december 2008 bearly bytes · pc with 1 ghz or faster processor 1 gb of ram or more 2 gb or more of...

19
1 Big Bear Computer Club Bearly Bytes Newsletter December, 2008 President’s Message—Yomar Cleary Award Winning Bearly Bytes Newsletter Next Meeting December 9, 5:30 @ The Discovery Center Bearly Bytes Big Bear Computer Club Volume 8 December 2008 Big Bear California It’s hard to believe that 2008 is coming to a close and we are start- ing another year. The Big Bear Computer Club has expanded in various areas including our training. We had a couple of workshops which were very successful in providing training to the beginners. We will continue with some training and expand our horizons by having presenters. We will look for interesting presenters at the May Southwest Computer Conference in San Diego. If you know of a presenter that would be of interest, please let a board member know. I would like to extend my sincere appreciation to the 2008 Computer Club board members who have supported me as Club President for the last 3 years. It has been a privileged to guide the Club in all its activities. Since I have accepted a full time job, I need to step down as President but have accepted the Vice Presidency. THANK YOU BOARD AND MEMBERS!! Mark your calendars for our Holiday Party sched- uled for December 9 th at 5:30 pm. We are provid- ing the Turkey & Ham and you are bringing the trimmings. Call me at (909) 878-5622 and let me know what you are bringing. HAPPY HOLIDAYS! Inside President’s Message ........................................ 1 Web Expressions Studio 2 Review ................. 2 Editor’s Corner................................................ 3 Roxio Creator 2009 Review............................ 4 About Bearly Bytes ......................................... 6 Nomination of Officers ................................... 6 Calendars......................................................... 7 November Door Prize Winners ...................... 8 Member Product Review ............................... 8 PC Cards and Beyond ..................................... 9 PC Cards and Beyond ..................................... 9 Investigate RAM problems ............................. 11 Investigate RAM problems ............................. 11 Word, Excel and Windows Tips ..................... 12 Cell Phone Tricks? .......................................... 13 General Meeting Notes ................................... 14 Dark Market takedown ................................... 15 Cash Flow ....................................................... 16 Microsoft Update & Watch Videos ................ 17 Understanding Hidden Threats ....................... 18 Membership Application ................................ 19

Upload: others

Post on 31-Aug-2019

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

1

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

President’s Message—Yomar Cleary

Award Winning Bearly Bytes Newsletter Next Meeting December 9, 5:30 @ The Discovery Center

Bearly Bytes

Big Bear Computer Club Volume 8

December 2008

Big Bear California

It’s hard to believe that 2008 is

coming to a close and we are start-

ing another year. The Big Bear

Computer Club has expanded in

various areas including our training.

We had a couple of workshops

which were very successful in providing training to

the beginners. We will continue with some training

and expand our horizons by having presenters. We

will look for interesting presenters at the May

Southwest Computer Conference in San Diego. If

you know of a presenter that would be of interest,

please let a board member know.

I would like to extend my sincere appreciation to

the 2008 Computer Club board members who have

supported me as Club President for the last 3 years.

It has been a privileged to guide the Club in all its

activities. Since I have accepted a full time job, I

need to step down as President but have accepted

the Vice Presidency.

THANK YOU BOARD AND MEMBERS!!

Mark your calendars for our Holiday Party sched-

uled for December 9th at 5:30 pm. We are provid-

ing the Turkey & Ham and you are bringing the

trimmings. Call me at (909) 878-5622 and let me

know what you are bringing.

HAPPY HOLIDAYS!

Inside

President’s Message ........................................ 1

Web Expressions Studio 2 Review ................. 2

Editor’s Corner ................................................ 3

Roxio Creator 2009 Review ............................ 4

About Bearly Bytes ......................................... 6

Nomination of Officers ................................... 6

Calendars ......................................................... 7

November Door Prize Winners ...................... 8

Member Product Review ............................... 8

PC Cards and Beyond ..................................... 9

PC Cards and Beyond ..................................... 9

Investigate RAM problems ............................. 11

Investigate RAM problems ............................. 11

Word, Excel and Windows Tips ..................... 12

Cell Phone Tricks? .......................................... 13

General Meeting Notes ................................... 14

Dark Market takedown ................................... 15

Cash Flow ....................................................... 16

Microsoft Update & Watch Videos ................ 17

Understanding Hidden Threats ....................... 18 Membership Application ................................ 19

Page 2: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

2

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Web Expression Studio 2

Reviewed by Tina Nazarian ([email protected])

Retail Price: $699 for the full version $349 for the upgrade

The system requirements for the Studio:

Microsoft® Windows® XP with Service Pack 2 or Windows Vista® operating system

PC with 1 GHz or faster processor

1 GB of RAM or more

2 GB or more of available hard-disk space

.NET Framework 3.5 (if it is not already installed, it will be installed automatically during

setup) Support for Microsoft DirectX® 9.0 graphics with Windows Vista Display Driver Model (WDDM) Driver, 128 MB of graphics RAM or more, Pixel Shader 2.0 in hardware, 32-bits

per pixel

DVD-ROM drive

1024 x 768 or higher-resolution monitor with 24-bit color Internet functionality requires Internet

access (additional fees may apply)

Actual requirements and product functionality may vary based on your system configuration and operating system

and assumes non-concurrent product use.

Windows Imaging Components (WIC) is required. Some WIC codecs are from third parties and may have unique

system requirements. Some WIC codecs may not be available for Windows XP or 64-bit version of Windows operat-ing systems.

Some product features require Adobe Reader 7.0 or later, and Apple QuickTime 7 (QuickTime 7.3.1 or later recom-

mended). There are actually five (5) programs included in the studio, including Expression Web 2, Expression Blend 2, Expression Design 2, Expression Media 2, and Expression Encoder 2. Together, they are a great resource for the web-site designer’s use. They offer a wide variety of tools and options using the most current programs. This product is not for the beginning or lesser-experienced computer user. The user must be familiar with cut-ting and pasting, moving objects, and inserting text. I found that having a strong PowerPoint background was almost essential to using the studio programs. The Expression Web 2 program provides the basic format for the website. This is where the background, styles, frames, drop-down menus, and other basic website tools are inserted. I was impressed with the options available in this program and the way that I could manipulate the formatting.

Expression Design 2 is where the designer gets to play with the colors for his emerging website. There is a wide range of colors and techniques available for the designer. The main problem I had with this program was trying to oper-ate the tools. The program needs an optional tutorial, explaining how to utilize the different options.

Expression Media 2 is where the designer gets to personalize his website. Pictures, files, and presentations can be imported from other site and incorporated into the emerging design. The import tools are easy to use and the pro-gram can access any file or picture on your computer. The only drawback I had with this problem was the editing ability. I found it easier to edit the picture on a separate program, save it, and then import it into the Media 2 files.

Expression Encoder 2 is a fun little program that requires a little more computer knowledge than the Media 2 program. This program is for sound and video integration into the web design using the Silverlight technology. Unfortu-nately, this program is for the advanced computer user who is familiar with sound and video applications.

Page 3: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

3

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

I want to wish you all a very

Merry Christmas and may

your New Year be prosper-

ous, peaceful and full of

Joy.

God Bless you,

Norene

Editor’s Corner

EMPTY PRINTER CARTHRIDGES RECYCLE

Bring your empty printer cartridges to the meeting.

The printer cartridge program is a BBCC fund-raiser

that helps us purchase supplies and pay for Big Bear

Computer Club expenses.

Thank you for your support.

I have created a couple of websites with this program and the second time was easier. I am not satisfied with either design, but contribute that to my lack of experience and not the program. I have recommended the program to my brother, who is more experienced in website design, and he has recommended it to others.

Overall, I would rate the Studio a three out of five for ease of use. I think the all the programs would benefit from a tutorial option in the tools button. As a first time web designer, I found parts of the design program difficult to understand and incorporate into the overall design. I did find a very nice tutorial online at the Microsoft Expression homepage and would highly recommend that anyone using this program take advance of this website tutorial. Microsoft also has a very easy to read book (one that uses everyday English) that takes a first time designer step by step in creating a website.

Bio for Tina Nazarian:

I am a Southern California native and a Big Bear High School alumnus. My family moved to the mountains when I was a child and I am the third of four generations of my family to have lived in the Valley. I am a US Navy veteran who served during the Gulf War in 1991 and, after receiving an honorable discharge, I returned to the Valley and completed my education. I am now the Senior Center Coordinator for the Big Bear Valley Recreation and Parks and I have offered indi-vidual computer tutoring to any interested senior. I devote my extra time to coaching youth

sports and writing fan fiction for various websites.

Page 4: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

4

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Roxio Creator 2009

Reviewed by Karen Tangeman [email protected]

Retail Price:

List Price: $99.99

Your Price: $79.99 with $20 upgrade mail-in rebate

Minimum System Requirements:

Microsoft® Windows Vista™ Home Basic, Windows® XP SP2 (32- or 64-bit), 1 GHz

processor and 512 MB RAM

1024x768 DirectX 9 compatible graphics card with at least 16-bit color setting, sound

card, DVD-ROM drive Hard drive with at least 3 GB free space for installation

Windows Media Player 10

Internet Explorer 7. Internet connection required for registration, product updates, and some fea-

tures. Any Internet charges are the user's responsibility.

TiVo® requires a TiVo® Series2™, Series3™, TiVo® HD DVR or other TiVoToGo™ compatible

DVR connected to your home network, and TiVo Desktop. Does not work with DirecTV® provided

TiVo DVRs. See www.tivo.com for more information.

For video capture: OHCI compliant IEEE 1394 FireWire card (for use with DV camera) or analog

video capture device

Blu-ray authoring requires an additional High-Def/Blu-ray Disc Plug-In which can be purchased at

www.roxio.com

Recordable Formats:

CD-R/RW, DVD+R/RW, DVD-R/RW, DVD-R DL, DVD+R DL, DVD-RAM, BD-R/RE, BD-R/

RE DL

Disc image formats: read ISO, C2D, BIN/CUE and GI; write ISO and GI

Company Information:

Manufacturer: Roxio (a division of Sonic Solutions)

Address: 455 El Camino Real, Santa Clara, CA 95050

Phone: (866) 280 7694

Web Site: http://www.roxio.com/

Installing Roxio Creator was quite painless but a little lengthy at 30 minutes. This is Roxio’s new version of

Roxio’s Easy Media Creator and this new version offers a huge variety of options. I found you can do just

about everything with your CD’s and DVDs along with their photo, audio, data, or Continued on Page 5

Page 5: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

5

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

video contents

The revamped interface has a more user-friendly icon-based look. Icons along the screen’s left-hand edge di-

vide Creator’s 2009’s multitude of abilities into six neat headings-Home, Data-Copy, Video-Movies, Music-

Audio, Photo, and Online. The beginner user will quickly be able to edit photos, video, and audio and will eas-

ily be able to master the advanced settings. There’s also a neat information tab along the right-hand edge

which is split into 3 sections- Do more, Tutorials, and Support. The Do more and Tutorials are very useful es-

pecially for beginners.

Simple tasks such as ripping and burning a CD, or just copying a DVD are now all in the Home window, and

only more advanced tasks are launched in separate windows.

Audio book fans will like Roxio Creator 2009’s new Audio Book Creator, which will convert CD and MP3

audio books into single files in the .m4b format, playable by Apple’s iTunes, iPod, and iPhone with each chap-

ter accessible under the top-level file name, as opposed to being individual files.

Another new feature, the Beatmatch function aims to flawlessly blend from one track to another, but unless

you supply it with tracks punctuated by a regular 4/4 beat, such as techno or house, it tends to mess up some. A

little more work needs to be done on this feature.

A really nice addition is the Drag and Drop Convert. With this it’s possible to drop folders full of music, video,

and photos, and convert them into formats that suit your portable media player’s capabilities.

More of Roxio Creator 2009’s applications now let you upload directly to YouTube. Plus, it offers its own

online media-sharing service as a destination for your photos and videos. You get 1GB for free with 5GB as a

pay option. The Blu-ray plug-in adds AVCHD and BD-MV (including menus) support to the existing data and

BD-AV support.

My final thoughts:

Roxio Creator 2009 is the perfect introduction for anyone who is beginning to work in a variety of media.

Creator’s abilities have always been its greatest selling point and this new version is no exception. With Roxio

Creator 2009 you get a comprehensive package capable of disc burning, basic photo editing and manipulation,

music ripping, coping and transcoding, video editing and authoring, as well as a basic back-up tool. Consider-

ing the price compared to some of the more complex multi-media programs this is a true bargain.

Bio of Karen Tangeman

I am a disabled/retired Registered Nurse. I have lived in Big Bear for 23 years and I have

3 children & 1 grandchild. I do my church’s newsletter monthly and am a council mem-

ber at my church. I am the Vice President, Review Editor, and the Vendor Liaison for the

computer club. I have been a member of the computer club for 4 years now and have at-

tended both the SWUGS & APCUG conferences in San Diego and Las Vegas. I contrib-

ute the Word Tips every month to our newsletter and help teach beginner computer at our

workshops.

Continued from Page 4

Page 6: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

6

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Bearly Bytes, past winner of SWUGC & APCUG

Newsletter contests. is the official publication of the

Big Bear Computer Club. Views expressed in Bearly

Bytes are those of the authors and do not necessarily

reflect the opinions of Big Bear Computer Club.

Other computer user groups are welcome to reprint

our articles as long as they give credit to the author

and Bearly Bytes, Big Bear Computer Club.

Submissions: All BBCC members are encouraged to

send letters, articles, questions, and comments to

Bearly Bytes for inclusion in future issues. Submit

as plain text in the body of an email and attach any

graphics as JPEG or GIF format. Send to Yomar

Cleary

NOMINATION & ELECTION OF

OFFICERS FOR 2009:

At the December 9th Computer Club general meet-

ing, we will be presenting the following nominees

and voting the 2009 Board in.

Board:

President ......................................... Rosemary Lloyd

Vice President ................................ Yomar Cleary

Treasurer ........................................ Barbara Moore

Secretary ........................................ Open

Director at Large ............................ Rick Edwards

Committees:

Review Editor ................................ Karen Tangeman

Newsletter Editor ........................... Norene Lieser

Webmaster ..................................... Bill Flanagan

Historian/Name Tag ....................... Nancy Hinz

Equipment ...................................... Don Odekirk

Membership ................................... Tina Nazarian

APCUG Representative ................. Sue Crane

Technical Director ......................... Jim Lloyd

Sunshine ......................................... Grace Fross

About Bearly Bytes

Page 7: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

7

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

December 2008

Sun Mon Tue Wed Thu Fri Sat

1 2 3 4 5 6

7 8 9 10 11 12 13

14 15 16 17 18 19 20

21 22 23 24 25 26 27

28 29 30 31

09 December meeting

25 Christmas

31 New Year’s Eve

January 2009

Sun Mon Tue Wed Thu Fri Sat

1 2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30 31

13 January meeting

27 Board Meeting @ Senior Center

The Abacus Group

For All Your Computer Needs

Jim Applebury

909 584-1733

Page 8: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

8

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Instead of listing a few review programs that are avail-

able, I would like to inform you that any program you

are interested in and would like to install on your com-

puter is probably available for review. All you have to

do is ask for it and review it. The program could be on

landscaping, any kind of crafts, digital photos, video,

any kind of home decorating, games, office or ac-

counting programs, gift cards, label, and printshop

programs, any program you are interested in having.

All you have to do is let me know which program you

would like to review. I will then contact the vendor

and it takes about 10 days to receive the program.

Sometimes the vendor will grant the reviewer a license

online and all the reviewer has to do is download the

program. Reviews are not hard to write; in fact they

are quite easy. You are given instructions on how to

write a review plus I have many samples you can look

at. Also if you need any help all you have to do is e-

mail or call me. Writing a review is like telling some-

one about the new program you just received. You tell

them what you like about the program, what you don’t

like, and how the program could be better, that’s it.

There’s your review. And you can review books, also.

— Karen Tangeman, Review Editor

Member Product Review Program November Door Prize Winners

Harry Hinz — 1 XL Tee-shirt by Migo

Yomar Cleary — 1 set laptop legs by Lapworks

Albert Neal— 1 Windows Vista Book by O’Reilly

Tina Nazarian — 1 Laplink everywhere by LapLink

Bill Treadwell — 1 Studio Ultimate verse 11 by Pinnacle

donated by Kim Dunn

50/50 WINNER - $20.00 Bill Treadwell—-With 1 bottle

Sparkling Cider and 1 sm bottle Sutter Home White Zinfan-

del. Bill donated the money back to the club for the Christ-

mas party.

Page 9: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

9

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

By Bryan Lambert - Sunday, October 19, 2008

Submitted by Larry Smith

In the wonderful world of laptops there are many, many things that can be done. In our earlier Tech Tips we

mentioned some of the goodies that you can look for when purchasing a lappy. In today’s Tech Tip, we’ll be

looking at a very important aspect that most every laptop has already integrated: expandability – particularly at

the PC Card, and later, the ExpressCard expansion.

In the Beginning… For years and years laptops came with the ubiquitous expansion slot

known affectionately as PCMCIA. Also, for years and years,

PCMCIA was just the right kind of expansion needed for the average laptop. Whether adding a modem (yes,

those were the days!), networking or even extra storage, PCMCIA fit the bill. What exactly is PCMCIA any-

way? PCMCIA really, in all fairness, isn’t a what, it’s a who. PCMCIA stands for Personal Computer Mem-

ory Card International Association, an organization made up of several companies that developed the standard

for what was known as a PCMCIA Card (yes, there is a joke that PCMCIA stands for People Can’t Memorize

Computer Industry Acronyms, but we won’t go there). To better differentiate the organization from the card,

it was decided to rename the PCMCIA card to PC Card.

Ok, now that we got that down, there’s more to throw at you. The PC Card was originally designed in the

early 1990s as a way for adding additional cheap memory to a laptop computer. It proved to be very success-

ful in this and was found to be well suited for several other types of expansion and doodads. The PC Card is

about the size of a credit card (85.6 by 54 millimeters to be exact), and comes in three different types, differen-

tiated by their thickness. Type I cards are 3.3 millimeters thick and are ideal for use as memory and storage on

a laptop. Type II cards are 5.5 millimeters think and are usually used for modem, network or even TV card

expansion. Type III cards are 10.5 millimeters thick and were ideally used for add-ons needing a thinker card,

such as hard disk drives.

Many laptops commonly came with two PC Card slots that could accommodate either two Type I /II cards or

one Type III card. CardBus were PC Cards that were introduced in the mid 90s, and were basically a souped-

up PC Cards that ran faster, allowed for bus mastering (where a card could ―talk‖ to other devices on the com-

puter without the need of going through the CPU) and were 32-bit rather

then 16-bit cards that most of the original PC Cards were. CardBus cards

have a slightly smaller notch on their interface side as well eight small

bumps on the top metal grounding plate on the interface side. Essen-

tially, all laptops made after 1997 could handle CardBus type PC Cards.

Move Over PC Card for the New Card in Town Many people who have purchased a laptop in the last couple of years have noticed something "different" about

them. Their PC Card slot seems to have morphed into something else. This brings us up to the wonderful

world of the ExpressCard – also brought to you by those fun loving people at the PCMCIA organization. Ex-

pressCard slots ―kind of‖ look the same as PC Card slots, and ExpressCards ―kind of‖ look like PC Cards –

but alas, the two are not interchangeable. This means that that dandy PC Card modem that you bought back in

2001, unfortunately, won’t fit into that ExpressCard slot on your new computer as most new computers do

(Continued on page 9)

PC Cards and Beyond!

“What exactly is PCMCIA anyway”

“There’s a New Card in Town”

Page 10: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

10

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

(continued from page 8)

not include both types of slots. This is OK as the ExpressCard format was designed around the new PCI Ex-

press us as well as the tried and true USB standard, which means that they are faster and better then the PC

Cards that they replaced.

ExpressCards come in two standard formats: ExpressCard/34 (so called because it is 34 millimeters across (34

by 75 millimeters to be exact)) and looks like a big stick of chewing gum, and ExpressCard/54 (surprise,

called this because it is 54 millimeters across (54 by 75 millimeters, again, to be exact)) and is an L-shaped

card. Both cards are 5 millimeters thick and both cards use the same connector interface. While an Ex-

pressCard/34 card will fit into both ExpressCard/34 and ExpressCard/54 slots, an ExpressCard/54 will only fit

into an ExpressCard/54 slot.

To Infinity and Beyond In this Tech Tip we have looked at the start and evolution of expansion slots in laptops. Whether you are adding an updated sound card or even the latest Wi-Fi device to your laptop, you have the power to expand with PC Card or ExpressCard quickly and easily. So, take a look at the slot on your laptop and think of the possibilities of the goodies you can add – all it takes is the right card for the right computer. Disclaimer: Occasionally we miss something, make a mistake, or don't cover everything on the topic but we

are trying hard to give you the most unbiased and well-written information that we can.

Page 11: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

11

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

If you’re encountering application failures, operating system faults, or Stop errors in Windows Vista, you

could have defective or failing RAM. Microsoft included the Windows Memory Diagnostic Tool in Win-

dows Vista so that you can test the RAM chips in your system.

There are actually several ways that you can launch the Windows Memory Diagnostic tool. The method

you will use will depend on your situation.

If you are experiencing intermittent problems but can still boot into Vista, you can launch the Windows

Memory Diagnostic tool by clicking the Start button, selecting Control Panel, and clicking the System and

Maintenance icon. When you access the System and Maintenance window, select Administrative Tools.

Then, click the Memory Diagnostics Tool icon.

Alternatively, you can click the Start button, type Memory in the Start Search box, and then click the Mem-

ory Diagnostics Tool icon. Either way, you’ll encounter a UAC and will need to respond accordingly.

When you see the Windows Memory Diagnostic Tool dialog box, click the Restart Now and Check for

Problems option. When you do, the dialog box will close and your system will automatically restart.

If you’re encountering application failures, operating system faults, or Stop errors in Windows Vista, you

could have defective or failing RAM. Microsoft included the Windows Memory Diagnostic Tool in Win-

dows Vista so that you can test the RAM chips in your system.

Launching the Windows Memory Diagnostic tool

There are actually several ways that you can launch the Windows Memory Diagnostic tool. The method

you will use will depend on your situation.

If you are experiencing intermittent problems but can still boot into Vista, you can launch the Windows

Memory Diagnostic tool by clicking the Start button, selecting Control Panel, and clicking the System and

Maintenance icon. When you access the System and Maintenance window, select Administrative Tools.

Then, click the Memory Diagnostics Tool icon.

Alternatively, you can click the Start button, type Memory in the Start Search box, and then click the Mem-

ory Diagnostics Tool icon. Either way, you’ll encounter a UAC and will need to respond accordingly.

When you see the Windows Memory Diagnostic Tool dialog box, click the Restart Now and Check for

Problems option. When you do, the dialog box will close and your system will automatically restart.

Investigate Ram Problems in by launching the VISTA Windows Memory Diagnostic

Tool

Page 12: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

12

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Excel Tip By Yomar Cleary

Word Tip By Karen Tangeman

Windows Tip By Norene Lieser

Auto Correcting for Your

Common Errors

Chances are good that you already

know what AutoCorrect is and that it

can be a boon for those words you

habitually mistype. (Exactly why I

invariably mistype some words, I'll

never understand.) However, setting

up AutoCorrect to compensate for

your mistyping can be a bother.

Here's a quick way to make short

work of adding your mistyping’s to

AutoCorrect:

Assuming that Word

flags the mistyped word

as misspelled, right-click

on it. A Context menu

appears.

If spelling corrections

are offered in the Context

menu, there should also

be a menu choice called

AutoCorrect. Choose it

and you will see the same

spelling corrections in

the resultant submenu.

Choose the correct spell-

ing in this submenu.

What you have just done is tell Word

that you want to create an Auto-

Correct entry that will automatically

correct the mistyped word using the

selected spelling. Fast, neat, and

easy!

Excel Tip

Setting Cell Width and Height Us-

ing the Keyboard

Have you wondered if there is a

way to adjust the height and width

of a cell by using the key­board,

without using the mouse. (Some

people are really adverse to using

the mouse!) The answer is yes,

there is a way. The problem, how-

ever, is that it isn’t a terribly intui-

tive way. If you are using a version

of Excel prior to Excel 2007, then

you can do the following to change

the row height:

1. Press Alt+o. Excel displays the

Format menu.

2. Press R. Excel chooses the Row

option and displays a submenu.

3. Press E. Excel chooses the

Height option and displays the

Row Height dialog box.

4. Type the value you want for the

row height.

5. Press Enter.

The method for changing the col-

umn width is equally obtuse:

1. Press Alt+o. Excel displays the

Format menu.

2. Press c. Excel chooses the Col-

umn option and displays a sub-

menu.

3. Press w. Excel chooses the

Width option and displays the

Column Width dialog box.

4. Type the value you want for the

column width.

5. Press Enter Applies to Excel 97, 2000, 2002,and 2003,

How to Navigate the Taskbar

Without a Mouse

If you find yourself using Win-

dows without a mouse or you just

prefer using the keyboard for task

switching, here are the key com-

binations you will need:

Control + Esc

Esc

Tab

Now you can use the left and

right arrows and the tab key to

navigate the taskbar.

___________________________

Make Your Folders Private

•Open My Computer

•Double-click the drive where

Windows is installed (usually

drive (C:), unless you have more

than one drive on your com-

puter).

•If the contents of the drive are

hidden, under System Tasks,

click Show the contents of this

drive.

•Double-click the Documents and

Settings folder.

•Double-click your user folder.

•Right-click any folder in your

user profile, and then click Prop-

erties.

•On the Sharing tab, select the

Make this folder private so that

only I have access to it check

box.

Page 13: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

13

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Five Things You Never Knew Your Cell Phone Could Do by Don Odekirk

For all the folks with cell phones. (This should be printed and kept in your car, purse, and wallet. Good infor-

mation to have with you.)

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a

life saver or an emergency tool for survival. Check out the things that you can do with it:

FIRST: Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your

mobile network and there is an emergency, dial 112 and the mobile will search any existing network to estab-

lish the emergency number for you, and interestingly, this number 112 can be dialed even if the keypad is

locked. Try it out.

SECOND: Have you locked your keys in the car?

Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell

phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their cell

phone from your cell phone. Hold your cell phone about a foot from your car door and have the person at your

home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves

someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away,

and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).

Note: It works fine! We tried it out and it unlocked our car over a cell phone!"

THIRD: Hidden Battery Power

Imagine your cell battery is very low. To activate, press the keys *3370#. Your cell phone will restart with this

reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge

your cell phone next time.

FOURTH: How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following digits on your phone: *#06#. A 15-digit

code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere

safe. If your phone gets stolen, you can phone your service provider

and give them this code. They will then be able to block your handset so even if the thief changes the SIM

card, your phone will be totally useless. You probably won't get your phone back, but at least you know that

whoever stole it can't use/sell it either. If everybody, there would be no point in people stealing mobile phones.

And Finally..

FIFTH: Free Directory Service for Cells

Cell phone companies are charging us $1.00 to $1.75 or more for 411 information calls when they don't have

to. Most of us do not carry a telephone directory in our vehicle, which makes this situation even more of a

problem. When you need to use the 411 information option, simply dial: (800)FREE411, or (800) 373-3411

without incurring any charge at all. Program this into your cell phone now.

Page 14: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

14

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Criminal Law

Personal Injury

Family Law

Workers’ Compensation

Civil Litigation

Philipson & Erdmier Attorneys

719 Pine Knot Avenue Big Bear Lake, CA 92315

909-866-4140 909-878-2118

November General Meeting

At this month’s meeting our presenter was Mike

McCort from Cyber Specialists International

(CSI). His company specializes in data recovery

and computer forensics. They work with law en-

forcement by collecting computer data, analyzing

it and preserving evidence. Also, the company can

assist individuals with recovering lost data on their

computer. Deleted files can be recovered; so can

files on a physically damaged hard drive. Mike’s

talk was very enlightening. He showed us many

elements involved in the process of recovering

data from computers. Other topics covered were

how child predators use the social networking sites

like Facebook, MySpace, etc. The bad guys pre-

tend to be young people looking for friendship. In

the course of any type of investigation, Mike is

required to report any child porn found to the au-

thorities. Meanwhile, millions of dollars are lost

due to Internet fraud and identity theft annually.

He gave us some tips on how to protect against

these maladies.

After the break, member Jack Koch showed us

some videos and slide shows that he and his grand-

daughter made. Jack explained that he added

sound and edited the video using a program that came

with his computer. It is very easy to do. Jack demon-

strated that video and photo editing can be done by

beginners as well as experienced computer users.

Members wrote questions for the RAM session. Jim

Applebury used his expertise to give some answers.

As always, it was educational.

Page 15: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

15

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Last week the FBI and its global partners wrapped up a two-year undercover cyber operation that

resulted in 56 arrests worldwide, the prevention of $70 million in potential losses, and the confirma-

tion that while there might be honor among thieves, in the end, they are still just thieves.

Here’s what happened:

...A discerning group of cyber criminals established a forum on the Internet called ―Dark Market,‖

where they bought and sold stolen financial information such as credit card data, login credentials

(user names and passwords), and even electronic equipment for carrying out financial crimes.

...At its peak, this vast criminal network had over 2,500 registered members, who all believed they

were operating in a protected cyber environment because they went to great lengths to vet members

and to weed out undesirable elements.

...What they didn’t know was that one of the site’s administrators and most respected members, who

called himself Master Splyntr, was one of us—an undercover FBI agent who had infiltrated the site

posing as a cyber crook.

―It was a group of people who trusted each other,‖ said the undercover agent after the arrests. He

explained that there are two types of cyber criminals: those who steal, but not from one another, and

―rippers,‖ who steal from anyone.

Keeping the rippers off the Dark Market site, the agent explained, gave the other members a false

sense of confidence. ―They did a good job of trying to be secure, and they felt secure. There was

honor among thieves, so to speak.‖

Master Splyntr was on the site nearly every day, anywhere from one hour to 15 hours a day. Dark Mar-

ket was like an exclusive club for cyber crooks, a meeting place for getting advice and brokering deals. During

his time online, the undercover agent said, ―we saw millions of dollars being exchanged.‖ At the same time,

the operation prevented the millions of dollars in losses by tipping off potential cyber crime targets.

From the outset, our agent pointed out, ―the goal was to infiltrate the organization.‖ The operation was ex-

tremely successful in developing intelligence on Dark Market’s leading members and the ways in which they

conducted their far-flung crimes.

Throughout the operation, we worked closely with our international law enforcement partners, including the

U.K.’s Serious Organized Crime Agency, the Turkish National Police, and the German Federal Criminal Po-

lice.

DARK MARKET' TAKEDOWN

Exclusive Cyber Club for Crooks Exposed

FBI Cyber Division Assistant Director Shawn Henry

Continued on Page 16

Page 16: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

16

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

AZTECA GRILL Open Daily

11:00 am - 9:00 pm

DINE IN

TAKE OUT

CATERING 40199 Big Bear Blvd.

Big Bear Lake

California

909 866-2350

―What’s worked for us in taking down spy rings

and entire mob families over the years—

embedding an undercover agent deep within a

criminal organization—worked beautifully in tak-

ing down Dark Market,‖ said our Cyber Division

Assistant Director Shawn Henry. ―And once again,

our global partnerships paid off.‖

As for our undercover agent who became a trusted

member of the forum, he explained that he often

had to think like a crook when signing on as Mas-

Beginning Bank $3,123.95

Cash Received

Fundraising: Equipment 25.00

Donations: 50/50 40.00

Donations 51.00

Total Income 116.00

Cash Disbursed

Promotion 26.91

Total paid out 26.91

Ending balance in Bank $3,213.04

November Cash Flow

Continued from Page 15

Page 17: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

17

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Internet Explorer 8

According to our recent Microsoft Mindshare October Newsletter the beta version of Internet Explorer 8 is out. Now available in

beta 2, the new IE8 offers great new features that make browsing the Web easier and more secure than ever. You can also tweak

page display on the fly to adjust for formatting glitches by using the new Compatibility View (which corrects the display on pages

that were made for older browsers). In addition to faster search, better management for your favorites, and enhanced customization

for content you want to download, IE8 includes automatic crash recovery and browse privately in confidence. If you want move in-

formation on IE 8 or would like to download it go to: http://www.microsoft.com/windows/internet-explorer/beta/default.aspx

It's Official: Windows 7

Microsoft recently announced that the next Windows OS, currently referred to internally as "Windows 7," will officially be called

Windows 7. The announcement was made public via a post on the Windows Vista Team Blog, which is a great resource to keep

informed about everything Windows. The website is http://windowsteamblog.com/blogs/windowsvista/default.aspx if you would

like to read more about it.

Microsoft Update

Web video is hugely popular thanks to broadband and sites like YouTube. This guide explains how to

find and watch videos online. Playing Downloaded Videos

To play a video file you have downloaded you will need media player software such as the free Windows Me-

dia Player, WinAmp or Media Player Classic.

To play a video in Windows Media Player, start the program by clicking on the Start menu then All Pro-

grams, and click on Windows Media Player.

Right-click on the menu bar at the top of the Windows Media Player window and select File then Open. Lo-

cate the video file you want to play, click to select it then click Open and Windows Media Player will try to

play the video.

If you do not see your video listed when you search for it, it may be that the video is in a format that Windows

Media Player does not support and you will need another program such as WinAmp or Media Player Classic

to play it.

Another way to open a video file is by right-clicking on the file and then click Open with and select your me-

dia player software.

Watch Videos online

This is an interesting website:

http://www.easycomputertips.com/article-

linkstousefulwebsites.html

All different kinds of info for us, check it out.

Page 18: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

18

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Attackers are continually finding new ways to access computer systems. The use of hidden methods such as

rootkits and botnets has increased, and you may be a victim without even realizing it.

What are rootkits and botnets?

A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge.

It may be included in a larger software package or installed by an attacker who has been able to take advan-

tage of a vulnerability on your computer or has convinced you to download it (see Avoiding Social Engineer-

ing and Phishing Attacks for more information). Rootkits are not necessarily malicious, but they may hide

malicious activities. Attackers may be able to access information, monitor your actions, modify programs, or

perform other functions on your computer without being detected.

Botnet is a term derived from the idea of bot networks. In its most basic form, a bot is simply an automated

computer program, or robot. In the context of botnets, bots refer to computers that are able to be controlled by

one, or many, outside sources. An attacker usually gains control by infecting the computers with a virus or

other malicious code that gives the attacker access. Your computer may be part of a botnet even though it ap-

pears to be operating normally. Botnets are often used to conduct a range of activities, from distributing spam

and viruses to conducting denial-of-service attacks

Why are they considered threats?

The main problem with both rootkits and botnets is that they are hidden. Although botnets are not hidden the

same way rootkits are, they may be undetected unless you are specifically looking for certain activity. If a

Rootkit has been installed, you may not be aware that your computer has been compromised,

and traditional anti-virus software may not be able to detect the malicious programs. Attackers are also creat-

ing more sophisticated programs that update themselves so that they are even harder to detect.

Attackers can use rootkits and botnets to access and modify personal information, attack other computers,

and commit other crimes, all while remaining undetected. By using multiple computers, attackers increase

the range and impact of their crimes. Because each computer in a botnet can be programmed to execute the

same command, an attacker can have each of them scanning multiple computers for vulnerabilities, monitor-

ing online activity, or collecting the information entered in online forms.

Unfortunately, if there is a rootkit on your computer or an attacker is using your computer in a botnet, you

may not know it. Even if you do discover that you are a victim, it is difficult for the average user to effectively

recover. The attacker may have modified files on your computer, so simply removing the malicious files may

not solve the problem, and you may not be able to safely trust a prior version of a file. If you believe that you

are a victim, consider contacting a trained system administrator.

As an alternative, some vendors are developing products and tools that may remove a rootkit from your com-

puter. If the software cannot locate and remove the infection, you may need to reinstall your operating system,

usually with a system restore disk that is often supplied with a new computer. Note that reinstalling or re-

storing the operating system typically erases all of your files and any additional software that you have in-

stalled on your computer. Also, the infection may be located at such a deep level that it cannot be removed by

simply reinstalling or restoring the operating system.

Understanding Hidden Threats: Rootkits and Botnets

Page 19: December 2008 Bearly Bytes · PC with 1 GHz or faster processor 1 GB of RAM or more 2 GB or more of available hard-disk space .NET Framework 3.5 (if it is not already installed, it

19

Big Bear Computer Club Bearly Bytes Newsletter December, 2008

Bearly Bytes

Big Bear Computer Club

Newsletter

P.O. Box 645

Big Bear City, CA 92314 909 878-5822

□ New □ Renewal □ Update Information

Full Name_____________________________________________ Mailing Address________________________________________ City, State, Zip_________________________________________ Home Phone____________________ Cell Phone_____________ E-mail address_________________________________________ Family Member(s) Associates $5/year Name__________________________ E-

mail______________________ Operating System(s)

□Windows/Vista □Windows/XP □Apple/MAC □LINUX □ OTHER ______________

Other Interests:________________________________________________ □ Yes, call me I would like to make new friends

DEMOGRAPHICS

□ Student

□ Working Adult

□ Business

□ Retired

Programs Beginner Intermediate Advanced Instructor

MS Office Digital Imaging Desktop Publishing Web Design

Monthly Meeting with: Presentation and demonstra-tion of popular hardware and software. RAM (Q & A) Sessions Tech news and Virus Alerts Member Software Raffle 50/50 Drawing Bearly Bytes -- Our award winning monthly newsletter mailed to you first class. Club Website: www.bigbearcc.org Free software review pro-gram Members Help Line Members E-mail Notifica-tions Members only Discounts Special Interest Groups (SIGs) All this for only $25 per year!! Mail your application and dues to: BBCC Treasurer PO Box 645 Big Bear City, CA 92314 or bring your application to a meeting. For information and direc-tions phone

BIG BEAR COMPUTER CLUB, INC.

Membership Application

Membership Bene-