the icon newsletter of the interactive computer owners...

16
THE ICON-Newsletter of the Interactive Computer Owners Network January 2018 WHATS INSIDE Page January & February Program Schedules ………. 2 Word of the month ………… 2 Interesting Sites to Visit on the Internet ..…….... 3 Retrieve Files From Backup. 4 Minutes of Dec. 9……..…… 6 Q&A for January- PowerPoint………….……… 6 Ask Leo—Wi -Fi Hotspot Safety…………….………… 7 Interesting Internet Finds…. 9 Interesting Web Sites….… 10 Computer Tutor—iPad & iPhone…………………….....11 Random Keystroke Repeats …………………...………… 12 Winter Gear……………..… 13 Card Sent …….….………. 14 Basic Computer Classes ... 14 ICON Membership. Applications …….………… 15 ICON Officers ………...….. 15 Announcements ……......... 16 Andrew Cummins President, ICON Computer Users Group [email protected] Greetings Welcome to the New Year. Things slow up for the club, if not other things, in winter because of the holidays, and because of the cold. Still, we managed a Christmas dinner. Its great seeing those who came. We always have a gift exchange, which is fun. Mostly, the gifts were very nice. But, given a couple of things brought, maybe we need to have a white elephant gift exchange. Im just sayin’. LoL. If you did get a nice tech gift nice at any time this season, bring it to an ICON meeting and tell us about it. Really, others would like to hear about it. If youre excited about it, or impressed, others will feel likewise. You dont have to devote a whole class period to it, just the amount of time with which you feel comfortable. At the start of a new year, we look forward to what will come. Every January is the Consumer Electronics Show where manu- facturers show off the tech gadgets theyre hoping to bring to market throughout the year. If youre reading news and you come across an article about the show, take the time to read it. Yes, the show is mostly incremental improvements on things al- ready available, but imagine if you were viewing athletics. Wouldnt you be excited every time someone set a new record doing something better or faster than ever done before? A sharper display or faster computer than anything previous should never get old. Unlike watching an athlete set a new record, these better things will eventually make into your home and hands, and benefit you daily. Sometimes these improvements manage to change the way we live, like home-assistant smart speakers are now doing, or cell phones and then smartphones have done in recent years. Try to give up modern technology for a week, and youll be reminded how your life has changed in the last couple of decades. I wish you all the best in this coming year. Come to the meet- ings. Bring someone. Contribute something. Enrich your life and enrich our club. Appreciate and embrace new technology especially that which makes our lives less complicated - yes, thats what some of this new technology is doing. Happy New Year! Andrew Cummins ICON President

Upload: others

Post on 20-Jan-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON-Newsletter of the Interactive Computer Owners Network January 2018

WHAT’S INSIDE Page

January & February Program Schedules ………. 2

Word of the month ………… 2

Interesting Sites to

Visit on the Internet ..…….... 3

Retrieve Files From Backup. 4

Minutes of Dec. 9……..…… 6

Q&A for January-

PowerPoint………….……… 6

Ask Leo—Wi-Fi Hotspot

Safety…………….………… 7

Interesting Internet Finds…. 9

Interesting Web Sites….… 10

Computer Tutor—iPad &

iPhone…………………….....11

Random Keystroke Repeats

…………………...………… 12

Winter Gear……………..… 13

Card Sent …….….………. 14

Basic Computer Classes ... 14

ICON Membership.

Applications …….………… 15

ICON Officers ………...….. 15

Announcements ……......... 16

Andrew Cummins President, ICON Computer Users Group

[email protected]

Greetings

Welcome to the New Year. Things slow up for the club, if not other things, in winter because of the holidays, and because of the cold. Still, we managed a Christmas dinner. It’s great seeing those who came. We always have a gift exchange, which is fun. Mostly, the gifts were very nice. But, given a couple of things brought, maybe we need to have a white elephant gift exchange. I’m just sayin’. LoL.

If you did get a nice tech gift nice at any time this season, bring it to an ICON meeting and tell us about it. Really, others would like to hear about it. If you’re excited about it, or impressed, others will feel likewise. You don’t have to devote a whole class period to it, just the amount of time with which you feel comfortable.

At the start of a new year, we look forward to what will come. Every January is the Consumer Electronics Show where manu-facturers show off the tech gadgets they’re hoping to bring to market throughout the year. If you’re reading news and you come across an article about the show, take the time to read it.

Yes, the show is mostly incremental improvements on things al-ready available, but imagine if you were viewing athletics. Wouldn’t you be excited every time someone set a new record doing something better or faster than ever done before? A sharper display or faster computer than anything previous should never get old. Unlike watching an athlete set a new record, these better things will eventually make into your home and hands, and benefit you daily.

Sometimes these improvements manage to change the way we live, like home-assistant smart speakers are now doing, or cell phones and then smartphones have done in recent years. Try to give up modern technology for a week, and you’ll be reminded how your life has changed in the last couple of decades.

I wish you all the best in this coming year. Come to the meet-ings. Bring someone. Contribute something. Enrich your life and enrich our club. Appreciate and embrace new technology especially that which makes our lives less complicated - yes, that’s what some of this new technology is doing. Happy New Year!

Andrew Cummins

ICON President

Page 2: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 2

Be sure to check the website before leaving home for any last minute changes

Program Preparations for January 2018

Saturday, January 13, The Library Station (Santa Fe Room)

10:30 a.m. Digital Media SIG —

11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk

12:30 p.m. Mini–Seminar

1:45 p.m. General Membership Meeting

Saturday, January 27 The Library Center (Meeting Room A)

10:30 a.m. Genealogy SIG —

11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk

12:30 p.m. Windows SIG —

1:45 p.m. Advanced Technology Forum

Program Preparations for February 2018

Saturday, February 12, The Library Station (Frisco Room)

10:30 a.m. Digital Media SIG —

11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk

12:30 p.m. Mini–Seminar

1:45 p.m. General Membership Meeting

Saturday, February 24 The Library Center (Meeting Room A)

10:30 a.m. Genealogy SIG —

11:30 a.m. Brown Bag Lunch and 1-on-1 Help Desk

12:30 p.m. Windows SIG —

1:45 p.m. Advanced Technology Forum

Technology Word of the Month

‘FEDORA” Find the definition elsewhere in this issue.

Page 3: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 3

Interesting Sites to Visit on the Internet

Nancy Preffitt ICON Member

Ngpreffitt (at) juno.com

Thought for the Day

“As a cure for worrying, work is better than whiskey.”

——Thomas Edison

KEEP THAT OLD COMPUTER WORKING If you didn’t get a new computer for Christmas and hope your old one will keep going for a while, you might want to check out Speccy. It’s program that will check every piece of hardware in your computer as well as the temperature of everything that has a thermostat. I downloaded it quickly and it gave me a detailed report. (If I had understood it, it would have been much more helpful!) This just reports on the hardware, not the software. They have a more complex program for sale, of course, but the freebie is the place to start. http://www.piriform.com/speccy If your hardware is okay, take a look at your hard drive. Spacesniffer does a visual layout of your folders and files. When you look at the report, the bigger the box, the bigger the file. You can then click on a specific box and it will take you down to the next level, then the next, etc. with each double click. At the end, it will give you info about that specific file, like when you installed it and the last time you accessed it. It’s still confusing, but more fun than Speccy, because you can click more! The instructions on the site are written in people language rather than techy, so you can probably figure out anything you want to with it. http://www.uderzo.it/main_products/space_sniffer/index.html There is also help built into Windows that’s already on your machine. Here’s how you do it. To access Storage Sense, Open Settings >> System >> Storage. Then find the Storage Sense section and click on “Change how we free up space”. You then toggle the types that will be deleted: unused temporary files, old recycle bin items, Downloads folder files that have been unchanged in 30 days, and previous versions of Windows.

Disk Cleanup is also on your computer. To get started, Open File Explorer then right click on the drive you want to clean up. On the General Tab, click the Disk Cleanup button. This will list all the file types you can delete. Check the ones you want to get rid of: Temporary Internet Files, Rcycle Bin and Down-loaded Program files. Click the “Clean Up System Files” button to make it work.

The whole thing is pretty scary, isn’t it?

Page 4: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 4

How to Retrieve Individual Files from a Windows Backup By David Kretchmar, Computer Hardware Technician, Sun City Summerlin Computer Club, NV August 2017 issue, Gigabyte Gazette http://www.scscc.club

In Windows 10, Microsoft has included the old Backup and Restore feature from Windows 7. This was weakened in Windows 8 and completely removed in Windows 8.1, but it is back in Windows 10, even if it is a bit depreciated

It’s now called “Backup and Restore (Windows7)”. Microsoft’s File History is a igreat tool designed to back up your individual files, and Microsoft seems to be pushing users to utilize this feature, rather than relying on entire system backups. To this end, Microsoft states that you cannot restore individual files from a system image.

Microsoft is being untruthful when it states that you cannot restore individual files from a system image. This might represent a twist on the old joke that when you get information from Microsoft it is completely accurate, but useless. I’m not sure it is an improvement for Microsoft to provide inaccurate information to push users to utilize File History. Using File History to back up your data fits more neatly into Microsoft’s long-term strategy of moving users to The Cloud, and maybe that’s how they justify this mendacity

Create an image then use Disk Manager Obviously, you must create a Windows system backup before you can pull individual files from the backup image. This can be accomplished in different ways; one way is to go into the Control Panel (Category View), System Security, then Backup and Re- store (Windows 7). Once you have created the im- age, execute Disk Management by right clicking on the Start win- dow and left clicking on Disk Management.

Click on Action then select “Attach VHD” (Virtual Hard Drive). Note this window Shows physical hard drives (Disk 0, Disk 1, etc.) as well as logical drives (C:, D:, etc.).

Now browse to the location of you image. Your image is cont- ained in a folder named Win- dowsImageBackup. Drill down to your image file. There is more than one file in a folder named “Backup (date of backup).” The one ginormous file is the one we

want to attach. Go back to the Disk Management window and you will see a new hard drive (the virtual drive you just created). Note it is the same size as the C: drive that was imaged. Right click on the representation of this drive and proceed to add a logical drive letter to this drive, if one is not already assigned.

Continued on page 5

Page 5: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 5

Continued from page 4 How to Retrieve Individual Files from a Windows Backup

Copy your files. Now use File Ex- plorer to access any of your files in the virtual drive you have just cre- ated. It’s that sim- ple! You can copy and paste any files you like from the image to any other location you can access. This is not as simple as a re- store from File Backup, but it

works. Remember, you have created a virtual drive, also known as a logical drive, every bit as “ real” as your own C: drive, lacking only the graphical us er interface. You can even execute programs on your virtual drive, if you can locate its executable or application file. Clean up When you are done gleaning the data you want from the virtual drive, Right click on its representation in the Disk Management win- dow, and delete the partition (s). Do not delete the image file on your backup drive or it will be gone forever. Just reboot and your system will be back minus the virtual- ization.

Page 6: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 6

Minutes of 9 December 2017

Today was our Holiday Party at Red Lobster. Nineteen members attended, brought exchange gifts, and told their most memorable stories of Christmas. Some stories were humorous and some were poignant, but all were interesting. We had expected Best Buy to come and bring their toys, but it didn’t happen. Meeting was called to order by Andrew Cummins, President. Minutes of 12 November 2017 were read by Mary. Motion to accept by John Somers, second by Gary Geise. Passed. No Treasurer’s report was given due to the absence of the Treasurer.

Old Business: None.

New Business: Nancy Preffitt shared about the speaker she has lined up for the January 13 meeting.

Motion to adjourn by Gary Geise, second by Nancy Preffitt. Carried.

Respectfully submitted, Mary Phillips, Secretary

Page 7: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 7

How Do I Use an Open Wi-Fi Hotspot Safely?

Open Wi-Fi hotspots at coffee shops, airports, and other public places are opportunities for hackers to steal information and more. I'll review how to stay safe.

It can be absolutely safe to send and receive email from a coffee shop, or any other location that pro-vides unsecured or “open” Wi-Fi. In fact, I do it all the time.

But you do have to follow some very important practices to ensure your safety.

Turn on the firewall Fortunately, firewalls are “on” by default in most operating systems.

However, when you’re at home, you may use your router as your firewall, and keep any software firewall on your machine disabled. That works well, as the router stops network-based attacks before they ever reach your computer… while you’re at home.

When you’re on an open Wi-Fi hotspot, or connected directly to the internet via other means, that soft-ware firewall isn’t redundant. In fact, it’s critical.

Make sure that the firewall is enabled before connecting to an open Wi-Fi hotspot. Various network-based threats could be present on an untrusted connection, and it’s the firewall’s job to protect you from exactly that.

The open Wi-Fi problem The problem with open Wi-Fi hotspots is that the wireless radio connection between your computer and the wireless access point nearby is not encrypted. That means any data you don’t actively encrypt some other way is transmitted in the clear, and anyone within range can eavesdrop and see it. Encryption, us-ing WPA2, prevents that.

An interstitial page is not encryption. If you connect to a hotspot and the operating system on your machine requires a password for that to work, that’s not an open Wi-Fi hotspot, and you may be OK. On the other hand, if you can connect, and when you fire up your browser it first takes you to a web page that says “enter a password” (as in a hotel) or “check to accept our terms” (as in most other open hotspots) that is not encrypted, and it is not secure. It is an open Wi-Fi hotspot.

Secure your desktop email program If you use a desktop email program, such as Outlook, Windows Live Mail, Thunderbird, or others, you must make certain it is configured to use SSL/secure connections for sending and downloading email. Typically, that means that when you configure each email account in your email program, you need to:

Configure your POP3 or IMAP server for accessing your email using the SSL, TLS, or SSL/TLS security op-tions, and usually a different port number.

Configure your SMTP server for sending email using SSL, TLS, or SSL/TLS security options, and usually a different port number, such as 26, 465, or 587, instead of the default 25.

The exact settings, and whether or not this is even possible, depends entirely on your email service provider; you’ll need to check with them to determine the correct settings. How you configure these settings, of course, depends on the email program you use.

With these settings, you can feel secure downloading and sending mail using an open Wi-Fi hotspot.

Secure your web-based email If you use a web-based email service like Gmail, Outlook.com, Yahoo, or others via your browser, you must make sure that it uses an httpS connection and that it keeps on using that httpS connection throughout your email session.

Continued on page 8

Page 8: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 8

Continued from page 7 How Do I Use an Open Wi-Fi Hotspot Safely?

Fortunately, most of the major email services have moved to making https the standard, (and sometimes the only) connection method.

Accessing email using a plain http connection might well be the source of many open Wi-Fi-related hacks. I expect that people simply log in to their web-based email service without thinking about security; as a result, their username and password are visible to any hackers in range who care to look. Be careful. Some services will use https only for your login, which is insufficient, as your email conversa-tions thereafter could be viewed by others. Other services may “fall out” of https, reverting to unsecure http without warning.

Secure all your other online accounts Any and all web-based (aka “cloud”) services that require you to log in with a username and password should either be used only with https from start to finish, or should be avoided completely while you’re us-ing an open Wi-Fi hotspot. With more and more services being provided online, this is getting to be a larger problem. Using “the cloud” is a great way to manage your digital life from wherever you may be, but one of the key problems remains security. Using https is critical to that security when you’re out and about.

Use a VPN This one’s for the road warriors. You know them: the folks who are always traveling and online the entire time, often hopping from coffee shop to coffee shop in search of an internet connection as they go. A VPN, or Virtual Private Network, is a service that sets up a securely encrypted ‘tunnel’ to the internet and routes all of your internet traffic through it. Https or not, SSL/secure email configuration or not, all of your traffic is securely tunneled, and no one sharing that open Wi-Fi hotspot can see a thing. This service typically involves a recurring fee. As I said, they’re great for road warriors, but probably over-kill for the rest of us, as long as we follow the other security steps described above.

Use different passwords Finally, it’s important to keep your account passwords different from each other and, of course, secure. That way, should one account be compromised by some stroke of misfortune, the hackers won’t automat-ically gain access to your other accounts. Remember, even when you use an open Wi-Fi hotspot proper-ly, a hacker can still see the sites you’re visiting, even though they cannot see what you are sending to and from that site. That means they’ll know exactly what sites to target.

Consider not using free Wi-Fi at all

As I said, it can be safe to use open Wi-Fi, but it’s also very easy for it to be unsafe. The solution is a very common and solid one: use your phone instead. While it is technically possible, a mobile/cellular network connection is significantly less likely to be

hacked. In fact, I use this solution heavily when I travel. Most mobile carriers offer one or more of the following options:

Use your mobile device. Many phones or other mobile devices, such as iPhones, iPads, Android-based phones, and others are quite capable email and web-surfing devices, and typically do so via the mobile network. (Some can also use Wi-Fi, so be certain you’re using the mobile broadband connec-tion for this option to avoid the very security issues we’re discussing.)

Tether your phone. Tethering means you connect your phone to your computer – usually by a USB cable, but in some cases, via a Bluetooth connection – and the phone acts as a modem, provid-ing a mobile broadband internet connection.

Use a dedicated mobile modem. Occasionally referred to as “air cards”, these are USB devices that attach to your computer and act as a modem, providing a mobile broadband internet connec-tion, much like tethering your phone.

Use a mobile hotspot. In lieu of tethering, many phones now have the ability to act as a Wi-Fi hotspot themselves. There are also dedicated devices, such as the MiFi, that are simple dedicat-ed hotspots. Either way, the device connects to the mobile broadband network

and provides a Wi-Fi hotspot accessible to one or more devices within range. When used in this Cclntinued on page 9

Page 9: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 9

Continued from page 8 How Do I Use an Open Wi-Fi Hotspot Safely

manner, these devices are acting as routers and must be configured securely, including a WPA2 password, so as not to be simply another open Wi-Fi hotspot susceptible to hacking.

I travel with a MiFi, and also have a phone capable of acting as a hotspot as a backup. I find this to be the most flexible option for the way I travel and use my computer.

Don’t forget physical security Laptops are convenient because they’re portable. And because they’re portable, laptops are also easily stolen.

Unfortunately, it only takes a few seconds for an unattended laptop to disappear. That’s one reason I never leave mine alone: even if I need to make a quick trip to the restroom, the laptop comes with me. There’s just no way of knowing that absolutely everyone around is completely trustworthy. In that same vein, I also prepare somewhat in case my laptop does get swiped. Specifically, that means:

My hard drive is encrypted.

My sensitive data is stored in folders that are encrypted using BoxCryptor, which is not mounted un-less I need something.

Lastpass is set to require a password re-prompt after a certain amount of inactivity.

I have two-factor authentication enabled on as many accounts as support it, including Lastpass.

I have tracking/remote wiping software installed.

Computer theft and recovery is a larger topic that’s only tangential to using open Wi-Fi hotspots. Clearly, though, if you are a frequent user of assorted open hotspots in your community or when you travel, a little attention to theft prevention and recovery is worth it as well.

Security and convenience are always at odds As you can see, it’s easy to get this stuff wrong, since doing it securely takes a little planning and fore-thought.

But it’s important. If you’re not doing things securely, that guy in the corner with his laptop open could be watching all your internet traffic on the Wi-Fi connection, including your account username and pass-word as they fly by.

And when that happens, you can get hacked.

Fortunately, with a little knowledge and preparation, it’s also relatively easy to be safe.

Interesting Internet Finds - Aug. By Steve Costello, Boca Raton Computer Society http://ctublog.sefcug.com / editor (at) brcs.org

While going through more than 300 RSS feeds, I often run across things I think might be of interest to other user group members. The following are some items I found interest-ing during the month of August 2017.

How to Get Started with Linux: A Beginner's Guide http://www.pcworld.com/article/2918397/operating-systems/how-to-get-started-with-linux-a-beginners-guide.html If you are thinking of switching to Linux, or just want to experiment with it, you should check out this post.

Concerned About Browsing Privacy? Here's How to Install Firefox Focus http://www.techrepublic.com/article/concerned-about-browsing-privacy-heres-how-to-install-firefox-focus/ For Android or iOS this browser helps protect your privacy without having to set anything up. Not ex-tremely fast, or with many settings and features, but so far seems to perform well.

How to Setup AND Share a Google Calendar I use and share Google Calendars for family and other things. If you have a need for a shared calendar, check out this post for how to do it with Google Calendar. https://whatsonmypc.wordpress.com/ 2017/08/11/how-to-setup-and-share-a-google-calendar/ Continued on page 10

Page 10: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 10

Continued from page 9 Interesting Internet Finds by Steve Costella New Password Guidelines Make Your Accounts Easier to Secure https://www.techlicious.com/blog/new-password-guidelines/ Learn the new password guidelines to help keep your accounts as secure as possible. Never Go Online Without a VPN http://www.makeuseof.com/tag/online-vpn-use/ This post explains why you should always use a VPN when you go online. I always do, even on my desk-top computers. How to Set Up New Computer with Ninite https://davescomputertips.com/how-to-set-up-new-computer-with-ninite/ Dave explains how he uses Ninite to set up a new Windows computer. I use Ninite and recommend it to my user group all the time. Of course, Ninite does not include every application, but it makes things easi-er for reinstalling those that it does. (Note: I run the Ninite installer every week to keep those applications up to date.) ********** Most Fridays, more interesting finds will be posted on the Computers, Technology, and User Groups Blog: http://ctublog.sefcug.com/tag/interesting-internet-finds/ The posts are under Creative Commons licensing.

Educational, Fun, and Interesting Web Sites - June 2017 by Howard Lewis, Midland Computer Club, MI http://mcc.apcug.org/ capmidmi (at) yahoo.com https://forvo.com/ Forvo is the largest pronunciation guide in the world, the place where you´ll find millions of words pronounced in their original languages. If you have a word you would like to know how to pronounce – whether it be English or one of the hundreds of languages around the world – you might be able to find help at this site. If there is a word you would like to know how to pronounce, you can request someone to pronounce it for you. https://www.techrepublic.com/article/what-kinds-of-people-fall-prey-to-identity-theft-phishing-and-hacks-its-not-who-you-think/ Who’s most likely to be the victim of hacks and identity theft? Surprisingly, it is not who we normally think that fall prey to the various scams running around. This article looks into some of the data and draws mixed conclusions. Interesting reading! https://betanews.com/2017/03/08/disable-ads-file-explorer-windows-10/ If you are getting ads in Windows 10’s File Explorer, here is how to disable them (at least temporarily). https://support.office.com/en-us/article/office-training-roadmaps-62a4b0dc-beba-4d8e-b79c-0ad200e705a1 Microsoft offers free basic training on the use of several of the Microsoft Office products (Word, Excel, Outlook, PowerPoint and Access). They are in pdf format and can be downloaded to view at your leisure. http://deep-web.org/how-to-research/deep-web-search-engines/ We all search the web at various times and we sometimes hear about the “dark web” (you don’t want to go there unless you know the ramifications!). But did you know there is also the “deep web”? The web as we know it is really just a small portion of the Internet that the major search engines (Google, Bing, Ya-hoo, etc.) view. But there is much more out there that can be searched with the appropriate search en-gine. This site lists some of the specialized search engines to find that really hard to find information.

Page 11: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 11

COMPUTER TUTOR

iPad & iPhone

From the Desk of Pamela Tabak DEDICATED TO THE COMPUTER

EDUCATION OF SENIORS

http://www.computertutorinc.net/frequently-asked-questions-2/

For additional resources, click the above link to Pamela’s FAQ page (frequently asked questions.)

Page 12: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 12

The Case of the Random Keystroke Repeats By Bob Woods, Under the Computer Hood UG Web- master www.uchug.org webmasters (at) uchug.org

A couple of years ago I decided I needed a new laptop. At the time, Costco was running a sale on a nicely appointed Acer laptop. Since Acer makes a pretty decent product I took the plunge and bought one. Overall, it has been an excellent choice with one exception, the keyboard. The keyboard has a nice feel to it and is well made, but has a problem with randomly repeating keystrokes. This problem was present in the as shipped Windows 8 and followed through with the Windows 10 update. Resetting key-stroke repeat rates and doing a BIOS update did not alleviate the issue. The problem was more annoy-ing than anything, but one day I decided to try to fix the problem once and for all. I tried doing a search in the Acer support site and saw others with the same model as I have and other models as well. In most cases the owners were asked to return the units for keyboard replacement under warranty. In most cases the problem was not resolved by the keyboard replacement. Seeing as this did not help, I decided to not go through the repair hassle with so little track record of success. So, onto a Google search of the issue.

Doing a Google search revealed that the issue of randomly repeating keystrokes was experienced by owners of many other brands and models. Very rarely did keyboard replacement or resetting keyboard repeat rates help. After digging around a while and trying various recommendations that did not work I came across an article in the HP Support Forum that sounded feasible. The link to the page is http://hp.care/2uauUco

Basically, the problem is some keyboards have more key bounce than others. With the short key travel on laptop keyboards the key bounce allowed the keys to inadvertently register as a double key stroke. Resetting the keyboard repeat rate will not resolve key bounce. The article describes how to use the Ease of Use settings in the Control Panel to turn on a key filter for Windows 7 or 8. On Windows 10:

Open Control Panel, click on Ease of Use and click "Make the keyboard easier to use." Then under "Make it easier to type" click the check box "Turn on Filter Keys". Next, follow the rest of the article for Windows 7 - 10 to make a change to a registry key that sets the bounce rate for the keyboard keys to 35 milliseconds.

Wow, that worked like a charm. No more random character repeats while typing. One thing to watch for. All was going splendidly until after a patch one day. I started to get the random keystrokes again. So, I checked the Ease of Use settings and found the patch had unchecked to box for "Turn on Key Filters". Gee, thanks Bill! Once turned back on the problem once again resolved itself and the patch did not change the bounce rate in the registry. Oh, happy typing again!

Page 13: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 13

www.SupportVeterans.org

Page 14: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 14

PLEASE! Please Notify us of Change of Address. Each time the newsletter goes to the WRONG ADDRESS, the Post Office charges ICON an additional fee of $0.70 post-age to notify ICON of a change of address. So when

you move or go out of town, please e-mail: [email protected]

THE CONTENTS AND OPINIONS OF THE ARTICLES IN THIS NEWSLETTER ARE THE OPINIONS OF THE AUTHORS. NOT

THOSE OF THE ICON USERS GROUP.

BASIC COMPUTER CLASSES

Basic Windows 10 computer classes are taught by ICON members Mary Phillips and Art Irish with ICON assistants for nine sessions monthly ex-cept April, August and December. Classes are held in Conference Room A in the Smith-Glynn-Callaway Medical Bldg basement, 3231 S Na-tional, Springfield MO. New classes will be held starting Jan. 8, Feb. 5, and March 5.

Students should bring a Windows 10 laptop, power cord, and mouse or plan to borrow one from an instructor. Sign up by calling Mercy Older Adults Services 841-0333 OR sign up at Mer-cy.net/senior-events.

CARD SENT IN January

If you know of someone in our group who is ill or has suffered a loss in the family, please contact Susie McSwain 883-2811 [email protected]

Technology Word of the Month: “Fedora”

Fedora is a Unix-like operating system based on the Linux kernel and GNU programs (a Linux distribu-tion) developed by the community-supported Fedora project and sponsored by the Red Hal Enterprise. Fedora workstation is a polished easy to use operating system for laptop and desktop computers, with a complete set of tools for developers and makers of all kinds.

HELP WANTED! 1-2 program chairpersons for our general meetings and a refreshments per-son to store/make coffee as needed.

HELP NEEDED?

For help, you can log onto ICON’s Forum at www.iconusersgroup.org and post your questions. Free registration is required in order to post questions and then you need to wait a day or so for an email confirmation to complete the registration. However, while you’re there, click on Search and enter the topic about which you’d like information and see if someone has already started a ‘thread’ — a series of questions and responses. All questions and responses can be read with-out having to register.

Page 15: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 15

ICON MEMBERSHIP APPLICATION Make Check to ICON — Mail dues to: ICON Users Group

1325 W Sunshine #169, Springfield MO 65807-2344 NAME _______________________ E-MAIL ADDRESS ______________________

ADDRESS _________________ HOME PHONE __________________ CITY ________________________ STATE _____ ZIP ______________

SPONSORED BY ______________________________________________________ DATE _______ YEARLY DUES $20.00 — PLUS $5.00 APPLICATION FEE

Please submit articles for the February issue of THE ICON by January 15, 2018 to Mary Phillips at [email protected]

VISIT ICON’S WEB SITE AT

www.iconusersgroup.org

GO TAKE A LOOK!!

ICON OFFICERS

ICON’S NEWEST MEMBERS AND RENEWAL

MAY YOUR ASSOCIATION WITH ICON USERS GROUP BE A HAPPY AND FUN-FILLED TIME.

Page 16: THE ICON Newsletter of the Interactive Computer Owners …iconusersgroup.org/newsletter/2018_01_newsletter.pdf · 2018. 1. 11. · might want to check out Speccy. It’s program that

THE ICON January 2018 PAGE 16

Return Service Requested

ICON Users Group 1325 W. Sunshine #169 Springfield MO 65807

———- ———-

ICON (Interactive Computer Owners’ Network) is a non-profit organization dedi-cated to sharing information about technology, and helping others more effectively learn to use computers and emerging technology.

We provide instructor led “Hands-on Classes”, “Moderated Workshops and Group Discussions”, “One-on-One Help Sessions”, and “Presentations” by individuals ranging from college level instructors, public service organizations, the business community, and our own members who are knowledgeable about specific topics.

Classes cover everything from beginner level to advanced skills, and discussions cover a wide range of topics from managing the various operating systems, to dig-ital photography, genealogy, office applications and web development.

Visitors are always welcome at all ICON functions

Check out our current schedule inside this newsletter...

Or by visiting: www.iconusersgroup.org

Visit the “Calendar” to find the time, date, and location of topics or classes that interest you and attend as often as you wish.

Hope to see you soon!

———-