bearly bytes newsletterbigbearcc.org/newsletters/october17.pdfhelpline & officers..... 15...

16
www.bigbearcc.org 1 Hello Everyone, Fall is upon us, and we are starng to think of winter being around the corner. No- vember 14, 2017 will be our last Big Bear Computer Club meeng of the year; we go dark during December and January due to winter weather in the mountains. We start up next year February 7, 2018. Next year our Membership meengs are going to be held on a different week of the month. The meengs will then be held on 1 st Tuesday of the month. Our meengs were being held on the 2 nd Tuesday of the month. You will get a reminder of this change next year. Don’t forget to click on all the bears in the October newsleer unl you find the one that requests your name to receive a prize at the general meeng. CONTENTS President’s Message & Next General Meeting .................... 1 2017 Big Bear Computer Workshops ................................... 2 Equifax Hacked ...................................................................... 2 5 Benefits of Next Genereation Firewalls ............................. 3 Bluetooth Vulnerabilities ...................................................... 5 Warning: CCleaner Hacked ................................................... 6 The Roots of Computer Code ............................................... 8 Club News ............................................................................... 9 Recycling Printer Ink with the Computer Club .................... 9 AmazonSmile ......................................................................... 9 How to Destroy Your Computer in Just Minutes ............... 10 Bits & BytesLast Club Meeting ...................................... 12 Club Relations and Calendar ............................................. 13 Word, Excel, & Apple .......................................................... 14 Helpline & Officers ............................................................... 15 Information & Membership Application ........................... .16 President’s Message - Yomar Cleary NEXT CLUB MEETING November 14, 2017 1:30 - 3:00 pm Folding @ Home Presented by Marc Busch Big Bear Computer Club November 2017 Volume 17 Issue 9 Bearly Bytes Newsletter Learn about how Stanford Universies’ distributed compung project for disease research that simulates protein folding, computaonal drug design, and other types of molecular dynamics. And you can join the project too—free at not cost! To be held at the Big Bear Senior Center, 42651 Big Bear Blvd Big Bear Lake

Upload: others

Post on 15-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 1

Hello Everyone

Fall is upon us and we are starting to think of winter being around the corner No-

vember 14 2017 will be our last Big Bear Computer Club meeting of the year we go

dark during December and January due to winter weather in the mountains We

start up next year February 7 2018

Next year our Membership meetings are going to be held on a different week of the

month The meetings will then be held on 1st Tuesday of the month Our meetings

were being held on the 2nd Tuesday of the month You will get a reminder of this

change next year

Donrsquot forget to click on all the bears in the October newsletter until you find the one that

requests your name to receive a prize at the general meeting

CONTENTS

Presidentrsquos Message amp Next General Meeting 1

2017 Big Bear Computer Workshops 2

Equifax Hacked 2

5 Benefits of Next Genereation Firewalls 3

Bluetooth Vulnerabilities 5

Warning CCleaner Hacked 6

The Roots of Computer Code 8

Club News 9

Recycling Printer Ink with the Computer Club 9

AmazonSmile 9

How to Destroy Your Computer in Just Minutes 10

Bits amp BytesmdashLast Club Meeting 12

Club Relations and Calendar 13

Word Excel amp Apple 14

Helpline amp Officers 15

Information amp Membership Application 16

Presidentrsquos Message - Yomar Cleary

NEXT CLUB MEETING

November 14 2017

130 - 300 pm

Folding Home Presented by Marc Busch

Big Bear Computer Club November 2017 Volume 17 Issue 9

Bearly Bytes

Newsletter

Learn about how Stanford Universitiesrsquo distributed

computing project for disease research that simulates

protein folding computational drug design and other

types of molecular dynamics And you can join the

project toomdashfree at not cost

To be held at the

Big Bear Senior Center

42651 Big Bear Blvd

Big Bear Lake

wwwbigbearccorg 2

2017 BIG BEAR

COMPUTER CLUB

ONE REMAINING

WORKSHOP

FOR THIS YEAR

October 30th Microsoft Publisher 2013

This Workshop Publisher is especially helpful for folks that do newsletters It completely creates a template including headings titles small text boxes for sidebars ads etc Learn what options it presents when working on computer projects that require more manipulating than Word or Excel offers again it is really applicable to Newsletters Ads Professional stationery set-ups side bar ads for existing documents Registration contact Sandi Ybarra at 909 585-8313

2017 Big Bear Computer Workshops

EQUIFAX HACKED

Equifax has been hacked and millions of peoplersquos personal private financial information has been stolen

How to see if you are affected by the recent EQUIFAX DATA BREACH and what to do if you are Click HERE

MalwareBytes a respected security firm released an article on how to protect against identity theft Click HERE

wwwbigbearccorg 3

Resource Networkcomputingcom

A look at the advantages NGFWs have over traditional network firewalls

The complexity of modern cyber attacks and advanced hacking methodologies are driving enterprises to look to next generation firewalls for better security New web-based malware and intrusion attempts bypass perimeter protections to exploit

applications Users are susceptible to malicious emails or phishing schemes as these threats are

concealed within the content itself and are delivered over the network undetected

Initially traditional firewalls just followed web protocols and werenrsquot intelligent enough to distinguish different kinds of web traffic Their inability to inspect network-packet data and identify legitimate business applications and attacks forced them to either accept or reject all the traffic

This meant that protection based on ports protocols IP addresses was no longer feasible Businesses needed a more robust form of security that wasnt just tied to the IP addresses They also needed newer rules for controlling website and application usage within a network That led to the evolution of next-generation firewalls (NGFWs) with advanced technologies that promised deeper inspection capabilities and better control over individual applications in a network

Here are the top five advantages next-generation firewalls have over traditional firewalls that every network professional should know

1 Multi-functional

Traditional firewalls provide basic packet filtering network and port address translations stateful inspections and can even support

virtual private networks However they are only limited to the Data Link Layer and Transport Layer of the OSI model

In addition to all the functionalities of traditional firewalls next generation firewalls also include integrated intrusion detection systems (IDS) and intrusion protection systems (IPS) that detect attacks based on traffic behavioral analysis threat signatures or anomalous activity This functionality helps perform deeper inspection and improve packet content filtering of network traffic up to the application layer

2 Application awareness

Traditional firewalls typically block common application ports or services on a network to control application access and monitor

specific threats However with network connectivity becoming more complex several applications use multiple or various ports making it extremely difficult for traditional firewalls to identify the targeted port

Moreover these ports are being used in various other ways such as tunneling in which a network protocol is enclosed within the packets carried by the second network and is de-encapsulated at the destination

To counter this next-generation firewall devices monitor traffic from layer 2 through layer 7 and are intelligent enough to determine what exactly is being sent or received If the content is within policy it is sent further or else its blocked

Application awareness also enables companies to set policies depending on the user and the application For instance allowing users to access Facebook but blocking Facebook Chats

Continued hellip page 4

5 Benefits of Next-Generation Firewalls

wwwbigbearccorg 4

ContinuedNew security

3 Streamlined infrastructure

Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices

With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users

NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural

complexities

4 Threat protection

Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it

It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls

5 Network speed

Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different

The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed

In contrast next-gen firewall

throughput remains exactly the same

irrespective of the number of

protection services

wwwbigbearccorg 5

Bluetooth Vulnerabilities

More in-depth details can be read

on this website

httpswwwarmiscomblueborne

Resource by Bruce Schneier

A bunch of Bluetooth vulnerabilities are being reported some pretty nasty

BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities

Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure

Finally unlike traditional malware or attacks the user does not have to click on a link or download a

questionable file No action by the user is necessary to enable the attack

wwwbigbearccorg 6

Warning CCleaner Hacked to Distribute Malware

Resource by Swati Khandelwal September 18 2017

Over 23 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which

wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware

Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information

All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP

address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software

including Windows up-dates

List of all running process-es

IP and MAC addresses Continued Page 7

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 2: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 2

2017 BIG BEAR

COMPUTER CLUB

ONE REMAINING

WORKSHOP

FOR THIS YEAR

October 30th Microsoft Publisher 2013

This Workshop Publisher is especially helpful for folks that do newsletters It completely creates a template including headings titles small text boxes for sidebars ads etc Learn what options it presents when working on computer projects that require more manipulating than Word or Excel offers again it is really applicable to Newsletters Ads Professional stationery set-ups side bar ads for existing documents Registration contact Sandi Ybarra at 909 585-8313

2017 Big Bear Computer Workshops

EQUIFAX HACKED

Equifax has been hacked and millions of peoplersquos personal private financial information has been stolen

How to see if you are affected by the recent EQUIFAX DATA BREACH and what to do if you are Click HERE

MalwareBytes a respected security firm released an article on how to protect against identity theft Click HERE

wwwbigbearccorg 3

Resource Networkcomputingcom

A look at the advantages NGFWs have over traditional network firewalls

The complexity of modern cyber attacks and advanced hacking methodologies are driving enterprises to look to next generation firewalls for better security New web-based malware and intrusion attempts bypass perimeter protections to exploit

applications Users are susceptible to malicious emails or phishing schemes as these threats are

concealed within the content itself and are delivered over the network undetected

Initially traditional firewalls just followed web protocols and werenrsquot intelligent enough to distinguish different kinds of web traffic Their inability to inspect network-packet data and identify legitimate business applications and attacks forced them to either accept or reject all the traffic

This meant that protection based on ports protocols IP addresses was no longer feasible Businesses needed a more robust form of security that wasnt just tied to the IP addresses They also needed newer rules for controlling website and application usage within a network That led to the evolution of next-generation firewalls (NGFWs) with advanced technologies that promised deeper inspection capabilities and better control over individual applications in a network

Here are the top five advantages next-generation firewalls have over traditional firewalls that every network professional should know

1 Multi-functional

Traditional firewalls provide basic packet filtering network and port address translations stateful inspections and can even support

virtual private networks However they are only limited to the Data Link Layer and Transport Layer of the OSI model

In addition to all the functionalities of traditional firewalls next generation firewalls also include integrated intrusion detection systems (IDS) and intrusion protection systems (IPS) that detect attacks based on traffic behavioral analysis threat signatures or anomalous activity This functionality helps perform deeper inspection and improve packet content filtering of network traffic up to the application layer

2 Application awareness

Traditional firewalls typically block common application ports or services on a network to control application access and monitor

specific threats However with network connectivity becoming more complex several applications use multiple or various ports making it extremely difficult for traditional firewalls to identify the targeted port

Moreover these ports are being used in various other ways such as tunneling in which a network protocol is enclosed within the packets carried by the second network and is de-encapsulated at the destination

To counter this next-generation firewall devices monitor traffic from layer 2 through layer 7 and are intelligent enough to determine what exactly is being sent or received If the content is within policy it is sent further or else its blocked

Application awareness also enables companies to set policies depending on the user and the application For instance allowing users to access Facebook but blocking Facebook Chats

Continued hellip page 4

5 Benefits of Next-Generation Firewalls

wwwbigbearccorg 4

ContinuedNew security

3 Streamlined infrastructure

Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices

With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users

NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural

complexities

4 Threat protection

Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it

It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls

5 Network speed

Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different

The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed

In contrast next-gen firewall

throughput remains exactly the same

irrespective of the number of

protection services

wwwbigbearccorg 5

Bluetooth Vulnerabilities

More in-depth details can be read

on this website

httpswwwarmiscomblueborne

Resource by Bruce Schneier

A bunch of Bluetooth vulnerabilities are being reported some pretty nasty

BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities

Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure

Finally unlike traditional malware or attacks the user does not have to click on a link or download a

questionable file No action by the user is necessary to enable the attack

wwwbigbearccorg 6

Warning CCleaner Hacked to Distribute Malware

Resource by Swati Khandelwal September 18 2017

Over 23 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which

wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware

Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information

All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP

address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software

including Windows up-dates

List of all running process-es

IP and MAC addresses Continued Page 7

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 3: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 3

Resource Networkcomputingcom

A look at the advantages NGFWs have over traditional network firewalls

The complexity of modern cyber attacks and advanced hacking methodologies are driving enterprises to look to next generation firewalls for better security New web-based malware and intrusion attempts bypass perimeter protections to exploit

applications Users are susceptible to malicious emails or phishing schemes as these threats are

concealed within the content itself and are delivered over the network undetected

Initially traditional firewalls just followed web protocols and werenrsquot intelligent enough to distinguish different kinds of web traffic Their inability to inspect network-packet data and identify legitimate business applications and attacks forced them to either accept or reject all the traffic

This meant that protection based on ports protocols IP addresses was no longer feasible Businesses needed a more robust form of security that wasnt just tied to the IP addresses They also needed newer rules for controlling website and application usage within a network That led to the evolution of next-generation firewalls (NGFWs) with advanced technologies that promised deeper inspection capabilities and better control over individual applications in a network

Here are the top five advantages next-generation firewalls have over traditional firewalls that every network professional should know

1 Multi-functional

Traditional firewalls provide basic packet filtering network and port address translations stateful inspections and can even support

virtual private networks However they are only limited to the Data Link Layer and Transport Layer of the OSI model

In addition to all the functionalities of traditional firewalls next generation firewalls also include integrated intrusion detection systems (IDS) and intrusion protection systems (IPS) that detect attacks based on traffic behavioral analysis threat signatures or anomalous activity This functionality helps perform deeper inspection and improve packet content filtering of network traffic up to the application layer

2 Application awareness

Traditional firewalls typically block common application ports or services on a network to control application access and monitor

specific threats However with network connectivity becoming more complex several applications use multiple or various ports making it extremely difficult for traditional firewalls to identify the targeted port

Moreover these ports are being used in various other ways such as tunneling in which a network protocol is enclosed within the packets carried by the second network and is de-encapsulated at the destination

To counter this next-generation firewall devices monitor traffic from layer 2 through layer 7 and are intelligent enough to determine what exactly is being sent or received If the content is within policy it is sent further or else its blocked

Application awareness also enables companies to set policies depending on the user and the application For instance allowing users to access Facebook but blocking Facebook Chats

Continued hellip page 4

5 Benefits of Next-Generation Firewalls

wwwbigbearccorg 4

ContinuedNew security

3 Streamlined infrastructure

Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices

With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users

NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural

complexities

4 Threat protection

Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it

It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls

5 Network speed

Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different

The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed

In contrast next-gen firewall

throughput remains exactly the same

irrespective of the number of

protection services

wwwbigbearccorg 5

Bluetooth Vulnerabilities

More in-depth details can be read

on this website

httpswwwarmiscomblueborne

Resource by Bruce Schneier

A bunch of Bluetooth vulnerabilities are being reported some pretty nasty

BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities

Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure

Finally unlike traditional malware or attacks the user does not have to click on a link or download a

questionable file No action by the user is necessary to enable the attack

wwwbigbearccorg 6

Warning CCleaner Hacked to Distribute Malware

Resource by Swati Khandelwal September 18 2017

Over 23 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which

wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware

Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information

All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP

address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software

including Windows up-dates

List of all running process-es

IP and MAC addresses Continued Page 7

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 4: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 4

ContinuedNew security

3 Streamlined infrastructure

Traditional firewalls require a separate security appliance for every new threat which leads to additional costs and efforts for maintaining and updating each of those devices

With dynamic IP addresses it becomes a complicated mess of configuring thousands of rules that are needed to identify and manage the traffic Also these devices donrsquot even provide the much needed controls and security to the content applications or even users

NGFWs provide integrated antivirus spam filtering deep-packet inspection and application control using only one device or console No extra devices are required thus reducing infrastructural

complexities

4 Threat protection

Unlike traditional firewalls NGFWs include antivirus and malware protection thats continuously upgraded automatically whenever new threats are discovered The NGFW device also minimizes the avenues of attack by limiting the applications that run on it

It then scans all the approved applications for any hidden vulnerabilities or confidential data leaks as well as mitigates risks from any unknown applications This also helps in reducing bandwidth usage from any useless traffic which isnt possible with traditional firewalls

5 Network speed

Though many vendors of traditional firewalls claim to offer a specific throughput (usually a gigabyte) from every port the reality is entirely different

The increased number of protection devices and services when turned on tend to choke the network speed By the time the traffic reaches the end user the speed is chopped by almost one-third of the actual promised speed

In contrast next-gen firewall

throughput remains exactly the same

irrespective of the number of

protection services

wwwbigbearccorg 5

Bluetooth Vulnerabilities

More in-depth details can be read

on this website

httpswwwarmiscomblueborne

Resource by Bruce Schneier

A bunch of Bluetooth vulnerabilities are being reported some pretty nasty

BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities

Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure

Finally unlike traditional malware or attacks the user does not have to click on a link or download a

questionable file No action by the user is necessary to enable the attack

wwwbigbearccorg 6

Warning CCleaner Hacked to Distribute Malware

Resource by Swati Khandelwal September 18 2017

Over 23 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which

wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware

Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information

All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP

address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software

including Windows up-dates

List of all running process-es

IP and MAC addresses Continued Page 7

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 5: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 5

Bluetooth Vulnerabilities

More in-depth details can be read

on this website

httpswwwarmiscomblueborne

Resource by Bruce Schneier

A bunch of Bluetooth vulnerabilities are being reported some pretty nasty

BlueBorne concerns us because of the medium by which it operates Unlike the majority of attacks today which rely on the internet a BlueBorne attack spreads through the air This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device With BlueBorne attackers can gain full control right from the start Moreover Bluetooth offers a wider attacker surface than WiFi almost entirely unexplored by the research community and hence contains far more vulnerabilities

Airborne attacks unfortunately provide a number of opportunities for the attacker First spreading through the air renders the attack much more contagious and allows it to spread with minimum effort Second it allows the attack to bypass current security measures and remain undetected as traditional methods do not protect from airborne threats Airborne attacks can also allow hackers to penetrate secure internal networks which are air gapped meaning they are disconnected from any other network for protection This can endanger industrial systems government agencies and critical infrastructure

Finally unlike traditional malware or attacks the user does not have to click on a link or download a

questionable file No action by the user is necessary to enable the attack

wwwbigbearccorg 6

Warning CCleaner Hacked to Distribute Malware

Resource by Swati Khandelwal September 18 2017

Over 23 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which

wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware

Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information

All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP

address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software

including Windows up-dates

List of all running process-es

IP and MAC addresses Continued Page 7

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 6: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 6

Warning CCleaner Hacked to Distribute Malware

Resource by Swati Khandelwal September 18 2017

Over 23 Million Users Infected

If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website then pay attentionmdashyour computer has been compromised CCleaner is a popular application with over 2 billion downloads created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance performance Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the appli-cation were compromised by some unknown hackers who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month This incident is yet another example of supply chain attack Earlier this year update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware which

wreaked havoc worldwide Avast and Piriform have both confirmed that the Windows 32 bit version of CCleaner v5336162 and CCleaner Cloud v1073191 were affected by the malware

Detected on 13 September the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attackers remote command-and-control servers Moreover the unknown hackers signed the malicious installation executable (v533) using a valid digital signature issued to Piriform by Symantec and used Domain Generation Algorithm (DGA) so that if attackers server went down the DGA could generate new domains to receive and send stolen information

All of the collected information was encrypted and encoded by base64 with a custom alphabet saysPaul Yung VP of Products at Piriform The encoded information was subsequently submitted to an external IP

address 216126xx (this address was hardcoded in the payload and we have intentionally masked its last two octets here) via a HTTPS POST request The malicious software was programmed to collect a large number of user data including Computer name List of installed software

including Windows up-dates

List of all running process-es

IP and MAC addresses Continued Page 7

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 7: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 7

Continued CCleaner

Additional information like whether the process is running with admin privileges and whether it is a 64-bit system

How to Remove Malware From Your PC

According to the Talos researchers around 5 million people download CCleaner (or Crap Cleaner) each week which indicates that more than 20 Million people could have been infected with the malicious version the app The impact of this attack could be severe given the extremely high number of systems possibly

affected CCleaner claims to have over 2 billion downloads worldwide as of November 2016 and is reportedly adding new users at a rate of 5 million a week Talos said However Piriform estimated that up to 3 percent of its users (up to 227 million people) were affected by the malicious installation Affected users are strongly recommended to update their CCleaner software to version 534 or higher in order to protect their computers from being compromised

The latest

version is

available for

download

here

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 8: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 8

Resource smithsoniancom

By Kat Eschner

Famously the first long-distance message Samuel Morse sent on the telegraph was ldquoWhat hath God wroughtrdquo When it comes to digital progress itrsquos a question thatrsquos still being answered The telegraph was a revolutionary means of communication in itself but itrsquos also connected to the development of modern computer languages Like any new technology its creation had a ripple effect provoking a wide range of other innovations Engineer Jean-Maurice-Eacutemile Baudot born on this day in 1845 was an important telegraph innovator whose telegraph system helped lay the groundwork for modern computers

Baudot had been a telegraph operator since 1869 write Fritz E Froehlich and Allen Kent in The FroehlichKent Encyclopedia of Telecommunications When he was training he learned how to operate Samuel Morsersquos original telegraph but he also learned to use other

telegraph models He practiced on the Hughes telegraph an early printing telegraph that had a keyboard like a piano and the Meyer telegraph which was the first to use paper tape with holes in it to record telegraph sig-nals according to author Anton A Huurdeman Baudot built on these innovations adding his own touch

Baudot Code Baudot Codes biggest advantage over Morse Code which was first used in the 1840s and other earli-er codes was its speed Earlier systems sent characters of infor-mation by using different lengths of character distinguished by a short gap (the ldquoditsrdquo and ldquodasrdquo of the Morse code system) ldquoBaudotrsquos code sent characters in a synchronized streamrdquo writes author Robin Boast ldquoas each character code was exactly the same length and had exactly the same number of elementsrdquo Alt-hough some of the ideas he used had been pioneered before Baudot was the first to connect them all in a system Boast writes He goes on to explain ldquomost sig-nificant for us is that Baudot was the first to recognize the im-portance of a simple five-bit binary codendasha digital coderdquo Baudotrsquos fixed-length binary code is a direct predecessor of some of the digital codes used today

ASCII the most widely accepted code for translating computer information into the words you see on your screen is based on Baudot code which itself went through several permutations after Bau-dots original innovation But more importantly Baudots code itself laid the first brick in the road to our digital universe writes James Draney for Review 31 Baudots Printing Telegraph was an encoding system that ran off five-bit binary

code It was not the first binary code of course but it was the first to be properly considered digital and its essence still exits in our computers tablets and mobiles today

Printing on paper tape

Having already patented his printing telegraph in France England and Germany Baudot se-cured an American patent for his printing telegraph on August 21 1888 The inventor wasnrsquot the first to use a paper-punch system to record telegraph signals but be-cause Baudot Code and his custom-built telegraph machines were widely embraced being much faster than previous telegraphs they helped keep the system alive His printing telegraph was a prede-cessor to computers because it ran without human intervention once the data (codes) were input presenting the information to the receiver in a readable formndashpaper tape with coded holes in it

Baudotrsquos teletype machine also called a teletypewriter used a five-key keyboard write Froehlich and Kent ldquoBorrowing from Meyer Baudot developed a distributor that allowed five instruments to share the same wirerdquo they write His prototype was tested in the later 1870s and widely adopted in France ldquoby 1892rdquo the pair write ldquoFrance had 101 Baudot-printing multiple telegraphs in operationrdquo

Digital printing using perforated paper was still used in the twentieth century Boast writes and it was ldquoone of the first recording media used for electronic computers in the 1940s and lsquo50srdquo Think punch cards and ticker tape

The Roots of Computer Code Lie in Telegraph Code

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 9: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 9

Your Computer Club donation is tax deductible

Donations are accepted

though Paypal

You do not need a Paypal account to donate through Paypal

The Computer Club can recycle you old printer cartridges and cell phones Bring them to a club meeting and we will take them off your hands A simple way for the club to raise some funds

Big Bear Computer Club News

You Can Support the

Big Bear

Computer Club

at

NO COST TO YOU

By using AmazonSmile

For each Amazon purchase you

complete Amazon will donate

05 of the purchase price to

the Big Bear Computer Club

Below is the link from Amazon

Smile that will take you directly

to the Big Bear Computer Club

Amazon support page

httpssmileamazoncomch74

-3131147

You can consider sharing this

link with your family and friends

so they too can support the Big

Bear Computer Club

Big Bear Computer Club Board News

We have started a Facebook page (thank you Bill Flanagan) for the computer club Are any of you readers interested in doing the clubrsquos Facebook page Also we have an opening for Name TagsHospitality chairperson for our monthly club meetings You would meet and greet folks coming to the clubrsquos monthly meetings

Please contact Yomar Cleary yclearycharternet

Big Bear Computer Club Forum

The Big Bear Computer Club has a Discussion Computer Forum on a local Big Bear internet information site Herersquos a link to the directly take you into the forum

wwwsocalmountainscom

Big Bear Computer Club

Website Links

Club Bylaws

Standing Rules amp Policies

Board Meeting Minutes

BBC Cash Flow Statements

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 10: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 10

How to Destroy Your Computer in Just Minutes

By David Kretchmar

Sun City Summerlin

Computer Club NV

Why You Should Avoid Installing

PUPS (Potentially Unwanted

Programs)

There are plenty of new computers

being used that are performing

much more slowly than they

should One of the quickest ways to

turn a fast new computer into a

slow system crippled by malware is

to start downloading software from

the wrong sites Or by downloading

the wrong software from what

appears to be the right site

Newer computers being slowed by

unwanted programs is a bother but

the damage done by PUPs can be

much more serious PUPs can be

responsible for programs that make

it impossible to access any of your

files or otherwise ruin your system

Every time you download anything

from the Internet you first issue

permissions that enable the opening

of a conduit or vector between the

Internet and your computer The

series of complex events is mostly

invisible to you except for your

clicking on that virtual button that

starts the whole process

Bing and Google searches often can

take you where you donrsquot want to

go When searching for popular

software sponsored search results

(which result in unwanted pro-

grams) often appear at the top of

the search results page along with

links from the actual software

source sites Often those ad links

try to install software on your

computer that you do not want It

could be anything it could be a

fake driver update program or a

scam system cleaning program

Note that my Bing search for VLC

media player first showed 4 sites

NOT associated with VLC ndash bad

sites

Testing Misleading

Advertisement links

How bad is it To find out I in-

stalled a fresh Windows 10 plus all

Windows updates on a freshly for-

matted hard drive I downloaded

and installed the free version of

Avast Antivirus software that

brought a hitchhiker of its own -

Google Chrome OK I wanted

Chrome but not every user would

so I considered this an invasive act

by a program I downloaded for pro-

tection

I used Edge Firefox and Google

Chrome and started using Google

and Bing search engines to start

searching for popular free pro-

grams The programs I sought are

often the first programs that get

installed on a PC Firefox Google

Chrome OpenOffice iTunes

Adobe Flash Java Adobe Acrobat

VLC and WinZip

Then I carelessly clicked on ad

results which appeared above or on

the same first page as ldquorealrdquo search

results These paid ads were

identified by notes and highlighted

in a very pale color to differentiate

them (slightly) from the actual

search links that appeared nearby

The ads didnrsquot appear after every

search and the ones that appeared

varied among searches and were

different for different browsers

Sometimes the first paid ad link

actually took me to the softwarersquos

true source site (ie searching for

Google offered wwwgooglecom

first) Often Avast would block a

download it recognized as harmful

but Avast did not catch many prob-

lems

For all of the searched for

programs I was able to bring up

more questionable sponsored search

results within seconds of repeated

searching Misleading results

showed up in all search engines and

I could not determine that any

browser offered better or worse

protection than others

For each ad link I clicked through

and installed the respective pro-

grams via the link or button

provided Instead of delivering just

the application I was looking for

all of the paid links attempted to

tack on unwanted programs In

some cases if I was careful to read

all of the fine print and uncheck

boxes I could get the files I was

Continued hellip page 11

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 11: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 11

Continued hellip Destroy computer

looking for without a bunch of extra

ldquoadded valuerdquo software but it was

very difficult

For the purposes of this article I

acted as an inexperienced user (or

an experienced user whorsquos not

paying attention) and clicked my

way through ads and dialogue box-

es that looked like the End User

License Agreement (EULA) wersquore

used to seeing through when in-

stalling software

And hellip They Got Me

After installing just a few programs

this way I started accumulating

browser toolbars (Bing Yahoo and

Google) and noticed my

search engine and home page had

been hijacked to something unwant-

ed As I continued the process

Windows started slowing down to a

crawl

After installing all of the programs

on my list I opened Windows 10rsquos

Programs and Features and each

browserrsquos extensions and add-ons

and counted 39 items that had been

installed in addition to the programs

I intended to get On rebooting

three new programs launched

popup windows at startup

including two that started running

virusregistry scans as soon as they

launched and a couple that flashed

warnings windows and offered fix-

es if I registered andor upgraded to

the full paid version

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

Remember this was originally a

clean install of Windows 10 that

needed nothing

Within a few minutes my computer

became noticeably slower plagued

by numerous popups and was

becoming essentially unusable

All of these were nasty but if even

a small fraction of them were I

would be in real trouble

Conclusions and Recommenda-

tions

Most of us will have to download

some third-party (non-Microsoft)

software from the Internet This

does not have to be dangerous if

you pay attention that the software

is being offered from the true home

site of that product NEVER down-

load software from any sponsored

link unless the desired software

creator is the sponsor

Do not depend on your

anti-malware program to protect

you It will catch some issues but

not all

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 12: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 12

About Bearly Bytes

Bearly Bytes Newsletter past winner of SWUGC amp APCUG Newsletter contests is the official publication of the Big Bear Computer Club Views expressed in Bearly Bytes are those of the authors and do not necessarily reflect the opinions of Big Bear Computer Club Other computer user groups are welcome to reprint our articles as long as they give credit to the author and Bearly Bytes Big Bear Computer Club Submissions All BBCC members are encouraged to send letters articles questions and comments to Bearly Bytes for inclusion in future issues Submit as plain text in the body of an email and attach any graphics as JPEG or GIF format and send to treadwellbigbearccorg

Bits amp Bytes

The Opportunity Drawing Winners

left to right Kimberlee Kid First aid kit Linda Sharman Green backpack Angie Pezina helliphelliphelliphellipFirst aid kit Paul Palmquist helliphelliphellipTape measure key chain Mary Lou helliphelliphelliphelliphelliphellipFirst aid kit

Enter Find the Bear

contest to win a cool prize

1 Locate this BEAR 2 Click on it 3 Fill in the form 4 and then Send

At the next general meeting following this newsletter a drawing will be held for all who found the bear The

selected winner will receive a surprise gift

You will need to attend the meeting in order to receive the prize

August 2017 Club Meeting

The presentation by Bob Gostischa from Avast Software cov-

ered Computers

(Windows and Mac)

tablets and Smart Phones

He addressed three im-

portant areas (1) the im-

portance to use the right

tools once you get to the

Internet (2) he will show

how to exercise caution

when visiting the internet

and (3) the

importance to avoid the

dangers found on the in-

ternet For those who

could not make it to the

meeting You really need to

click on the httpsgoogl5v4sIQ (launches Google Docs)to

see his presentation on Tips for Staying Safe Online amp Pre-

venting Identity Theft

Bob Gostischa receiving a thank you

from our Club President

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 13: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 13

Upcoming Calendar Events

Group Newsletter Sites

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 14: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 14

Word Tips By Rosemary Lloyd

Excel Tips By Yomar Cleary

Apple News

The stories you really care about

The more you read the better

News gets at understanding your

interests And now itrsquos even more

personalized Top Stories choos-

es the stories that are relevant to

you and delivers them to your

screen while the Today widget

keeps you up to date throughout

the day News stays on top of the

stories yoursquore interested in So

you can too

All the news you want All in one place

News collects all the stories you want to read mdash so you no longer need to move from app to app to stay informed And with the For You tab itrsquos easier than ever to find the stories that matter most to you News also features breaking news notifications and subscriptions to some of your favorite publications

To Show or Hide the Ruler Applies To Word 2013

Click the View tab Click the check box

next to Ruler

to show or hide

the ruler

httpswwwgcflearnfreeorgword2013getting-to-know-word1

Cropping Graphics in Excel

Once you place a graphic in your workbook you may decide to crop it Cropping means to cut off part of the graphic so it doesnt show in your workbook To crop a graphic follow these steps

Make sure that the Format tab of

the ribbon is displayed (This

tab is only visible if you first

click on a graphic)

Click on the Crop tool in the Size

group

Click on one of the graphics corner

or side handles with the mouse

pointer

Drag the handle towards the center

of the graphic stopping when

you have cropped the desired

amount

You can turn off cropping by

clicking on the Crop tool again

or by pressing Esc

You should understand that while cropping a graphic makes it look smaller none of the original graphic is actually lost it is only hidden Cropping a graphic will not decrease the amount of storage space re-quired by that graphic in your workbook

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 15: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 15

The following members have generously offered to help you with your PC

problems by phone or by email

Windows Beginners Yomar Cleary 9092146990 yclearycharternet

Microsoft Windows Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Outlook Rosemary Lloyd

9095477257 Rosemarybigbearccorg

MS Excel Yomar Cleary 9098785622 yclearycharternet

MS Publisher Yomar Cleary 9092146990 yclearycharternet

CD Burning Rosemary Lloyd 9095477257 rosemarybigbearccorg

Computer Upgrades Marc Busch

9496099266 bigbearjedicharternet

The Computer Club provides training at the monthly meetings when there is no

presenter

Persons with all levels of computer knowledge are welcome to attend the

clubrsquos open meetings

Your First 2 visits are free Bring a friend

Annual Membership is $25 and spouse $5 All recurring membership dues are due in

January

Helpline Officers and Key Leaders

President Yomar Cleary 9092146990 yclearycharternet

Vice Presidenthellip helliphelliphelliphellip Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Treasurer Tom Brandau 2134461315 tombran44gmailcom

Secretary Sandi Ybarra 9095858318 sandiscabingmailcom

Director at Large helliphelliphelliphelliphellip Jerry Merino 9095858714 gmerinocharternet

Director at Large helliphelliphellip Del Johnson

9095849017helliphellipdeljohnson_Isyahoocom

Director at Large helliphelliphellip Bill Treadwell

9097304625 treadwellbigbearccorg

Webmaster Rosemary Lloyd

9095477257 Rosemarybigbearccorg

Assistant Webmaster helliphelliphelliphellipBill Flanagan

9098669379 billbigbearccorg

Newsletter Editor Bill Treadwell

9097304625 treadwellbigbearccorg

Publicity Yomar Cleary

9092146990 yclearycharternet

Equipment Chair Marc Busch

9496099266 helliphelliphellipbigbearjedicharternet

Technical Advisor hellip Jim Lloyd

9095849358 inquiriessugarloafpccom

Refreshments Chair helliphelliphelliphellip Sharon Teeter

9095852026 sharonteeter1verizonnet

Historian Sandi Ybarra

9095858318 sandiscabingmailcom

Sunshine Chair Angie Pezina

9098662314 apezinagmailcom

Hospitality Chairhelliphelliphelliphelliphelliphellipvacant

THE BEAR WANTS YOU TO SHARE A TIP

Send tips to treadwellbigbearccorg

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center

Page 16: Bearly Bytes Newsletterbigbearcc.org/newsletters/october17.pdfHelpline & Officers..... 15 Information & Membership Application ..... .16 President’s Message -Yomar Cleary NEXT CLUB

wwwbigbearccorg 16

Mailing Address

Big Bear Computer Club

PO Box 645

Big Bear City CA 92314

Monthly Meeting presen-

tation and demonstration

of popular hardware and

software

RAM (QampA) sessions

Tech News and Virus

Alerts

Door prize drawings

Bearly Bytes our award-

winning monthly news-

letter emailed

Website bigbearccorg

Free Software Review

Member Help Line

Member E-mail Notifica-tions

Member-only Discounts

Training workshops

All this for only $25 per year

Membership Benefits

New Renewal Update my Information

Full Name ___________________________________________________________________

Mailing Address _______________________________________________________________

City State Zip ________________________________________________________________

Home Phone _(______)___________________ Cell Phone_(_____)__________________

E-mail address ________________________________________________________________

Adding Associates

For each Family Member (s) add $5year towards your dues

Mail your application and check for dues to

BCC Treasurer

PO Box 645

Big Bear City CA 92314

Or bring your application and dues to a monthly general meeting

General Information and Membership Application

I agree that Big Bear Computer Club may use such photographs of me with or without my name and for any lawful purpose including for example such

purposes as publicity newsletter advertising and web content

Yes No Your initials _________

BIG BEAR COMPUTER CLUB INC P O BOX 645 ndash BIG BEAR CITY CA 92314

Membership Applicationmdash$2500 ndash Associate $5 You can pay your dues at the monthly meeting by mail -- make checks to Big Bear Computer

Club or by Pay Pal (Go into our website wwwbigbearccorg and go to ldquoDonaterdquo)

Computer Club meetings are held

in the Big Bear Senior Center