Jul - to return to the CUGR home page
Transcription
Jul - to return to the CUGR home page
Volume 2005, Number 07 http: http://users.snowcrest.net/ibmpcugr Tuesday, July 19, 2005 Yum! Compliments of CUG of Redding Annual Ice Cream Social Bring your Family & Friends No Meeting In August! Check at the door for your name tag and please leave it in the Tag Box when the meeting is over. No Motherboard In August Next Motherboard covering August and September will be in September July 2005 Club Calendar WINDOWS & MORE NO MEETING IN JULY OR AUGUST Class will resume on Sept. 7th. DTP SIG NO MEETING IN JULY OR AUGUST Class will resume on Sept. 7th. GENERAL MEETING 6:30 PM, TUESDAY, JULY 19 MULTI-MEDIA NO MEETING IN JULY OR AUGUST Class will resume on Sept. 24 th. 24th. BOARD MEETING — 1 PM, MONDAY, JULY 25 & AUGUST 22 Jack-In-The-Box, Dana Dr. SEE BACK PAGE FOR MORE SIG INFO The IBM/PC USERS GROUP OF REDDING meets at the Palo Cedro Church Of Christ, 21895 St. Francis Way. For more information phone 241-3902 and leave a message. In this issue of the Motherboard… Happy July 4th! Have a great and safe summer SECRET AR Y’S MESSAGE SECRETAR ARY’S Paul Colligan ............................. 2 BOARD MESSAGE C U G .............................................. 2 CLUB PICS June Mentors’ Meeting ............ 3 SEPTEMBER’S DOOR PRIZE C U G .............................................. 4 TREASURER’S REPORT Mario Quinn ................................ 4 BITS AND PIECES Rush Blodget ............................. 5 EV ALUA TIONS/REVIEWS DUE EVALUA ALUATIONS/REVIEWS Jane Quinn ................................. 5 FREE REVIEW PRODUCT LIST Jane Quinn ............................. 5 COMMUNITY SERVICE Jane Quinn ................................. 6 AKVIS COLORIAGE PLUG-IN Anna Lee Horton ....................... 6 ANOTHER SILENT ATT ACK ATTACK Iris Wilsker .................................. 7 PEOPLE PASSWORD PRACTICES Gabe Goldberg .......................... 8 SSNP VOLUNTEERS Dorothy Kirk ................................ 9 BABY BOOMERS & SENIORS SURVEY Anna Coates ............................... 9 Club Information Club Website: http://users.snowcrest.net/ibmpcugr Club Mentors Members volunteering to help members! Word Perfect Charlotte Puck 347-3366, Days only cpuck@shastacollege.edu New Users Dorothy Kirk PaintShop Pro 246-9661, Anytime dak75@sbcglobal.net New Users Bob Rice 357-2143, Anytime ricerl@snowcrest.net MS Windows Darold Wright Photo Delux 222-1781 daroldlwright@yahoo.com MS Word, MS Power Jane Quinn Point, MS Movie 365-0825 Maker 2, DVD jquinn@charter.net Software & Digital Image Pro MS Windows: Bill Ball 98, ME, XP bcard9@charter.net Hardware, Software 275-4632 DTP; Judi Ball Graphic Prgs 275-4632 Photo Editing jebed@charter.net Access Sara Somers Power Point 472-1392 Quicken Modrn-dancer@yahoo.com Board of Directors Darold L. Wright President daroldlwright@yahoo.com 222-1781 Lyle V anNorman V ice & Past VanNorman Vice President kb6dow@arrl.net 242-0925 Paul Colligan Secretary paulinrdng@hotmail.com 247-7044 Mario Quinn Treasurer latingolfer@charter.net 365-0825 Jane Quinn Dir Dir,, Vendor Contact, SIG Leader qjquinn@charter.net 365-0825 Eugenia Goodman Dir Dir, Membership euggoodman@snowcrest.net 221-7723 Anna Lee Horton Director alhorton@sbcglobal.net 222-5521 Bruce Roth Dir Dir,, Sound Control baroh@prodigy.net 247-7306 Bob Rice Dir ebsite Dir,, W Website ricerl@snowcrest.net 357-2143 Bill Ball Dir Dir,, SIG Leader bcard9@charter.net 275-4632 Belva Sullivent Dir Dir,, Greeter Greeter,, Name T ag Manager Tag belvas@juno.com 241-9926 Judi Ball Dir Dir,, SIG Leader jebed@charter.net 275-4632 Margar e t Martinovich Dir Margare Dir,, Membership gmm@shasta.com 241-6378 Motherboard Newsletter Staff Judith E. Ball jebed@charter.net Rush Blodget rblodget@sbcglobal.net Dorothy Kirk dak75@sbcglobal.net Editor 275-4632 Writer 241-4754 Writer 246-9661 Mary Montague Proofreader twinsgranny228@aol.com 365-6414 Anna Lee Horton Proofreader alhorton@sbcglobal.net 222-5521 Rosa Zupancic Distributor zupancic@paiconnect.com 223-9609 Motherboard Newsletter Policies and Deadlines The Motherboard newsletter is published monthly by the Computer Users Group of Redding, PO Box 494778, Redding, CA 96049-4778. The CUG is a 501(c)(3) nonprofit corporation. Subscriptions are included in the $25 annual membership fee. The purpose of the newsletter is to inform members of upcoming events and provide information about the use of IBM compatible computers. Disclaimer: Neither the CUG, its Officers, the Editor, nor the newsletter contributors assume any liability for damages occurred due to the use of information provided in this publication. Reprints: Articles from this newsletter may be reprinted by other user groups if credit is given to both the author, CUG and the Motherboard. Mail a copy of the newsletter where the article is reprinted Page 2 to the Editor at the address in the first paragraph of this text. Personal Ads For Members: Requirements are: 1. Advertiser must be a member. 2. The item must be computer-related. 3. The ad must be received by editor J. Ball by the monthly date of the board meeting. Sorry, no exceptions. Sorry, no exceptions. Other terms must be approved by the club’s Board of Officers and Directors. Article Submissions: All articles and reviews must be submitted to J. Ball by the Monday of the monthly Board meeting (see Page 1 for date.) Sorry, no exceptions. Motherboard Editor reserves the right to make corrections and deletions in all articles in the interest of grammar, style, and space. THE MOTHERBOARD Secretary’s Message It’s your club. Your input is of value to us… MENTORS NIGHT A BIG SUCCESS Our second “Mentors Night” will occur at our meeting on October 18. Our May meeting was such a success that the Board decided to invite club members again to select a program or topic that they are comfortable with, bring their computers to the meeting, and share their ideas with other members. We aren’t looking for professionals, experts, or even people with the time and public speaking skills needed to make a formal presentation. Instead, we plan to set up several stations around the room and invite folks to visit whichever group or topic that interests them. W HICH T OPICS A RE BEST ? Actually, that is completely up to you. If you are interested in a computerrelated topic or a particular piece of software, or a handy peripheal for that matter, there are always others who would like to share your knowledge. That’s what our October meeting is all about. You’ll probably learn more from the people in your group than they learn from you. That’s the way it should be. H OW D O I V OLUNTEER ? Thanks for asking. Send me an e-mail paulinrdng@hotmail.com. I’ll get back to you after I return from vacation on August 10. In the meantime, have a great summer. Paul Colligan From The Board Although there will not be a general meeting in August, there will be a board meeting on the 22nd of August in preparation for September’s general meeting. Remember, these board meetings are open to all members. T HE A NNUAL I CE C REAM S OCIAL July’s Ice Cream Social is provided by the CUG organization. So don’t forget to bring your family and friends and enjoy a great social time. Ice cream, all fixin’s, drinks, and cookies will be available, however if there is a particular dessert you want to share, you are welcome to bring it with you. There is no drawing in July. July 2005 First Time Successful “Mentor Workshop” Meeting Congratulations To Our Winners Jim Smith won the USB 256MB Jump Drive July 2005 Larry Owings won the Holiday Clip Art Explosion Package THE MOTHERBOARD Fred Schmitz won the 10-Pack CD Jewel Cases Page 3 Welcome Renewals Watch For This Door Prize In September! Epson Sylus Photo R200 Printer This is the same model that Judi Ball demonstrated during the June Mentors meeting. It prints beautiful photos, and prints labels directly on affordable printable CD-DVDs! It is new and comes with the 6 fullsized individual Epson ink cartridges, the CD-DVD print tray, and all needed cables packed in the box. Marie Church Marlene Robinson Ronald Chiodo IBM/PCUG MEMBER WEBSITES DAVE & BECKY HEMP Don’t miss your opportunity to win this terrific dual-job printer! www.c-zone.net/dochemp/ Monthly Treasury Report JACK M C AULIFFE by Treasurer Mario Quinn Real Estate Broker www.realtyphoto.com May & June 2005, Reported on June 27, 2005 KITTYSTONE PERSIANS Lynn Johanson kittystone.com MEXICAN-TOURS www.mexican-tours.com Lyle VanNorman lyle@mexican-tours.com EnvironmentalMold.com lyle@EnvironmentalMold.com Informational site for air Quality. Beginning Balance, May 2005 Income: Membership Dues (5/23) Membership Dues (5/03) Door Prize Ticket Donations (5/03) Door Prize Ticket Donations (5/23) Total May Income New May Income Balance Outlay: Church Rent (5/25) Membership Outlay (5/23) Newsletter Postage (5/23) Newsletter Printing (5/17) Office Depot Printing (5/17) Total May Outlay Bank statement agreement (5/31): $3,315.01 $ 75.00 150.00 37.00 38.00 $300.00 $ 60.00 25.00 50.73 48.26 81.30 $ 265.29 QUESTIONED DOCUMENT EXAMINATION Mary Ann Czermak www.documents-examiner.com RIVERCITY JAZZ SOCIETY Joyce Covey jazzjoy@charter.net REDDING REAL ESTATE Rick Goates www.reddingrealestate.net RON COLE JR. www.houseofspecialtygifts.com Publicize Your WebSite Here for FREE! (Members Only Please) Page 4 Income Deposits Not Shown: Membership Dues Door Prize Ticket Donations Total June Income New Income Balance Outlay, Checks Not Yet Cleared: Church Rent Newsletter Printing Total June Outlay Ending Balance (6/27): CD at North Valley Bank Total Liquid Assets $ 75.00 60.00 $135.00 $ 60.00 $ 56.31 $ 116.31 +300.00 $3,615.01 -265.29 $3,349.72 $3,349.72 +135.00 $3,484.72 -116.31 $3,368.41 3,000.00 $6,368.41 The membership dues for springtime (in general) are the highest as most dues are paid during this time of year. This income drastically falls off in the summer as our monthly expenses will be more than we take in. Also, the total assets, including the CD, are to be understood as the club’s backup for all equipment used at the general meetings and for the use of the SIGs, such as the screen, laptop, projector ($2-3000), projector lamps, etc. This backup is necessary, as property insurance is too expensive and these items need replacing periodically to keep up with the ever-changing technology. THE MOTHERBOARD July 2005 Bits And Pieces Free Review Products by Rush Blodget; IMB/PCUG of Redding, rblodget@snowcrest.net For All CUG Members Flash Decompiler 2.1 by Eltima SoftTHE “PHISHERS” ARE AT IT AGAIN unsuccessful in ware for editing movies. Last week when I clicked on the Norton accomplishing this This is a SWF to FLA conversion within icon to update my Antivirus 2005 program — partially because a convenient interface, but fully decomI got a “pop-up” presumably from Norton I do not have a piles SWF movies and enables editing of Symantec that looked quite authentic physical disk (I SWF files. The built-in explorer feature navi(they have learned how to hijack genuine bought 2005 on-line gates SWF files with ease and maintains a Websites of well known vendors and as a download). comprehensive favorites list for fast navigation. The complete details on Flash T HE “P HARMERS ” insert their own links). The message was Decompiler’s functionality can be found that my Norton Antivirus 2005 was about An article in the Inat http://www.eltima.com/products/flash to expire and I would need to enter my vestors Business decompiler/. Product Key to re-verify the expiration Daily for June 21, 2005 states that the They also offer 30 days to evaluate the date. I “bit” on that because I knew that I hackers latest strategy is called demo version of this software. had a previous version over which I had “pharming.” This technique is stated to Disk Password Protection 4 by EXLADE downloaded the 2005 upgrade and hence combine phishing, viruses, spyware, Disk Password Protection, formerly known as HDD Password Protection 4.0 I presumed that their computer had picked and Web address redirection all into one has received numerous refinements, up the older program when I logged on to package. The goal in this case is including increased protection with get the latest changes. identity theft and can fool sophisticated cryptographic data encryption algoThis caused the Norton System computer users. rithms, new support for removable media Status screen screen to turn red and The article states that the typical including Flash drives and USB external show that Internet Worm detection had scenario is for the hacker to insert a worm drives, and a redesigned interface. been turned OFF and that Virus into someone’s computer via a peer-toDisk Password Protection offers password-protected startup of boot funcDefinition updates were no longer peer application. The inserted program tions, read/write operations for partitions available. All other functions of the will locate the Web address file and insert and the hard drive. computer were for the time being still a bogus address for a site representing These and other features of Disk intact. I was able to log onto the a bank or credit card company. When Password Protection 4.0 are described Symantec/Norton Help website where the computer user types in the URL of at http://www.exlade.com/products/ Symantec candidly admitted that the the bank or credit card company it pulls diskpassword protection/. cause could be “a virus infection that out the fraudulent Website. The article EXLADE offers 30 days to evaluate the demo version of this software or request has disabled necessary Norton Antialso cites instances where the pharmers for a Review version. Virus services or deleted LiveUpdate have temporarily taken over Google and XP Web Buttons by XP Web ButtonsXP files.” The suggested remedy involved Amazon.com and redirected users to The latest release of XP Web Buttons many steps in addition to uninstalling their own site instead. sports a new interface, support for .ico files the Norton program. I am so far Among possible remedies the article and clear-type fonts, revised help and lists a browser plug-in by Netcraft that tutorial functions and more icon selections displays geographic information about in .gif and .ico formats. A host of sample projects for inspiration has been included. the site being displayed. If the server’s XP Web Buttons is distributed elecsite is located in Eastern Europe it is tronically over the Internet; free demo probably a bogus site run by a “pharmer.” version is available at http://xp-webContact: Jane Quinn at: buttons.com/ for review/evaluation. qjquinn@charter.net As a member of this club you are eligible to request Review Software The Anderson Senior Center is looking for individuals who would like to from vendors who support User teach a computer class. If you’re interested in offering your computer Groups. See the club’s Website on skills to train older citizens in the community this center has great facilities. the Evaluation Program for details of The topic and the time frame would be of your choosing. For example, this great resource! you could offer 4 classes on the basics of E-mail and the Internet. It Below is the current list of reviews could be an hour class or a two hour class that would meet four times. scheduled to appear in the MotherWhatever you find comfortable to offer would be welcome. board. Our computer room is fully equipped with XP and great software Product: Digital Image Pro 10 packages. Plus with our High Speed internet connection and Projector, Reviewer: Margot Letendre Evaluation Program Interested In Community Service? Due 7/05 Product: Photoshop cs2 Reviewer: Mary Ann Czermak Due 8/05 July 2005 our classroom resembles a college classroom setting. We have several Photo programs, and training tools. If you’re at all interested in sharing your knowledge with others, Please contact Jane Quinn 365 0825 e-mail qjquinn@charter.net THE MOTHERBOARD Page 5 AKVIS Coloriage Plug-in by Anna Lee Horton Coloriage by Akvis is a plug-in for photo-editing programs, such as Adobe Photoshop or Elements, Corel Photo-Paint, and Jasc Paint Shop Pro. A plug-in is a program in its own right, but only works in conjuction with a “mother” program as listed above. This plug-in allows you to color a black and white photo or change colors in a colored picture. It’s a great tool to experiment with in designing and decorating. You can see how a room or house would look in different colors to compare. It’s nice to be able to take those old family pictures and color them. I used the Coloriage plug-in with Microsoft’s Digital Image 9 Suite and in Adobe Elements. Akvis has an excellent help section on the Web. If you click the question mark on the right side of the tool bar, it will take you to their website. Under About Programs, select Working Area and the tools will be explained. Then select How It Works to get a step-by-step instruction on how the plug-in works. The instructions are very easy to follow. What is nice is that the shading, brightness and tonal quality of the original picture are retained when you choose a color for an object in the picture.This makes the picture look natural. So it is important to correct flaws in old pictures of “Aunt Hattie” or great grandma and take out scratches, fold marks, or other such general “repair” before you color the picture. Select your color selections with the original shades and brightness in mind, since you cannot change a dark color to a lighter color and visa-versa from the original picture. Once I had the Coloriage file in one program’s plug-in folder, I copied it and put it into my other photo-editing software’s plug-in folder. When a picture is opened in Adobe Elements, go to the Filter menu and select Akvis and click on Coloriage. It will launch the plug-in. In Microsoft Digital Image 9 to go the Effects menu, select Plug-in Filters and then click on Launch Plug-in Filter. So easy in any of these programs. The Akvis Coloriage window has an image window with two tabs above it—a Before and After. In the Before tab, you see the original photo where you put the Page 6 colors within objects in the picture using the Pencil tool. The tools for coloring are in the toolbar above the Coloriage window. The After tab shows the results. On the far right side of the window are the Navigator, Color Library and the Colors Palette. When you left click a color, the selected color will show in the square on the right in the Colors Palette. The gradient line above the Colors Palette shows the gradients for that color. Select what gradient you want (the eye dropper will show) and use the pencil tool to outline within the boundary of the object you wish to color. If you are inside an object where there are details that will be painted in other colors, outline them with the main color of the object. For example, outline a face with the color of the skin and then draw a closed line around the eyes and mouth in the same color so the color of the eyes and lips won’t bleed into the main area. After you finish defining your color outlines, click on the button that looks like a greater than (>) symbol (next to the eyedropper) to start the colorizaton process. This may take a few minutes. The result is shown in the After tab. If you are satisfied with the colored image, click the button with the check mark to the right of the tool bar and the changes are applied to the original picture and the window closes. The colorized ending result. See the Motherboard on-line at http://users. snowcrest.net/ibmpcugr to see the full effect of these pictures in color. An on-line tutorial by Akvis showing the work window and features and how to color the areas to change. The Color Library is a neat feature. It has under the heading, Peoples, color selections for different skins with gradients in each subset of colors — the same for hair and lip colors. The Color Library is divided into groups and contains colors that are hard to pick, such as grass, trees, stone, bricks, water and leaves. Each group has color selections with gradients within that color. It is a very versatile and useful feature. In the tool bar you have various tools to use like an Eraser tool, a Keep-Color Pencil, an Eyedropper which lets you select a color already painted or select another color from the color palette, a Tube tool to change color of drawn strokes and a Magic Tube tool that lets you change the color of all strokes having the same color. There are SaveStroke and Load-Stroke buttons on the tool bar. These tools are real time savers when you want to work on the image another day. THE MOTHERBOARD I experimented with a sepia colored portrait of my mother’s high school graduation. I changed the background and the color of her dress several times. She wore a string of pearls and when I changed the color of her dress, the pearls picked up the same color. This is where the KeepColor Pencil was useful. For coloring the pearls a smaller Pencil “brush” size was required and this was done by using the slider in the Navigator. When the scale of the image is magnified, the smaller the “brush” size, the easier it is to define smaller color strokes. When the image is made smaller, the Pencil “brush” becomes larger and makes larger color strokes. I also colored a group picture with trees, lawn, fences and a building. Many objects had to be outlined and many colors were required. The Color Library with its many sub-choices of tree, leaves and grass colors was just the ticket. I took a picture of my house and changed the roof and wall colors and experimented with different combinations of color. A great thing should I decide to paint my house. I had fun with a picture of a friend and gave her a different colored lipstick, Continued on Page 7, bottom Column 3 July 2005 Another Silent Attack on Our Computers by Ira Wilsker, APCUG Director; Columnist, The Examiner, Beaumont, Texas’ Radio Show Host; Police Officer W EBSITES : http://research.microsoft.com/rootkit http://www.sysinternals.com/ntw2k/ freeware/rootkitreveal.shtml http://www.f-secure.com/blacklight http://www.f-secure.com/blacklight/ rootkit.shtml At the recent computer security symposium in Corpus Christi, one of the speakers mentioned something that I was vaguely aware of as a threat. The threat is considered as a silent attempt to invade our computers for the purposes of installing viruses, Trojans, worms, or other malware devices. This silent threat may be used by terrorists to launch a coordinated attack on our infrastructure, steal our personal information, or otherwise wreak havoc. So insidious is this threat that it would sound like the content of an urban legend, yet it is documented as real. Imagine a threat that would be undetected by the current antivirus, firewall, and antispyware software, yet be so powerful as to effectively take over our computers, without our knowledge. This threat, formerly considered solely as an unproven concept, is now known to be real. This threat is also now implicated in taking over countless computers. This contemporary threat is known by the innocuous term “Rootkit.” A rootkit is defined on the Sysinternals website as, “ … the mechanisms and techniques whereby malware, including viruses, spyware, and Trojans, attempt to hide their presence from spyware blockers, antivirus, and system management utilities. There are several rootkit classifications depending on whether the malware survives reboot and whether it executes in user mode or kernel mode.” The security software company F-Secure expands the definition with, “Rootkits for Windows works in a different way and is typically used to hide malicious software from for example an antivirus scanner. Rootkits are typically not malicious by themselves but are used for malicious purposes by viruses, worms, backdoors and spyware. A virus combined with a rootkit produces what was known as full stealth viruses in the MS-DOS environment.” Because rootkits are currently very effective at hiding malware from our July 2005 antivirus and anti-spyware scanners, it is quite possible or even probable that our computers are infected, despite repeated scans with properly updated software. Microsoft, and other vendors, have acknowledged the threat and are now beginning to produce software that can detect and destroy the rootkits on our computers. The software is still in its infancy, and lacks the ease of use, automation, and attractive graphical interfaces that we are used to with our antivirus software. It is inevitable that as word of the rootkit threat spreads, and more computers are identified as having stealthy rootkits hiding viruses and other threats, that the small current crop of rootkit detecting software will improve, and other competitors, probably the major antivirus vendors, will join the fight. If rootkit technology continues to spread, the current crop of generally excellent computer security suites from the likes of Symantec (Norton), McAfee, Panda, TrendMicro, and others will be forced to add rootkit protection to their respective suites, or face competitive obsolescence. Fortunately for us, there are a few rootkit detectors already available, mostly for free! This first generation of products still needs much refining to enable the average person to scan for rootkits with ease, but they are still a very good first step. There are a few rootkit detectors available which are currently free. One “RootkitRevealer” is from a company known for its excellent and often free software, Sysinternals. This software uses a patent-pending technology to detect rootkits, and is currently available for download at www.sysinternals. com/ ntw2k/freeware/rootkitreveal .shtml. Rootkit-Revealer will run on almost any Microsoft operating system, NT4 and later, which includes Windows 2000, and XP. Another rootkit detector is from FSecure, a well-known computer security company headquartered in Finland, with offices in the US and elsewhere. FSecure’s product is “Blacklight,” available as a free beta (pre-release) version until July 1. Blacklight can be downloaded at www.f-secure.com/blacklight. I have recently tried both products, and I personally found Blacklight the easier THE MOTHERBOARD to use. It seemed effective at detecting and eliminating rootkits. Microsoft will shortly be making available its rootkit detector, the “Strider GhostBuster,” details at research. microsoft.com/rootkit. Persons unknown who wish to do us harm, either at a personal level such as stealing our account information and committing the crime of identity theft, or the impersonal level, such as cyber terrorists intent on shutting down our critical infrastructure, may use the rootkit technology to bypass our otherwise necessary defenses. Until such time as the integrated computer security suites catch up with this threat, I will now have to add a rootkit detector to my recommended list of essential computer security utilities, alongside antivirus software, a good firewall, and a spyware detector. It is also imperative that all four of these utilities be frequently updated to ensure a reasonable degree of personal security. We will also have to add rootkits to our vernacular of cyber threats, along with the now ubiquitous terms “virus,” “spyware,” and “hacker.” I shudder to wonder what may be coming down the pike next. The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you. AKVIS COLORIAGE Continued from Page 6 eye color and hair color. Purple and green hair and blue lipstick is good for a laugh. Download the Akvis Coloriage plugin for a 10-day free trial at http://akvis.com /en/coloriage/index.php Tutorials can be found on http://akvis. com/en/coloriage-tutorial/index.php After the 10 days a registration key is required. The price of Coloriage is $97. System requirements are: Pentium III minimum 256 Ram minimum 15 MB free space on hard drive Installed photo editor programs that support plug-ins as listed in the beginning paragraph. Page 7 Simple Password Practices Keep PC and Online Data Secure by Gabe Goldberg, APCUG Advisor and Columnist, AARP Computers and Technology Website P ASSWORD DILEMMA We can’t live an online life without them, but if they’re too numerous to remember, they encourage unsafe practices. What to do? First, basics. A password is just the key that opens a computer lock. It may gain access to a newspaper’s online edition, protect banking records, let you bid on auctions, open a frequent-flyer account, or do anything requiring verified identity. Some Web sites assign passwords; most allow choosing them. Rules for selecting passwords are easy to find but are often impractical. Don’t use easily guessed familiar names or words; use letters and numbers and special characters? OK. Avoid anything related to facts about yourself? Makes sense. Don’t share passwords with anyone? Good advice. Change passwords periodically? Oops, it’s a memory test [http://www.eval u8.org/ staticpage?page=review&siteid=8906]. Use unique passwords everywhere? Hm, that takes a lot of passwords. Don’t write them down or store them in a computer file? Tilt! Maintaining passwords is a nuisance. So some people use one password for everything — a bad idea, since sharing or compromising one access opens them all. Password hierarchies are common: use one password for financial matters, another for commerce, and one for trivials such as newspaper sites. That avoids revealing your sensitive e-mail/ password combination to junk Web sites. But don’t use a common password for all e-commerce sites (amazon.com, buy.com, etc.) since they’re occasionally hacked. And treat sites like PayPal as financial rather than ecommerce. And don’t just guess which password you used on a site; some sites lock accounts after just a few failed logins. As passwords proliferate, it’s common to store them in a computer file. And having too many site-assigned passwords guarantees the need to record them. But please, don’t call the file “passwords.txt” and don’t use the word “password” in it. The paranoid and geeky encrypt such files, but that risks losing the file by forgetting the encryption key. Page 8 You can print and save registration pages, but that leads to bulky files, cumbersome to search and requiring updating. Some people use an address book or print lists of sites and accounts, then handwrite passwords. But that still needs updating, and can be lost, destroyed, or found by someone untrustworthy. If you have multiple email addresses, note which you use on a given site, since that’s often the key for logging in or receiving password reminders. Hackers use special software to attack logins, applying dictionary word lists and other guessing techniques. Passwords are described as “strong” (hard to crack) if they have at least eight characters, include upper/lower case and punctuation characters and at least one digit. So even if you use a memory aid for remembering passwords — such as words from a poem — convert them to strong passwords in a way that only you will know. High-tech devices can add security, but they’re usually used only in business settings; they include biometric devices which check fingerprints or eye structure and random logon-key generators. Software password managers are more practical. These record and secure passwords and then auto-fill online logins. Good ones offer a “don’t remember/don’t ask” option to avoid recording info about sensitive sites. Encryption is desirable but not mandatory; it should be possible to secure the password manager itself with a master password. Many managers are free, some are bought, and common software such as Web browsers and e-mail clients often includes it. Google returns many hits related to “password manager” and classy software site Tucows [www. tucows.com] numbers 300 such tools. Before installing one, make sure it supports your software applications, especially if they’re non-Microsoft. Many people don’t secure home computers — but consider cleaners, workers, friends wandering through, perhaps even having permission to use the computer. Suddenly security THE MOTHERBOARD becomes more appealing. If you handle money online, check banking/financial sites occasionally for unauthorized transactions. Remember that you may occasionally need access to secure sites while away from your computer. You can copy passwords to a thumbdrive or PDA or simply print them, but remember that they’re powerful keys and must be protected. Before traveling, check your passwords so you’re not surprised on the road. If you leave your computer running, you can access it remotely via tools such as GoToMyPC. On business-owned PCs, separate personal from work-related material. Determine whether your office has policies for personal computer use and monitoring of computer activity. Some businesses install keystroke loggers which can capture passwords before they’re encrypted. And remember that system administrators can often defeat security measures as part of their job, so you may not want to store sensitive personal material at work. Work and home PCs both need disaster preparation, so family members or colleagues can access what’s needed in an emergency. Work-related passwords and instructions can be stored securely so they’re available but can’t be secretly used. For home computers and facilities such as e-mail and finance, remember that many ISPs and companies have privacy policies prohibiting revealing information to family members, even in cases of illness or death. Instructions and important passwords should be stored with essential family records. Note that changing situations may require special care — for example, a divorce might motivate tight security. This article appeared originally on AARP’s Computers and Technology Web site, [www.aarp.org/computers]. (c) AARP 2004/2005. The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you. July 2005 Motherboard Newsletter Contributors… Our local contributors help tremendously to pay for the functioning of our club. As club members please do what you can to support their businesses. Visit or call their businesses, be a patron if possible, and tell them you saw their business card in the club’s newsletter. Ink Jet Specialties Suppliers of Inkjet and Laser Cartridges, Refill Kits Ribbons, bulk Ink & Accessories Inkjet Refilling Service Ed LeBouef 2610 Bechelli Ln. Redding, CA 96002 (530) 243-4INK Fax (419) 735-9063 Order Line 1-866-243-4INK (530) 243-4465 www.inkjetspecialties.com EdL@inkjetspecialties.com Andy Main Crown Camera Imaging Experts “Northern California’s Finest and First Internet Provider” UNLIMITED INTERNET ACCESS Starting at $15/month! DSL & Wireless Access, Web Design & Hosting Services www.snowcrest.net (530) 245-4698 / (530) 926-6888 Digital Cameras Photo & Printer Supplies 1365 Market Street M-F 8:30 - 5:30 Sat. 9 - 5 Redding, CA 96001 Phone: 530-243-8333 or 800-655-4256 FAX: 530-243-4978 Repair all makes & models of personal computers. ! Repair monitors & printers ! Repair all types of computer related equipment ! Sell IBM compatible computer systems. WE… ! Curtis Ricketts (530) 357-3200 5309 Chestnut St. Anderson, CA 96007 www.com-pair-svcs.com Fax: (530) 357-3803 The New Membership Application Below Is Not A Renewal Reminder Reminder.. Membership renewal dates are on the address label, just above the member’s name. IBMPC Users Group Of Redding Membership Application Name(s): _____________________________________________________ Address: _____________________________________________________ City:________________________________ State: _________ Zip: _______ Home Phone: __________________ Business Phone: ______________ ___ E-mail Address: ________________________________________ _____ __ Date: _______________ $25.00 DUES PER YEAR New Renewal Cash Check MAIL TO: IBM/PC Users Group of Redding, P.O. Box 494778, Redding, CA 96049 (For general information call any Officer or Director listed on Page 2) by Dorothy Kirk Baby Boomers and Seniors Internet Usage The Shasta Senior Nutrition Program (SSNP) is looking for someone to instruct classes in Beginning Windows, More Advanced Windows, Windows XP, Word processing (Word), and The Internet. You do not need to be an expert, just know the basics. Lesson plans and plenty of help are available. The computers are in a private room and use either Windows 2000 or Windows XP. Give it a try, it’s rewarding, as well as fun! Call 226-3060 or visit the main office at 2225 College View Drive. Ask for Tammy or Debbie. Hi, I am a Masters Student at Swinburne University in Australia, and I’m currently doing my thesis on Baby Boomer and Seniors Internet Usage. It’s one of a few similar academic research papers on this topic. The survey is totally anonymous and can be viewed at http://www.surveymonkey.com/s.asp?u=399441062138 It takes around 7-10 minutes to complete. Thanks and Kind Regards Anna Coates, amcal@hotmail.com Posted with the APCUG Organization, June 2005 SSNP Volunteer Wanted July 2005 THE MOTHERBOARD Page 9 Why Join A Computer Club? 1 . Benefit from a common interest in a personal (and costly) investment: Your business or personal computer. 2 . Enjoy more of that investment by learning more about it. 3 . Share ti ps an cks, as well as new andd tri tricks, and old ideas. 4 . Become exposed to a variety of new hardware and software without sales pressure. 5 . Receive an informative monthly newsletter. 6 . Have access to various club func-tions and all Special Interest Groups (SIGs). 7 . Find out that no one needs to be alone and helpless with todays computer technology. Multi-Media SIG IBM/PC Users Group of Redding P.O. Box 494778 Redding, CA 96049-4778 CUG’S MEETING PLACE Palo Cedro Church Of Christ 21895 St. Francis Way. Includes Digital Cameras, Burning Music CDs, and Creating QuickT ime Movies. QuickTime Saturday — 10 AM Class will resume on Sept. 24th. Churn Creek Golf Course Meeting Room; 7335 Churn Creek Rd. Jane Quinn 365-0825 qjquinn@charter .net qjquinn@charter.net Windows & More SIG DTP & Graphics Art SIG Wednesday — 11:30 AM Class will resume on Sept. 7th. Wednesday — 2 PM Class will resume on Sept. 7th. Please see map to left for meeting place. Judi Ball 275-4632 jebed@charter .net jebed@charter.net Bill Ball 275-4632 bcard9@charter .net bcard9@charter.net Page 10 THE MOTHERBOARD July 2005