Cloudeight InfoAve Premium newsletter

Help us help you! Visit our Donation Station.

InfoAve Premium Home InfoAve Premium Vol 7 E-book Question? Comments? InfoAve Forum
Captain Optimizer Sale! SUPERAntiSpyware Pro  Registry Commander Sale! Donation Station


Cloudeight InfoAve Premium

September 2, 2011
Issue # 411
Volume 8 Number 48

Dear friends,

Welcome to InfoAve Premium, Issue # 411 - We're glad to have you with us. Thank you so much for subscribing to this newsletter and for all your support and kind words. We appreciate it very much!


A special holiday review edition

We want to take a moment and wish all our subscribers in the USA a very happy and safe Labor Day weekend. This edition of InfoAve Premium is a review edition. In it, we feature some of our favorite items from past newsletters, and a few new things as well. Doing a review edition gives us a chance to spend time with our family and fiends this long holiday weekend. We hope that you have a great holiday weekend too. Thank you!


THANK YOU VERY MUCH

We are very grateful for all the donations we've received. Your support helps to keep our small business afloat in these difficult times. We both are sincerely thankful for your kindness and generosity. We don't know what we'd do with you! In times like these you discover the best in people. We are overwhelmed by your response; we can't thank you enough for your support. Our promise to you is that week after week we'll give you the best we have.

Thank you!


Can you help?

The road is still rocky for us, but we are very aware that many of you are having a tough time right now too. But if you are able to help us get through a very difficult time, we'd be very grateful. The economy along with traditionally slow summer sales have put us in a bind. We continue to work as hard as we can to provide you with the very best computer newsletter on the Web - and your support and encouragement has helped us immeasurably. We've cut our expenses as far as we can and still keep things going. Many of you have helped us many times and we appreciate it. If you are able to, this week, please consider visiting our Donation Station and making a donation. We have some very nice gifts available for various donation amounts. We have a "donate any amount" feature - where you can donate any amount you like - even the smallest donations are greatly appreciated. We really need your help again this weekend. Thanks so much!

Cloudeight InfoAve

Three new items available right now from our donation station - all with FREE shipping anywhere in the world!

Cloudeight InfoAve PremiumNow at our Donation Station!

Carry and protect up to six camera/digital media cards! Slimline, protective case holds up to six memory cards including SD, Memory Stick® Smart Media® and Micro SD. Faux Leather Black case has strap on the back so you can connect it to your camera strap, camera bag, belt, etc. Includes a 25 year warranty by CaseLogic. FREE SHIPPING ANYWHERE! Learn more and/or donate here.


Cloudeight InfoAve Premium

Now at our Donation Station!

8GB ReadyBoost-ready high performance USB Flash Drive with Bonus Movie!

Want to share pictures, video, documents, files and more with your family & friends? Store, transport, backup or share your files! Large 8 GB capacity has room for thousands of files. To access your data, simply plug into any PC or MAC -- no need for cables or adapters. Access your files. Anywhere. Anytime. Learn more or donate here.

SPECIAL BONUS! Get a free downloadable movie from PNY with special coupon code included with your USB! Choose from dozens of titles from Sony! Click here for more information on movies available. Yes, includes USA and other countries!

Features:

  • 8GB High Performance USB 2.0 Flash Drive - ReadyBoost compatible to boost performance and system speed in Windows Vista and Windows 7. Remains compatible with older versions of Windows and MAC!

  • Store, share, transport and backup your favorite photos, documents, music, videos and more.

  • Low power consumption, non-volatile flash memory makes Attaché drives more durable than other storage devices

  • Retractable cap, free tech support from PNY and 1 year warranty

  • Free shipping to anywhere in the world!

  • Learn more and/or donate here.


Now at our Donation Station!

Cloudeight InfoAve PremiumWireless Laptop Optical Scroll Mouse

This high-quality Wireless Laptop Optical Scroll Mouse features a foldable USB receiver so you can safely take this mouse anywhere! Sleek, compact design for netbooks and laptops. This mouse is wireless so there are no messy cords or cables to get tangled. Great for travel or at home. This mouse also works great with your desktop computer too!


Features:

  • 3-button + scroll wheel

  • Operates on 2 x AA batteries, included

  • Color: Black, White or Blue

  • Includes foldable USB receiver

  • Learn more and/or donate now!


If you need to change your newsletter subscription address please see "Manage your subscription" at the bottom of this newsletter.

We hope you enjoy this issue of InfoAve Premium! Thanks again for subscribing.

We thank you all for your generous support.

Reader's comments

A comment from Gerald
Is it just my imagination or are you guys putting more and more information in this newsletter? The last few weeks' editions have been jammed packed with information. Your newsletters have become magazines. Don't get me wrong, I think it's great. No one can say you're not giving them more than money's worth. Keep up the great work. I'll be making another donation this week - I would hate to see you disappear from the Internet. I've been with you since 2001 and I've come to rely on the information and advice you provide. Thanks! Gerald

Thanks, Gerald. It does seem the newsletters have gotten bigger, doesn't it? When we started Premium, we featured 4 questions and answers and 5 tips and tricks. Now we average 6 to 7 questions and answers per issue. When we started we featured 4 or 5 tips and tricks per issue and now we average 7 to 10. So yes Premium has gotten bigger. We want all our readers to get more than they paid for every single week. Thanks again for your kind words and your support. TC & EB


A comment from Linda
After reading your latest newsletter I now know what has been happening to my laptop (Vista) and my desktop (Windows 7). I had Avast installed with both of them and also SUPERAntiSpyware Pro. I couldn't figure out what was happening but you have solved my problem. I have kept the Spyware (SUPERAntiSpyware) and gone to Microsoft Security Essentials. So far things are working much better. I don't get those annoying messages anymore and believe it or not my boot up is much smoother. I have been a subscriber for some time and through you I have learned some pretty nifty things. Keep up the good work and God bless...................Linda

Thanks so much for sharing and for your support. TC & EB


A comment from Ann
I have just discovered this powerful little magnifying tool. It is much more functional than Windows Magnifier. I found it on Cnet, and this is a link to the Editor's Review that will tell you all you need to know. I love your freeware picks! Ann.

Cool little program! We thought you'd like to have your own freeware pick this week, so we gave you your own spot! Thanks so much, Ann. TC & EB


A Comment from us

Many of you who use Yahoo mail have been receiving this newsletter sporadically. We think we've finally resolved this issue. And some of you using other service providers occasionally miss an issue. We've been working with our newsletter sending service to ensure that we resolve as many problems with delivery as we can.

These are the IP addresses we are now using for "Infoave Premium". If your ISP has a whitelist, you'll need to provide them with these IP addresses so they can make sure our newsletters get through their spam filters and blackists.
69.25.194.2
69.25.194.49
69.25.194.50
69.25.194.51

Also remember the address from which this newsletter is sent is --
From: "Cloudeight InfoAve Premium" infoave-premium @ pr1.netatlantic.com.

Thank you all for your patience and for working with us as we try to make sure that every one of you receives your newsletter every Friday.


Your comments are always welcome!


Cloudeight InfoAve PremiumAvailable this week from our Donation Station

Padded Neoprene USB Flash Drive Holders with Key Ring

Keep your flash drives handy and safe from damage with one of our Neoprene Padded USB flash drive holders with a convenient key ring.

These padded flash drive holders are made from durable, high-quality neoprene. They'll keep your data safe and handy.

  • Expandable neoprene case stores 2 USB Flash drives in separate pockets; padding protects drives too!

  • Metal Key Ring included so you can attach to keys, laptop case, lanyards, backpacks. Never misplace a USB drive again!

  • Dimensions 4.75" x 1.75" x 0.5"

Get more information here!

 

Your donations are very much appreciated. Thank you!

Questions and answers

Bob asks about leaving his computer connected to the Internet 24/7
Don't you think that leaving your computer turned on and connected to the Internet with a cable connection exposes you to unnecessary risks? Also, I have cable Internet and at least 2 or 3 times a day, my connection drops and I am not connected to the Internet. Sometimes I am offline for 15 minutes or more. Let me know your thoughts. I have been a subscriber for over five years now and I have come to rely on your advice and expertise. You make it more understandable to us non geeks. Thanks. Bob C.

Our Answer
There's nothing dangerous about leaving your broadband modem turned on 24/7, provided you have good, updated, antivirus and antispyware installed and you follow good computer protocol. If you're concerned about malicious people or software somehow finding their way to your computer (very unlikely) it would be better to turn your computer off and leave the modem running. If your computer is off (at the switch) nothing can invade it. It would provide you with whatever protection you'd get from turning off your modem, without interfering with the IP protocol settings of your modem or constantly resetting your modem every time you turn it off and on.

Cable dropouts are not caused by you turning off the modem frequently - they're caused by broadband provider problems or your provider over-subscribing nodes. Each node is designed to support a certain number of users - we'll use fifty as an example. Cable will continue to oversell that node until problems reported by subscribers. Cable companies just can't add infrastructure fast enough to handle the growth. With so many cable companies now providing HD TV, Internet Phone as well as high-speed Internet, it's no wonder that some subscribers experience slower speeds than they're paying for and service interruptions. A cable company may put seventy-five to one hundred subscribers on the node that was only designed to handle fifty - and that's what causes dropouts, slower speeds and other problems. If you do experience dropouts, one of the fastest ways to get reconnected is to unplug the power to your cable modem for ten to fifteen seconds, and then plug it back in.

We leave our computers and our modems turned on 24/7/365 (unless there are thunderstorms or weather conditions which may cause a power failure - or we're going to be away for a few days). We don't think that you need to turn off your computer or your modem as a safety measure against "getting hacked" or having something malicious find its way onto your computer.

It's great that you have several anti-spyware installed and an anti-virus program. We want to remind everyone that while having several anti-spyware programs installed is a great idea, you should choose one to run as your primary protector - and keep the others to double-check your computer once or twice a week. Don't have several anti-spyware programs running in the background. That unnecessarily uses resources and doesn't afford you any greater protection - it might even cause conflicts. And, never, have more than one anti-virus installed on your computer. Always keep your anti-virus and anti-spyware programs updated! Most anti-spyware and anti-virus programs are reactive not pro-active types of programs. Windows XP, Windows Vista, and Windows 7 all have built-in firewalls - and you should always leave your Windows firewall turned on, but you do not need to install a third-party firewall.

Also, if you have a router (wired or wireless) you will find that it probably acts as hardware firewall too. Check your router's documentation to learn whether or not your router acts as a hardware firewall - many do. If it does, it will work with Windows firewall without causing any problems.


Holly keeps getting a network error message
I have been a lifetime subscriber for years and can't wait until Fridays. I did have to switch my email address from Yahoo to Google to keep getting your newsletter. Here's my question: I have a new hard drive that Dell installed on my laptop (trust me, I WILL clone this one!) and I keep getting the following popup: Microsoft Network Inspection System stopped working and was closed. A problem caused the application to stop working correctly. Windows will notify you if a solution is available. I have never had this message before and was hoping you could enlighten me? It doesn't seem to stop anything I'm doing, so I just close it and keep on working. I have Windows Vista Premium with IE8 installed if that's any help. My warranty is up in about a month on my laptop. Hope I gave you enough info. and PLEASE keep up the great work! Holly

Our answer
Hi Holly. You're in luck. The answer to your question is simple. The error you're getting is related to Microsoft Security Essentials' update process. To get rid of the error, uninstall Microsoft Security Essentials, reboot, then re-install Microsoft Security Essentials. That should take of those error messages.


Paul wants to know about a program called Rapport
Recently my bank starting asking all its online banking customers to install security program called Rapport What is it and why do I need it? I am hoping you can shed some light on this for me. I'm sure others who read your newsletter would be interested too. Thanks you guys.

Our answer
We recently read a pro-Rapport article in a security newsletter to which we subscribe. It seems there's a never ending need to create new fears and then provide programs to protect you from them. It's sort of like being a doctor and inventing diseases so you can make money providing patients with cures for diseases you invented. If the overkill weren't so serious it would be humorous.

Rapport claims to prevent "man in the middle attacks"; in other words it claims to prevent someone intercepting data being transmitted to and from your computer during an online banking or other online financial session. "Man in the middle" sounds so ominous. We wonder how many banks have signed on with Rapport because of this ghastly "man in the middle".

According to Wikipedia... a "...man-in-the-middle attack (often abbreviated MITM), bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other - it is an attack on mutual authentication. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL authenticates the server using a mutually trusted certification authority...."

To put that in simple English, the only way a man-in-the-middle attack would ever work is if you were tricked into communicating with a person who had the time, means, and skill to successfully make it appear you were on your bank's secure site, and to make the transactions appear completely normal.

First of all, if you're only reasonably careful, you're not very likely to encounter a "man-in-the-middle" attack. By being reasonably careful we mean simple things - like looking for the https:// in front of any URL which requires you to enter any kind of sensitive personal information, if you don't see the https:// (which indicates a secure connection) and see only http:// - don't enter any personal sensitive information; you're not on the correct site. Nearly 100% of all online transactions take place on secure servers with 128-bit encryption.

If you're using Wi-Fi connections in your home, make sure you use WPA2-PSK encryption if you have it available, WEP is not as secure - but better than no Wi-Fi security at all. If you don't know what WPA2-PSK or WPA or WEP keys are, we will cover them in detail in the tips section of this newsletter.

So if you are only moderately careful, the chances of a man-in-the-middle attack happening to you are less than the chances of you being beaned by a meteorite. The company which makes Rapport is called Trusteer. What they have done is created a multi-million dollar business by taking advantage of banks naïveté - or they've convinced the banks that they can attract new customers by creating a new market using good-old fear tactics.

In our opinion, Rapport is absolutely useless, absolutely unnecessary, and a gimmick that banks will use to attract customers. It's another product that someone with great sales and fear mongering skills came up with, and then convinced major banks that they could gain more customers by offering Rapport technology. Rapport is not a free product, but we understand that many banks are buying the license and then offering it to customers as a free perk.

Rapport's web site (and we're not even going to include the URL) makes it sound like if your bank doesn't use their "technology" you're only seconds away from disaster. It's a farce and it preys on those who don't know very much about the internet or computers. If my bank made me use Rapport, I'd find another bank that didn't waste its money on such foolishness.

That's how we see it.


Gretchen wants to know what toggle keys are
I've seen the term toggle keys several places and I'm curious as to what they are. Can't think of anyone better than you two to ask. Thanks for all the great info. Gretchen C.

Our answer
Thank you,, Gretchen.

ToggleKeys is term used to describe a computer keyboard key that has one or more functions. For example, the caps lock key, num lock key, and scroll lock key are examples of ToggleKeys. ToggleKeys are also an accessibility option.

When ToggleKeys are turned on, your computer will make a high or low tone beep when you press any of the NumLock, CapsLock, or ScrollLock keys.

Did you know that the NumLock key is not as useless as you thought? Did you know that you can turn ToggleKeys on by using only your NumLock key?  When ToggleKeys is on, your computer will beep whenever you press the CapsLock, ScrollLock or NumLock keys). Normally, you would turn ToggleKeys on in Accessibility Options in Control Panel.

And the NumLock key isn't as useless as you thought. Did you know that you can simply hold down the NumLock button for five seconds, and that my friends turns on ToggleKeys for you.  It's much quicker than clicking Control Panel, Accessibility options, and then ToggleKeys.

With ToggleKeys on, you will hear a beep to let you know you've pressed your CapsLock key - which is very handy. It also will beep when you press the ScrollLock or NumLock keys too.

If you turned ToggleKeys on using this tip and want to turn them off, all you have to do is hold down the NumLock key for five seconds again.  


Karen wants to go back further than the restore points that appear in System Restore
Hello there you two! Actually, I have a question that pertains to Vista and Win 7. Is there a way to go back into restore points and restore your pc further then the options given? Like about 3 months ago or something as such? Thank you so very much! Karen

Our answer
Hello and thanks, Karen. The answer to your question is "no, you can't". The number of restore points available to you is directly related to the amount of drive space you've allocated to System Restore. The default setting is for System Restore to use 2% of your available drive space. If you want more System Restore points, you'd need to increase the amount of drive space available for System Restore to use. If you'd like to increase the amount of drive space allocated to System Restore you can do it by following these steps:

1. Click the start button and right-click "Computer"
2. Select "Properties"
3. Select "System Protection"
4. Click the "System Protection" tab
5. Click the "Configure" button next to "Configure restore settings, manage disk space, and delete restore points."
6. In the dialog window, use the slider to increase the space available to System Restore.
7. Click "Apply" and then "OK"

We would recommend that you not use more than 5 to 7% of your total available disk space. While it may seem like a good idea to have as many restore points as possible, restore points use huge amounts of disk space. If you really want to be safe, create an image based backup using a program like Paragon Backup & Recovery (free). Create the image-based backup when your computer is running well and you have all the programs installed that you need and use often. That way, if anything happens, rather than relying on System Restore to go a few months back in time (which would use up a serious amount of disk space) use your image backup to restore your computer to an earlier time. You image backup can be created and saved for months or even years, and you can use it to revert your computer back to the date of the backup.

System Restore is a great feature and it comes in handy - but keeping restore points for months is impractical as it would use up far too much of your hard drive space.


Sandy has a Dell computer and needs a new keyboard
Hi. I love your newsletter! I read it ever Friday evening - it's my unwind time! My question is this: I have a four year old Dell computer and my keyboard (which has absorbed many coffee spills and food attacks) is finally giving up the ghost, I think. I'd like to buy a new keyboard. Do I have to buy a Dell keyboard or can I just go the local Best Buy or Walmart and buy any brand? My friend says only Dell keyboards work with Dell computers. Give me the straight scoop. I trust you guys! Thanks, Sandy.

Our answer
Your friend is not correct. Almost all keyboards these days are USB keyboards. And a USB keyboard is a USB keyboard is a USB keyboard. You can go to any store that sells keyboards and buy any brand, and be 99.999% sure it will work with your computer. All you have to do is unplug your old food-and-coffee stained keyboard, plug in your new keyboard and Windows (XP, Vista, or Windows 7) will detect it, and you can start typing away with only a few seconds delay. Just make sure you pick out a keyboard you're going to be happy with. Many newer keyboards have all kinds of features you may not want and/or will never use. So, if you're like us, and a standard no-frills keyboard works best for you - buy it. You pay a lot extra for all those "time-saving" keys newer keyboards seem to want to foist upon you. Everyone has their own preferences...if those time-saving keys save you time and you're willing to pay more for them, that's fine too. The one thing you don't have to worry about is matching brand names.


Never Reinstall Windows Again!
Reimage is one of our biggest selling featured products thanks to you!

REIMAGE NOW WORKS ON 32bit and 64bit Windows XP, Windows Vista, and Windows 7

There's only one reason why Reimage has become a fast selling product: It works. Are you looking for a permanent solution for your annoying computer problems? Slow startup? Slow reboots? Constant Windows error messages? Waiting forever for programs to start?

Reimage is an online PC repair tool that repairs Windows  and makes your PC run like new again, for a fraction of the cost that places like Best Buy, Staples, and other computer repair services charge. And Reimage guarantees it will work for you or you get your money back!

Reimage Features and Benefits

  • Requires no setup

  • Reimage is the ultimate professional repair tool

  • Rebuilds the entire Windows system - without damaging your programs or files

  • Repairs damaged operating system

  • Refreshes native operating system drivers

  • Save 10% off Reimage - use coupon code fixitnow10 at checkout!

"It works like Magic." - eWeek Magazine

Don't spend hundreds of dollars on computer repair. Repair Windows quickly and easily at fraction of the cost of computer repair services like "Geek Squad". Repair your Windows system in minutes.

Computer tips and tricks

What is a secure server?
All computer users

First: HTTPS://  HTTP:// . Do you see the difference? Of course, one has an S at the end, the other does not. The S stands for secure. All you have to remember is: it stands for your security.

SSL or Secure Sockets Layer was first established by Netscape and is the web standard for exchanging sensitive information between a server and your computer (the client). SSL is now supported by all leading browsers: Internet Explorer, Mozilla, Firefox, Safari, Opera, Chrome and others.

When you connect to a secure server, your browser asks for the server's digital Certificate of Authority. This certificate authenticates the server's identity as a secure server and ensures you that you will safe in transmitting sensitive to that server and receiving sensitive data from that server. It assures you that you are not connecting to an imposter site or communicating with a hacker.

Every time you conduct a session with a secure server, a session key is created. The current web standard is for a 128-bit session key to be issued at the beginning of the session. No one can break into that session without that randomly generated 128-bit session key. The only two computers that know the key for that session is your computer and the secure server. There's absolutely no way anyone can "hack" into that session, or "spy" on it. The 128-bit session key has 2 to the 128th power or 2 x 2 x 2 (128 twos) characters. No hacker or criminal, even if they were using a bank of super computers, using brute force password crackers, could break the security of your session. When the session is over, the key expires. If you need to go back to that server to make another transaction, you'll have to go through the authentication process all over again. Fortunately, all this authentication and the issuance of the session key happens so quickly you don't notice a thing. But behind the scenes, your computer is verifying the secure server's authenticity, and the server is generating and exchange a unique 128-bit session key known only to your computer and the secure server.

Here's a really good explanation of 128-bit encryption that should give you some idea how secure your transactions are online. The following appeared in an article was written by the folks at Inet. You can read the rest of the article here.

"...SSL uses public-key encryption to exchange a session key between the client and server; this session key is used to encrypt the http transaction (both request and response). Each transaction uses a different session key so that even if someone did manage to decrypt a transaction, that would not mean that they would have found the server's secret key; if they wanted to decrypt another transaction, they'd need to spend as much time and effort on the second transaction as they did on the first. Of course, they would have first have to have figured out some method of intercepting the transaction data in the first place, which is in itself extremely difficult. It would be significantly easier to tap your phone, or to intercept your mail to acquire your credit card number than to somehow intercept and decode Internet Data.

Servers and browsers do encryption ranging from a 40-bit secret key to a 128-bit secret key, that is to say '2 to the 40th power' or '2 to the 128th power'. Many people have heard that 40-bit is insecure and that you need 128-bit to keep your credit card info safe. They feel that using a 40-bit key is insecure because it's vulnerable to a "brute force" attack (basically trying each of the 2^40 possible keys until you find the one that decrypts the message). This was in fact demonstrated when a French researcher used a network of fast workstations to crack a 40-bit encrypted message in a little over a week. Of course, even this 'vulnerability' is not really applicable to applications like an online credit card transaction, since the transaction is completed in a few moments. If a network of fast computers takes a week to crack a 40-bit key, you'd be completed your transaction and long gone before the hacker even got started.

Of course, using a 128-bit key eliminates any problem at all because there are 2^128 instead of 2^40 possible keys. Using the same method (a networked of fast workstations) to crack a message encrypted with such a key would take significantly longer than the age of the universe using conventional technology. Remember that 128-bit is not just 'three times' as powerful as 40-bit encryption. 2^128 is 'two times two, times two, times two...' with 128 two's. That is two, doubled on itself 128 times. 2^40 is already a HUGE number, about a trillion (that's a million, million!). Therefore 2^128 is that number (a trillion), doubled over and over on itself another 88 times. Again, it would take significantly longer than the age of the universe to crack a 128-bit key..."

When identity theft occurs, it does not occur during a secure transaction. Buying and banking online is as safe (or safer) than driving to your bank and doing your banking there - or using your credit card while shopping at your local mall or shopping center. If you listen to those selling some security software, like firewalls, or like the "Rapport" service,  or anti-phishing programs (remember all current versions of the most popular browsers already have anti-phishing protection), you'd think you were in danger of losing everything every time you made a transaction online. It's just not true. It's an example of using scare-tactics and half-truths to create artificial markets. These fear-mongering software developers create fear and then make money from that fear. It's a shameless and endless game. These software developers are like the charlatan snake oil salesmen of old. But you don't have to fall pray to their fear tactics. Learn all you can about your computer and the Internet; educating yourself is the best way to ensure that you'll never fall pray to these shameless snake oil salesmen. Billions of dollars are wasted by fearful Internet users who don't understand the way the Internet works and who think the answer to their safety online is to load up their computers with useless software proffered by fear mongers whose real motivation isn't protecting users from harm, but lining their own pockets.

Remember, any time you do online banking, online shopping, or conduct any transaction which requires you to enter your social security number, credit card numbers, or any other kinds of sensitive data, make sure the URL (web address) starts with HTTPS:// and not HTTP://. And don't click links in email that ask you to click to change your banking or credit card information or password. No bank or credit card company is going to send you an email asking you to click a link in an email and verify your password or information. If a bank or other financial institution requires action from you, they'll ask you to login to your account - not click a link in email. Never click links in email that appears to come from a bank, payment service, credit card company or other financial institution - no matter how authentic it looks. There's a 99% chance that that email is a phishing email - do not fall for it.

As in life, on the Internet education is key. The more you know, the safer you'll be - and without wasting money on useless software.


Find Available Wireless Networks In Windows Vista and Windows 7
Windows Vista and Windows 7 - all versions

There are many software programs you can download that will find available wireless networks for you. But did you know that if you use Windows 7 or Vista, you can find available wireless networks, wherever you are, without downloading anything.

To find out what (if any) wireless networks are available wherever you are and lots of other interesting information such as signal strength, broadcast channel, and more about any detected wireless networks near you, just do this:

1. Press Windows Key + R

2. In the form next to "Open" type "CMD" (without the quotes) and press ENTER.

3. The command window will open

4.  At the prompt enter the following command: "netsh wlan show all" (without the quotes), and press Enter.

Every available wireless connection will be shown including the one you're connected to, if any.


Dust to dust
All computer users

Heat is the enemy of your computer's internal workings. And nothing causes a computer to run hotter than dust and dirt which collects inside your computer's case - and clogs fans and air vents. If your computer isn't able to draw fresh cool air into the case - or if your cooling fans are clogged with dust, your computer is going to run hotter than it should. If you allow your computer to run hotter than it should for a long time, hard drives will fail and eventually processors will fail.

Make sure the inside of your computer's case is free from dust, dust bunnies and dirt. Once every month, open your computer's case and check the fans and vents. If you see signs of dust collecting, use your vacuum cleaner with an attachment, to vacuum the dirt and dust away. Keeping your computer's case, fans, and vents free of dirt and dust keeps your computer running cooler. If your computer runs cooler, your hard drive(s) and processor will last longer.

Some people will tell you to use compressed air to clean dust and dirt from your computer. You can do this, but sometimes all you do with compressed air is scatter the dirt and dust. We suggest you use a vacuum cleaner - with an attachment - to clear the dust and dirt from the inside of your computer and the air vents built into your computer's case. Be gentle.


Use your toolbars to organize any folder
Windows XP, Windows Vista, Windows 7

We've been getting a lot of questions lately about organizing files in a folder. I guess we do it so matter-of-factly that we don't really think about it. It's so easy and so natural to us that we're sometimes baffled by the emails we get that ask how to get their files back to A to Z order instead of Z to A order.

It's so simple to organize any folder on your computer using nothing more than what you look at every day - a little sub-toolbar that appears when you open almost any folder.

The following screen capture was taken using a Windows 7 computer so the toolbar might look a little different to you if you're using XP or Vista - but you will always have some or most of these options.

Look at the screen shot below:

Cloudeight InfoAve

If you click on "Name" for example, it will reorganize your files alphabetically. So if your files somehow got arranged Z to A, clicking on "Name" will organize them A to Z. Click it again and their back to Z to A....and so on. It's so simple we sometimes forget that many people don't know that you can do this.

You can organize your files by size too. Click "File size" once and the files will be organized from the smallest to the biggest. Click it again and they'll be arranged from the biggest to the smallest.

Are you beginning to see a pattern here?

OK. So what would happen if your files were organized by "Date modified" from newest to the oldest and you clicked "Date modified"? RIGHT! Your files would be rearranged from the oldest to the newest. What if you clicked "Date modified" again? RIGHT! You'd be right back to the beginning, with the newest files listed first and oldest files last.

If you want to organize your files in other ways, Windows gives you more choices you can add to your toolbar. See the screen shot above for some of the other ways you can reorganize your files.


What firewall vendors don't want you to know
Windows XP, Windows Vista, Windows 7

Some of you have noticed that Norton 360 now includes "LifeLock". So Norton now not only touts that its firewall can keep you safe from identity theft - but "LifeLock" can keep you even safer. The truth is, neither one can. Norton knows it. We know it. Anyone who understands how identity theft works knows it. If all you needed was a firewall to keep you safe, snug, and secure, why would Norton shell out millions of dollars to include the questionable LifeLock membership program in their security. Security vendors will do anything to convince you - if only you bought their product you'd be safe. But it's not true, and they know it. Norton's shenanigans prove it. Not only doesn't a firewall prevent identity theft, Norton basically admits it by putting in a program designed to prevent identity theft. But LifeLock doesn't prevent identity theft - and that's why they've been sued by users and by the FTC. LifeLock a while back paid a hefty fine to the U.S. Government for making false claims. It's too bad the U.S. Government doesn't take a closer look at the claims being made by security and firewall vendors these days.

Software vendors have never been above hyperbolizing to the point of prevarication. We subscribe to many security newsletters - some of them published by security software vendors like Sunbelt and McAfee. Sometimes reading the baloney these newsletters serve up to their readers almost makes us want to regurgitate. And it's a shame that vendors will go to any lengths to sell a product knowing it can't possibly do what they promise. Unfortunately, gullible readers gobble up the baloney - because scare tactics sell products.

A firewall - no matter which one - cannot prevent identity theft; there isn't a program made that can prevent you from giving your information away willingly. The best crooks can trick the innocent into giving up passwords, email addresses, credit card numbers, and even social security numbers.

A firewall is necessary, but every version of Windows from XP on has had a built-in firewall. If you listen to the so-called tech experts, they'll tell you Windows firewall isn't as good as brand x, y, or z. If you're paying attention when you're reading though, you'll find that most of these so-called experts are selling brands x, y, or z - or all three. The motivation is money - your money. So in a sense those who twist the truth are our for the same thing as the crooks who trick you into giving up your personal information --- your money.

Firewalls can't protect you from identity theft. In most cases, they don't even help. LifeLock, now included with Norton, has been the target of many lawsuits and has already paid a stiff fine to the government for making false claims.

When it comes down to it, you need a good anti-spyware program - or two, a good anti-virus program and you need to keep them updated. You need to keep Windows firewall turned on - not because it will protect you from identity theft, but because it can protect you from the unlikely event of unauthorized access to your computer via a network.

What you really need to protect you from identity theft is something you already have - common sense. The same old common sense you've been using for years - the common sense that tells you not to leave valuables lying on the front seat of your car, to lock your car doors, to lock you house at night when you go to bed, etc. Most identity theft occurs when people get careless and click links in emails that look as if they came from a bank or credit card company. These links lead to counterfeit sites. Unwary users give up their personal information unwittingly - and that's how identity theft most often occurs.

A firewall isn't going to stop identity theft. A 3rd-party firewall will certainly lighten your wallet -legally. Common sense will prevent identity theft better than any combination of security programs. Think before you click! And always make sure you know where you're going and to whom you're giving your information. When in doubt - leave it out. Don't give away any personal information to any site unless you're absolutely sure of the site you're on.


Why you should love advertising
All computer users

We have been poking around on the Internet since the early 90's. It hardly seems possible that almost 20 years have passed. Back in those early days, the Web was not the hub of commerce it is today. Most of the sites were small mom & pop shops - and the web was every bit as interesting as it is today. As the Web grew, those mom & pop sites - including ours - discovered the facts of the Internet: It is not cheap to have and maintain a presence on the Web. The more traffic that flows to your site, the more bandwidth you need, the more bandwidth you need, the more expensive it is to keep the site on the Web. And back in the mid and late 90's, bandwidth was even more expensive than it is today. The costs involved in maintaining a presence on the Web is higher than just the cost of the bandwidth too. Unless a person or company can afford to buy and maintain Web servers, hire professionals who know how to keep those servers up and running and connected to the Web -- and have the money to purchase the "pipe" that connects those servers to the Web, you have to pay a Web hosting service to host your Web sites - and that costs money too. These expenses are in addition to the cost of the time you put into the site(s). For us it was and is a labor of love, but it's intense labor - most times we still put in 10 to 14 hours a day. Neither of us can remember a day - even during our rare vacations when we haven't spent at least a few hours working on the sites. There's always something to do.

Back in 90's we, along with tens of thousands of other mom & pop sites, learned quickly that you can't keep taking money out of the family budget to keep a site on the Web. In the early 2000's hundreds of thousands of smaller sites simply closed up shop. Other, more successful ones, were gobbled up by bigger sites, and others, like ours, tried to make ends meet by adding advertising to our pages. We quickly learned that almost everyone hated advertising and hardly anyone clicked on those ads that we put there to help pay the bills. If people didn't click, we didn't get paid. In fact, it's considered excellent if 1% of the people who see ads on a site actually click on the ad - even if it's something that interests them.

Here we are in 2010 - still struggling to pay the bills. We've resisted the temptation to put pop-ups, pop-unders, and floater ads on our sites. We could make some extra and much needed revenue by doing that - but we don't like intrusive ads - and we figure our site visitors won't either. So, we've resisted the temptation to monetize our traffic more effectively by putting those kinds of ads on our site.

The ironic thing about all of this is: If people would have not looked at advertising on the Web with such disdain, there would be hundreds of thousands more thing free on the Web. Every year more and more free things disappear, and there are more and more things you have to pay for. E-Commerce is big business, so big in fact, within the next 10 years more sales will take place online than in brick & mortar retail stores. And when this happens, guess what? Those retail stores you've shopped for years will disappear, just like newspapers are disappearing right now. As more people get their news online, as more people buy clothing, computers, electronics, books, etc. online, the less "real" newspapers and "real" stores there will be.

We all got used to advertising on TV. When cable TV first started, there weren't any ads. Now, spend an hour watching CNN, Fox News, Discovery Channel or most any other cable network and you'll find there are just as many ads on cable TV as there are on broadcast TV. The only difference is - you're paying for cable and you still have to watch ads.

When we travel the Web, we're just like you. We tend to tune out advertising too. But we're starting to realize that unless we all changes our attitudes about advertising, the Web will become more and more commercial and less and less free. It would be a shame if the Web we leave to our children and grandchildren is nothing but a Web of ecommerce sites - a Web where you can't go very far without a credit card.

If we all continue to view ads as a negative and tune out ads every time we see them on the Web, then we're almost assuring that the Web of the future will be a lot less free than the Web we enjoy today - just like the Web we enjoy today, is a lot less free than the one TC & EB enjoyed in the 90's.

Advertising has kept broadcast radio and television free for decades - and it can help keep the remaining free sites on the Web - free. If advertising can't support your favorite free sites, then those sites will have to find other ways to generate income or they'll disappear. You can still find a lot of free and useful things on the Web - but just because they're free for you doesn't mean their free for those who provide them. It costs us thousands of dollars every month to provide the free products and services that we provide. We gladly provide them to everyone free. If the day comes when we can no longer afford to maintain and host our sites, we'll have a decision to make. Right now, we're doing all we can to make sure that day never comes.

If you want to keep the Web free and keep it from falling into the hands of a handful of huge corporations, if you don't want to pay for everything you do on the Web, if you want to keep the free things on the Web free - then you should love advertising. Advertising might be annoying but it will be far more annoying and expensive, if someday you have to pay a membership free or a fee each time you want to access the sites that you enjoy. So, if you see an ad that is advertising something that may be of interest to you, click it and check it out -- that may be the only way a website makes money.


A true story of a computer disaster averted
Windows XP, Widnows Vista, Windows 7

Last week a friend of mine called me with a perplexing Windows problem. He couldn't access the Internet, some Windows functions had been disabled, and his antivirus program had been deactivated. To make this part of the story as short and sweet as possible, we figured out that he had someone gotten when of the new generation of viruses that installs as a regular program, then deactivates the antivirus software, and then does its dirty work. These viruses, I fear, will be pretty commonplace in the coming months. These new designer viruses are pernicious and very well programmed.

Anyway, there wasn't much he could do but format his computer because formatting was the only certain way to ensure that the virus was removed and all his Windows functionality was restored. But formatting a hard drive and reinstalling Windows is always a last resort and always a pain in the you-know-what. Not only do you have to format your hard drive and reinstall Windows but then (if you don't' have a good mirror image backup) you have spend days, maybe weeks reinstalling all your software programs, adjusting settings and blah, blah, blah. In short: It's no fun.

Besides reading him the riot act about keeping good mirror-image backups, I tried to help him find an alternative for him when there seemed to be none. I'm resourceful if not smart. Anyway, I sent him off to give Reimage a try. I advised him that Reimage is the only thing I knew of that had the potential to save his current Windows installation, all his programs, remove the virus that was destroying his system, and get his computer back for him without formatting. I told him the truth: Reimage works 85% of the time, nothing works all of time. Obviously Windows doesn't work all of the time.

He gave Reimage a try and now his computer is running again and he didn't have to format. Reimage is not a tool to use for minor problems or occasional errors. It's big time repair for big time problems. It's something anyone facing a format and reinstallation of Windows should try before resort to a format. And its certainly better than calling Geek Squad and spending $199.00 or more only to have them format your computer and reinstall Windows.

This is a true story and it's a good tip. We really do use and recommend the products you see mentioned in this newsletter every week. We recommend them to our best friends and family members too. Reimage is not a miracle, it's as great tool. It saved my friend's computer and saved my friend days and days of work.

Before you call Geek Squad, Staples or some other computer repair service, before you give up the ghost and format and reinstall Windows, give Reimage a try. There's an excellent chance it will work for you too and save you tons of money and tons and tons of aggravation and time. And you have nothing to lose. If Reimage doesn't work for you, you get a full refund.


Tips for tabbed browsing
Windows XP, Windows Vista, Windows 7

Not a week goes by that we don't receive a few emails from people telling us that our links don't work on one page or another. And sure enough, we'll go check and the links are working perfectly. The problem is the don't have their browsers configured to switch to new tabs as they are opened. If browsers are not configured to switch to the new tabs as they are opened, then there is a good chance a user won't notice that a new tab has been created. When browsers featuring tabbed browsing are not configured correctly and a user clicks a link that opens a new tab, the old tab remains in focus, and the new tab may go unnoticed - especially if there a few other tabs already open.

Tabbed browsing is a great feature - and it saves having a lot of separate browser windows open, that's for sure. But when tabbed-browsing is not set up correctly it may seem like links are not working. We are reminding you to make sure your browser is set to switch to new tabs when they are opened.

Here are the instructions for the three most popular browsers:

Internet Explorer 8 and 9

Click "Tools" "Internet Options" and on the "General" screen (the default dialog) click the "Settings" button next to "Change how web pages are displayed in tabs". Then in the Tabs dialog check the box next to "Always switch to new tabs when they are created".

Cloudeight InfoAve

Firefox

Click "Tools", "Options" then click on "Tabs" and check the boxes that say "Open new windows in a new tab instead" and "When I open a link in a new tab, switch to it immediately."

Cloudeight InfoAve

Google Chrome Browser

Chrome is auto-configured to switch to new tabs as they are opened. No problems with tabs if you use Chrome.

If you use Firefox or Internet Explorer, why not check right now to make sure your browser is set to switch to new tabs whenever they're created. You'll find your browsing experience will be much better this way!


How much stuff can a flash drive hold?
Windows - all versions

All of sudden, everyone is discovering the convenience and utility of USB flash drives. One of the questions we are asked most often is: "How much stuff can a flash drive hold?" Well, it depends on the size of the flash drive and the size of the files.

To give you an idea of how much a flash drive can hold, we've created the following chart. The files sizes we used were the average sizes for photos, MP3 songs, and MS Office Docs. Hours of video are hours of video. If a average full-length movie lasts 2 hours, you can do the math.

Flash drive capacity

Photos

Songs

MS Office Docs

Video (Hours)

32GB

22,900

15,300

29,000

72

16GB

11,400

7,600

14,500

36

8GB

5,700

3,800

7,200

18

4GB

2,850

1,900

3,600

9

2GB

1,400

900

1,800

4.5

Check out our 8GB ReadyBoost-ready USB flash drives available at our Donation Station right now.


Block a Sender in Gmail
Windows all versions - Gmail account

Are you getting emails from someone you'd rather not receive emails from? Well, you could mark one message as spam, and then everything else from that sender would be forever placed in your spam folder, out of sight and out of mind. But then, you'd either have to wait for Google to clean your spam folder periodically - at whatever interval they decide - or you'd have to manually clean your spam folder whenever.

Here's a way to block a sender and have the email sent right to trash - out of sight, out of mind, forever. Gone forever too.

1. In Gmail, click the "Create a filter" link near the  top of any Gmail mailbox.

2. Type the email address you want to block under From:.

3. Examples: If you want to block emails from an entire domain, you can do that  too. If you wanted to block a message from hirohiro@youbetchacom, you'd enter that. If you wanted to block all mail from youbetcha.com, you'd enter "@youbetcha.com". If you want to block several different email addresses in one entry, separate them with a | (the pipe, or vertical bar, normally located above the backslash on the keyboard).


Do you have a tip or trick to share, or something you'd like us to research? Let us know!

 

Back to basics

What  do you mean by "third-party"?

When we use the term "third-party" in regards to Windows, we mean software that does not come with the Windows operating system. For example Irfanview would be a third-party image viewer. Windows comes with it's own image viewer so you don't really need Irfanview. But Irfanview is better and more robust. So we use a third-party image viewer on our systems. 

Most often you'll read about third-party firewalls. We don't recommend them. Windows XP, Windows Vista and Windows 7 all come with a built-in firewall. Many so-called experts feel the Windows firewall doesn't protect you well enough. We disagree. We don't recommend third-party firewalls for a number of reasons, many of which we've covered over and over.

Anytime you see us reference third-party software it means software that does not come with Windows, it comes from a "third-party" - in other words from someone else other than Microsoft.

 


Cloudeight InfoAve PremiumAvailable now at our Donation Station!

USB 2.0 Expandable Memory Card Reader

SUPPORTS 10 Different kinds of Memory Cards!

This high-quality USB 2.0 Expandable USB Flash Memory Card Reader Pen Drive allows you to flexibly transform your supported flash memory card to a portable pen/flash drive. Use it to read your camera's SD card if you don't have a SD card slot on your computer... you won't have to hook up your camera to transfer pictures from your SD card. Use it to transfer data from any device using a memory card to your computer!

Slide your SD/MMC/Mini SD/RS MMC/T-flash memory card into this expandable pen drive and transfer your data or photos to your computer without cables. This expandable pen drive allows you to turn any memory card into a USB flash drive in seconds!

Specifications:

  • Supports SD, MMC, MMC II, RS MMC, Ultra II SD, Extreme SD, Extreme II SD, Mini SD, MMC Micro, and T-Flash

  • LED indicator lights

  • Transform supported flash memory card to a portable USB flash drive.

  • Hot swappable (Swap memory cards without unplugging from the computer.)

  • Change to a different flash memory card at anytime

  • High-speed USB 2.0 supported

  • Use it to read your camera's SD card if you don't have a SD card slot on your computer. Then you don't have to hook up your camera to transfer pictures from your SD card.

Computer has no card reader? No problem. Put your camera's flash memory card into this USB flash drive/Card Reader and plug it into any open USB slot on your computer! Or use your flash memory card as a USB Flash Drive! Use it to transfer data from any memory card to your computer in a flash!

Get your USB 2.0 Expandable USB Flash/Pen Drive with SD/MMC Card Reader Pen Drive today!

Our software recommendations

This week's essay

Shadows

I think everyone has shadows in their past. Some dark corners that don't look very pretty when the light of day shines upon them.

Maybe I just think everyone has shadows in their past because I have so many. Or maybe others have too many too. Or maybe very few really do, but it is comforting to think they do.

It occurs to me that I can't base my life on what happens to others. It's true, I think, that we all need to feel that we're not alone - that others share some of the same things we don't like about ourselves. But we all bear the consequences of our own actions - and looking for faults and shadows in others is no way to fix the faults in me or shed light on the shadows I've buried deep beside the path of my life.

Visit this page to read the rest of this essay.

This week's freeware pick

Desktops
Operating systems: Windows XP, Windows Vista, Windows 7
File size: 60kb zip file - download - no installation required
Download times: a second or two on any connection

I'm getting kind of jaded in my old age. Not too much impresses me anymore. While looking for a freeware pick of the week this week, I stumbled on one that is only 60 kilobytes. Do you know how small that is? We'll the PNG image featured in this article is almost 60 kilobytes. Some Web pages are well over 60KB. My first thought was how can a program which is only 60KB be any good? It isn't good. It's great.

What Desktops does is give you four separate workspaces. Really! With just a click you can switch between 4 desktops. You can be working on your next Pulitzer Prize novel on desktop #1, chatting with a friend on desktop #2, reading an ebook on desktop #3 and have your email program running on desktop #4 - and switch between them with a single click. These virtual desktops are the real deal - it's just like having four separate desktops. Really! Here look:

Cloudeight InfoAve

There are four separate desktops running on one Windows 7 laptop. To switch between them, just click on the one you want to use. It's that easy.

Rather than prattle on about Desktops (which is a Microsoft application via Sysinternals), let call in the program's developer to tell you more about this unique application - a lot of program squeezed into 60KB, let me tell you. Anyway here's what the developer has to say:

"Desktops allows you to organize your applications on up to four virtual desktops. Read email on one, browse the web on the second, and do work in your productivity software on the third, without the clutter of the windows you're not using. After you configure hotkeys for switching desktops, you can create and switch desktops either by clicking on the tray icon to open a desktop preview and switching window, or by using the hotkeys.

Using Desktops

Unlike other virtual desktop utilities that implement their desktops by showing the windows that are active on a desktop and hiding the rest, Sysinternals Desktops uses a Windows desktop object for each desktop. Application windows are bound to a desktop object when they are created, so Windows maintains the connection between windows and desktops and knows which ones to show when you switch a desktop. That making Sysinternals Desktops very lightweight and free from bugs that the other approach is prone to where their view of active windows becomes inconsistent with the visible windows...."

What more can we say? A 60KB program that doesn't even need to be installed, that gives you four separate workspaces. It's just too cool. And because it's so cool, we've named Desktops our freeware program of the week.

You can read more about and/or download Desktops by following this link.

Hey, EB! We done good!

Our site of the week

Switcheroo Zoo

This is a typical Eightball special for sure. I send her out on a mission to find a site of the week and she comes back with ten - about 4 hours later. It seems she enjoys playing around on these sites more than working, so perhaps in the future I'll find the site of the week and play around and let her work!

This week's site of the week is really great though - even if Eightball was the one who found it. It's great for adults, it's great for kids, it's great for grandparents and grandchildren; it's great for everyone.

Basically what this site does is allow you to create your own zoo - and create your own animals. Maybe you have your own animal at home - your husband - or your wife - but we're not talking those kinds of animals, we're talking about cutesy bizarre creatures. Now I'm not saying your husband or wife isn't cutesy - or bizarre, I'm just sayin'.

Before I get way off track here and start prattling on and on about things I shouldn't, I'm going to stop right here and let the site's developers have their say. I'm sure they'll be far more succinct than I.  Take it away, Switcheroo Zoo developers:

"Switcheroo Zoo (a.k.a. Switch Zoo) started as a small project. We were playing around with the idea of making new animals by switching their parts. At first, the zoo had just nine animals, and it was the only attraction on the website. Today, there are 142 species in Switch Zoo, and the site features animal games, music performed using animal voices, a reference section about all of the animals in Switch Zoo, lesson plans, and poetry, stories and artwork created by students and visitors...."

You can do more at Switcheroo Zoo than just make your own zoo and create your own animals. You can create a habitat, for example, and lots more. It's sort of hard to explain this site except to say you've probably not seen anything like it and you'll have a lot of fun there. If you have kids or grandkids, Switcheroo Zoo is a great place for them too.

I think you'll really like what Eightball found for you this week - but don't write me complaining because you wasted so much time there. I'm just the messenger, I'm not the message. Take a few minutes, right now, and visit this week's site of the week - Switcheroo Zoo.


Twitter, InfoAve Daily and Facebook

We've been very active on our Twitter and Facebook pages recently.

You can follow us on Twitter here.

Also we've got a new daily tips and tricks newsletter that we send every weekday afternoon around 7PM Eastern time. It's free and you can sign up for it at http://thundercloud.net/start/subscribe.htm. It's a great way to review some of our best tips from all the past issues of our newsletters.

We like you! And we'd like you to like us on Facebook. We're not too proud to beg! Walmart has more friends than us! We gotta do better! Cloudie is hurt.

Please take a second and "like us" on Facebook by clicking on Cloudie. You won't hurt him. He's ticklish! He likes it.

 

Newsbytes

Google promoting daily deals on its front page

Google Inc promoted a daily deals offer on the front page of its website on Wednesday, a rare instance of the search giant using the prized online real estate for advertising.

Google, the world's No.1 Internet search engine, launched a daily deals business in certain cities earlier this year, in a move to counter the increasing influence of deals giant Groupon.

The move signals an escalation of Google's competition with Groupon, as the two companies vie for ad dollars from local businesses, such as restaurants and retail stores.

A short blurb underneath Google's famously sparse homepage on Wednesday offered visitors $25 tickets to New York's American Museum of Natural History for the discounted price of $5.

Continue reading...


Apple should take Amazon's new tablet computer seriously

Is Apple's iPad the undisputed king of the tablet market? There's a new challenger likely entering the race that could give it a run for its money.
Tech analysts say Amazon is set to introduce its Android tablet later this year. And we're hearing if the company plays its cards right, it could sell as many as five million tablets in the fourth quarter...

...Amazon has to get the right content and services that really show consumers what they can do with the device.

While Rotman Epps thinks Amazon may eventually cut into Apple's business, right now the introduction of its tablet mostly means reinvigorating the Android market. And its other competitors should take heed, she said, because Amazon has more assets than Samsung, HP and Research in Motion.

"They have as much content as Apple does in terms of music, videos, and games, and they now sell Android aps," she said. "So they'd be piggybacking on the Android ecosystem but taking it to the next level."

Continue reading...

Wait! Before you go...

Important Links:

Recommended security applications

Microsoft Security Essentials version 2 - excellent anti-virus protection. Free and easy to use - easy on resources.

AVAST Anti-Virus (free version for personal/home use - updated to Version 5) AVAST continues to offer and support their free version.

AntiVir (free personal version available) now compatible with Windows Vista and Windows 7.

NEVER INSTALL MORE THAN ONE ANTIVIRUS PROGRAM!

No anti-virus can protect you if you do not keep it updated. Update your anti-virus at least twice a week or more. Install and use only one anti-virus program. Installing two does not give you twice the protection. On the contrary, installing two could result in reduced protection and many computer problems.

Also, it's very important that you keep your Windows updated with the latest patches, fixes, and updates. If you don't have Automatic Update turned on, you should consider turning on Windows updates - at least to notify you when updates are available. You can still choose when to install them, not install them or install them automatically. If you don't install Windows updates you could be leaving yourself vulnerable to emerging threats. We highly recommend you install all Windows updates as soon as they become available.

Recommended anti-spyware programs
(install two anti-spyware programs for the best protection)

SUPERAntiSpyware Superior antispyware protection - lifetime license - on sale now! Use your license on two computers - it costs less than $12.50 per computer for a lifetime of spyware/malware protection. Pay once - never pay again. SUPERAntiSpyware is our #1 choice for antispyware protection.

Recommended firewall

We do not recommend any third-party firewalls. We do recommend you use the Windows Firewall and leave it turned on.

Other recommended programs

These programs can help protect you and your computer in other ways than anti-spyware/anti-virus programs.

Malwarebytes (free version - no real-time protection - but very useful anyway.

Malwarebytes (Pro version) - includes real-time protection - lifetime license.

Always keep your common sense with you when you're on the Internet. Don't be lured into installing free software or signing up for a free service if it seems too good to be true. Research it - google it! Read the privacy policy and/or Terms of Service or License Agreement of any free software or free service you're considering. As a rule of thumb, free products and free services which have extremely long, difficult-to-understand agreements are most often deceptive in nature. Be careful and stay informed - you'll be just fine. The internet is the greatest source of information ever - and it's all right at your fingertips. And despite all the nonsense and misanthropes that hide in the shadows, the Web is a wonderful place. Play it safe, use common sense, and enjoy all the internet has to offer.


Cloudeight InfoAve

Visit Our Donation Station

If you can help us right now, we'd really appreciate it. But we know that many of you are having problems as well with the world economy being what it is. If you can't afford to help us financially, you can help us by using our Start Page. Our Start Page now has over 100 free games you can play, plus breaking news and daily tips and tricks. It costs nothing to use our Start Page - and you don't even have to register. Use our Start Page as your start page and you'll be helping us without spending a dime


InfoAve Daily Tips & Tricks

We're offering something we think most of you will enjoy. We're offering a daily tips and tricks summary newsletter that is sent everyday. It's a summary of daily tips, freeware picks, and site picks - so it's very brief and lightweight. If you'd like to receive or daily tips and tricks newsletter (completely free, of course) you can subscribe here.

Don't forget... you can also help us by using our Start Page. We have added over 100 free games to our Start Page. It costs you nothing to use our Start Page --and helps us a lot.


Thank you very much for subscribing to InfoAve Premium. We appreciate your help and your support very much.

Have a great Labor Day Holiday weekend!

Eightball & Thundercloud
Cloudeight InfoAve Premium Edition Issue # 411
Volume 8 Number 48
September 2, 2011

InfoAve Premium Home

InfoAve Premium Vol 7 E-book

Question? Comments?

InfoAve Forum

Captain Optimizer Sale!

SUPERAntiSpyware Pro 

Registry Commander Sale!

Donation Station

IMPORTANT DISCLAIMER ABOUT SOFTWARE RECOMMENDED IN THIS NEWSLETTER

All software recommendations we make in this newsletter are based on our own experience and testing of the programs that we recommend. This does NOT guarantee they will work on YOUR computer. We assume you will read the program documentation and use the program according to the instructions. We make no guarantees about any program recommended in this newsletter or its suitability for any particular purpose. We will not be responsible for any problems you may have. We do not and cannot provide support for any products other than our own Cloudeight products and we will not answer email concerning any product which is not a Cloudeight product. We urge you to use good judgment when downloading and installing software and to use a program only after reading the program's documentation. And, all Tips & Tricks in this newsletter have been tested by us on several different computers and were found to work as indicated. They may not work on yours. We make no guarantees. Anything we recommend you try and use at your own risk. We will not be responsible for any problems caused by any software programs recommended in this newsletter or any of the tips and tricks in this newsletter.

Readers' comments are their own and Cloudeight Internet LLC is not responsible for comments of our readers. All readers' comments, suggestions, questions, and tips and tricks sent to us become the property of Cloudeight Internet LLC. You understand that we may use your comments without your explicit permission.

InfoAve Premium is published by:

Cloudeight Internet LLC
PO BOX 73
Middleville, Michigan USA 49353-0073

This newsletter is sent from the address infoave-premium/@/pr1.netatlantic.com . The IP address for Netatlantic is 69.25.194.2. Netatlantic is a respected newsletter hosting service. We have used their services for many years. All content is copyright ©2011 by Cloudeight Internet LLC (all rights reserved).