, so there is a
solid triangle to the right of his name (in circle). In the lower panel there is a solid arrow to the
right of Frankey Jane showing that she had children. The arrow beside James Pollard has a
tail indicating that he is in the direct lineage of La… Jones.
Editing can be done in the right panel fields (boxes) of the Family tab and additional editing
in the Person tab. Just below the relationship area are four small icons to enter information for
categories: Facts, Media, Notes, and Tasks. Facts are events supported by documents such
as Marriage or census records; Media includes photos, videos, audio tapes, scanned letters,
etc.; Notes are the family stories, obituaries, newspaper clipping info; and Tasks are a To Do
List of items or information needed.
Review: RoboForm
Program stores websites, login information
By Jim Thornton, Member, Channel Islands PCUG, CA
August 2011 issue, The Outer Edge
www.cipcug.org
Jasthorn (at) gmail.com
RoboForm is one of my favorite software programs as it helps me very quickly log into
secured websites. My listings of these websites include airlines, email, financial, medical,
stores, travel, etc., and I currently have more than 50 of these secured websites listed.
The program is very easy to use. For example, first open Internet Explorer, and then click
on one of its little toolbars titled RoboForm and a list of several choices appear titled Logins,
Identities, and Soft Notes. While I mentioned Internet Explorer, RoboForm also works equally
as well with Firefox, Safari, Chrome, and many more browsers. Next,
I click on Logins and then click again on the listed secured website that I want to enter.
Next, RoboForm automatically redirects Internet Explorer to the website that I selected and
when the login website appears, RoboForm automatically fills in my name and password, and
I‘m immediately logged into the secured website with unrestricted abilities.
3 of 14
HACS.exe Vol. 5 No. 10
Once you have the program installed, when you go to a new secured website and fill in
your user name and password and click on Enter, RoboForm will automatically add the
information. Including the website address, to your list of Logins.
If you need a new password, RoboForm will generate a highly secure password. On
the Login list in RoboForm, the secured websites are listed alphabetically and you can
easily rename any listing.
Other RoboForm features include SafeNotes, which securely stores other information of
your choice. For example, some banks will frequently ask you for your wife‘s favorite color,
your first dog‘s name, etc., to ensure that you are the secured party attempting to access your
bank account, etc. You can securely store this information in SafeNotes.
RoboForm‘s options under Logins include Edit, New, and Print List. Under Identities are
Edit, New, and Fill Empty Fields Only. SafeNotes includes Edit, New, Print to New, and Print
Last. Numerous other choices include Fill Forms, Save Forms, Fields — Reset, Sat, and
Clear, Profiles — Default, New, Date, Name, Refresh Fields, Explorer, Tools — Edit Identify,
Edit Password, Edit SafeNotes, Search Fields, Taskbar Icon, Generate Password, and Sign
RoboForm data, and Options — Help.
I‘ve used RoboForm for numerous years in Windows XP, Windows Me, Windows 2000,
Windows Vista, and now Windows 7. RoboForm‘s website is www.roboform.com, and there
are three versions of RoboForm available: Desktop, Everywhere, and 2Go.
Desktop provides high security and restricts the access to RoboForm from only one
computer.
Everywhere allows you to access RoboForm from numerous computers.
2Go works using a portable USB drive, so that you can take your RoboForm information
and use it on many computers while traveling on business or on vacation.
RoboForm runs in numerous versions of Internet Explorer, including versions 6, 7, 8, and 9
but only on 32-bit versions and not the 64-bit versions. There is a free version of RoboForm
that is limited to only 10 logins. For more than 10 logins, the Everywhere version is available
for $20 per year, and the Desktop version is $30. The current version, which is version
6.10.2.0, was introduced earlier this year.
When you install RoboForm for the first time, you will be asked to create a master
password, which protects all of your secured data in your Logins, Identities, and SafeNotes.
This prevents anyone else who has access to your computer from seeing or copying this
information. If you prefer, you can eliminate this protection and allow anyone to access all of
your important information.
4 of 14
HACS.exe Vol. 5 No. 10
TrueCrypt
Free open-source data encryption software for Windows 7/Vista/XP, Mac OS X, and Linux
By John Langill, Newsletter Co-editor, Southern Tier Personal Computing Club, NY
August 2011 issue, Rare Bits, STPCC Newsletter
jlangil1 (at) stny.rr.com
The May 2011 issue of Rare Bits contained an article by Dick Maybach titled ―Cloud
Computing‖ in which he pointed out the necessity of securing your data via encryption when it
―...is stored on the same disks, uses the same memory, and passes through the same
processors as everybody else‘s.‖ And I recall Dave Bilcik voicing a similar warning at the May
meeting and also mentioning the program TrueCrypt. It just so happens that I am currently
using TrueCrypt and I believe it to be very satisfactory solution whether you need relatively
modest security or very tight and sophisticated protection.
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted
volume (data storage device). ―On-the-fly‖ encryption means that data is automatically
encrypted or decrypted right before it is loaded or saved, without any user intervention. The
entire file system is encrypted; e.g., filenames, folder-names, contents of every file, free
space, meta-data, etc. No data stored on an encrypted volume can be read (decrypted)
without using the correct password and/or key file(s), or correct encryption keys.
I‘m not sure how unique TrueCrypt‘s approach is but I was nevertheless intrigued by it. The
first step is to create a ―container;‖ otherwise known as a TrueCrypt ―encrypted volume.‖ To
my mind, this is somewhat like obtaining a safety-deposit box at a bank.
TrueCrypt provides a ―wizard‖ to assist with the task. As at a bank where safety-deposit
boxes of various sizes can be rented, the encrypted
volume can be created to have as much capacity as
you
need. For example, it can be a specific portion of a
hard-disk, or an entire flash drive or other storage
device. Unlike a safety-deposit box, however, you
hold the only key... so you need to remember and
protect it. And, into the container (the volume) you
can
store any number of files. If the capacity of the
volume is exceeded, you simply create
a bigger container.
One of the interesting facets of a TrueCrypt volume is that it has most of the characteristics
of an ordinary file. That is, the volume can be moved or copied within the storage areas of a
given PC, or to a different PC. The name of the volume can be changed; and the volume can
be included in routine backups. It can be transmitted across the Internet; and even into the
wild-blue yonder, if you‘re so inclined. And, even if you have no intention of salting ―the cloud‖
with your personal data, what about that minuscule 8- or 32GB flash-drive you carry around in
your pocket. The smaller they get, the easier they are to lose. Wouldn‘t it be reassuring to
have made it an encrypted volume so that whoever finds it won‘t have an easy time of it when
they try to discover the contents of your personal data?
5 of 14
HACS.exe Vol. 5 No. 10
The downside of the file-like characteristics is that, like
any file, an encrypted volume can also be deleted and all
its content lost (...thank goodness for the Recycle Bin).
That would be very bad if done unwittingly. But that‘s why
we do back-ups! Yes? Once a TrueCrypt volume is
mounted, the data files it contains can be copied to and
from the volume just like they are copied to or from any
normal disk; for example, by simple drag-and-drop
operations.
Files are automatically decrypted on-the-fly in RAM
(Random Access Memory) while they are being read or
copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to
a TrueCrypt volume are automatically encrypted on-the-fly in RAM right before they are
written to the volume. Note, however, this does not mean the whole file that is to be
encrypted/decrypted must reside in RAM before it can be encrypted/decrypted. That is, there
are no extra RAM requirements for TrueCrypt. The following paragraph explains how this is
accomplished.
Let‘s suppose that there is an .avi video file stored on a TrueCrypt volume; that is, the
entire video file is encrypted. The user provides the correct password and/or key file and
mounts (opens) the TrueCrypt volume. When the user double-clicks the icon of the video file,
the operating system launches the application associated with the file type — typically a
media player. The media player then begins loading a small initial portion of the video file
from the TrueCrypt-encrypted volume to RAM in order to play it. While the portion is being
loaded, TrueCrypt is automatically decrypting it in RAM. The decrypted portion of the video in
RAM is then played by the media player. While this portion is being played, the media player
begins loading next small portion of the video file from the TrueCrypt-encrypted volume to
RAM and the process repeats. This process is called ―on-the-fly‖ encryption/decryption and it
works for all file types, not just for video files. The process also ensures minimal impact on
processing performance.
Note that TrueCrypt never saves any decrypted data to a disk – it only stores it temporarily
in RAM. Even when the volume is mounted, data stored in the volume remains encrypted.
When you restart Windows or turn off your computer, the volume will be automatically
dismounted and files stored in it will be inaccessible and encrypted. Even when power is
suddenly interrupted (i.e., without a proper system shut-down), files stored in the volume are
inaccessible and encrypted. To make them accessible again, you have to mount the volume
by providing the correct password and/or key file.
Of course, as with any unintended power interruption or shut-down, unsaved changes to
files are lost because re-encryption of changes occurs only when files are saved to the
volume in a normal fashion.
I‘ve only touched on a few of the main facets of TrueCrypt. In addition, TrueCrypt offers a
choice of encryption algorithms from which you can select one that will give the degree of
security you feel you need. This and other aspects of TrueCrypt are fully documented in an
6 of 14
HACS.exe Vol. 5 No. 10
excellent User Guide. The latest version of the free software, Release 7.0a, can be
downloaded from the product‘s home Website at http://www.truecrypt.org,
as well as from CNET‘s http://www.download.com, and other sites on the Web.
The User Guide PDF and a more detailed description of TrueCrypt can be found at the
product‘s home web-site.
TrueCrypt is one free program that is, in my opinion, an exception to my general perception
of the breed. Of course, the developers gratefully accept donations. In this case, I think they
are well deserved.
Mac Users Get a Taste of Windows‘ World
First Mac Malware Program May Have Affected Up to 120,000 Machines
By Linda Gonse, Editor / Webmaster, Orange County PC Users‘ Group, CA
June 2011 issue, Nibbles ‗n Bits
www.orcopug.org
editor (at) orcopug.org
Macintosh has reached new heights of popularity which has been confirmed by the recent
success of malware called Mac Defender.
In April, unsuspecting Mac users, confident in their platform‘s supposed invulnerability to
viruses, were jarred from their complacency by a pop-up alert that declared their Mac was
infected! And, it wasn‘t infected by one virus, but several. If they would click on a link, Mac
Defender would clean out the machine.
Of course, there was a charge for this cleanup, so users were told to insert their credit card
information before Mac Defender went to work.
Windows users will surely nod their heads at this point with a now familiar scenario and agree
that the Mac user is in trouble; albeit, not the trouble represented by the non-existent viruses
the malware pointed out. Windows users have been scammed by several types of malware,
just like Mac Defender.
When a user is in a state of panic and confusion, getting quick action to help is foremost in
the user‘s mind. Inputting credit card information seems secondary to the important task of
clearing viruses.
Unfortunately, the so-called virus detector the user buys isn‘t really a working program. The
entire goal of the malware was to separate users from their credit card information.
Mercury news, http://bit.ly/lcZ1El, has reported that ―the program, according to security firm
Intego, is very well designed, and looks professional.‖ In addition, more variants of the initial
malware program are showing up now. ―The most recent one doesn‘t even require the user to
enter a password, as is typically the case when installing Macintosh software.‖
7 of 14
HACS.exe Vol. 5 No. 10
Mashable.com, http://on.mash.to/k8KYtq, reported that ―calls to AppleCare about the malware
appear to be high. ZDNet estimates that anywhere between 60,000 and 120,000 Mac OS X
users could have been affected by the Mac Defender attack.
―Apple has finally acknowledged the recent rise of a fake antivirus program for Mac OS X and
has promised to deliver a software update to remove the malware.‖
Jon Jones, editor of the North Coast Mac Users Group newsletter in Santa Rosa, California,
said of the attack, ―Well…it‘s about time. It almost feels (in a sick, twisted way) as some sort
of validation for Mac users, that they‘ve finally found themselves in the crosshairs of malicious
code villains, after having been kept out of the fray for so long on the premise that their
numbers were so small, they just didn‘t matter.
―Someone finally figured out that with a simple twist on the methods of attack, targeting Mac
users (in general) could be like shooting fish in a barrel. I suspect that since Macs are, in
some respects, targeted towards a market that embraces its approachability, ease of use,
and highly touted technical security, there is a fairly large chunk of Mac faithful who tend to
lack technological ‗smarts,‘ and are likely a bit too naively trusting of content that comes
through their devices, especially when it comes on the form of alerts, or deals with sensitive
data. (―Oh, I‘ll just do what it says, because I don‘t understand it, but it knows better what I
need to do than I do.‖)
―These attacks operate on less of a technical foundation, and more on a social engineering
ruse, and it is the above noted users who are the prime target—and access to their credit
card information the end reward. As these attacks continue to become more and more
sophisticated, it is certainly even more of an imperative that Mac users who have enjoyed a
false sense of security for too long, start to become a bit more savvy about how to manage
their online activity and personal information.
―I know of one Mac tech who, over the last few weeks, has had at least one client for whom
he has had to clean up this sort of malware three times, because even though he has
explained the process and the danger each time, the client continues to find the false urgency
of the attack just too compelling…and because the method clearly lays out to the victim how
best to set themselves up for attack— it frankly comes across as just too ‗Mac-like.‘ The
attack ‗just works.‘
―Thusly, every time the client sees a dialogue box instructing him follow the steps to surrender
access of the machine to an unknown entity and then submit personal information and credit
card numbers to same, he does it without questioning it because…well, as it has often been
said, you just can‘t fix stupid.‖
Some people think that Apple has been so innovative and cutting edge that it will develop a
defense that kills future armies of malware and viruses that attempt to access Macs. No
nonsense, to the point, and certain.
Jon‘s answer to that is ―It is very difficult to sense quite where Apple will go with this in the
future, at least in terms of defensibility. It has long been considered among the more secure
‗out of the box‘ OS environments — (some individual components and applications are
8 of 14
HACS.exe Vol. 5 No. 10
another thing). Which is why the most successful malware attacks on the Mac are the ones
that convince the users to dismantle their own defenses and install the malicious code
themselves, while unaware of what they are actually doing. So in a sense, I think we are
seeing some results of a cooperative bi-polarity. An abundance of built-in security has helped
to foster an abundance of built-in corresponding abdication of personal responsibility for one‘s
own computing and surfing habits. it is very possible that the tighter Apple reins in OS
security, the greater the lethargy for a significant portion of the user base regarding computer
security.
―Balancing this against the ongoing necessity for Apple (all OS developers, really) to
implement more dynamic cutting edge technologies and more robust feature sets into their
systems to retain relevance in an increasingly competitive field often involves inclusion of
technologies for which corresponding safeguards may yet still be in their infancy.
―If the last several years of Apple‘s predominant efforts are any sign, I suspect the answer lies
in diminishing development in desktop systems, and greater development in iOS across a
wider range of devices.
―What was initially heralded as Dashboard Widgets on the Mac OS (and later Gadgets on
Windows) seems to have been an early stepping stone in what later evolved into the more
fully featured mobile app platform we see today—namely a diverse range of mini-applications
of very specific and limited utility residing in a dedicated sub-system,‖ said Jon.
―With this new trend gaining such widespread and intense popularity, it seems to foster some
type of resolution for security issues that afflict the desktop OS (but not entirely) while keeping
consumers satisfied with simplicity of use because functionality is generally spread around
across a wide range of dedicated apps, giving most consumers the functionality they seek at
a reasonable price, but Apple gets to impose a greater degree of security by locking down the
OS, and providing a single portal through which vetted applications are made available.
―Is this a perfect or even marginally ―open‖ and freely configurable solution that will work for
everyone? Certainly not. But with increasingly productive development in this arena, and its
rapid embrace by a consuming public, I suspect that expanded iOS development will be
Apple‘s next major step in helping mitigate user victimization against increasingly
sophisticated malware attacks,‖ Jon said.
9 of 14
HACS.exe Vol. 5 No. 10
eBay Adventures - ―So what gives?‖
By Rick Eblaw, Vice President, Southern Tier Personal Computing Club, NY
August 2011 issue, Rare Bits
www.stpcc.org
ekblaw (at) juno.com
If you spend some time on eBay, you'll find all kinds of interesting stuff offered for sale.
There‘s lots of collectibles, some of which would be hard to locate unless you were willing to
travel the country going to flea markets. There are items that you can find in stores that are
sometimes offered at a substantial discount. And then are some items that are hard to
explain...
Here‘s a recent example. There‘s a fellow in China who is currently selling a lot of ―Mini
USB 2.0 Wireless Bluetooth Adapter Dongle‖ items, which you can readily find by searching
eBay for ―usb wireless‖ and sorting by ―Price + Shipping: lowest first.‖ That in itself isn‘t
interesting, there‘s no shortage of sellers offering USB Bluetooth adapters. What‘s interesting
about this one is that the minimum bid is $0.01 (one penny) and free shipping is offered. You
don‘t have to be a financial genius to see that if only one person bids on one of these
10 of 14
HACS.exe Vol. 5 No. 10
auctions, the seller is going to lose money. Since the seller is in China and presumably has
direct access to the manufacturer of these devices, he‘s probably paying just a few pennies
for each one. But he still needs to pay the international postage, and if you check the
feedback you‘ll see a number of folks who did get their device for just $0.01. So what gives?
I had $1.08 in eBay Bucks ―burning a hole in my pocket,‖ so I figured I‘d give this a shot.
On my first attempt I set my maximum bid to $0.99, and a couple of people tried to outbid me
in the last few seconds of the auction, but the highest attempt was a $0.50 bid, so I won with
an automatic $0.55 bid. I then tried to bid on another, but I was only allowed to bid on one of
these items from the seller in a 10-day period — so the seller was not going to allow someone
to buy a whole bunch of these for $0.01 each in a short period of time. So I found another
seller of the same item for the same price and put in a maxi mum bid of $0.53, figuring that
at worst I‘d use up my eBay Bucks (which is ―bonus money‖ based on how much you bought
on eBay in the previous month). Again, I had someone else bid, but they only tried up to
$0.36, so I won my second dongle for $0.41. When I paid the sellers using my eBay Bucks, I
discovered that both ―sellers‖ had the same PayPal account, so there was really just one
seller using multiple eBay accounts.
Back to the ―So what gives?‖ question. I see at least 3 possible ways to explain this:
1. The seller is hoping that the $0.01 price will bring in bidders, but there will be enough
people bidding on these so that the final bid will be high enough to make a profit, on average,
over a large number of sales. This doesn‘t seem to be happening, I see lots of people getting
these for $0.01, and even my two quick attempts on this didn‘t raise the price to a point where
the seller could break even.
2. The seller is offering these dongles as a ―loss leader,‖ just like a retail store, in hopes
that you will buy from the seller again when you want something that is being sold at a
reasonable profit. While the ―loss leader‖ concept has shown some success in the retail store
market, on eBay and the Internet you have many choices available instantly so I don‘t think
this concept is going to work.
3. This is my best guess to explain these auctions: The seller is trying to quickly raise his
total number of feedbacks, his positive feedback percentage, his detailed feedback ratings,
and to be a ―Top-rated seller.‖ To understand why these measures are important, you have to
be familiar with the eBay rating system and the preferences of most eBay buyers. I‘m not
going to go into the details here, but it‘s clear that the majority of eBay buyers want to buy
from the ―Top-rated sellers,‖ they like seeing big feedback numbers, and they want to see
positive feedback near 100%. Normally, to achieve these sorts of numbers you have to sell a
lot of items over a fairly long period of time, which is why most buyers feel that they can trust‖
a ―Top-rated seller‖ -- they‘ve got a ―proven track record.‖ This seller is effectively trying to
―buy‖ a solid reputation in a short period of time at a relatively low cost -- the loss on each
individual sale of these dongles is the business cost of building his reputation -he‘s basically
giving away USB Bluetooth dongles to get a large number of positive feedback ratings.
You might wonder why a seller would use multiple eBay accounts. If a seller gets too many
negative feedbacks in a short period of time, eBay may ban the account, or require the seller
to take specific actions to ―repair their reputation.‖ Even a handful of negative feedbacks in a
week will turn off buyers even if eBay doesn‘t take any action, so many of the ―big sellers‖
have multiple accounts so that they can ―throw away‖ an account that has been ―poisoned‖ by
negative feedback ratings.
11 of 14
HACS.exe Vol. 5 No. 10
Gmail Not Displaying Correctly In IE
Jerry Liedl, HACS
Recently a friend called with a problem he has been encountering using Gmail via his ISP,
Morris Broad Band. Following some recent updates he shared the following:
My screen view is all messed up. Everything is kind of vertical and flowing offscreen. All of the items that are usually in a bar across the top such as 'move to,' or
'labels' are now reading vertically down the page. On top of that, everything on the left
- my inbox, labels, etc. - is now off the page and barely visible.
After some soul searching and, of course, web browsing one finds the problem is relatively
common and has a simple solution. Internet Explorer has a Compatibility View, a feature that
affects how some websites are displayed. If Compatibility View is enabled for google.com, it
may cause some Gmail features to display incorrectly. So, the solution is to remove
google.com from the list of sites that have Compatibility View enabled to ensure that Gmail
displays correctly. To do this, follow the steps below:
For IE8
1. Open the Tools menu at the top of your browser1 and select Compatibility View
Settings.
2. Select 'google.com' under 'Websites you've added to Compatibility View'.
3. Click Remove.
For IE9
1. Right-click on the gear icon
in the upper right hand corner. (if you do not have the
Command bar visible you need to select it)
2. Select Command bar.
3. Open the Tools menu near the top of your browser and select Compatibility View
Settings.
4. Select 'google.com' under 'Websites you've added to Compatibility View'.
5. Click Remove
The Tip Corner
By Bill Sheff, Novice SIG Coordinator, Lehigh Valley Computer Group, PA
August 2011 issue, The LVCG Journal
www.lvcg.org
nsheff (at) aol.com
Windows 7
Just got Windows 7? Notice something missing? Well if you want to see a list of what
happened to those programs you liked in XP or Vista here is a simple way to find out. Open
Help and Support then type "What happened" in the search box. Windows will give you lots of
results for the query, such as: What happened to the NetBEUIprotocol?, What happened to
ActiveSync?, What happened to Sticky Notes?, What happened to Windows Calendar?, What
happened to the Run as command?, What happened to the Quick Launch toolbar?‖ and
many more.
12 of 14
HACS.exe Vol. 5 No. 10
Say you picked the ―What happened to the Run command?‖ This is what you get: ―The
Run command no longer appears on the Start menu in this version of Windows. The
search box that appears on the Start menu provides much of the same functionality as the
Run command. However, the Run command is still available if you prefer to use it. You can
even add it to the Start menu for easier access.
To add the Run command to the Start menu Click to open Taskbar and Start Menu
Properties. Click the Start Menu tab, and then click Customize. In the list of Start menu
options, select the Run command check box, and then click OK. The Run command will be
displayed on the right side of the Start menu.
Tip: You can also access the Run command by pressing the Windows logo key +R. Check
it out.‖
Google Images
A while ago Google switched over to a different display method for their images. If you
want to turn it off and go back to the original, here‘s what you do: Scroll to the very bottom of
your Google image search and click on Switch to basic version. If you want to go back to the
regular way, simply scroll back to the bottom and click Switch to standard version.
System Tools
Just for a little review, there are a bunch of very useful programs in the System Tools
folder. To get to them you access the System Tools by going to All Programs | Tools. When
you open the folder in XP you can find the following programs:
►CHARACTER MAP, which allows you to copy and paste letters and symbols from other
fonts into your document without switching fonts.
►DISK CLEANUP, which frees up space on your hard drive by eliminating unused and
temporary files.
►DISK DEFRAGMENTER (Defrag), which speeds up your computer by reassigning or
eliminating stray bits of data.
►FILES AND SETTINGS TRANSFER WIZARD, for transferring files and data from one
drive to another.
►INTERNET EXPLORER (NO ADD-ONS), which allows you to access the internet
without any Explorer addons interfering with it.
►SCHEDULED TASKS, which allows you to schedule a specific time to run updater,
defrag, and other system programs.
►SYSTEM INFORMATION, which tells you the basic ram, processor, etc., of your system.
►SYSTEM RESTORE, which will restore your Windows system to an earlier time.
In Vista and Win 7 you can find all of the above and more. Check it out.
Templates
A template is a prepared form or pattern within various programs such as document and
spreadsheet programs. They allow a user to develop a form that allows for easy entry and
automatically formats and calculates data.
13 of 14
HACS.exe Vol. 5 No. 10
If you are a user of the Microsoft Office suite you are probably aware of them as Microsoft
makes mention of templates and even has a folder of them within their suite.
But are you aware that there are literally hundreds located on the internet? But that is not
all. There are even templates designed for the free suite put out by Open Office. Just Google
open office templates and find body mass calculators, ovulation schedules time cards, shift
scheduling and so much more.
You do not have to reinvent the wheel every time you sit at your computer. One little
caveat though, these are usually presented by users and sometimes do not cover
all you would like to find in a template. But do not lose heart, once downloaded you can
continue to tweak the form until it does what you want the way you want it.
Computer Humor
Newest add-on to keyboard
Send the information regarding what software for which you would be willing
to be a resource person. Send it to jerry@liedl.org and we will publish it for
members to reference.
HACS Officers/Executive Committee
President - Jerry Liedl - jerry@liedl.org
Past President – Joy Capps - joydcapps@gmail.com
Vice-president – Bob Cannon – bob@neqn.net
Secretary – Ken Granzin - granzin@att.net
Treasurer – Jim Bailes - j.bailes@morrisbb.net
Public Relations – Fred Haddad - fredhaddad1@gmail.com
Program Committee – Interim chair is the Vice President
Membership – Interim chair is the Treasurer
Door Prizes – Joy Capps
THE END
14 of 14
HACS.exe Vol. 5 No. 10