Cloudeight InfoAve Premium
September 2, 2011 Issue # 411 Volume 8 Number 48
Dear friends,
Welcome to InfoAve Premium, Issue # 411 - We're
glad to have you with us. Thank you so much for subscribing to
this newsletter and for all your support and kind words. We
appreciate it very much!
A special holiday review edition
We want to take a moment and wish all our
subscribers in the USA a very happy and safe Labor Day weekend.
This edition of InfoAve Premium is a review edition. In it, we
feature some of our favorite items from past newsletters, and a
few new things as well. Doing a review edition gives us a chance
to spend time with our family and fiends this long holiday
weekend. We hope that you have a great holiday weekend too.
Thank you!
THANK YOU VERY MUCH
We are very grateful for all the donations we've
received. Your support helps to keep our small business afloat
in these difficult times. We both are sincerely thankful for
your kindness and generosity. We don't know what we'd do with
you! In times like these you discover the best in people. We are
overwhelmed by your response; we can't thank you enough for your
support. Our promise to you is that week after week we'll give
you the best we have.
Thank you!
Can you help?
The road is still rocky for us, but we are very
aware that many of you are having a tough time right now too.
But if you are able to help us get through a very difficult
time, we'd be very grateful. The economy along with
traditionally slow summer sales have put us in a bind. We
continue to work as hard as we can to provide you with the very
best computer newsletter on the Web - and your support and
encouragement has helped us immeasurably. We've cut our expenses
as far as we can and still keep things going. Many of you have
helped us many times and we appreciate it. If you are able to,
this week, please consider visiting our Donation Station and
making a donation. We have some very nice gifts available for
various donation amounts. We have a "donate any amount" feature
- where you can donate any amount you like - even the smallest
donations are greatly appreciated. We really need your help
again this weekend. Thanks so much!

Three new items available right now from our
donation station - all with FREE shipping anywhere in the world!
Now
at our Donation Station!
Carry and protect up to six
camera/digital media cards! Slimline, protective case
holds up to six memory cards including SD, Memory Stick®
Smart Media® and Micro SD. Faux Leather Black case has
strap on the back so you can connect it to your camera
strap, camera bag, belt, etc. Includes a 25 year
warranty by CaseLogic. FREE SHIPPING ANYWHERE!
Learn more and/or donate here.

Now at our Donation Station!
8GB ReadyBoost-ready high performance USB Flash Drive with Bonus
Movie!
Want to share pictures, video, documents, files
and more with your family & friends? Store, transport, backup or
share your files! Large 8 GB capacity has room for thousands of
files. To access your data, simply plug into any PC or MAC -- no
need for cables or adapters. Access your files. Anywhere.
Anytime.
Learn more or donate here.
SPECIAL BONUS! Get a free
downloadable movie from PNY with special coupon code included
with your USB! Choose from dozens of titles from Sony!
Click here
for more information on movies available. Yes, includes USA
and other countries!
Features:
-
8GB High Performance USB 2.0 Flash Drive -
ReadyBoost compatible to boost performance and system speed
in Windows Vista and Windows 7. Remains compatible with
older versions of Windows and MAC!
-
Store, share, transport and backup your
favorite photos, documents, music, videos and more.
-
Low power consumption, non-volatile flash
memory makes Attaché drives more durable than other storage
devices
-
Retractable cap, free tech support from PNY
and 1 year warranty
-
Free shipping to anywhere in the world!
-
Learn more and/or donate here.
Now at our Donation Station!
Wireless Laptop Optical Scroll Mouse
This high-quality Wireless Laptop Optical Scroll Mouse
features a foldable USB receiver so you can safely take this
mouse anywhere! Sleek, compact design for netbooks and laptops.
This mouse is wireless so there are no messy cords or cables to
get tangled. Great for travel or at home. This mouse also works
great with your desktop computer too!
Features:
-
3-button + scroll wheel
-
Operates on 2 x AA batteries, included
-
Color: Black, White or Blue
-
Includes foldable USB receiver
-
Learn more and/or donate now!
If you need to change your
newsletter subscription address please see "Manage your
subscription" at the bottom of this newsletter.
We hope you enjoy this issue of InfoAve Premium!
Thanks again for subscribing.
We thank you all for your
generous support.
A comment from Gerald
Is it just my imagination or are you guys
putting more and more information in this newsletter? The last
few weeks' editions have been jammed packed with information.
Your newsletters have become magazines. Don't get me wrong, I
think it's great. No one can say you're not giving them more
than money's worth. Keep up the great work. I'll be making
another donation this week - I would hate to see you disappear
from the Internet. I've been with you since 2001 and I've come
to rely on the information and advice you provide. Thanks!
Gerald
Thanks, Gerald. It does seem the newsletters
have gotten bigger, doesn't it? When we started Premium, we
featured 4 questions and answers and 5 tips and tricks. Now we
average 6 to 7 questions and answers per issue. When we started
we featured 4 or 5 tips and tricks per issue and now we average
7 to 10. So yes Premium has gotten bigger. We want all our
readers to get more than they paid for every single week. Thanks
again for your kind words and your support. TC & EB
A comment from Linda
After reading your latest newsletter I now know what has
been happening to my laptop (Vista) and my desktop (Windows 7).
I had Avast installed with both of them and also
SUPERAntiSpyware Pro. I couldn't figure out what was happening
but you have solved my problem. I have kept the Spyware
(SUPERAntiSpyware) and gone to Microsoft Security Essentials. So
far things are working much better. I don't get those annoying
messages anymore and believe it or not my boot up is much
smoother. I have been a subscriber for some time and through you
I have learned some pretty nifty things. Keep up the good work
and God bless...................Linda
Thanks so much for sharing and for your support. TC & EB
A
comment from Ann
I have just discovered this powerful little magnifying tool.
It is much more functional than Windows Magnifier. I found it on
Cnet, and this is a link to the
Editor's Review that will tell you all you need to know. I
love your freeware picks! Ann.
Cool little program! We thought you'd like to have your own
freeware pick this week, so we gave you your own spot! Thanks so
much, Ann. TC & EB
A Comment from us
Many of you who use Yahoo mail have been
receiving this newsletter sporadically. We think we've finally
resolved this issue. And some of you using other service
providers occasionally miss an issue. We've been working with
our newsletter sending service to ensure that we resolve as many
problems with delivery as we can.
These are the IP addresses we are now using for
"Infoave Premium". If your ISP has a whitelist, you'll need to
provide them with these IP addresses so they can make sure our
newsletters get through their spam filters and blackists.
69.25.194.2
69.25.194.49
69.25.194.50
69.25.194.51
Also remember the address from which this newsletter is sent is
--
From: "Cloudeight InfoAve Premium" infoave-premium @
pr1.netatlantic.com.
Thank you all for your patience and for working
with us as we try to make sure that every one of you receives
your newsletter every Friday.
Your comments are always welcome!
 Available
this
week from our Donation Station
Padded Neoprene USB Flash Drive Holders with Key Ring
Keep your flash drives handy and safe from
damage with one of our Neoprene Padded USB flash drive holders
with a convenient key ring.
These padded flash drive holders are made from
durable, high-quality neoprene. They'll keep your data safe and
handy.
-
Expandable neoprene case stores 2 USB Flash
drives in separate pockets; padding protects drives too!
-
Metal Key Ring included so you can attach to
keys, laptop case, lanyards, backpacks. Never misplace a USB
drive again!
-
Dimensions 4.75" x 1.75" x 0.5"
Get more information here!
Your donations are very much appreciated. Thank
you!
Bob asks about leaving his computer connected
to the Internet 24/7
Don't you think that leaving your computer turned on and
connected to the Internet with a cable connection exposes you to
unnecessary risks? Also, I have cable Internet and at least 2 or
3 times a day, my connection drops and I am not connected to the
Internet. Sometimes I am offline for 15 minutes or more. Let me
know your thoughts. I have been a subscriber for over five years
now and I have come to rely on your advice and expertise. You
make it more understandable to us non geeks. Thanks. Bob C.
Our Answer
There's nothing dangerous about leaving your broadband modem
turned on 24/7, provided you have good, updated, antivirus and
antispyware installed and you follow good computer protocol. If
you're concerned about malicious people or software somehow
finding their way to your computer (very unlikely) it would be
better to turn your computer off and leave the modem running. If
your computer is off (at the switch) nothing can invade it. It
would provide you with whatever protection you'd get from
turning off your modem, without interfering with the IP protocol
settings of your modem or constantly resetting your modem every
time you turn it off and on.
Cable dropouts are not caused by you turning off the modem
frequently - they're caused by broadband provider problems or
your provider over-subscribing nodes. Each node is designed to
support a certain number of users - we'll use fifty as an
example. Cable will continue to oversell that node until
problems reported by subscribers. Cable companies just can't add
infrastructure fast enough to handle the growth. With so many
cable companies now providing HD TV, Internet Phone as well as
high-speed Internet, it's no wonder that some subscribers
experience slower speeds than they're paying for and service
interruptions. A cable company may put seventy-five to one
hundred subscribers on the node that was only designed to handle
fifty - and that's what causes dropouts, slower speeds and other
problems. If you do experience dropouts, one of the fastest ways
to get reconnected is to unplug the power to your cable modem
for ten to fifteen seconds, and then plug it back in.
We leave our computers and our modems turned on 24/7/365 (unless
there are thunderstorms or weather conditions which may cause a
power failure - or we're going to be away for a few days). We
don't think that you need to turn off your computer or your
modem as a safety measure against "getting hacked" or having
something malicious find its way onto your computer.
It's great that you have several anti-spyware installed and an
anti-virus program. We want to remind everyone that while having
several anti-spyware programs installed is a great idea, you
should choose one to run as your primary protector - and keep
the others to double-check your computer once or twice a week.
Don't have several anti-spyware programs running in the
background. That unnecessarily uses resources and doesn't afford
you any greater protection - it might even cause conflicts. And,
never, have more than one anti-virus installed on your computer.
Always keep your anti-virus and anti-spyware programs updated!
Most anti-spyware and anti-virus programs are reactive not
pro-active types of programs. Windows XP, Windows Vista, and
Windows 7 all have built-in firewalls - and you should always
leave your Windows firewall turned on, but you do not need to
install a third-party firewall.
Also, if you have a router (wired or wireless) you will find
that it probably acts as hardware firewall too. Check your
router's documentation to learn whether or not your router acts
as a hardware firewall - many do. If it does, it will work with
Windows firewall without causing any problems.
Holly keeps getting a network error message
I have been a lifetime subscriber for years and can't wait until
Fridays. I did have to switch my email address from Yahoo to
Google to keep getting your newsletter. Here's my question: I
have a new hard drive that Dell installed on my laptop (trust me,
I WILL clone this one!) and I keep getting the following popup:
Microsoft Network Inspection System stopped working and was
closed. A problem caused the application to stop working
correctly. Windows will notify you if a solution is available. I
have never had this message before and was hoping you could
enlighten me? It doesn't seem to stop anything I'm doing, so I
just close it and keep on working. I have Windows Vista Premium
with IE8 installed if that's any help. My warranty is up in
about a month on my laptop. Hope I gave you enough info. and
PLEASE keep up the great work! Holly
Our answer
Hi Holly. You're in luck. The answer to your question is simple.
The error you're getting is related to Microsoft Security
Essentials' update process. To get rid of the error, uninstall
Microsoft Security Essentials, reboot, then re-install Microsoft
Security Essentials. That should take of those error messages.
Paul wants to
know about a program called Rapport
Recently my bank starting asking all its online banking
customers to install security program called Rapport What is it
and why do I need it? I am hoping you can shed some light on
this for me. I'm sure others who read your newsletter would be
interested too. Thanks you guys.
Our answer
We recently read a pro-Rapport article in a security
newsletter to which we subscribe. It seems there's a never
ending need to create new fears and then provide programs to
protect you from them. It's sort of like being a doctor and
inventing diseases so you can make money providing patients with
cures for diseases you invented. If the overkill weren't so
serious it would be humorous.
Rapport claims to
prevent "man in the middle attacks"; in other words it claims to
prevent someone intercepting data being transmitted to and from
your computer during an online banking or other online financial
session. "Man in the middle" sounds so ominous. We wonder how
many banks have signed on with Rapport because of this ghastly
"man in the middle".
According to
Wikipedia... a "...man-in-the-middle attack (often
abbreviated MITM), bucket-brigade attack, or sometimes Janus
attack, is a form of active eavesdropping in which the attacker
makes independent connections with the victims and relays
messages between them, making them believe that they are talking
directly to each other over a private connection, when in fact
the entire conversation is controlled by the attacker. The
attacker must be able to intercept all messages going between
the two victims and inject new ones, which is straightforward in
many circumstances (for example, an attacker within reception
range of an unencrypted Wi-Fi wireless access point, can insert
himself as a man-in-the-middle).
A man-in-the-middle attack can succeed only when the attacker
can impersonate each endpoint to the satisfaction of the other -
it is an attack on mutual authentication. Most cryptographic
protocols include some form of endpoint authentication
specifically to prevent MITM attacks. For example, SSL
authenticates the server using a mutually trusted certification
authority...."
To put that in
simple English, the only way a man-in-the-middle attack would
ever work is if you were tricked into communicating with a
person who had the time, means, and skill to successfully make
it appear you were on your bank's secure site, and to make the
transactions appear completely normal.
First of all, if
you're only reasonably careful, you're not very likely to
encounter a "man-in-the-middle" attack. By being reasonably
careful we mean simple things - like looking for the https:// in
front of any URL which requires you to enter any kind of
sensitive personal information, if you don't see the https://
(which indicates a secure connection) and see only http:// -
don't enter any personal sensitive information; you're not on
the correct site. Nearly 100% of all online transactions take
place on secure servers with 128-bit encryption.
If you're using
Wi-Fi connections in your home, make sure you use WPA2-PSK
encryption if you have it available, WEP is not as secure - but
better than no Wi-Fi security at all. If you don't know what
WPA2-PSK or WPA or WEP keys are, we will cover them in detail in
the tips section of this newsletter.
So if you are
only moderately careful, the chances of a man-in-the-middle
attack happening to you are less than the chances of you being
beaned by a meteorite. The company which makes Rapport is called
Trusteer. What they have done is created a multi-million dollar
business by taking advantage of banks naïveté - or they've
convinced the banks that they can attract new customers by
creating a new market using good-old fear tactics.
In our opinion,
Rapport is absolutely useless, absolutely unnecessary, and a
gimmick that banks will use to attract customers. It's another
product that someone with great sales and fear mongering skills
came up with, and then convinced major banks that they could
gain more customers by offering Rapport technology. Rapport is
not a free product, but we understand that many banks are buying
the license and then offering it to customers as a free perk.
Rapport's web
site (and we're not even going to include the URL) makes it
sound like if your bank doesn't use their "technology" you're
only seconds away from disaster. It's a farce and it preys on
those who don't know very much about the internet or computers.
If my bank made me use Rapport, I'd find another bank that
didn't waste its money on such foolishness.
That's how we see
it.
Gretchen
wants to know what toggle keys are
I've seen the term toggle keys several places and I'm curious as
to what they are. Can't think of anyone better than you two to
ask. Thanks for all the great info. Gretchen C.
Our answer
Thank
you,, Gretchen.
ToggleKeys
is term used to describe a computer keyboard key that has one or
more functions. For example, the caps lock key, num lock key,
and scroll lock key are examples of ToggleKeys. ToggleKeys are
also an accessibility option.
When ToggleKeys are turned on, your
computer will make a high or low tone beep when you press any of
the NumLock, CapsLock, or ScrollLock keys.
Did you know that the NumLock key is
not as useless as you thought? Did you know that you can turn
ToggleKeys on by using only your NumLock key? When ToggleKeys
is on, your computer will beep whenever you press the CapsLock,
ScrollLock or NumLock keys). Normally, you would turn ToggleKeys
on in Accessibility Options in Control Panel.
And the NumLock key isn't as useless
as you thought. Did you know that you can simply hold down the
NumLock button for five seconds, and that my friends turns on
ToggleKeys for you. It's much quicker than clicking Control
Panel, Accessibility options, and then ToggleKeys.
With ToggleKeys on, you will hear a
beep to let you know you've pressed your CapsLock key - which is
very handy. It also will beep when you press the ScrollLock or
NumLock keys too.
If you turned ToggleKeys on using
this tip and want to turn them off, all you have to do is hold
down the NumLock key for five seconds again.
Karen wants to
go back further than the restore points that appear in System
Restore
Hello there you two! Actually, I have a question that
pertains to Vista and Win 7. Is there a way to go back into
restore points and restore your pc further then the options
given? Like about 3 months ago or something as such? Thank you
so very much! Karen
Our answer
Hello and thanks, Karen. The answer to your question is "no, you
can't". The number of restore points available to you is
directly related to the amount of drive space you've allocated
to System Restore. The default setting is for System Restore to
use 2% of your available drive space. If you want more System
Restore points, you'd need to increase the amount of drive space
available for System Restore to use. If you'd like to increase
the amount of drive space allocated to System Restore you can do
it by following these steps:
1. Click the start button and right-click "Computer"
2. Select "Properties"
3. Select "System Protection"
4. Click the "System Protection" tab
5. Click the "Configure" button next to "Configure restore
settings, manage disk space, and delete restore points."
6. In the dialog window, use the slider to increase the space
available to System Restore.
7. Click "Apply" and then "OK"
We would recommend that you not use more than 5 to 7% of your
total available disk space. While it may seem like a good idea
to have as many restore points as possible, restore points use
huge amounts of disk space. If you really want to be safe,
create an image based backup using a program like Paragon Backup
& Recovery (free). Create the image-based backup when your
computer is running well and you have all the programs installed
that you need and use often. That way, if anything happens,
rather than relying on System Restore to go a few months back in
time (which would use up a serious amount of disk space) use
your image backup to restore your computer to an earlier time.
You image backup can be created and saved for months or even
years, and you can use it to revert your computer back to the
date of the backup.
System Restore is a great feature and it comes in handy - but
keeping restore points for months is impractical as it would use
up far too much of your hard drive space.
Sandy has a Dell computer and needs a new
keyboard
Hi. I love your newsletter! I read it ever Friday evening -
it's my unwind time! My question is this: I have a four year old
Dell computer and my keyboard (which has absorbed many coffee
spills and food attacks) is finally giving up the ghost, I
think. I'd like to buy a new keyboard. Do I have to buy a Dell
keyboard or can I just go the local Best Buy or Walmart and buy
any brand? My friend says only Dell keyboards work with Dell
computers. Give me the straight scoop. I trust you guys! Thanks,
Sandy.
Our answer
Your friend is not correct. Almost all keyboards these days
are USB keyboards. And a USB keyboard is a USB keyboard is a USB
keyboard. You can go to any store that sells keyboards and buy
any brand, and be 99.999% sure it will work with your computer.
All you have to do is unplug your old food-and-coffee stained
keyboard, plug in your new keyboard and Windows (XP, Vista, or
Windows 7) will detect it, and you can start typing away with
only a few seconds delay. Just make sure you pick out a keyboard
you're going to be happy with. Many newer keyboards have all
kinds of features you may not want and/or will never use. So, if
you're like us, and a standard no-frills keyboard works best for
you - buy it. You pay a lot extra for all those "time-saving"
keys newer keyboards seem to want to foist upon you. Everyone
has their own preferences...if those time-saving keys save you
time and you're willing to pay more for them, that's fine too.
The one thing you don't have to worry about is matching brand
names.
Never Reinstall Windows Again!
Reimage is one of our biggest selling featured products thanks
to you!
REIMAGE NOW WORKS ON 32bit and 64bit
Windows XP, Windows Vista, and Windows 7
There's only one
reason why Reimage has become a fast selling product: It works.
Are you looking for a permanent solution for your annoying
computer problems? Slow startup? Slow reboots? Constant Windows
error messages? Waiting forever for programs to start?
Reimage is an online PC repair tool that repairs Windows
and makes your PC run like new again, for a fraction of the
cost that places like Best Buy, Staples, and other computer
repair services charge. And Reimage guarantees it will work for
you or you get your money back!
Reimage Features and Benefits
-
Requires no setup
-
Reimage is the
ultimate professional repair tool
-
Rebuilds the
entire Windows system - without damaging your programs or
files
-
Repairs damaged
operating system
-
Refreshes native
operating system drivers
-
Save 10% off Reimage - use coupon code fixitnow10 at
checkout!
"It works like
Magic." - eWeek Magazine
Don't
spend hundreds of dollars on computer repair.
Repair Windows quickly and easily at fraction of the cost of
computer repair services like "Geek Squad".
Repair your Windows system in minutes.
What is a
secure server?
All computer users
First: HTTPS://
HTTP:// . Do you see the difference? Of course, one has an S at
the end, the other does not. The S stands for secure. All you
have to remember is: it stands for your security.
SSL or Secure
Sockets Layer was first established by Netscape and is the web
standard for exchanging sensitive information between a server
and your computer (the client). SSL is now supported by all
leading browsers: Internet Explorer, Mozilla, Firefox, Safari,
Opera, Chrome and others.
When you connect
to a secure server, your browser asks for the server's digital
Certificate of Authority. This certificate authenticates the
server's identity as a secure server and ensures you that you
will safe in transmitting sensitive to that server and receiving
sensitive data from that server. It assures you that you are not
connecting to an imposter site or communicating with a hacker.
Every time you
conduct a session with a secure server, a session key is
created. The current web standard is for a 128-bit session key
to be issued at the beginning of the session. No one can break
into that session without that randomly generated 128-bit
session key. The only two computers that know the key for that
session is your computer and the secure server. There's
absolutely no way anyone can "hack" into that session, or "spy"
on it. The 128-bit session key has 2 to the 128th power or 2 x 2
x 2 (128 twos) characters. No hacker or criminal, even if they
were using a bank of super computers, using brute force password
crackers, could break the security of your session. When the
session is over, the key expires. If you need to go back to that
server to make another transaction, you'll have to go through
the authentication process all over again. Fortunately, all this
authentication and the issuance of the session key happens so
quickly you don't notice a thing. But behind the scenes, your
computer is verifying the secure server's authenticity, and the
server is generating and exchange a unique 128-bit session key
known only to your computer and the secure server.
Here's a really
good explanation of 128-bit encryption that should give you some
idea how secure your transactions are online. The following
appeared in an article was written by the folks at Inet.
You can
read the rest of the article here.
"...SSL uses
public-key encryption to exchange a session key between the
client and server; this session key is used to encrypt the http
transaction (both request and response). Each transaction uses a
different session key so that even if someone did manage to
decrypt a transaction, that would not mean that they would have
found the server's secret key; if they wanted to decrypt another
transaction, they'd need to spend as much time and effort on the
second transaction as they did on the first. Of course, they
would have first have to have figured out some method of
intercepting the transaction data in the first place, which is
in itself extremely difficult. It would be significantly easier
to tap your phone, or to intercept your mail to acquire your
credit card number than to somehow intercept and decode Internet
Data.
Servers and browsers do encryption ranging from a 40-bit secret
key to a 128-bit secret key, that is to say '2 to the 40th
power' or '2 to the 128th power'. Many people have heard that
40-bit is insecure and that you need 128-bit to keep your credit
card info safe. They feel that using a 40-bit key is insecure
because it's vulnerable to a "brute force" attack (basically
trying each of the 2^40 possible keys until you find the one
that decrypts the message). This was in fact demonstrated when a
French researcher used a network of fast workstations to crack a
40-bit encrypted message in a little over a week. Of course,
even this 'vulnerability' is not really applicable to
applications like an online credit card transaction, since the
transaction is completed in a few moments. If a network of fast
computers takes a week to crack a 40-bit key, you'd be completed
your transaction and long gone before the hacker even got
started.
Of course, using a 128-bit key eliminates any problem at all
because there are 2^128 instead of 2^40 possible keys. Using the
same method (a networked of fast workstations) to crack a
message encrypted with such a key would take significantly
longer than the age of the universe using conventional
technology. Remember that 128-bit is not just 'three times' as
powerful as 40-bit encryption. 2^128 is 'two times two, times
two, times two...' with 128 two's. That is two, doubled on
itself 128 times. 2^40 is already a HUGE number, about a
trillion (that's a million, million!). Therefore 2^128 is that
number (a trillion), doubled over and over on itself another 88
times. Again, it would take significantly longer than the age of
the universe to crack a 128-bit key..."
When identity theft occurs, it does not occur during a secure
transaction. Buying and banking online is as safe (or safer)
than driving to your bank and doing your banking there - or
using your credit card while shopping at your local mall or
shopping center. If you listen to those selling some security
software, like firewalls, or like the "Rapport" service, or
anti-phishing programs (remember all current versions of the
most popular browsers already have anti-phishing protection),
you'd think you were in danger of losing everything every time
you made a transaction online. It's just not true. It's an
example of using scare-tactics and half-truths to create
artificial markets. These fear-mongering software developers
create fear and then make money from that fear. It's a shameless
and endless game. These software developers are like the
charlatan snake oil salesmen of old. But you don't have to fall
pray to their fear tactics. Learn all you can about your
computer and the Internet; educating yourself is the best way to
ensure that you'll never fall pray to these shameless snake oil
salesmen. Billions of dollars are wasted by fearful Internet
users who don't understand the way the Internet works and who
think the answer to their safety online is to load up their
computers with useless software proffered by fear mongers whose
real motivation isn't protecting users from harm, but lining
their own pockets.
Remember, any
time you do online banking, online shopping, or conduct any
transaction which requires you to enter your social security
number, credit card numbers, or any other kinds of sensitive
data, make sure the URL (web address) starts with HTTPS:// and
not HTTP://. And don't click links in email that ask you to
click to change your banking or credit card information or
password. No bank or credit card company is going to send you an
email asking you to click a link in an email and verify your
password or information. If a bank or other financial
institution requires action from you, they'll ask you to login
to your account - not click a link in email. Never click links
in email that appears to come from a bank, payment service,
credit card company or other financial institution - no matter
how authentic it looks. There's a 99% chance that that email is
a phishing email - do not fall for it.
As in life, on
the Internet education is key. The more you know, the safer
you'll be - and without wasting money on useless software.
Find Available Wireless Networks
In Windows Vista and Windows 7
Windows Vista and Windows 7 - all versions
There are many software programs you
can download that will find available wireless networks for you.
But did you know that if you use Windows 7 or Vista, you can
find available wireless networks, wherever you are, without
downloading anything.
To find out what (if any) wireless
networks are available wherever you are and lots of other
interesting information such as signal strength, broadcast
channel, and more about any detected wireless networks near you,
just do this:
1. Press Windows Key + R
2. In the form next to "Open" type "CMD" (without the quotes)
and press ENTER.
3. The command window will open
4. At the prompt enter the following command: "netsh wlan show
all" (without the quotes), and press Enter.
Every available wireless connection
will be shown including the one you're connected to, if any.
Dust to dust
All computer users
Heat is the enemy of your computer's internal workings. And
nothing causes a computer to run hotter than dust and dirt which
collects inside your computer's case - and clogs fans and air
vents. If your computer isn't able to draw fresh cool air into
the case - or if your cooling fans are clogged with dust, your
computer is going to run hotter than it should. If you allow
your computer to run hotter than it should for a long time, hard
drives will fail and eventually processors will fail.
Make sure the inside of your computer's case is free from dust,
dust bunnies and dirt. Once every month, open your computer's
case and check the fans and vents. If you see signs of dust
collecting, use your vacuum cleaner with an attachment, to
vacuum the dirt and dust away. Keeping your computer's case,
fans, and vents free of dirt and dust keeps your computer
running cooler. If your computer runs cooler, your hard drive(s)
and processor will last longer.
Some people will tell you to use compressed air to clean dust
and dirt from your computer. You can do this, but sometimes all
you do with compressed air is scatter the dirt and dust. We
suggest you use a vacuum cleaner - with an attachment - to clear
the dust and dirt from the inside of your computer and the air
vents built into your computer's case. Be gentle.
Use your
toolbars to organize any folder
Windows XP, Windows Vista, Windows 7
We've been getting a lot of questions lately about organizing
files in a folder. I guess we do it so matter-of-factly that we
don't really think about it. It's so easy and so natural to us
that we're sometimes baffled by the emails we get that ask how
to get their files back to A to Z order instead of Z to A order.
It's so simple to organize any folder on your computer using
nothing more than what you look at every day - a little
sub-toolbar that appears when you open almost any folder.
The following screen capture was taken using a Windows 7
computer so the toolbar might look a little different to you if
you're using XP or Vista - but you will always have some or most
of these options.
Look at the screen shot below:

If you click on "Name" for example, it will reorganize your
files alphabetically. So if your files somehow got arranged Z to
A, clicking on "Name" will organize them A to Z. Click it again
and their back to Z to A....and so on. It's so simple we
sometimes forget that many people don't know that you can do
this.
You can organize your files by size too. Click "File size" once
and the files will be organized from the smallest to the
biggest. Click it again and they'll be arranged from the biggest
to the smallest.
Are you beginning to see a pattern here?
OK. So what would happen if your files were organized by "Date
modified" from newest to the oldest and you clicked "Date
modified"? RIGHT! Your files would be rearranged from the oldest
to the newest. What if you clicked "Date modified" again? RIGHT!
You'd be right back to the beginning, with the newest files
listed first and oldest files last.
If you want to
organize your files in other ways, Windows gives you more
choices you can add to your toolbar. See the screen shot above
for some of the other ways you can reorganize your files.
What firewall vendors don't want you to
know
Windows XP, Windows Vista, Windows 7
Some of you have noticed that Norton 360 now includes
"LifeLock". So Norton now not only touts that its firewall can
keep you safe from identity theft - but "LifeLock" can keep you
even safer. The truth is, neither one can. Norton knows it. We
know it. Anyone who understands how identity theft works knows
it. If all you needed was a firewall to keep you safe, snug, and
secure, why would Norton shell out millions of dollars to
include the questionable LifeLock membership program in their
security. Security vendors will do anything to convince you - if
only you bought their product you'd be safe. But it's not true,
and they know it. Norton's shenanigans prove it. Not only
doesn't a firewall prevent identity theft, Norton basically
admits it by putting in a program designed to prevent identity
theft. But LifeLock doesn't prevent identity theft - and that's
why they've been sued by users and by the FTC. LifeLock a while
back paid a hefty fine to the U.S. Government for making false
claims. It's too bad the U.S. Government doesn't take a closer
look at the claims being made by security and firewall vendors
these days.
Software vendors have never been above hyperbolizing to the
point of prevarication. We subscribe to many security
newsletters - some of them published by security software
vendors like Sunbelt and McAfee. Sometimes reading the baloney
these newsletters serve up to their readers almost makes us want
to regurgitate. And it's a shame that vendors will go to any
lengths to sell a product knowing it can't possibly do what they
promise. Unfortunately, gullible readers gobble up the baloney -
because scare tactics sell products.
A firewall - no matter which one - cannot prevent identity
theft; there isn't a program made that can prevent you from
giving your information away willingly. The best crooks can
trick the innocent into giving up passwords, email addresses,
credit card numbers, and even social security numbers.
A firewall is necessary, but every version of Windows from XP on
has had a built-in firewall. If you listen to the so-called tech
experts, they'll tell you Windows firewall isn't as good as
brand x, y, or z. If you're paying attention when you're reading
though, you'll find that most of these so-called experts are
selling brands x, y, or z - or all three. The motivation is
money - your money. So in a sense those who twist the truth are
our for the same thing as the crooks who trick you into giving
up your personal information --- your money.
Firewalls can't protect you from identity theft. In most cases,
they don't even help. LifeLock, now included with Norton, has
been the target of many lawsuits and has already paid a stiff
fine to the government for making false claims.
When it comes down to it, you need a good anti-spyware program -
or two, a good anti-virus program and you need to keep them
updated. You need to keep Windows firewall turned on - not
because it will protect you from identity theft, but because it
can protect you from the unlikely event of unauthorized access
to your computer via a network.
What you really need to protect you from identity theft is
something you already have - common sense. The same old common
sense you've been using for years - the common sense that tells
you not to leave valuables lying on the front seat of your car,
to lock your car doors, to lock you house at night when you go
to bed, etc. Most identity theft occurs when people get careless
and click links in emails that look as if they came from a bank
or credit card company. These links lead to counterfeit sites.
Unwary users give up their personal information unwittingly -
and that's how identity theft most often occurs.
A firewall isn't going to stop identity theft. A 3rd-party
firewall will certainly lighten your wallet -legally. Common
sense will prevent identity theft better than any combination of
security programs. Think before you click! And always make sure
you know where you're going and to whom you're giving your
information. When in doubt - leave it out. Don't give away any
personal information to any site unless you're absolutely sure
of the site you're on.
Why you should
love advertising
All computer users
We have been poking around on the Internet since the early 90's.
It hardly seems possible that almost 20 years have passed. Back
in those early days, the Web was not the hub of commerce it is
today. Most of the sites were small mom & pop shops - and the
web was every bit as interesting as it is today. As the Web
grew, those mom & pop sites - including ours - discovered the
facts of the Internet: It is not cheap to have and maintain a
presence on the Web. The more traffic that flows to your site,
the more bandwidth you need, the more bandwidth you need, the
more expensive it is to keep the site on the Web. And back in
the mid and late 90's, bandwidth was even more expensive than it
is today. The costs involved in maintaining a presence on the
Web is higher than just the cost of the bandwidth too. Unless a
person or company can afford to buy and maintain Web servers,
hire professionals who know how to keep those servers up and
running and connected to the Web -- and have the money to
purchase the "pipe" that connects those servers to the Web, you
have to pay a Web hosting service to host your Web sites - and
that costs money too. These expenses are in addition to the cost
of the time you put into the site(s). For us it was and is a
labor of love, but it's intense labor - most times we still put
in 10 to 14 hours a day. Neither of us can remember a day - even
during our rare vacations when we haven't spent at least a few
hours working on the sites. There's always something to do.
Back in 90's we, along with tens of thousands of other mom & pop
sites, learned quickly that you can't keep taking money out of
the family budget to keep a site on the Web. In the early 2000's
hundreds of thousands of smaller sites simply closed up shop.
Other, more successful ones, were gobbled up by bigger sites,
and others, like ours, tried to make ends meet by adding
advertising to our pages. We quickly learned that almost
everyone hated advertising and hardly anyone clicked on those
ads that we put there to help pay the bills. If people didn't
click, we didn't get paid. In fact, it's considered excellent if
1% of the people who see ads on a site actually click on the ad
- even if it's something that interests them.
Here we are in 2010 - still struggling to pay the bills. We've
resisted the temptation to put pop-ups, pop-unders, and floater
ads on our sites. We could make some extra and much needed
revenue by doing that - but we don't like intrusive ads - and we
figure our site visitors won't either. So, we've resisted the
temptation to monetize our traffic more effectively by putting
those kinds of ads on our site.
The ironic thing about all of this is: If people would have not
looked at advertising on the Web with such disdain, there would
be hundreds of thousands more thing free on the Web. Every year
more and more free things disappear, and there are more and more
things you have to pay for. E-Commerce is big business, so big
in fact, within the next 10 years more sales will take place
online than in brick & mortar retail stores. And when this
happens, guess what? Those retail stores you've shopped for
years will disappear, just like newspapers are disappearing
right now. As more people get their news online, as more people
buy clothing, computers, electronics, books, etc. online, the
less "real" newspapers and "real" stores there will be.
We all got used to advertising on TV. When cable TV first
started, there weren't any ads. Now, spend an hour watching CNN,
Fox News, Discovery Channel or most any other cable network and
you'll find there are just as many ads on cable TV as there are
on broadcast TV. The only difference is - you're paying for
cable and you still have to watch ads.
When we travel the Web, we're just like you. We tend to tune out
advertising too. But we're starting to realize that unless we
all changes our attitudes about advertising, the Web will become
more and more commercial and less and less free. It would be a
shame if the Web we leave to our children and grandchildren is
nothing but a Web of ecommerce sites - a Web where you can't go
very far without a credit card.
If we all continue to view ads as a negative and tune out ads
every time we see them on the Web, then we're almost assuring
that the Web of the future will be a lot less free than the Web
we enjoy today - just like the Web we enjoy today, is a lot less
free than the one TC & EB enjoyed in the 90's.
Advertising has kept broadcast radio and television free for
decades - and it can help keep the remaining free sites on the
Web - free. If advertising can't support your favorite free
sites, then those sites will have to find other ways to generate
income or they'll disappear. You can still find a lot of free
and useful things on the Web - but just because they're free for
you doesn't mean their free for those who provide them. It costs
us thousands of dollars every month to provide the free products
and services that we provide. We gladly provide them to everyone
free. If the day comes when we can no longer afford to maintain
and host our sites, we'll have a decision to make. Right now,
we're doing all we can to make sure that day never comes.
If you want to
keep the Web free and keep it from falling into the hands of a
handful of huge corporations, if you don't want to pay for
everything you do on the Web, if you want to keep the free
things on the Web free - then you should love advertising.
Advertising might be annoying but it will be far more annoying
and expensive, if someday you have to pay a membership free or a
fee each time you want to access the sites that you enjoy. So,
if you see an ad that is advertising something that may be of
interest to you, click it and check it out -- that may be the
only way a website makes money.
A true story of a computer disaster averted
Windows XP, Widnows Vista, Windows 7
Last week a friend of mine called me with a perplexing Windows
problem. He couldn't access the Internet, some Windows functions
had been disabled, and his antivirus program had been
deactivated. To make this part of the story as short and sweet
as possible, we figured out that he had someone gotten when of
the new generation of viruses that installs as a regular
program, then deactivates the antivirus software, and then does
its dirty work. These viruses, I fear, will be pretty
commonplace in the coming months. These new designer viruses are
pernicious and very well programmed.
Anyway, there wasn't much he could do but format his computer
because formatting was the only certain way to ensure that the
virus was removed and all his Windows functionality was
restored. But formatting a hard drive and reinstalling Windows
is always a last resort and always a pain in the you-know-what.
Not only do you have to format your hard drive and reinstall
Windows but then (if you don't' have a good mirror image backup)
you have spend days, maybe weeks reinstalling all your software
programs, adjusting settings and blah, blah, blah. In short:
It's no fun.
Besides reading him the riot act about keeping good mirror-image
backups, I tried to help him find an alternative for him when
there seemed to be none. I'm resourceful if not smart. Anyway, I
sent him off to give
Reimage a try. I advised him that
Reimage is the only thing I knew of that had the potential
to save his current Windows installation, all his programs,
remove the virus that was destroying his system, and get his
computer back for him without formatting. I told him the truth:
Reimage works 85% of the time, nothing works all of time.
Obviously Windows doesn't work all of the time.
He gave
Reimage a try and now his computer is running again and he
didn't have to format. Reimage is not a tool to use for minor
problems or occasional errors. It's big time repair for big time
problems. It's something anyone facing a format and
reinstallation of Windows should try before resort to a format.
And its certainly better than calling Geek Squad and spending
$199.00 or more only to have them format your computer and
reinstall Windows.
This is a true story and it's a good tip. We really do use and
recommend the products you see mentioned in this newsletter
every week. We recommend them to our best friends and family
members too. Reimage is not a miracle, it's as great tool. It
saved my friend's computer and saved my friend days and days of
work.
Before you call Geek Squad, Staples or some other computer
repair service, before you give up the ghost and format and
reinstall Windows,
give Reimage a try. There's an excellent chance it will work
for you too and save you tons of money and tons and tons of
aggravation and time. And you have nothing to lose. If Reimage
doesn't work for you, you get a full refund.
Tips for tabbed browsing
Windows XP, Windows Vista, Windows 7
Not a week goes by that we don't receive a few emails from
people telling us that our links don't work on one page or
another. And sure enough, we'll go check and the links are
working perfectly. The problem is the don't have their browsers
configured to switch to new tabs as they are opened. If browsers
are not configured to switch to the new tabs as they are opened,
then there is a good chance a user won't notice that a new tab
has been created. When browsers featuring tabbed browsing are
not configured correctly and a user clicks a link that opens a
new tab, the old tab remains in focus, and the new tab may go
unnoticed - especially if there a few other tabs already open.
Tabbed browsing is a great feature - and it saves having a
lot of separate browser windows open, that's for sure. But when
tabbed-browsing is not set up correctly it may seem like links
are not working. We are reminding you to make sure your browser
is set to switch to new tabs when they are opened.
Here are the instructions for the three most popular
browsers:
Internet Explorer 8 and 9
Click "Tools" "Internet Options" and on the "General" screen
(the default dialog) click the "Settings" button next to "Change
how web pages are displayed in tabs". Then in the Tabs dialog
check the box next to "Always switch to new tabs when they are
created".

Firefox
Click "Tools", "Options" then click on "Tabs" and check the
boxes that say "Open new windows in a new tab instead" and "When
I open a link in a new tab, switch to it immediately."

Google Chrome Browser
Chrome is auto-configured to switch to new tabs as they are
opened. No problems with tabs if you use Chrome.
If you use Firefox or Internet Explorer, why not check right
now to make sure your browser is set to switch to new tabs
whenever they're created. You'll find your browsing experience
will be much better this way!
How much stuff
can a flash drive hold?
Windows - all versions
All of sudden,
everyone is discovering the convenience and utility of USB flash
drives. One of the questions we are asked most often is: "How much
stuff can a flash drive hold?" Well, it depends on the size of the
flash drive and the size of the files.
To give you an idea
of how much a flash drive can hold, we've created the following
chart. The files sizes we used were the average sizes for photos,
MP3 songs, and MS Office Docs. Hours of video are hours of video. If
a average full-length movie lasts 2 hours, you can do the math.
Flash drive capacity |
Photos |
Songs |
MS
Office Docs |
Video (Hours) |
32GB |
22,900 |
15,300 |
29,000 |
72 |
16GB |
11,400 |
7,600 |
14,500 |
36 |
8GB |
5,700 |
3,800 |
7,200 |
18 |
4GB |
2,850 |
1,900 |
3,600 |
9 |
2GB |
1,400 |
900 |
1,800 |
4.5 |
Check out our 8GB ReadyBoost-ready
USB flash drives available at our Donation Station right now.
Block
a Sender in Gmail
Windows all versions - Gmail account
Are you getting emails from someone you'd rather not receive emails
from? Well, you could mark one message as spam, and then everything
else from that sender would be forever placed in your spam folder,
out of sight and out of mind. But then, you'd either have to wait
for Google to clean your spam folder periodically - at whatever
interval they decide - or you'd have to manually clean your spam
folder whenever.
Here's a way to block a sender and have the email sent right to
trash - out of sight, out of mind, forever. Gone forever too.
1. In Gmail, click the "Create a filter" link near the top of any
Gmail mailbox.
2.
Type the email address you want to block under From:.
3. Examples: If you want to block emails
from an entire domain, you can do that too. If you wanted to block
a message from
hirohiro@youbetchacom, you'd enter that. If you wanted to block
all mail from youbetcha.com, you'd enter "@youbetcha.com".
If you want to block several different email addresses in one entry,
separate them with a | (the pipe, or vertical bar, normally located
above the backslash on the keyboard).
Do you have a tip or trick to share, or something
you'd like us to research?
Let us know!
What
do you mean by "third-party"?
When we use the term "third-party" in
regards to Windows, we mean software that does not come with the
Windows operating system. For example Irfanview would be a
third-party image viewer. Windows comes with it's own image viewer
so you don't really need Irfanview. But Irfanview is better and more
robust. So we use a third-party image viewer on our systems.
Most often you'll read about
third-party firewalls. We don't recommend them. Windows XP, Windows
Vista and Windows 7 all come with a built-in firewall. Many
so-called experts feel the Windows firewall doesn't protect you well
enough. We disagree. We don't recommend third-party firewalls for a
number of reasons, many of which we've covered over and over.
Anytime you see us reference
third-party software it means software that does not come with
Windows, it comes from a "third-party" - in other words from someone
else other than Microsoft.
 Available
now at our Donation Station!
USB
2.0 Expandable Memory Card Reader
SUPPORTS 10 Different kinds of Memory Cards!
This high-quality USB 2.0 Expandable USB Flash Memory Card
Reader Pen Drive allows you to flexibly transform your supported
flash memory card to a portable pen/flash drive. Use it to read your
camera's SD card if you don't have a SD card slot on your
computer... you won't have to hook up your camera to transfer
pictures from your SD card. Use it to transfer data from any device
using a memory card to your computer!
Slide your SD/MMC/Mini
SD/RS MMC/T-flash memory card into this expandable pen drive and
transfer your data or photos to your computer without cables. This
expandable pen drive allows you to turn any memory card into a USB
flash drive in seconds!
Specifications:
-
Supports SD, MMC, MMC II, RS MMC, Ultra II SD,
Extreme SD, Extreme II SD, Mini SD, MMC Micro, and T-Flash
-
LED indicator lights
-
Transform supported flash memory card to a
portable USB flash drive.
-
Hot swappable (Swap memory cards without
unplugging from the computer.)
-
Change to a different flash memory card at
anytime
-
High-speed USB 2.0 supported
-
Use it to read your camera's SD card if you
don't have a SD card slot on your computer. Then you don't have
to hook up your camera to transfer pictures from your SD card.
Computer has no card reader? No problem. Put your
camera's flash memory card into this USB flash drive/Card Reader and
plug it into any open USB slot on your computer! Or use your flash
memory card as a USB Flash Drive! Use it to transfer data from any
memory card to your computer in a flash!
Get
your USB 2.0 Expandable USB Flash/Pen Drive with SD/MMC Card Reader
Pen Drive today!
Our software
recommendations |
- Our
new #1 choice in registry cleaners and optimizer. Easy and safe.
It's a winner. Save
$20 on
Registry Commander right now - or get more information about
Registry Commander here. New! Use your license on 2
computers!
SUPERAntiSpyware
Superior antispyware protection - lifetime
license - on sale now! Now our #1 choice for antispyware
protection.
Captain
Optimizer - Save $20 on the program that won our
best new software of 2010 award! Use your license on two
computers!
Read
more here.
Shadows
I think everyone has shadows in their past. Some dark corners that
don't look very pretty when the light of day shines upon them.
Maybe I just think everyone has shadows in their past because I have
so many. Or maybe others have too many too. Or maybe very few really
do, but it is comforting to think they do.
It occurs to me that I can't base my life on what happens to others.
It's true, I think, that we all need to feel that we're not alone -
that others share some of the same things we don't like about
ourselves. But we all bear the consequences of our own actions - and
looking for faults and shadows in others is no way to fix the faults
in me or shed light on the shadows I've buried deep beside the path
of my life.
Visit this page to read the rest of this essay.
This
week's freeware pick |
Desktops
Operating systems: Windows XP, Windows Vista, Windows 7
File size: 60kb zip file - download - no installation required
Download times: a second or two on any connection
I'm getting kind of
jaded in my old age. Not too much impresses me anymore. While
looking for a freeware pick of the week this week, I stumbled on one
that is only 60 kilobytes. Do you know how small that is? We'll the
PNG image featured in this article is almost 60 kilobytes. Some Web
pages are well over 60KB. My first thought was how can a program
which is only 60KB be any good? It isn't good. It's great.
What Desktops does is
give you four separate workspaces. Really! With just a click you can
switch between 4 desktops. You can be working on your next Pulitzer
Prize novel on desktop #1, chatting with a friend on desktop #2,
reading an ebook on desktop #3 and have your email program running
on desktop #4 - and switch between them with a single click. These
virtual desktops are the real deal - it's just like having four
separate desktops. Really! Here look:

There are four
separate desktops running on one Windows 7 laptop. To switch between
them, just click on the one you want to use. It's that easy.
Rather than prattle
on about Desktops (which is a Microsoft application via
Sysinternals), let call in the program's developer to tell you more
about this unique application - a lot of program squeezed into 60KB,
let me tell you. Anyway here's what the developer has to say:
"Desktops allows you
to organize your applications on up to four virtual desktops. Read
email on one, browse the web on the second, and do work in your
productivity software on the third, without the clutter of the
windows you're not using. After you configure hotkeys for switching
desktops, you can create and switch desktops either by clicking on
the tray icon to open a desktop preview and switching window, or by
using the hotkeys.
Using Desktops
Unlike other virtual desktop utilities that implement their desktops
by showing the windows that are active on a desktop and hiding the
rest, Sysinternals Desktops uses a Windows desktop object for each
desktop. Application windows are bound to a desktop object when they
are created, so Windows maintains the connection between windows and
desktops and knows which ones to show when you switch a desktop.
That making Sysinternals Desktops very lightweight and free from
bugs that the other approach is prone to where their view of active
windows becomes inconsistent with the visible windows...."
What more can we say?
A 60KB program that doesn't even need to be installed, that gives
you four separate workspaces. It's just too cool. And because it's
so cool,
we've named Desktops our freeware program of the week.
You can read more about and/or download Desktops by following this
link.
Hey, EB! We done
good!
Switcheroo Zoo
This is a typical Eightball special
for sure. I send her out on a mission to find a site of the week and
she comes back with ten - about 4 hours later. It seems she enjoys
playing around on these sites more than working, so perhaps in the
future I'll find the site of the week and play around and let her
work!
This week's site of the week is really
great though - even if Eightball was the one who found it. It's
great for adults, it's great for kids, it's great for grandparents
and grandchildren; it's great for everyone.
Basically what this site does is allow
you to create your own zoo - and create your own animals. Maybe you
have your own animal at home - your husband - or your wife - but
we're not talking those kinds of animals, we're talking about cutesy
bizarre creatures. Now I'm not saying your husband or wife isn't
cutesy - or bizarre, I'm just sayin'.
Before I get way off track here and
start prattling on and on about things I shouldn't, I'm going to
stop right here and let the site's developers have their say. I'm
sure they'll be far more succinct than I. Take it away, Switcheroo
Zoo developers:
"Switcheroo Zoo (a.k.a. Switch Zoo)
started as a small project. We were playing around with the idea of
making new animals by switching their parts. At first, the zoo had
just nine animals, and it was the only attraction on the website.
Today, there are 142 species in Switch Zoo, and the site features
animal games, music performed using animal voices, a reference
section about all of the animals in Switch Zoo, lesson plans, and
poetry, stories and artwork created by students and visitors...."
You can do more at
Switcheroo Zoo than
just make your own zoo and create your own animals. You can create a
habitat, for example, and lots more. It's sort of hard to explain
this site except to say you've probably not seen anything like it
and you'll have a lot of fun there. If you have kids or grandkids,
Switcheroo Zoo is a great place for them too.
I think you'll really like what
Eightball found for you this week - but don't write me complaining
because you wasted so much time there. I'm just the messenger, I'm
not the message. Take a
few minutes, right now, and visit this week's site of the week -
Switcheroo Zoo.
Twitter, InfoAve Daily and Facebook
We've been very active on our Twitter and Facebook pages recently.
You can follow us on
Twitter here.
Also
we've got a new daily tips and tricks newsletter that we send every
weekday afternoon around 7PM Eastern time. It's free and you can
sign up for it at
http://thundercloud.net/start/subscribe.htm. It's a great way to
review some of our best tips from all the past issues of our
newsletters.
We like you! And we'd like you to like us on
Facebook. We're not too proud to beg! Walmart has more friends than
us! We gotta do better! Cloudie is hurt.
Please take a second and "like us" on Facebook by
clicking on Cloudie. You won't hurt him. He's ticklish! He likes it.
Google promoting daily deals on its front page
Google Inc promoted a daily deals offer on the front page of its
website on Wednesday, a rare instance of the search giant using the
prized online real estate for advertising.
Google, the world's No.1 Internet search engine, launched a daily
deals business in certain cities earlier this year, in a move to
counter the increasing influence of deals giant Groupon.
The move signals an escalation of Google's competition with Groupon,
as the two companies vie for ad dollars from local businesses, such
as restaurants and retail stores.
A short blurb underneath Google's famously sparse homepage on
Wednesday offered visitors $25 tickets to New York's American Museum
of Natural History for the discounted price of $5.
Continue reading...
Apple should take Amazon's new tablet computer seriously
Is Apple's iPad the undisputed king of the tablet market? There's a
new challenger likely entering the race that could give it a run for
its money.
Tech analysts say Amazon is set to introduce its Android tablet
later this year. And we're hearing if the company plays its cards
right, it could sell as many as five million tablets in the fourth
quarter...
...Amazon has to get the right content and services
that really show consumers what they can do with the device.
While Rotman Epps thinks Amazon may eventually cut into Apple's
business, right now the introduction of its tablet mostly means
reinvigorating the Android market. And its other competitors should
take heed, she said, because Amazon has more assets than Samsung, HP
and Research in Motion.
"They have as much content as Apple does in terms of music, videos,
and games, and they now sell Android aps," she said. "So they'd be
piggybacking on the Android ecosystem but taking it to the next
level."
Continue reading...
Important Links:
Submit your questions, comments, and suggestions for possible
inclusion in our newsletters here. This form is for
questions, comments and suggestions for this newsletter, not for
product support, stationery questions, or general questions
concerning our products or services.
Submit your Windows
tips and tricks here.
Send us your
suggestions and recommendation for future freeware picks and/or
sites of the week.
Follow us on Twitter
Visit this page
if you're having problems getting our newsletter - or if you
think your ISP is blocking, censoring or deleting this
newsletter.
If
you need help with one of our software programs, have a question
about an order, or have a question about any of our email
stationery, screen savers, or other products - please don't use
our InfoAve Questions/Answers/Tips form.
Please
use our general Cloudeight support form
instead.
Recommended security applications
Microsoft Security Essentials version 2 - excellent anti-virus
protection. Free and easy to use - easy on resources.
AVAST Anti-Virus (free version for personal/home use - updated
to Version 5) AVAST continues to offer and support their free
version.
AntiVir (free personal version available) now compatible with
Windows Vista and Windows 7.
NEVER
INSTALL MORE THAN ONE ANTIVIRUS PROGRAM!
No
anti-virus can protect you if you do not keep it updated. Update
your anti-virus at least twice a week or more. Install and use only
one anti-virus program. Installing two does not give you twice the
protection. On the contrary, installing two could result in reduced
protection and many computer problems.
Also,
it's very important that you keep your Windows updated with the
latest patches, fixes, and updates. If you don't have Automatic
Update turned on, you should consider turning on Windows updates -
at least to notify you when updates are available. You can still
choose when to install them, not install them or install them
automatically. If you don't install Windows updates you could be
leaving yourself vulnerable to emerging threats. We highly recommend
you install all Windows updates as soon as they become available.
Recommended anti-spyware programs (install two anti-spyware
programs for the best protection)
SUPERAntiSpyware
Superior antispyware protection - lifetime license -
on sale
now! Use your license on two computers - it costs less than
$12.50 per computer for a lifetime of spyware/malware protection.
Pay once - never pay again. SUPERAntiSpyware is our #1 choice for
antispyware protection.
Recommended firewall
We do
not recommend any third-party firewalls. We do recommend you use the
Windows Firewall and leave it turned on.
Other
recommended programs
These programs can help protect you
and your computer in other ways than anti-spyware/anti-virus
programs.
Malwarebytes
(free version - no real-time protection - but very useful anyway.
Malwarebytes (Pro version) - includes real-time protection -
lifetime license.
Always
keep your common sense with you when you're on the Internet. Don't
be lured into installing free software or signing up for a free
service if it seems too good to be true. Research it - google it!
Read the privacy policy and/or Terms of Service or License Agreement
of any free software or free service you're considering. As a rule
of thumb, free products and free services which have extremely long,
difficult-to-understand agreements are most often deceptive in
nature. Be careful and stay informed - you'll be just fine. The
internet is the greatest source of information ever - and it's all
right at your fingertips. And despite all the nonsense and
misanthropes that hide in the shadows, the Web is a wonderful place.
Play it safe, use common sense, and enjoy all the internet has to
offer.

Visit Our Donation Station
Padded neoprene USB Flash Drive Holder Key Chain
Executive ballpoint pen + 2GB USB ReadyBoost Flash Drive in a
metal case
USB 2.0 Flash drive/Memory Card reader - supports 10 different
kinds of flash memory cards
HubbaMan 4-port USB hubs
USB Wristband Flash Drives
4GB ReadyBoost Flash Drives
6-pocket USB flash drive/SD card holders
Donate Any Amount - Donate any amount no matter how
small and choose a registered version of FolderMagic,
CalendarPal, or Smileycons. Any amount no matter how small helps
- and you can choose your gift just for helping us
If you can help us right now, we'd really appreciate
it. But we know that many of you are having problems as well with
the world economy being what it is. If you can't afford to help us
financially, you can help us by
using our Start Page.
Our Start Page now
has over 100 free games you can play, plus breaking news and daily
tips and tricks. It costs nothing to use our Start Page - and you
don't even have to register.
Use our Start Page
as your start page and you'll be helping us without spending a dime
InfoAve Daily
Tips & Tricks
We're offering something we think most of you will
enjoy. We're offering a daily tips and tricks summary newsletter
that is sent everyday. It's a summary of daily tips, freeware picks,
and site picks - so it's very brief and lightweight. If you'd like
to receive or daily tips and tricks newsletter (completely free, of
course) you
can subscribe here.
Don't forget... you can also help us by using our
Start Page. We have
added over 100 free games to our Start Page. It costs you nothing to
use our Start Page
--and helps us a lot.
Thank you very much for
subscribing to InfoAve Premium. We appreciate your help and your
support very much.
Have a great Labor Day
Holiday weekend!
Eightball & Thundercloud
Cloudeight InfoAve Premium Edition Issue # 411 Volume 8 Number 48
September 2, 2011
IMPORTANT DISCLAIMER
ABOUT SOFTWARE RECOMMENDED IN THIS NEWSLETTER
All software recommendations we make in this
newsletter are based on our own experience and testing of the
programs that we recommend. This does NOT guarantee they will
work on YOUR computer. We assume you will read the program
documentation and use the program according to the instructions.
We make no guarantees about any program recommended in this
newsletter or its suitability for any particular purpose. We
will not be responsible for any problems you may have. We do not
and cannot provide support for any products other than our own
Cloudeight products and we will not answer email concerning any
product which is not a Cloudeight product. We urge you to use
good judgment when downloading and installing software and to
use a program only after reading the program's documentation.
And, all Tips & Tricks in this newsletter have been tested by us
on several different computers and were found to work as
indicated. They may not work on yours. We make no guarantees.
Anything we recommend you try and use at your own risk. We will
not be responsible for any problems caused by any software
programs recommended in this newsletter or any of the tips and
tricks in this newsletter.
Readers' comments are their
own and Cloudeight Internet LLC is not responsible for comments
of our readers. All readers' comments, suggestions, questions,
and tips and tricks sent to us become the property of Cloudeight
Internet LLC. You understand that we may use your comments
without your explicit permission.
InfoAve Premium is published by:
Cloudeight Internet LLC PO BOX 73 Middleville, Michigan
USA 49353-0073
This newsletter is sent from the address
infoave-premium/@/pr1.netatlantic.com . The IP address for
Netatlantic is 69.25.194.2. Netatlantic is a respected newsletter
hosting service. We have used their services for many years. All
content is copyright ©2011 by Cloudeight Internet LLC (all rights
reserved). |