Information Avenue Premium - July 15, 2005 - Issue #91
You may read this newsletter online at
http://thundercloud.net/infoave/premium/archives-2005/week-91.htm  
Click Here to Change Your Subscription E-mail Address

Hi everyone,

Welcome to issue #91 of InfoAve Premium. We want to thank each of you for your support of this newsletter and our Web sites. Thank you for subscribing.

This Week's Quote: "From the day of your birth 'til you ride in the hearse, there is nothing so bad that it couldn't be worse." (author unknown)

You can send us your comments or submit questions for possible inclusion in future issues of InfoAve Premium by clicking here. Keep in mind we can't answer each of you personally, but all questions submitted are read and considered for inclusion in this newsletter.

Lions and Tigers and Bears! Oh My!Lions and Tigers and Bears! Thanks for the great response to our latest e-book - "Lions and Tigers and Bears - A Common Sense Guide to the Internet and Computers" ! We appreciate it. For those of you who haven't got a copy yet, we bet it will be the most entertaining and educational $3.45 you ever spent. You'll learn in detail about phishing, spam, viruses, Trojans, worms, spyware, adware, and other dubious threats on the Internet. But you won't find any geek-speak here. This book is written in our light-hearted, common sense style that makes this e-book a joy to read. Our motto is: "Learn while having fun!" All Premium members get this e-book at 50% off. Click here for more info about Lions and Tigers and Bears!


How You Can Support Cloudeight

Zappit System Cleaner by Cloudeight - We've been working on Zappit since January and we've made it the best, easiest-to-use, system cleaner ever. It's fun and easy to use. Even the newest computer user will find it a snap to keep their computers clean. And, Zappit is configurable and powerful enough for the advanced user,, too! Please click here to learn more about Zappit - you'll be glad you did!

Smileycons on sale! Save $5.00 right now! Our Smileycons program has been updated and is now better than ever. We're offering Smileycons to all Cloudeight subscribers at $5.00 off regular price. Please click here to learn more about our special offer.

Our InfoAve Premium E-book is the only place you can get all the content of our first 52 information-packed issues. We guarantee you it will be the best $3.45 you've ever spent. Please click here for all the details and learn how to get your copy of " Information Avenue- Premium E-book - The First Year".

Lions and Tigers and Bears! Introducing our most entertaining e-book ever! Lions and Tigers and Bears - A Common Sense Guide to the Internet and Computers will help you to use the tools you already have to safely traverse the "forest" we call the Internet and not be worried about the "Lions and Tigers and Bears".

Help Cloudeight Help You! - A dollar or two goes a long way to help keep us going. If you'd like to donate a small amount to Cloudeight we would very much appreciate it. Click here to make a donation. Thanks!

Read The Free Edition And All the Ads



Reader Comments

Chuck Loves Our New E-book

I love the new e-book. It's fun to read and I got a chuckle or two out of it, too. But, I really liked how you explained "Phishing" and setting up wireless security. I laughed at your examples about spam filtering but your analogy hit the nail on the head. Keep up the great work. Chuck.

Thanks, Chuck. We wrote the e-book in the same style as we write the newsletters. We tried to throw a laugh or two in there too, although sometimes it's hard to think of funny things when you're talking about phishing or spam! Thanks for supporting Cloudeight and for taking time to write! TC & EB


Leon Corrects Us About Windows Validation

Microsoft has not yet "required" validation of windows installation before downloading.  The screen after selecting to continue gives an option.  I really enjoy your way of providing the info you send out.  Keep up the good work. Thanks, Leon.

Leon
-You're correct. Microsoft still has not implemented "Windows Validation" at least, for now, it's not mandatory . But, it's getting close. For those of you who haven't heard about Windows Validation, it is a process you'll have to endure before you can download software from Microsoft. You'll have to wait while Microsoft validates your Windows installation. Normally this takes only a few seconds. The theory behind this is to catch people using pirated copies of Windows. Sometimes it does not work so well. I have a genuine copy of Windows that came pre-installed on one of my Dell computers. When I said "Yes" to validate my copy of Windows it asked me for my Windows key. When I typed it in it said it was not a valid key. I carefully entered it again; still no luck. The third time wasn't a charm either. Yes, I copied and pasted the key too :) So, according to Microsoft I was using an "illegal" copy of Windows. Finally, after telling them my Windows came pre-installed on my Dell (and I have a Windows XP CD-ROM from Dell too) and that I had just formatted my computer and re-installed Windows (which didn't ask for a key) Microsoft finally "validated" my copy of Windows and I was allowed to download. So, the system is not perfect. But, you're correct, Leon, to download software from Microsoft at this point, validation is not mandatory. Yet! TC & EB


Geoff Has An Answer For Kathy

This is an answer for Kathy who commented about issue #180 (Free Edition and Issue #90 Premium Edition). I have been a member of Cloudeight for many years and have not been let down once. Kathy should trust Cloudeight and enjoy the site. Regards Geoff an old one from the U.K. .

Thanks, Geoff. We encourage our readers to challenge us and if we make a mistake, to point it out. If they're right we'll print it. We're not above making mistakes. The only people who don't make mistakes are those who don't do anything. We take great care in composing tips, tricks, and answers to readers' questions. We test all software thoroughly before recommending any software program. Still, mistakes can be made and things do change. If you find something questionable about anything we recommend, please do let us know. We've got a very high batting average but still someone could throw us a curve.


Geraldine and Helen Ask Why They Didn't Get Their July 8th (Issue #90) Issue of InfoAve Premium

No problems at this time but wondering why I did not receive my July 8th newsletter today???  Too much July 4th celebrations for TC & EB??? Thanks, Geraldine.

Today is Friday July 8 2005 and there's no Information Avenue. Is everything okay with you who write it. Didn't see anything in last letter saying you were skipping some weeks or anything. I always look forward to Fridays because of the Information Ave.  Hope everything is okay. Thank you, Helen

Hi Geraldine & Helen. Our July 8th (Issue #90) of InfoAve Premium went out to all subscribers around 1:30PM (Eastern Time - USA). If you didn't get it, that means your ISP didn't deliver it (remember ISP spam filters = censorship) or you're using an anti-spam program which either deleted our newsletter or dumped it into a spam folder. We have a very detailed chapter on "spam" and ISP's who censor email in our new e-book. You should read it :) . Anyway, our newsletters always go out on Fridays (or earlier on Holiday Weekends). So, anytime you don't get it, and you use spam filtering check your spam folder. If you find your spam filter is deleting our emails, you'll need to make adjustments to it. If you don't use an anti-spam program on your computer, that means your ISP does. When an ISP deletes email without your knowledge or permission that is called 'censorship'.  Thanks for writing. TC & EB

A Note From EB: I spend a lot of time each week answering Premium members who suddenly stop getting their newsletters. Most are because their ISP started censoring and deleting their email or they installed a spam filter that, like most, cannot tell good mail from bad and deleted it. If you find your newsletter is not coming, please check your own spam filter setup first, be sure pr1.netatlantic.com is on the allowed list of domains, and if you are certain it is not something you set up as far as filters, contact your ISP and complain.- EB

Premium NewsByte - Giving an additional urgency to this month's software patch release, Microsoft has issued a warning that two of the upgrades fix flaws that are actively being exploited on the Web. As the company predicted last week, it released two fixes for Windows and one for Office. All patches have the company's highest 'critical' security rating. One of the patched problems is a hole in Microsoft's Java Virtual Machine that allows hackers to take control of a computer. Another one affects the Color Management Module inside Windows. Read more

Comment - Always check http://windowsupdate.microsoft.com/ to make sure you have the latest patches and fixes available for your brand of Windows. TC & EB

This Week's Top Questions and Answers

Sandra Wants To Know Why She Can't Run Defrag
I have been trying to defrag my computer, as everyone says that it should be done at least once a week or every second week. Well my computer won't do anything when I try to run defrag. If you have any suggestions on what could be stopping it or if you have already answered this question, please let me know what issue and I will look it up and follow your instructions. I also don't know how to find out what programs are running in the background, in order to try to defrag it. Thank you for all the good work you all do as it is very helpful to me and I look forward for them to come to read. You must be very busy to research all the questions asked. Job very well done. Thank you again, Sandra

HTTP_USER_AGENT: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; FunWebProducts; CursorZone Grip Toolbar 2.08; .NET CLR 1.1.4322; Hotbar 4.6.1)

Our Answer
Sandra, I bet one look at your question with a copy of your browser tags included and most of our readers could tell you why you can't run defrag. All the products highlighted in blue are either spyware or adware. All of these programs install additional programs (FunWebProducts by Ask Jeeves installs around a dozen programs besides the ONE you wanted) . Even worse, all these program start with Windows; most of them continually make contact with a Web server, and transmit data about you or your Web browsing habits back to the controlling Web site, or simply "checking for software updates" (uh huh). With this much activity going on in the background, it's no wonder you can't defrag, because your hard drive is constantly having data written to it and read from it.

The first thing you need to do is get rid of the spyware and adware. You're computer is virtually swimming in it. We do not recommend Ad-Aware (see our tip in this week's edition) and we are certainly not recommend Microsoft's Windows Anti-Spyware (see this week's "Rant"). We have found no better combination to remove and keep spyware and adware off your computer that SpySweeper and Spybot Search and Destroy. We'd recommend you download both of these and run them (one at a time) to remove the infestation of spyware and adware which must be, by now, overwhelming your computer.

Secondly, after removing the spyware/adware/malware and grayware from your computer, if you still have problems running Defrag, we'd suggest that you disable your screen saver temporarily. You can do this by right-clicking your desktop, clicking "Properties" and then clicking the Screen Saver tab. Choose "None". Then close all running programs (Outlook Express, Internet Explorer, and anything else you have open). After cleaning all the spyware and adware off you computer, disabling your screen saver and closing all the open programs, you should be able to run Defrag without any problems.


Linda Asks About Unsubscribe Links in Newsletters
Thank you so much for all the valuable information that you provide with your newsletter! I would like to know about "unsubscribing" to e-mails lists. Is a good idea to use the "unsubscribe " at the bottom of unwanted e-mails? Is it better just to block the sender? What is the best way to deal with unwanted lists that you never subscribed to - but somehow got on the list? I am afraid that when I unsubscribe and am asked to enter my e-mail address I am just making the problem worse. I sometimes use "block sender" but I seem to get more and more of unwanted e-mails. Thanks.

Our Answer

Thank you, Linda. Here's a good rule to follow: If it is a newsletter that you knowingly subscribed to (like InfoAve) and you no longer wish to receive it, then clicking the unsubscribe link provided in the newsletter is the proper way to remove yourself from the mailing list. However, if you receive newsletters or advertising email from places you know you didn't subscribe to and/or you've never even heard of, clicking the unsubscribe link makes matters worse:

#1. Clicking unsubscribe links in spam emails verifies that your address is valid and opens you up to more spam from the same spammer.

#2. Clicking unsubscribe links in spam emails, validates your email address, and your address will end up being sold as a valid email address to other spammers.

Additionally, trying to block spam by using Outlook Express' "Blocked Sender" feature is useless. You'll be like the Federation fighting the Borg. You know the Star Trek thing? Where the Borg say "Resistance is futile"?. Anyway, trying to block spam by using the Blocked Sender feature or creating message rules based on the sender's address is futile. This is because no successful, professional spammer would ever send from a valid email address - least of all anything that could be traced back to him. And a professional spammer may send you the same email dozens of times from dozens of different email addresses - none of them valid. So, when we see anti-spam programs like Mail Washer offering to "Bounce" mail back to the spammer, we have to laugh. Programs may indeed bounce the email, but certainly never back to the person who sent it.

In our new e-book, we go into a lot more detail about ways to fight spam, without losing any good email or making legitimate senders jump through hoops to get an email to you. While we don't have room in this newsletter to include all the details we expand upon in the new e-book, we can tell you that we use PopPeeper to control spam. It takes us less than 10 minutes of our time each day dealing with the hundreds of spam emails we get. It takes us over an hour a day dealing with the problems that spam filters cause when we, a legitimate sender, try to answer support mail and fill orders which are blocked by either ISP's spam filters or users misconfigured spam filters. The best spam filter is your brain. Use it. And you'll save yourself and your legitimate senders a lot of grief. Use a program like PopPeeper and your brain and we guarantee you'll receive all your valid email and zero spam.


Joan Asks About The Ubiquitous Active-X Warning
In your June 24th issue you had a free site of the week for PC-Pitstop. I clicked on your embedded link and was taken to the site but also had some info from Internet Explorer saying that it had blocked the site from downloading an active x from being installed. Is this normal or are some of my settings wrong? You guys are the best in the world. So refreshing to know people like you still exist in this world. Have downloaded and ready to pay for Zappit - great program. Thanks so much - Joan

Our Answer
Thanks, Joan. Many legitimate sites like http://housecall.trendmicro.com/ , http://windowsupdate.microsoft.com/ and http://www.pcpitstop.com/ use Active-X controls to install a control to allow them to perform a specific function. In the case of an online anti-virus scanner that would be to scan your system for viruses, worms and the like. With PC Pitstop, you went there for a specific purpose, we assume. And that purpose was to find problems with your PC. The only way a site like PC Pitstop can do this, without you downloading and installing a heavy-duty program (which probably wouldn't be free) is to install an Active-X control and run the program from their Web server.

Normally, whenever Internet Explorer warns you of an Active-X control trying to install, you have the option to over-ride it. Usually, a yellow bar will appear at the top of your browser window. If you click that bar you are given options to allow it to install or not to allow it. You have to use good judgment to be sure. But sites like PC Pitstop and many others are providing a service you most likely want and probably the reason you went to that site in the first place .

All that being said, a warning: Some pretty bad spyware and adware is installed using Active-X controls. If you're not sure about the site you're visiting, play it safe and don't allow the Active-X control until you've had time to research the site. You can do this easily by performing a search (preferably Google) about the site and including the search term "+ spyware". So, if you were on Claria's site (don't go there) and were not sure if you should it to install Active-X controls, let Internet Explorer block the Active-X control(s) and do a search in Google for "Claria + Spyware". See what turns up. If you find nothing about it being malware, adware, spyware, or worse, make an informed decision to allow the Active-X control or not. But, never jump in with both feet if you're not sure. Once a mess is made it can very difficult to clean it up. So, think before you swim.

Firefox is considered "safe" because it does not recognize or allow the installation of Active-X. While this is true, what they don't tell you is that Firefox does allow the installation of scriptlets and JavaScript. They call these (euphemistically) "Browser Extensions". But, when all is said and done, its purpose is the almost the same as Active-X. That is, to add functionality to the browser. Firefox extension can be and are being abused right now. And we're just seeing the tip of the iceberg. FunWebProducts already makes "extensions" for Firefox. More and more questionable things will be available as "extensions". Spyware, adware and worse will find a new life as extensions for Firefox.

No software program and no browser will keep you completely safe. Using good common sense and caution should be your guiding force on the Internet. Common sense combined with the right software and knowledge will keep you a lot safer.

Finally, we would never send our readers to a site that had dangerous or nefarious content. We do check these things out pretty good you know :)


Jan Asks if AVG is As Good As Norton
I'm not sure if this is appropriate but I would like to know about the quality of security and the differences of that for Norton Antivirus and AVG free version of antivirus. I was told that AVG was "better" than Norton but my granddaughter just got a virus using that and was told that it wasn't as good as Norton. I have Norton on my desktop and just purchased a new laptop (built for me) and it has AVG and now I don't know whether to get Norton for the laptop, or not. Thanks, Jan

Our Answer
We don't think a statement like one being better than the other can be made. The question is are both equally effective? And if they are, then we'll choose AVG or AVAST over Norton every time. Why? Because we simply don't think you need to drain your system resources to protect it from viruses and worms. We have never seen any official, independent studies, which showed that Norton protected a computer any better than AVAST or AVG.

Our guess is that your granddaughter's problems stemmed from lack of keeping her AVG updated. And, it may not have been her fault. One of the only problems we've found with AVG isn't that it doesn't protect systems well, but that its update feature (auto-update) is not entirely reliable. We can only guess that so many are using the free version of AVG that their servers sometimes cannot handle the volume, leaving some users without updated definitions. This can cause problems in detecting viruses and worms. That's why we recommend that anyone using AVG not only set auto-updates frequently but also check for updates manually every day.

In fact, one of the biggest reasons why we now favor AVAST over AVG isn't because AVG doesn't protect a computer well, but because of the many reported problems with its update servers and its intermittent failure to automatically update. We've never experienced this problem with AVAST.

Facts: We've never seen a study showing Norton any more effective than a litany of other AV programs. Norton uses more system resources than any other AV we've ever tested, puts more tentacles into far reaches of your computer than any other AV program we've tested, and costs more than any other AV (except McAfee).

When all is said and done, the choice remains yours. You have to decide for yourself if you want to pay top-dollar for Norton and if you want to allow it to use a disproportionate amount of your system's resources. If it works for you and you feel it provides better protection than any other, then you should use what you like. Like most software, it comes down to what you like and the program with which you're most comfortable.


Sarah Wants To Know What We Mean by System Resources
I would like to know exactly what you are referring to when you refer to "system resources." Is the RAM the system resources. I never have known for sure what the system resources are and I know that for answers to computer questions you guys are the best out there for giving the public reliable information. Thanks for all your good work and the best information newsletter on the net. Thank you, Sarah

Answer
Thanks very much, Sarah. We'll make an analogy for you that will help you understand the difference between RAM and available system resources.

Let's say you live in a town called "Small Town". It's a quiet little village of 2000 people. Your town gets its water from a  small lake. Your town's water department purifies the water (hopefully!) and pumps it up into the town's only water tower. They keep the water in the tower full most of the time and this provides you with water pressure, luxurious showers and, of course, (duh!) drinking water.

Now the lake and the water in the tower is like the RAM in your computer. When the water tower has plenty of water in it then you have plenty of water and good water pressure. But, now let's say a big fire breaks out in your town and all the fire trucks in your town and surrounding towns are fighting the fire. They hook their hoses up to the hydrants and blast the fire with zillions of gallons of water (ok so we exaggerate!).

You go into the bathroom to take a nice hot shower and turn on the faucet and only dribbles of water come out. No shower today!  The lake's got plenty of water but the tower is straining to provide the firemen with the water they need to fight the fire. And, there's not enough water pressure for you to take a shower. This is what happens when you try to run a program when there's not enough system resources to open the program. The firemen are like programs running on your computer. When there's a bunch of them running they're draining water from the tower. Now, the bigger tower you have (the more RAM you have that is) the more programs you can run without "draining the tower" . So the more RAM you have installed, the more programs you can run before you finally drain your available resources.

When the tower starts getting empty (when your RAM is low) you'll notice programs opening up slower, programs crashing, and freezing, and your computer starts running poorly. While there's plenty of water in the lake, there's hardly any in the tower. Rebooting is like pumping water back into the tower and filling it up. So, when you've rebooted you've replenished the tower.

If you constantly experience slow performance, programs freezing or crashing, programs taking forever to load when you click the shortcut to open them, that means your system resources are low. If you've got plenty of water in the lake but none in the tower it does you no good at all. That is just what Low System Resources means.

Guidelines for Windows XP-SP2. We don't recommend anyone try running Windows XP-SP2 with less than 512 MB of RAM installed. So if you don't have at least 512 MB of RAM installed, install more RAM. This is like building a bigger water tower. Ideally you should have 768MB or 1 gigabyte of RAM installed if you like to multi-task and run resource hungry applications like 3D Games, graphics programs, or high-powered office programs and spread sheets.

And controlling programs that start with Windows is always important in maintaining a good supply of water in your tower. Spyware and its buddy, adware, can really drain your water tower in a hurry. Dozens of these little fake-fireman will hook up hoses to your hydrant and shoot water in the air, just for fun -and waste your precious resources. No fire needed for them! Get rid of these big RAM-wasters! Cutting back on programs starting with Windows, making sure you have plenty of water in your tower (plenty of RAM) and not using more water than your tower can supply (running more programs than your RAM can support) are all important to keeping your computer running fast and problem-free.

Premium NewsByte A new alliance of computer firms and consumers plan to take on what could quite possibly be a very difficult job: defining what spyware actually is. The alliance, called the Anti-Spyware Coalition, includes high-profile companies such as Microsoft, AOL and Yahoo. Although antispyware software "is the best tool you have out there today," consumers now need to trust those that develop spyware-fighting technology for their protection, said the group's leader, Ari Schwartz, Associate Director of the Center for Democracy. Schwartz called the spyware situation a crisis. Read More

Thundercloud & Eightball's Rant

What's Up With Microsoft?

We've always been supportive of Microsoft. This irks some people because the cool thing to do is be anti-Microsoft. If you don't believe this, look at similar newsletters and you'll see a decidedly anti-Microsoft bent running through them. It is not our mission to be "cool" but to be honest. Our honest opinion has been that Microsoft doesn't deserve all the bad press and attacks it receives from many techno-writers and the press in general. However, it has become popular to take an anti-Microsoft stance and because it (they think) increases readership (and makes them more money). It's almost a certainty that anti-Microsoftism will continue to be popular horse to ride. After all most of us learn in life, it's easier to criticize than to praise.  It's easier to find fault than solutions. And, it's human nature to be negative. I guess we all become cynics if we live long enough. But some seem born to be cynical.

Microsoft is the company who brought computing to the masses. Arguably, Windows is a "borrowed" idea. Apple came out with a graphical user interface before Microsoft. Bill Gates and associates took Apple's idea of a GUI and made it run on IBM and IBM compatible computers - and the rest is history. We think, and many agree, that Windows XP is a great advancement over any other consumer version of Windows thus far. We supported Service Packs 1 and 2, in spite of the many doomsayers warning users not to install these service packs. Today, you'd be hard pressed to find anyone with any credibility not recommending installing Windows XP Service Pack 2. But, in the beginning we stood as one of few who advised our readers to install it.

Almost unanimously, until now, we have always supported Microsoft.. But today we're wondering exactly where Microsoft is headed. The things going on at Microsoft today are not things we would have seen a few years ago. And we don't much care for the things we think we see.

Let's take their Microsoft AntiSpyware Program and their rumored buyout of Claria  (makers of such wonderful things as Gator, WeatherScope, and Dashbar - spyware/adware all) for example. Please click here to read the rest of today's Rant. 

Premium NewsByte - The discovery that Microsoft updated its spyware definition files in order to advise users to ignore Claria's adware fueled rumors that Redmond planned to acquire the contextual advertising company. But security experts said the move signals a change in its attitude to adware in general. On June 30, the Wall Street Journal reported that Microsoft was in talks with Claria, which makes downloadable software that aggregates users' Web surfing behavior. Meanwhile, spyware watchers noticed that Microsoft Anti-Spyware (MAS), the spy-blocker software released as a free beta, advised users to "ignore" Claria's GAIN, DashBar and DateManager. MAS formerly advised users to "quarantine" it. The blogosphere ignited with speculation that the upgrade was part of the companies' courting process.  Read more.

This Week's Tips and Tricks

Reader's Tip of The Week Submitted by Marlene
(Tip edited by TC & EB)

Ever want to get at your Address Book, without opening up IE?  Open Outlook Express, click on the Address Book icon (on the toolbar) click "File" Export - choose your Desktop as the destination and give it a name. It will be saved with a .WAB extension (Windows Address Book).  You can leave it on your desktop or drag your Address Book to your Quick Launch toolbar. Note: If you drag it to the Quick Launch bar choose "Move here" not "Create Shortcut Here" or you'll have to leave your Address Book on your desktop forever :) . Now you can access your Address Book without opening up Outlook Express.

Thanks Marlene. You can also do a search from Start/Search, search for "All files and folders" and type in *.wab. When your Address Book is located, you can drag it out of the search to your desktop. Be sure to choose "Copy here" and not "Move here" or all sorts of bad things can happen :-)  Do you have a tip or trick you would like to share with our readers? Send it to us by clicking here. If we use your tip, you'll win a great prize!


This week's Tips and Tricks

Curse Those Boring Cursors?
Windows XP Home and Professional

(This tip was suggested by a question from Pam who asked: "Are there any good, safe, non-adware programs out there for cursors?  I am still using the Santa Clause from Microsoft at Christmas.  I noticed that when I checked out your tutorial about thumbnail views that there was a Google ad for a couple of cursor programs.  One was Cursor Cafe and the other was Best Free Cursors.  I can hardly wait for your Ok because I am tired of Santa." )

Cursor Cafe is a very questionable product. Best Free Cursors was part of Cursorzone.com which is now out-of-business. Briefly, Cursor Cafe comes with Starware Toolbar (this is the catch and how they make money by making you a pawn). Here is an excerpt from their "Privacy Policy"

CursorCafe.com also offers the optional Starware Toolbar featuring the CursorCafe.com button. The Starware Toolbar is provided by Starware and comprises a web browser toolbar with web search assistant and travel search assistant functionality (collectively, the "Toolbar"). The Toolbar provides useful, convenient and fun services that enhance your web browsing experience ("Toolbar Services"). Examples of Toolbar Services include CursorCafe.com Web Search, CursorCafe.com Dictionary, and CursorCafe.com Travel Search. (Note from EB- This really makes me angry, they are making it sound like having information gleaned from you is "FUN") The Starware Toolbar privacy policy can be read here.

Some Starware Toolbar Services provide links to partner websites that are neither owned nor controlled by CursorCafe.com (e.g. the Starware Travel Search service links to Orbitz.com), and are governed by the privacy practices of those partners. Please take the time to carefully read the privacy policies of those partners when visiting their websites.


While they say optional toolbar, you'll find it hard to not install it. So the use of the word "Optional" is questionable. Once installed your search results will be skewed by showing all paid advertisers (disguised as "search results") first. Meaning no matter what search engine you choose, you'll have to wade through a bunch of paid links to get any relevant search results. This type of scheme is now becoming vogue among adware/spyware developers trying to escape the wrath of the recently awakened press. This is how "FunWebProducts" (AKA MyWebSearch, MySearch, Ask Jeeves, SmileyCentral, etc) make money with their "products".  A new twist on an old game, but the people who use these kinds of programs are still pawns.

Windows comes with several different cursor sets (called "mouse pointers" in Windows' parlance). Three sets stand out. One is called "Dinosaurs" one is called "Old Fashioned" and one is called "Conductor". To learn how to access these and use them as your cursor set (mouse pointer set) see our tutorial - click here.


Why You Shouldn't Rely on Ad-Aware
Windows All Versions

(This tip is based on a question from Sandy who asks "You advertise SpySweeper and Spybot Search & Destroy. I am using Ad-ware. Am I fine with Ad-aware or should I switch to one of the two you recommend? I believe Ad-aware is similar to the two you recommend. Do you have any comparisons or suggestions?")

As of this writing, Ad-Aware does not detect some of the most well-known spyware/adware. For example, it doesn't detect Hotbar, Claria's Gator, WeatherScope, Dashbar, 180 solutions, and other programs that most anti-spyware programs recognize and remove, In fact, Ad-Aware on its site declares that adware, for the most part, is harmless. This is strange that a program whose name suggests that adware needs to be removed does not remove most adware from you computer and, in fact, considers it harmless.

Ad-Aware at one time was one of our favorite anti-adware and anti-spyware programs. But, they've been threatened with lawsuits by several suspected spyware and adware developers. Their response was to remove from their spyware/adware definitions anyone they perceived as a threat to them - not you. In other words, it appears to us, they caved in to the threats fearing financial ruin. It's understandable but not excusable. After all millions have relied (and still rely) on Ad-Aware to protect them. But, Ad-Aware chose self-preservation over your needs. And, looking out for number one has made Ad-Aware weak and worth ZERO in our book.

We still cannot understand how a program called "Ad-Aware" can say that adware is, for the most part harmless. Even if the adware does not threaten your privacy it can be a stinger for your system's stability and a drain on your resources. Every ad displayed in an adware program uses your resources. For what? To display advertising you don't want to see anyway? And most adware shows you targeted advertising based on your private use of your browser and computer. They do this by several means, all of which are potential security risks and, to our way of thinking, privacy violations.

We will never recommend Ad-Aware until it demonstrates that it cares about its users as much as it does about itself. If they're going call adware "harmless" then they should change their name to "Spy-Aware" or "Really-Bad-Stuff-Aware" - or anything that describes what the program might actually do. In other words, anything other than "Ad-Aware".


Beware - Phishing By Telephone Is Here
Most everyone has heard of phishing by now. And just when you think you're understanding the modus operandi of phishers, wouldn't you know phishing is changing in a most disturbing way? It's called Phishing by Phone and it uses email and telephone to catch "phish".

In Microsoft's most recent security newsletter, they provide an excellent definition of "Phishing by Phone":

"...Instead of being directed to a Web page, you could be prompted to call a customer support number where a person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data to steal your identity and access your account. Often the person on the other end of the phone line will make claims that your account will be closed or other problems could occur if you don't respond. Read on to learn how to avoid falling prey to this new threat.

Although law enforcement and other security agencies can trace phone numbers, perpetrators often use payphones, stolen cellular phone numbers, or hacked accounts, so it's important to avoid being conned rather than try to minimize damage afterwards.

Note: This scam may also take advantage of fax or VoIP (Voice over Internet Protocol) numbers as well..." (Click to read the recommendations Microsoft makes to help you avoid being a victim of "Phishing by Phone".)

We wanted to share that with all our readers because we don't want any of you to end up being phish.


Maximize, Minimize, Simplifize
(Windows 98,ME, NT, 2000 and Windows XP Home and Professional)

Sometimes those program window controls (at the top right of almost every window) - you know the minus sign, the rectangle(s) and the plus sign - can be difficult to work with. Did you know that you don't need them anyway? You don't need those controls to maximize or restore a window. Just double-click the title bar. (The title bar is the strip along the very top of the window which contains the program's name.) Double-clicking the title bar does the same thing as clicking the maximize button. To restore the Windows to its original size (if original size is not "maximum") just double-click the title bar again.  If you want to see the window's context menu, right-click the title bar or hit the "Alt" key plus the spacebar key. If you want to minimize all windows, just hit the Windows Key plus the "M" key. If you tap the Windows Key + M again, all windows are restored.


Shortcut To Standby
(Windows XP Home and Professional)


(This tip was suggested by several readers who read our tip on creating a shortcut to Windows shutdown on the desktop. They wanted a tip to create a shortcut to Windows "Standby" mode". So here it is!)

Right-click on your desktop and choose "New" then "Shortcut", and type or copy and paste in the following in the command line (it must be exactly as shown):

%windir%\System32\rundll32.exe powrprof.dll,SetSuspendState

Now give it a name (Suspend or Standby would be good :-) ) and your all set. If you don't like the default icon that Windows assigns to your new shortcut, you can change it by right clicking on the shortcut, choose "Properties" and click the "Change icon" . Browse and find an icon you'd like to use and click "Apply" and "OK". Hint: You can do this with most shortcut icons too!

NOTE: This command will put your computer in a state of hibernation which is much safer than "Standby". Here's why: Standby is faster than hibernation to be sure. But hibernation is safer. When you put your computer on standby, your computer enters a low-power state that turns off your monitor and hard drive. This saves energy but not your work or data. Standby is okay for brief periods - like going to lunch or to take the garbage out :). But, you need to be aware that any changes you made to any open files prior to entering standby mode will not be saved to your hard drive, and you may lose anything you're working on. Your PC still relies on limited power to the system to preserve your work. If a power failure occurs while your PC is on standby, you could lose any unsaved data. A shortcut icon to "Standby" is convenient but too tempting. The way to go when using a shortcut is to set your computer to hibernate. Then you don't have to worry about closing open files or works-in-progress. When you click the shortcut, the hibernate routine will to save all your data to disk and you'll be playing it safe. Because, Hibernate stores your system's state (everything currently in RAM) to your hard disk and when you power on again, you'll be right back where you were. All this takes a bit longer than "Standby" mode, but, then again, you don't have to sit around  and watch while your computer goes into hibernation. Keeping your work and data safe by using hibernation may take a bit longer than "Standby" but you'll never have to worry about losing data or a power outage. It's always better to be safe than sorry, as we've said many times before!

Premium NewsByte - Patch Tuesday this month was an IT administrator's worse nightmare. Microsoft Corp. patched three "critical" flaws. Oracle Corp. plugged 49 database server holes. The Mozilla Org. fixed a dozen fairly serious Firefox and Thunderbird bugs. Apple Computer Inc. applied security stripes to Tiger. Cisco Systems Inc. corrected denial-of-service flaws in CallManager. And the list goes on and on. According to a database maintained by the U.K.-based NISCC (National Infrastructure Security Co-ordination Centre), a total of 14 high-profile software vendors, including several Linux distributors, pushed out security updates between July 11 and 12, a deluge that caught enterprise IT administrators off guard and unprepared.  Read More

Our Freeware Pick Of The Week

RootkitRevealer

The descriptions below are from the developer's Web site:

"RootkitRevealer is an advanced patent-pending root kit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects all persistent rootkits published at www.rootkit.com, including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). If you use it to identify the presence of a rootkit please let us know!

What is a Rootkit?
The term rootkit is used to describe the mechanisms and techniques whereby malware, including viruses, spyware, and Trojans, attempt to hide their presence from spyware blockers, antivirus, and system management utilities. There are several rootkit classifications depending on whether the malware survives reboot and whether it executes in user mode or kernel mode. ..."

Rootkits have been around for awhile but they're just now coming into the spotlight. As more and more spyware, adware, and other malware developers use rootkits, to bore into your computer while remaining hidden, you'll be hearing more about them. Rootkits can be particularly unpleasant and most difficult to detect and remove. We think, sooner or later the term "rootkit" will become as well known as the term "virus" or "spyware" is now. We want you to know and we want you to be aware. And most of all we want you to be safe. That's why we've made "Rootkit Revealer" our freeware program of the week! Note: This is not a program for beginners. But, intermediate and more advanced users will have no trouble understanding this program. Please do not download this program if you're a beginning computer user.

Premium NewsByte - Internet-based telephone services are still very inferior to traditional phone connections in reliability and sound quality, according to an extensive study that judged Vonage and AT&T CallVantage best among the top providers. Keynote Systems Inc., known for measuring the performance of popular Web sites, also found that the reliability of Voice-over-Internet phone service is significantly affected by the provider of the high-speed Internet line used to dial a call. Time Warner Cable and MCI Inc.'s UUNET business service scored highest on reliability. Keynote found little variance in audio clarity among the broadband providers...  Read more

Comment - Internet Phone Service is also referred to as VoIP (Voice Over Internet Protocol). Looks like it's not quite ready for prime time. Still for $25.00 a month and unlimited long distance (USA and Canada) - if it works 95% of the time it might be worth it! TC & EB

Our Site of The Week

Microsoft Security At Home

Many of the things Microsoft has done to help computer user are to be applauded. Despite our Rant this week, Microsoft does a lot to help those who need help with their online security or seek to learn more about computers and online safety. Indeed, online security and online safety are complex subjects and no matter how much you know there are still many things you don't. With that in mind, we have made Microsoft's Security At Home Web site
our site of the week!  A great site for those of you who yearn to know more about this crazy world of interconnected computers that we call the "Internet".

Premium NewsByte - Why Microsoft AntiSpyware Is Untrustworthy - Opinion: Just when you think Microsoft did something important the right way, it does the worst possible thing. What is going through the company's head? I'm still waiting for the explanation that makes it all make sense, but it doesn't look good. I have the nasty feeling Microsoft was disappointed with its good-guy/good-technology approach to anti-spyware. The security business is not like most of the software categories in which Microsoft participates. People care about reputations. Users have to trust the product. And you just can't trust a product that tells you to ignore the fact that Claria's GAIN software is installed on your system. Read more

Back To Basics

What is a Dialer?

Dialers are a form of Trojan or spyware that once installed change your dial-up settings and is capable of dialing numbers without your knowledge. Once dialer software is downloaded and installed the user may be disconnected from their Internet service provider and another phone number dialed. The user can be billed for the time used. These numbers may be 900 porn numbers or other such sleazy type "pay-by-the-minute" phone services. Dialers are generally malicious in nature and can rack up expensive and unwanted bills costing you a ton of money. Most dialers are recognized and removed by good anti-spyware software. Those who connect by cable to the Internet are not affected by Dialers.

Premium NewsByte - Microsoft's MSN business unit is trying to hook customers onto "Kahuna." Kahuna is codename for an upcoming version of Hotmail that will sport a new style of interface, automatic inbox refreshing and a preview pane that will enable Hotmail users to read and respond to e-mail without ever leaving their inbox. Microsoft has reason to be testing such additions: Many of these features are already out of testing and in production among its competitors.  Read more

This Week's Internet Threat Alerts

No new widespread Internet Threats at this time. But...always be wary. Keep your anti-virus and anti-spyware programs up-to-date. Use a good firewall, especially if you're using a broadband or other high-speed connection.

Recommended Anti-Virus

AVAST Anti-Virus (free version for personal/home use)

AVG Anti-Virus (free version for personal/home use)

EZ-Trust Anti-Virus (Free one-year trial for Microsoft Users - $19.95 for 2 years)

NOTE: No anti-virus can protect you if you do not keep it updated. Update your anti-virus at least twice a week or more. Install and use only one anti-virus program. Installing two does not give you twice the protection. On the contrary, installing two could result in reduced protection.

Also, it's very important that you keep your Windows updated with the latest patches, fixes, and updates from http://windowsupdate.microsoft.com/ . If you don't have Automatic Update turned on, you should visit the Windows Update site once per week.

Recommended Anti-Spyware

SpySweeper (free fully-functional thirty-day trial available - commercial software)

Spybot Search & Destroy (freeware)

And, if you're an AOL user we strongly urge you to use the anti-spyware that AOL is currently providing its users. If you're currently using AOL, we urge you to use this great tool along with one or more of the others we recommend.

NOTE: No anti-spyware program can protect you if you if do not keep the spyware definitions updated. We recommend installing and using at least two anti-spyware programs. No one program can completely protect you from all the potential spyware and adware threats.

Our Best Advice

Use common sense. Don't be lured into installing free software or signing up for a free service if it seems too good to be true. Read the privacy policy and/or Terms of Service or License Agreement of any free software or free service you're considering. As a rule of thumb, free products and free services which have extremely long, difficult-to-understand agreements filled with legal-speak are most often deceptive in nature. Be careful and stay informed - you'll be just fine. Despite all the hooligans that hide in the shadows of the 'Net, the Web is a wonderful place for us all to enjoy!

Please consider buying our Premium E-book "The First Year" or our brand new "Lions and Tigers and Bears" e-book. They are only $3.45 each and both are worth a great deal more. We guarantee it!



Those of you who are new to InfoAve Premium Edition can read previous issues of InfoAve Premium by clicking the following link: http://thundercloud.net/infoave/premium/premiumhome.htm. Don't forget that all of the information included in our first fifty-two issues of Information Avenue Premium is included in our InfoAve Premium E-book "The First Year".

We would like to thank all of you who have subscribed to Cloudeight InfoAve Premium. We're glad to have you with us!  If you have a question you would like to see answered in InfoAve Premium please submit it to us by clicking here. Keep in mind we cannot answer every question, but we do read every one.

A reminder: All of our subscribers are now considered members of our Cloudeight Stationery site. You can visit your Member's Page by going to http://thundercloud.net/giftlist/ . Don't forget to create a shortcut on your desktop!

We'll see you next week with a brand new issue of InfoAve Premium. Thanks to all of you for your support and for subscribing to InfoAve Premium!

Best wishes,

Eightball & Thundercloud
Cloudeight InfoAve Premium Edition
July 15, 2005

IMPORTANT LINKS!

Premium Home
| Information Avenue Public | Cloudeight Home | InfoAve Forum | Smileycons | Change Email Address

DISCLAIMER

All software recommendations we make in this newsletter are based on our own experience and testing of the programs that we recommend. This does NOT guarantee they will work on YOUR computer. We assume you will read the program documentation and use the program according to the instructions. We make no guarantees about any program recommended in this newsletter or its suitability for any particular purpose. We will not be responsible for any problems you may have. We do not and cannot provide support for any products other than our own Cloudeight products and we will not answer email concerning any product which is not a Cloudeight product. We urge you to use good judgment when downloading and installing software and to use a program only after reading the program's documentation. And, all Tips & Tricks in this newsletter have been tested by us on several different computers and were found to work as indicated. They may not work on yours. We make no guarantees. Anything we recommend you try and use at your own risk. We will not be responsible for any problems caused by any software programs recommended in this newsletter or any of the  tips and tricks in this newsletter.

Readers comments are their own and Cloudeight Internet LLC is not responsible for comments of readers included herein.

This newsletter is published by:
Cloudeight Internet LLC
P.O. Box 558
Hastings, Michigan 49058

This newsletter and all content is copyright ©2005 by Cloudeight Internet LLC (All rights reserved)