Official Newsletter SouthEastern Michigan Computer Organization, Inc.

Volume 28 August, 2003 Number 8 IN THIS ISSUE MEETINGS SCHEDULE ...... 3 Deals Column, by Bob (The Cheapskate) Click ...... 3 Windows Upgrade Options, by Michael Horowitz ...... 5 SPAM—Bane Of The Internet, by Ira Wilsker ...... 11 LCD Monitors, by Tom Zinneman ...... 13 Right Click, Try It—You May Like It, by Les J. Kizer ...... 15 Hunt For The Lost Font, by Mick Topping ...... 16 A Windows Tip From Elliott Chandler ...... 17 Natural Mousing: Vertical Mouse Optical, A Review by Linda Webb ...... 18 Sony Digital Camera, A Review, by Bill Moeller ...... 18 Network Basics, Broadband Routers, by John Woody & Michael Espinoza .... 20 What Is A CPU, by Lee Alexander ...... 23 Ultimate Backup—Part 2, by Warner Mach ...... 25 Security Testing Online—Fraud Or Not, by Greg West ...... 27 The Windows Registry Demystified, by Dale Oliver ...... 29 Making A Two-Computer Network, by Frank Fahey ...... 32 Spam Sleuth Version 2.0—A Review, by Franz Breidenich ...... 33 Digital Camera Flash Cards, by John Hoffmann ...... 37 Letter From The Editor ...... 37 Board Meeting Minutes, by Carol Sanzi ...... 38 SIGs: IBM, IBM Intermediate, Advanced, & Novice IBM Group ...... 39 DATA BUS Deadline (7th day after meeting) ...... 39 Tax Deductible Donations ...... 39 Other Groups Calendar ...... 40 Special Member Benefit & Resource Persons ...... 41 SEMCO CALENDAR OF EVENTS ...... 42 MAP, OAKLAND UNIVERSITY, ROCHESTER ...... 43 1 SEMCO OFFICERS President Gary DeNise (248) 634-7514 Vice President Phil “Vic” Charns (248) 398-4465 Secretary Carol Sanzi (586) 739-7256 Treasurer Roger Gay (248) 641-7799 Members at Large of the Board of Directors Bob Clyne (810) 387-3101 Chuck Moery [email protected] NEWSLETTER STAFF Publications Committee Chair Bill Agnew (586) 752-2227 Editor Bill Agnew (586) 752-2227 Associate Editor Bob Clyne (810) 387-3101 Publisher Phil “Vic” Charns (248) 398-4465 Calendar—Other Groups Chair needed

SIG (SPECIAL INTEREST GROUP) CHAIRPERSONS SIG-IBM: CoChairman Tom Callow (248) 642-1920 (9-5) CoChairman Warner Mach (313) 326-0733 SIG-IBM INTERMEDIATE Jack Vander-Schrier (586)739-7720 (12-8) NOVICE-IBM GROUP Rotating Hosts SIG-ADVANCED Franz Breidenich (248) 398-3359

The SouthEastern Michigan Computer Organization, Inc. (SEMCO) is a non-profit, 501(c)(3), group dedicated to providing information, education and a forum to computer users (professional and amateur) and other interested individuals. Membership in SEMCO is open to all individuals 18 years or older. Persons under 18 years may become members through the sponsorship of a parent or guardian. Dues of $30/year include monthly DATA BUS and free personal ads.

All SEMCO correspondence should be addressed to SEMCO - P.O. Box 707 - Bloomfield Hills, MI 48303-0707 Website: http://www.semco.org E-mail: [email protected] General information: (voice) answering device in Royal Oak (248) 398-7560

DATA BUS is published monthly by SEMCO as its official newsletter. Mail DATA BUS newsletter copy to: Bill Agnew, 3450 31 Mile Road, Washington, MI 48095; or e-mail to: [email protected]. Editor is responsible for contents and control of the DATA BUS. Materials published herein may be used for non-commercial purposes only, without further permission of SEMCO or the authors, except as noted, providing credit is given to the author and source, i.e. DATA BUS, and issue date. Entire contents copyright © 2003 SouthEastern Michigan Computer Organization, Inc. SEMCO does not condone in any way the illegal copying of copyrighted material and will not tolerate such practice at any SEMCO function. Your mailing label and membership cards list the month and year your membership expires. Newsletters will not be sent after the month of expiration. Back issues may not be available. Renew your membership as early as possible to avoid missing any newsletters.

This publication was created using Adobe PageMaker 6.5 Plus, donated by Adobe Systems, Inc.

2 that they will do business under a new SEMCO MEETINGS name, but with two different units: one Sunday, for handhelds, and the other for “so August 10, 2003 called” smart phones. Since Palm is not an APCUG sponsor, it looks like Board Meeting 12:00pm Handspring will be gone too. General Meeting 1:30pm According to Value Line, Handspring’s SIG-IBM Meeting 1:45pm liquidity was deteriorating, and revenues Social Period 3:15pm were significantly below last year’s IBM Novice Group 3:45pm levels. Sales for both have been SIG-IBM Intermediate 3:45pm declining, so perhaps it’s time. Ink Jet Deal Is Jetting Back Again I don’t often repeat a deal, but this one DEALS COLUMN was very popular. Susie McLean of from the DealsGuy Inksell.com agreed to repeat the Greater Orlando Computer UG original deal offered last year and by Bob “The Cheapskate” Click extend it until the end of this year Alas, Its Another Goodbye From a (2003). The differences are: the Great User Group Supporter expiration date, the coupon code, and I was about to release the August free shipping on orders over $49.00 (an column to my editors when I received improvement). I am repeating it below Bonnie Mitchell’s e-mail with the sad with the changes. news that Casady & Greene is closing “InkSell.com is a discount printing their doors after 19 years in business. Supply Company that specializes in Bonnie, their users group coordinator, cartridges for all makes of ink jet and sent out her sad goodbye to all of us laser printers, solid ink printers, who are users group contacts. While copiers, and fax machines. We sell we were only connected with C & G for brand names, new compatible cartridges eight years, many of you have met (for most brands), and remanufactured Bonnie at APCUG or regional events cartridges and refill kits. Our compatible across the country. She was always cartridge quality is certified to match ready to help with review products and that of the manufacturer, and our prices prizes for drawings. C & G supported are up to 70 and 80% less. We would be us when the expense of it might have happy to offer DealsGuy readers a been questionable, but they were there 10% discount on purchases at our when we needed them. This recession online store. is certainly taking its toll in the “A discount coupon code will be business community, and in the valid through December 31, 2003. To process, the user group community is redeem the 10% discount, (not valid losing some great friends along the way. with any other discount or offer), Thanks for everything Bonnie, and good simply visit our site, , place your order, Eliminating The Competition and continue to ‘check out’ where there I read that Palm has declared its will be a blank to enter the discount intention to purchase Handspring, and coupon code (DealsGuy2003). The 3 discount will be automatically visitors. One problem though: if you’re calculated. Should anyone have using the free space given to you by questions or need assistance, phone your ISP, you probably have no access customer service at 1-800-255-0483, to the log for it (and can’t use the or send e-mail to . product I am about to offer). On the Don’t forget the free shipping on other hand, if you have a paid Web orders over $49.00.” space, usually you have access to the Its Not Free This Time, But Its Still A server log for your site. You should Bargain find out if your server log is accessible. Colleen Toumayan from Executive You could analyze things the hard way e-mailed me to let my readers and download the log file, then sift know that they have a good price on through it manually to see what you Undelete and Diskeeper bundled can determine. Sure it will work, but together. The bundle is $39.95 and it’s time consuming. I know, in my would normally be $59.90 if bought case, I’d like to know which files were separately. hit, and for how long. About Diskeeper: “they say built-in I talked to Sane Solutions about defragmenters are slow, labor offering a discount on their products, intensive, and use too much system and they agreed to do it. I have to say, resources to keep up with the their NetTracker Professional software performance demands of today’s is already much cheaper than another computing needs. Ultimately, they well known software for the same don’t get used. Running Diskeeper is purpose, but Sane Solutions feels theirs like hiring an expert to constantly does it better. They did not give me a monitor and maintain your system’s product to review, so you will have to maximum performance.” do your own evaluation, but you can About Undelete: “you store a lot of download a fully functional two-week data on your computer, and you need to trial version to evaluate. Check their protect it 24/7. Re-creating accidentally Web site at and deleted files takes a lot of time, and look at the product descriptions. using backups to restore deleted files is NetTracker Professional sells for not always reliable—especially if $495.00, and NetTracker Enterprise is you’ve created and deleted something $995.00. Darryl Cunningham, sales between backups. New Undelete manager of Sane Solutions, said that if replaces your recycle bin with a you call him with your request, he’d Recovery Bin, which catches all the personally handle the order giving you files you delete, so file recovery is quick a 20% discount on their products and and easy.” support. Wow! That’s a $99 discount The products in the bundle are for just on NetTracker, making it very home use, and you can check them competitive! The 20% discount is good out at and order them if you wish. You can contact Darryl at 1-800-407- What’s Going On Your Web Site? 3570, ext. 122 to order. Don’t forget to If you have a Web site, it often helps if tell him you heard this from the you know all the statistics about the DealsGuy. 4 Talk About Tweaking! Windows Upgrade Many of you have used TweakUI and loved it. It performs many very useful Options tasks for Windows. Lee Reynolds of By Michael Horowitz Boca Raton Computer Society Inc. wrote some time ago in his monthly When considering installing a new “Nibbling At The Net” column about version of Windows on a computer, another even more useful utility that he the first issue is whether your computer feels is much better than TweakUI. It is is fast enough for the new operating Xteq X-Setup and can be found at system. Microsoft and others publish . It’s absolutely both minimum and recommended free for home users. However, they do horsepower (cpu speed, installed ram, take donations if you enjoy using it. and available hard disk space). You can This product has an incredible learn about the horsepower number of features that you can hardly requirements for Windows XP at imagine. It is also updated constantly. . other software such as Office 97 and The second issue is whether your 2000, not to mention hardware computer and surrounding hardware installed on your computer. Sounds is supported by the new version of like a great product. Thanks for letting Windows. Microsoft publishes a us know Lee. Hardware Compatibility List where you here again next month if your editor can see if Windows is supported on permits. This column is written to make your computer. In addition, you should user group members aware of special check your printer, scanner, and other offers I have found or arranged, and my hardware to see if there are drivers for comments should not be interpreted to the new version of Windows. This is encourage, or discourage, the purchase especially of concern when moving of any products, no matter how enthused from a Windows 9x family OS to an I might sound. NT class version of Windows (NT4, Bob (The Cheapskate) Click 2000, XP). . Visit my Software also has compatibility Web site at issues. Not all software runs on all for past columns. I have also been flavors of Windows. Any software that busy putting up some interesting you want to continue to use should be new articles on my Web site, so take a checked to make sure it is compatible look. My thanks to the authors I was with the new version of Windows. able to reach. However, they don’t all Windows XP was the first version of answer their e-mail, so I miss posting Windows to address this issue. It has a many very good articles there. feature that attempts to fake out a program so that it thinks it is running Tip: Refreshments at SEMCO meetings under an older version of Windows. are always delicious and require no If you decide to install a new password for access. version of Windows, the next issue is 5 how. Most people discuss two options, An upgrade installation is not but there are actually four ways to run a always an option. It depends on the old new version of Windows on your and new versions of Windows. The rules computer. I will discuss the two for Windows XP are presented later. common options first. Also, you should not do an upgrade A new version of Windows can be installation if the old version of installed as either an upgrade of an older Windows is having problems. If your existing copy of Windows or on a new motivation for a new copy of Windows empty hard disk. An upgrade install is to fix problems with the old version, places the new copy of Windows on then do a clean installation of either top of the old copy. A clean install puts your current version of Windows or a the new copy of Windows on your new version. computer as if the old copy never Further complicating things is the existed. There are pros and cons to each fact that many (most?) copies of approach. Windows that you buy in a retail store Upgrade installation are not designed for a clean install. They Con: You lose the old copy of Windows. are referred to as “upgrade” copies. It is clobbered by the new copy being Upgrade versions of Windows are much installed over it. Should there be any cheaper than “full” versions, but are problems with the new copy of only for people who already own a prior Windows, you can’t fall back to your copy of Windows. For example, the tried and true old copy. Con: Compared upgrade version of Windows XP Home to a clean installation, an upgrade Edition is under $100; the full version install is more likely to cause problems is $200 (as of February 2003). The in the future. It’s complicated, in a upgrade version of Windows XP world where simpler is better. Pro: Your Professional sells for about $200; the existing applications, data and settings full version is about $400. Upgrade remain more or less unchanged. versions of Windows are intended to be Clean installation used to upgrade an old version of Con: You lose not only the old copy of Windows. They require proof of Windows, but everything that was ownership of a previous version of previously on your computer, all your Windows. When you do an upgrade data and all your applications. installation, the proof of ownership Obviously, this requires that you first comes from the old version of Windows back up all your data files. Don’t forget found on your computer. For a clean any files; if you fail to back up a file it installation of an upgrade version, is lost forever. It is easy to forget that you need to provide a CD-ROM from e-mail, or an address book, also needs the earlier version of Windows as proof to be backed up. Pro: From a technical of ownership. Even though you own perspective, a clean installation is a previous version of Windows, simpler and less likely to cause you may not have a CD-ROM to problems in the future compared to provide as proof. Many computer an upgrade installation. Con: It manufacturers stopped providing requires re-installing all applications this years ago. Instead they provide only and customizing things from scratch. a recovery CD-ROM. 6 It is safe to say, that both upgrade generically as partitioning software. installations and clean installations are Among the available software is poor choices. There are two other PartitionMagic from PowerQuest, options that offer none of the downsides Partition Commander from previously mentioned. These next two V Communications, Partition Expert options let you run both the old and the from Acronis, and Partition Manager new version of Windows on the same from Paragon Software. There is also a computer. In effect, you can have your free program, Ranish Partition cake and eat it too. Manager, but the user interface is said The downside to these alternative to be very difficult, and for a job like approaches is that they require some this, it is better to have technical technical skill and additional software. support available. Note that resizing a The third alternative lets you run partition is potentially a dangerous either the old or the new version of thing. Always back up your most Windows, but only one at a time. When important files first and run a full disk the computer starts up (boots) you are check beforehand. presented with a choice of which Also, this approach requires more version of Windows to run. The fourth hard disk space than either a clean alternative, lets you run both the old and install or an upgrade install. After all, new versions of Windows concurrently! two separate and independent versions A Third Alternative (Partitions) of Windows reside on the computer. Be Installing two versions of Windows on sure to check the amount of available one computer is done by giving each space on the hard disk before even its own dedicated partition. The old considering this approach. In general, copy of Windows remains where it is, figure on two gigabytes of disk space but its partition will likely have to be as a minimum amount for installing an shrunk. The new copy of Windows is NT class version of Windows and one installed in a different, and new, gigabyte for a version of Windows in partition. the 9x family. The vast majority of personal It is also possible to add a second computers have a single partition hard disk to a computer and have each whose size is the full size of the hard hard disk dedicated to one version of disk. In this case, this single partition Windows. The advantage to this has to be shrunk and a new partition approach is that it can save the cost of created in the space freed up. partitioning software. In fact, a large This approach is referred to as enough hard disk can be had for roughly “multi-boot,” or “dual-boot,” or the same price as the partitioning “side-by-side” installation. The terms software. Choosing an OS at start-up refer to the fact that you can boot (techie time could be handled by either the new speak for “start up”) either of two version of Windows (if it is an NT versions of Windows. class), the system BIOS, or commercial No version of Windows comes with software such as System Commander software that can non-destructively or Boot Commander. Nonetheless, you resize a partition. This requires a may opt for purchasing partitioning commercial product, known software for reasons explained below. 7 The general approach of having version of Windows, it is very difficult. different versions of Windows installed Finally, one copy of Windows sees the in different partitions can be used with files that constitute the other copy, an any two versions of Windows. If done accident just waiting to happen. correctly, it does not matter which A far better approach is to keep each version of Windows is installed first or copy of Windows totally separate, second. distinct, and unaware of the other copy. The advantages of this are many. This way, a problem in one copy of You can fall back and use the old OS if Windows cannot affect the other one. the new version of Windows causes Also, each copy of Windows can be trouble. You can migrate to the new re-installed, removed, or upgraded with version of Windows gradually rather no effect on the other copy. On their than in a big bang. Software and/or own, the NT class versions of Windows hardware that is not supported in the cannot keep two copies of Windows new version of Windows can be run totally isolated from each other. from the old one. Also, the new version There are also software programs of Windows is installed cleanly, which that manage multiple copies of means it’s less likely to experience Windows on a single computer. The problems. The down side is that it most popular such program is System requires a reasonable amount of Commander from V Communications. technical skill to set up. However, if the It offers a list of operating systems that old version of Windows is from the you can choose from each time you start Windows 9x family, and the new the computer. The software is easier to version is from the Windows NT deal with than the corresponding family, and there is an available empty features in the NT class versions of partition for the new version of Windows. Windows, then the new version of However, multi-boot software such Windows has some crude, but usable as System Commander costs money and features for managing the two versions can be confusing to install. Also, it gets of Windows. in the way of the normal Windows During installation of the new startup process, so if Windows fails to version of Windows, the old version boot, debugging is all the more will be detected. Thereafter, the new difficult. I’m not sure if it can keep each version of Windows offers a list (menu) copy of Windows totally separate. of Windows instances on the computer Total isolation of each copy of Windows at start-up time. You get to choose which requires up-front planning to hide the copy of Windows to run every time the partition with the old version of computer starts up. I am not a big fan Windows. At the time the new version of this approach however. of Windows is installed, the computer For one thing, the description of the thus appears to have an empty hard disk. older version of Windows is sometimes This worked better with the 9x versions wrong. Also, files get installed in the of Windows. and XP partition where the older version of will see the hidden partition at install Windows resides. If the time ever comes time, but they can be directed to ignore that you want to get rid of the old it both at install time and after the fact. 8 You can have total isolation of each support and in cost. Vmware costs $330; OS, a 100% normal boot process (i.e. Virtual PC from Connectix is $230. no multi-boot software), and still run Connectix was acquired by Microsoft either OS. The trick is a program called in March 2003. These products are “pqboot” included with PartitionMagic, installed on the old version of Windows which has to be installed in each copy (know as the host OS), just like any of Windows. The computer will always other software. When you run them boot the last used OS. If this is not the initially, you create a Virtual Machine OS you want to run, pqboot can be run with a virtual hard disk and virtual to shut down the current OS, hide its RAM. You install a new copy of partition, and boot the other OS. There Windows (known as a guest OS) inside are DOS and Windows versions of a Virtual Machine. Virtual machines are pqboot. The DOS version supports logically powered on and off, command line switches. In the best case simulating a real computer. Powering scenario, there can be an icon on the a Virtual Machine on/off is somewhat desktop that invokes the DOS version akin to opening and closing a document of pqboot to shut down the current with a word processing program. version of Windows and start up the There is no limit to the number of other version. This automated OS Virtual Machines you can define and switching requires only that the user use other than the hard disk space on double-click. your computer. The speed of your CPU Data files can be made visible to and the amount of RAM in your each OS by placing them in a logical computer limit the number of Virtual partition within an extended partition. Machines that be run concurrently. Pqboot makes no changes to logical When a Virtual Machine is running, the partitions. Of course, this data partition interface to it is a normal Windows has to be formatted with a file system window, which can be minimized and (FAT16, FAT32, NTFS) supported by maximized. The virtual machine is just both versions of Windows. another running application. You can The Fourth Alternative (Virtual switch between a virtual machine and Machine) other applications in the usual way (task Finally, there is yet another totally bar, alt-Tab, etc). VMware offers a full different approach. Providing the best screen mode; running a virtual machine of all possible worlds, this approach lets in full screen mode makes it look like a you run both the old and the new real computer. version of Windows at the same time. VMware and Virtual PC have You start up Windows, in the same limitations on the versions of Windows manner you start any other application, they can be installed onto and the such as Word or Excel. versions of Windows (and Linux) that This is done using virtual machine can be installed in a virtual machine. In software. Two companies offer this addition, the guest OS may have software for home use, VMware and Connectix inside a virtual machine. Two examples . They of items that cannot be run are BIOS vary in the flavors of Windows they locked copies of Windows and the 9 product activation feature of Article: “How To Troubleshoot Windows XP. Windows XP Problems During One caution with VMware: the Installation When You Upgrade from thirty days of technical support starts or Windows Me.” the day you get the software, whether Note again, these final two Article: “Last Call for Windows XP approaches require a non-trivial amount Upgrades.” PC World magazine, May, of technical expertise. 2002. Tips on how to do an upgrade A Final Word on Windows XP installation of Windows XP. Most likely, the new version of Many programs originally written for Article: “Windows XP Professional , 98 or Me will not run Upgrade Center.” Information from correctly under XP. For the most part, Microsoft on the four steps to the burden of researching this falls to upgrading to Windows XP. you. For every program you care about, Be especially sure to check your Article: “Bugs and Dust Balls: A anti-virus and firewall programs. ‘Clean’ Installation.” The New York As for an upgrade install (XP on top Times, October 24, 2002, by Sarah of an older version of Windows), the Milstein. The horrors of upgrading from Home Edition of XP can be installed Windows 98 to XP. The article contains on top of only Windows 98 and a number of technical mistakes. Windows Me. The Professional Edition Windows 98, Me, NT4 (only SP6), and This article by Michael Horowitz 2000. If you are running Windows 95 is reprinted from: The LangaList. (or 3.1 for that matter) you cannot Michael teaches a class called upgrade to XP; instead you will have Defensive Computing at Hunter to opt for one of the other three College in New York. Meet him at approaches. , or If you are installing XP on top of an check out his class site at older version of Windows, then you can . use a program on the Windows XP There is no restriction against any CD-ROM called the upgrade advisor. non-profit group using the article as It checks for some programs known to long as it is kept in context, with proper be incompatible with Windows XP. You credit given to the author. This article can run it from the XP CD (assuming it is brought to you by the Editorial is the D disk) with D:\i386\winnt32 – Committee of the Association of check upgrade only. This program is Personal Computer User Groups very limited in its scope however. (APCUG), an international The following articles offer some organization of which this group is a advice specific to XP upgrades: member. 10 SPAM—Bane Of The citizens, or received by the “dummy” e-mail addresses created for this Internet purpose. Since many internet users By Ira Wilsker wonder where and how spammers get their e-mail addresses, the FTC found I hate it; I absolutely hate it. I open my that 86% of the e-mail addresses used e-mail in the morning and find up to on their websites and newsgroups were 100 e-mail solicitations offering illegal harvested and resold by spammers. The cable TV descramblers, cheap FTC also tracked the success rate of the prescription drugs without a “remove me” links commonly given by prescription, devices and treatments for spammers, and found that 63% of the “personal enhancement,” university remove requests were not honored. The degrees without attending class, FTC also found substantial voyeuristic opportunities, and the misrepresentation in the sample e-mails infamous offers of easy riches from the analyzed, including false “From:” and family members of deceased Nigerian “Subject:” lines, often clearly intended dictators. I can typically spend over a to trick the recipient into opening the half-hour daily deleting this trash. Most message. Many of those messages (17% of us find the “unsolicited commercial of “Adult” spam with false headers) e-mail” a mere nuisance, but to our would then display pornographic internet service providers it has become images without any regard for the age an expensive proposition to process this or emotional status of the recipient. “spam” e-mail, as it steals internet In the analysis of about 1000 spam bandwidth, hard drive space, and e-mails, the FTC found that 20% of the processor time, with the costs passed e-mails were for what the FTC labeled on to us subscribers. What may even be “Investment or Business Opportunities,” worse is the blatant fraud and criminal including such offers as work-at-home, solicitations that many of us franchise opportunities, chain letters, experience. and other non-securities offers. “Adult” According to a report released by spam, consisting mostly of pornography the Federal Trade Commission on April and dating services, accounted for 18% 30, 2003 , much of the consisting of credit card offers, spam mail we receive contains false mortgage refinancing, cheap insurance, claims as well as other deceptive, and and other related items comprised 17% probably illegal, content. To determine of spam. Close behind were “Products the degree of proliferation and and Services” (16%). “Health” related deception in spam, the FTC created spam, offering dietary supplements, what appeared to be private websites disease prevention, and physical containing unique e-mail addresses only enhancement (mostly sexual in nature) used on those sites, and posted material accounted for 10% of all spam. Only in popular newsgroups and chat areas, 7% of the spam was for computer or again using unique e-mail addresses. Internet related equipment or services. During the collection phase, over It should be noted that all of this spam 11,000,000 spam e-mails were sent by received by the FTC was indeed 11 unsolicited, and not in response to an “Investment or Business Opportunities,” inquiry made by FTC staffers, even a full 90% contained false information, though many of the e-mails claimed while 49% of the “Health” spams had (falsely) to be a reply to an inquiry, or falsehoods. 47% of the travel and the result of signing up for an “opt-in” leisure related spams contained false service. information. Considering the “From:,” The FTC also investigated the “Subject:,” and body of the spam mail, accuracy of the e-mail headers, and the cumulative number of false e-mails found that one-third of all spam mail rises to 66%, with 96% of all had false “From:” lines in an attempt to “Investment or Business Opportunities” disguise the source of the e-mail. containing misinformation. Again, it Almost half (46%) of the spams with amazes me that so many Internet users false “From:” lines appeared to be from are gullible and fall for these an acquaintance of the recipient, deceptions. Despite some states apparently to trick the recipient into requiring commercial e-mail to opening the message. Another 13% of contain the prefix “ADV” in the these e-mails appeared to come from subject line, only 2% of all spam an established business relationship, and complied. 14% had blank sources. Some Then there are the chain letters, spammers (3%) try to trick the re- which often claim to be legal, even to cipient into opening the messages by the point of being endorsed by showing that the message appeared to government agencies. According to be from the recipient himself! the FTC, “Nothing is further from The “Subject:” line of spam was the truth.” only slightly less deceptive, with 22% It may get worse—spammers are of spams containing false subject lines, now targeting our cell phones, and most and with one-third of those having a of us pay to receive text messages, stated subject totally unrelated to the shifting the cost of spam almost totally content of the message. 42% of these to us, the recipients. false subject lines alleged to show some There is no restriction against any existing business or personal non-profit group using this article as relationship with the recipient. long as it is kept in context, with proper Cumulatively, 44% of all spam mail credit given to the author. This article had false “From:” and/or “Subject:” is brought to you by the Editorial lines. Personally, I do not understand Committee of the Association of how anyone could transact business, Personal Computer User Groups including possibly sending credit card (APCUG), an international information, to an unknown individual organization of which this group is a who is lying about his true identity; that member. is a real setup for fraud and loss. The body of the message also often Tip: contained deceptive information, with When an electrical storm approaches, 40% of all spam mail containing one or don’t trust your $49 surge protector; more falsehoods in the content of the pull the power plug AND the phone message; of those messages touting connector. 12 LCD Monitors other glass layer, with the liquid crystal By Tom Zinneman cells sandwiched between them. Each intersection constitutes a single pixel Liquid crystal displays (LCDs) have that can either pass or block light, been around since the early 1970s. depending on the amount of charge. For They are found in many consumer color screens, a single color pixel is applications, such as appliances composed of three individual liquid (microwave ovens, stoves, etc.), crystal cells. Because the individual calculators, laptop computers, charges must be continually refreshed, telephones, and watches. They are now passive displays suffer from slow being used in full-size monitors that response times and low brightness and will, as their cost decreases, gradually contrast. There are some new passive replace the cathode ray tube (CRT) technologies, CSTN (color super-twist monitors that most of us use with our nemantic) and DSTN (double-layer desktop computers. super-twist nematic), which have CRT monitors use beams of improved response times and generate electrons striking a phosphorescent brighter screens with more contrast. material coated on glass to generate Active screens, also known as TFT images. LCD monitors use electric (twisted film transistor), use transistors charge to excite liquid crystal cells and capacitors to control the charge on suspended between layers of glass. each liquid crystal cell. Tiny transistors These cells either block or transmit the and capacitors are etched onto the glass light to create a viewable image. substrate at the intersection of each row The LCD screen for a laptop or and column. Color displays require an desktop is composed of several layers enormous number of transistors. For of different materials. A fluorescent example, a color display with a light source, known as a backlight, is resolution of 1,024 by 768 pixels on one end. The light from this source requires 2,359,296 transistors (1024 passes through a layer of polarized columns x 768 rows x 3 cells) etched glass. The polarized light then passes onto the glass. This technology provides through thousands of liquid crystal cells fast response times and much brighter arrayed in rows across the screen. This and higher contrast images. However, liquid crystal layer is followed by because of their complexity, they are another layer of polarized glass, then also more expensive to produce. by a protective covering. If the screen Practically all notebook displays and is to be color, a layer of red, green, and LCD monitors now on the market use blue filters is placed between the crystal TFT technology. layer and the second layer of LCD monitors offer a number of polarized glass. advantages over CRT monitors, as well There are two types of LCD screens as some shortcomings. LCD monitors used in computers: passive and active. take up less space, weigh less, and Passive screens use a grid of horizontal consume less power than their CRT and vertical wires to apply charge. The counterparts. Let’s compare a 15-inch horizontal grid is attached to one of the (diagonal) LCD monitor with a 17-inch glass layers and the vertical grid to the CRT monitor. Remember that a 17-inch 13 CRT only has a 15.6 to 16-inch monitor is a digital device, it contains viewable area, so its viewable image is circuitry to convert the analog data back only slightly larger then that of a into digital data. This double conversion 15-inch LCD. An LCD monitor is about tends to degrade the quality of the image one-third the size of the CRT monitor. that is displayed. Older LCD monitors Its depth is typically 7 inches versus 17 sometimes had trouble synchronizing inches for a CRT. A typical LCD unit with the analog signals, resulting in weighs 12 pounds versus 40 pounds for pixel jitter. Tweaking the settings and/or the CRT unit. It consumes only 30 watts working with the drivers was required of power compared to about 110 watts to get a stable image. Many of the newer for an equivalent CRT. Another monitors are provided with a single advantage of LCD monitors, unlike button on the front panel that lets their CRT counterparts, is that they do the user initiate an automatic not emit electromagnetic radiation. synchronization process that eliminates An important issue with LCD pixel jitter. monitors is resolution. CRT monitors Newer LCD monitors may be are usually capable of displaying provided with a digital connector and multiple resolutions. LCD monitors, cable that interfaces to a graphics board however, usually work well in only one that provides a digital output. This resolution, known as their native digital output usually conforms to the resolution. Other resolutions can Digital Visual Interface (DVI) standard usually be displayed, but either the promoted by the Digital Display image may not be full-screen or the Working Group (see ). image quality may be poor. The The DVI standard can accommodate industry-standard 15-inch LCD monitor both analog and digital interfaces usually has a native resolution of 1024 with a single connector, although there x 768 pixels. are actually three different Another area in which LCD configurations. One is DVI-A, which monitors still trail CRTs is the display is for analog-only connections; a second of moving images. LCD displays have is DVI-D, which is for digital a slower response time than CRTs. This connections; and the third is DVI-I (for delay (or latency) may cause images integrated), which can handle either from a video or animated game to blur analog or digital signals. or lose detail. LCD monitors also have Some other features to be a smaller viewing angle than CRT considered when selecting an LCD monitors. A CRT screen can be viewed monitor are brightness and contrast. from a wide angle, whereas the LCD Brightness of LCD screens, also known screen must be viewed from the front. as luminance, is measured in nits Until recently, most desktop LCD (candelas per meter squared). Newer monitors were built to handle only monitors have a maximum brightness analog inputs. The reason for this is that that can range from 100 to 250 nits. The most standard graphics boards in your higher the nits, the brighter the display. computer convert information to be The contrast ratio is the ratio between displayed to the analog form required the average brightness for white and by CRT monitors. Since the LCD black areas on the screen. These ratios 14 typically vary from 150 to more than we would use the up and down arrow 300. The higher the number, the better keys to go to the end of the block. the image. Again we would press ctrl-b to define Following are some web sites of the end of the block. Eventually manufacturers that produce LCD someone, who is long forgotten, monitors: highlighted the area from the Eizo Nanao Technologies beginning to the end of the block and told us the text was now selected, not IBM blocked. Unblocking was done with ctrl-o, Samsung Electronics which today will help you open a file. Ctrl-b now causes selected text to Sony Electronics become bold; in those dark days before the rodent invaded, I can’t remember Viewsonic having bold type at all. . Then, while the text was blocked or The February 6, 2001 issue of PC selected, we pressed ctrl-x for cut or Magazine has a good article in which ctrl-c for copy followed by using the up 13 leading 15-inch LCD monitors were and down arrow keys to point to the evaluated and compared. place where we wanted the text inserted. Tom Zinneman is a member of the Then press ctrl-v for paste. Ctrl-x, Charlotte County Computer Group ctrl-c, and ctrl-v still exist and are used Corp. in Port Charlottte, Florida by only the oldest among us. . If you When the rodent arrived and we have any questions or comments, plugged its tail into the PC, many contact him at . advances came. The menu bar was enhanced with buttons, and then the tool bar was added. Most application programs added rodent buttons for cut, Right Click copy, and paste. With the index-finger pressing on the rodent’s hind quarter, Try It—You May Like It selecting text was easier, and Les J. Kizer highlighting also. Moving the rodent to the cut or copy button, followed by a My friends, there was a time long ago. flick of the index finger gave the It was way back in the early age as command to be. Then slide the computer time is told. Even some of us somewhat tamed rodent to the location old folks find it hard to recall; however, of the insert, a quick flick, and then you know, for the children’s sake we back to the paste button for another need to remember history. It was a time flick of the index finger. Progress! Ease before the ascent of the rodent. of Use! Fabulous! And rodents become In those prehistoric PC days, when famous, heralded throughout the land. we copied text from one place to That, though, is not the end of the another, we blocked the beginning of rodent’s march to fame. For all this the copy or item by pressing ctrl-b. Then fame was obtained by pressing the 15 rodent with only the left or index Hunt For The Lost Font finger. What about pressing the rodent’s By Mick Topping other hind quarter? Silently, with great stealth, Springfield, Missouri User someone slipped in something new. It Groups was done so quietly and without a fanfare, so that we are not even sure Did you ever lose a font? A year or so when it began to happen. It is called ago I made up and printed a sheet of simply: right-click, as opposed to click. business cards that I was happy with. Now we can select the text we want Last week, I gave away my last one. (I to cut or copy. Then without an go through about one card a month.) arduous effort of guiding the rodent to When I opened the business card again the menu or tool bar, we simply (in Corel Draw-7), it complained that it right-click. Voila! A menu pops up on could not find the font Andy Bold, and the spot giving us likely choices upon asked which font to substitute. which to flick our index finger. Move Let me mention that I am not much the rodent to the insert point, and of a font person. I usually couldn’t care right-click again. The same or a less about which font to use. I am an modified menu pops up for us to flick engineer, more interested in the our choice. Neat, and so effortless. meaning of the words than in how they Today, we can right-click almost are drawn. Arial, Courier, and Times anything—desktop, icons, menu bars— New Roman are about all I ever use. or anywhere, and a small menu pops up But for my business card, I wanted containing the choices we are most something to reflect my casual likely to flick. Such is the added insouciance, and convey the fact that I triumph of the rodent and right-click. have a passion for informality, and that Is there any end to what we can I am really not looking for work. Since accomplish simply by flicking a rodent’s I had put a good 10-15 minutes into the hind quarter—one side or the other? original font selection, I was somewhat Long live the rodent! concerned, and more than somewhat Les Kizer is a member of the irritated, that it was no longer available. Greater Tampa Bay PC User Group So, I decided to hunt the critter down. and the Mid-Hudson Computer User First, I looked for “Andy” in every Group. You can reach him at font folder on 3 computers. (I couldn’t . remember which machine I had used to There is no restriction against any print the cards.) Nothing like Andy Bold non-profit group using this article as anywhere. Then I remembered, long as it is kept in context, with proper Windows applications (for the most credit given to the author. This article part) keep their fonts in the is brought to you by the Editorial C:\Windows\Fonts folder, and most Committee of the Association of applications just reach into this folder Personal Computer User Groups to use a font. And applications rarely (APCUG), an international delete their fonts when they are organization of which this group is a uninstalled. So any font that was ever member. put on a computer is likely still there, 16 unless major surgery has been done. find which applications came with This fact pointed to my laptop which fonts. computer as the culprit, as I had A quick lookup, and there was what recently done a clean-install of I needed. Andy Bold is distributed with Windows XP, whereas the other Microsoft Home Publisher, part of the computers had been little changed over never used software that had come with the year. Regular experimentation had my laptop. A quick dig through my caused numerous apps to be installed stack of CD-ROMs, and there it was, in on the laptop. Then, when the new the MHP\Fonts folder, an icon labeled version of Windows was installed, only AndyB.ttf. I drag it over to my those apps still needed were re-installed. Windows\Fonts folder, and it But which of those non-reinstalled automatically installs, and I can now applications came with the Andy Bold print my cards like I want them. font? First a web-search on “lost font.” Unfortunately, I have a 2-year supply Wow, I am not the only one who has of them done with the other font. lost a font. Over 300 web pages Anyone want a card? Aw come on— containing “lost font,” none of which please take a card. was very promising. Many of the links There is no restriction against any were inactive, and advertising non-profit group using the article as overwhelmed others, and I was getting long as it is kept in context, with proper nowhere. Another search on “Andy credit given to the author. This article Bold;” only a few hits this time, and is brought to you by the Editorial here was a “Bulkley Valley Christian” Committee of the Association of school web page with a note that to Personal Computer User Groups appreciate the page you needed to have (APCUG), an international Andy Bold installed on your computer. organization of which this group is a And there was a link promising to let member. me download AndyB.ttf! Unfortunately, it was another broken link. Most likely, someone had remembered that the fonts are copyrighted, and shouldn’t be downloaded. A Windows Tip In frustration, I finally gave-up, and From Elliott Chandler printed two new sheets of business SEMCO Member cards in Balloon… or Plump, or Poster One great feature of Windows is that Boldoni, not sure which. Of course, the there is more than one way to do almost new cards were not out of the printer everything. That is true of Copy when I had another thought—maybe and Paste, which works almost someone at Microsoft had considered anywhere. Suppose you wish to copy this problem. Sure enough they had. It some information, but you don’t see is not easy to find, but once you know an Edit menu. Use keyboard shortcuts where to look, there it is at . That site has a a “copy,” and the Control-v key search engine that will allow you to combination does a “paste.” 17 Natural Mousing: benefit users with computer-related arm or hand problems. Vertical Mouse Optical Once I was comfortable with the A Review mouse’s position, motion, and basic By Linda Webb functionality, I installed the included driver. A vertical mouse icon was added Imagine you’re about to extend your to my task bar, and several new tabs arm in a handshake. Next, take that were added to my already-installed same position, and place your hand mouse properties. I could then program around the new Vertical Mouse Optical the remaining two physical buttons and from Evoluent while you’re working at wheel button, adding the use of three your computer. Feel the difference! additional programmable buttons for Instead of an unnatural, palm-down often-used functions such as clicking position, you use this mouse in a “Enter” or “Back.” The Vertical Mouse neutral, handshake position. Evoluent, is supported for Windows 95 through a startup company in California, has XP. However, Windows 95 and NT taken a traditional mouse, rotated it users get only two-button and 90 degrees, and added optics to scroll-wheel functionality. MAC is also produce an exciting new pointing supported. A CD-Rom disc containing device that addresses a long-term a six-page user guide in PDF format computing ergonomics need as well as and all hardware drivers as well as a one that should offer increased overall USB to PS/2 converter are included in mousing comfort for many users. the box. The initial version of the To test the functionality of the Ver- mouse is designed for right-hand tical Mouse out of the box with my PC, users; lefties will have to look forward I plugged it into a USB port and to a future model. Hopefully we’ll immediately had two-button and also see wireless and smaller versions scroll-wheel functionality. The mouse for road warriors in future editions as had a solid feel, with a wide, stable base well. The Vertical Mouse can be and a “soft-touch” thumb rest, allowing ordered at ; it sells me to wrap my hand comfortably for $49.95. If you suffer from any around it. I compared this to the computer-related arm or hand injuries palm-down, traditional, 2-button mouse or if you’re simply looking for a more position, noting that on the traditional comfortable mouse “ride,”consider mouse, my thumb and pinky were theEvoluentVerticalMouse. spread around the sides of the old mouse without a real resting place. Back to the Sony Digital Camera Vertical Mouse, I had no trouble reaching any of the buttons; they are A Review all located in traditional mouse po- By Bill Moeller sitions. My hand fit the mouse comfortably, as should larger or smaller With 5 megapixel resolution, Zeiss hand sizes. I noted that while I could optics, and Sony electronics, the 2003 reach and press all the buttons, making Sony DSC-F717 camera delivers very the left button easier to press might impressive images up to full page 18 (8-1/2x11) when printed on a photo right hand. “Almost,” because the LCD quality printer. (Impressive enough that surface falls under the greasy heel of my I am retiring my 35mm film cameras.) thumb, creating a cleanliness problem. It can be used in full automatic The zoom is very easy to use, and mode, full manual mode, or anywhere coupled with the wysiwig viewfinder in between. The point-and-shoot results in tightly composed exposures photographer will find the full requiring no cropping, and therefore no automatic mode, as well as some of the effective loss of resolution.The preprogrammed settings for subjects like exposures are good enough that few landscapes and portraits, easy to use and require manipulation before printing, capable of delivering great photographs. and those that do only need simple The serious photographer will appreciate adjustments using the histogram tool. the ability to take full control of just This also helps avoid loss of resolution. about anything he wants to in order to While the LCD display is next to adapt to different conditions or get just useless outdoors in bright light, exactly what he wants. nothing is lost when you switch to the The zoom lens has a range, in 35mm eye-level finder, which is usable equivalent terms, of 38 to 190mm, an outdoors thanks to the well designed aperture range of f/2.0 to f /8.0, and is eyecup and the brightness control. On threaded to receive 58mm filters.The the other hand, the LCD display is selectable light sensitivity is equivalent absolutely great for indoor sports to a range of ISO film speeds from 100 action. It is much easier to follow fast to 800. Maximum image resolution is action with the camera held at arm’s 1920x2560 pixels. Image storage mode length with one eye on the actual scene choices are tiff, fine jpeg, or standard and the other on the LCD than it is jpeg. Exposure mode choices are full trying to use the eye-level finder. automatic, programmed, shutter speed As with all pop-up flash units, red priority, aperture priority, full manual, eye can be a problem even with the or scene selection. The eye-level preflash. My solution for this is the viewfinder is digital, not optical, and available accessory flash, which stands has brightness control and diopter well above the axis of the lens, correction.The LCD screen on the integrates fully with the camera’s camera back measures about automatic features, and can be used in 1-7/16x1-1/8, and also has a the bounce mode if that is what you like. brightness control.There is a built in Downloading to the PC is as simple pop up flash, and focus is automatic. as plugging in the supplied USB cable; Power is provided by a rechargeable it all just happens, automatically. And lithium-ion battery pack. when the battery runs down, which you I like the way this camera fits into can see coming because of the camera’s my hands. For me, holding a camera with displays, you simply connect the two hands is a commandment, and this camera to a 120V AC source, using the one responds well to that command. The supplied adapter, and wait for the good-sized zoom lens cradles naturally in indicator light to tell you all is well. my left hand while the somewhat small The camera is accompanied by a (for me) body almost fits nicely into my very comprehensive and well written 19 123 page manual. But be aware that this the other is through POTS (Plain Old is a camera manual, and not a book of Telephone System) connections, called tips on how to take photographs. ADSL (Asymmetric Digital Subscriber At about $800, this camera is a bit Line). Both utilize frequency spectrum expensive for those who want only capability not normally available for point-and-shoot, but highly competitive the intended communication medium. with comparable 35mm equipment for In the case of direct cable, the frequency those who want more creative control. spectrum at the upper (in excess of 20 It is easy to use, but very powerful. Mbps for downstream signals) and Image quality is the equal of 35mm at lower (in excess of 2 Mbps for print sizes up to 8x10 or so. More and upstream signals) end of the cable is better and cheaper will come along, but available for data. This is in addition to for those who choose to act now this the cable TV signals that may be camera deserves serious consideration. transmitted. Bottom line: a joy to use and a topnotch The ADSL service furnished photographic performer. through the telephone system also uses frequency spectrum previously not used in the last 18,000 feet of the copper Network Basics And twisted pair POTS communication Broadband Routers system. It’s not completely true that this frequency spectrum has not been By John Woody and used, in that, the TELCO had Michael Espinoza previously used it for home and This is a look into the Small Office, business security dialing at a much Home Office network basics. It will cheaper cost than broadband would begin how-to coverage concerning that demand. The POTS phone line class of routers known as broadband continues to function for telephone, routers. This class of routers has fax, or analog data communication been developed to handle low as before. end broadband communication What does this have to do with connections; this is at the low end of broadband routers, you ask? Well, for the digital communications techniques. starters, with home and small business Broadband communication provides connections having this much (1100 to connections in the 1100 to 1500 Kbps 1500 Kbps) bandwidth, more than one range downstream and 200 to 400 Kbps computer may be setup to be on-line at upstream, in general terms. These the same time. The best way to connections are direct connections; i.e., accomplish this is to establish a they are on all the time as opposed to network for the computers and to analog and ISDN dial-up. A direct install a router to handle the connection, as has often been noted, connection. The routers for this task can be a security concern. are called broadband DSL/Cable Broadband connections can be routers, as noted above. Most of these provided via two distinct technical routers have one or more, usually four, methods. One method is through the ports in a switch arranged to act as a television cable, called direct cable, and smart hub in the network. One or more 20 computers can be connected to the In the case of the DSL connection, router through the switch ports. The the ADSL functions are turned on at router then acts to keep the connection the TELCO CO (Central Office). A with the broadband modem, DSL regular POTS phone line is used as the or cable. carrier. There is a physical limit to this Broadband service—DSL or Cable service. The user’s copper twisted phone A brief description of broadband line must be within 18,000 feet of the service, DSL or cable, includes the CO to maintain data signal strength. ability to provide a direct connection SW Bell actually requires that the to the Internet. And, it goes without service be within 17,500 feet. The saying that either technique is much TELCO can determine if a user is within faster than analog dial-up Internet the required copper distance during the access. A general description of the phone call for service startup. As above, physical connection for each broadband a DSL modem is attached to the demark technique follows. However, each router line connection. The TELCO, SW Bell may have its own install quirks that in San Antonio, provides line filters for must be attended to from the the analog side of the phone line. The instructions provided by the vendor. DSL modem is then either connected In the case of direct cable, a splitter directly to an NIC within a single is installed to tap the data signal off of computer or to the uplink in a hub or the TV signal. The cable company switch in a network. This cable is provides their signal through a series provided by the modem vendor and is of subnetworks within their cable a CAT 5 cross-over RJ45 cable. Again, infrastructure. These subnets each at this point, a broadband router can be service about 250 to 400 customers. installed in the network matrix. The Each subnetwork provides adequate TV cross-over cable is plugged into the and data signals through the COAX router WAN port. The computers are cable to provide both TV and data. The plugged into the router switch ports via data COAX is split and run within the RJ 45 CAT 5 jumper cables. home or business to a demark wall plug. As can be noted, the physical A COAX jumper cable connects the connection of the broadband router into demark cable with a broadband cable the network is fairly simple. The router modem. The cable modem is then becomes another node on the local either connected directly to a NIC network. It’s function is to know where (Network Interface Card) within a to connect to in the next stage upstream single computer or to the uplink in a from the network. Routers are hub or switch in a network. This cable specialized computers that send data is provided by the modem vendor and along to it’s final destination by is a CAT 5 cross-over RJ45 cable. This knowing who is at the other end of it’s is the point at which a broadband router connection between networks. Routers comes into the picture. The cross-over work between networks. Routers know cable is plugged into the router WAN where to send data by maintaining (Wide Area Network) port. The configuration tables of the connections computers are plugged into the router inside and outside their network to other switch ports via RJ 45 CAT 5 cables. networks. The configuration table 21 maintains the addresses of each node There are three choices: Dynamic, inside the network and the addresses of Fixed, and PPPoE. Dynamic WAN other networks that it is directly means that the ISP will dynamically connected to. An example for my assign the IP connecting address. There broadband router is that it knows the are not enough IP addresses to cover all addresses of the hosts in it’s network the users in a subnetwork by the ISPs. by their IP addresses, and, the address By dynamically assigning these IP of the next level up, either satx.rr.com, addresses, the ISP can have many users for Time Warner Roadrunner, or in the system just like the analog sbcglobal.net for SW Bell. dial-up providers do. It is also a I need to make one point about these security feature as well. Fixed WAN routers. Broadband routers are simple means that the ISP provides an Internet computers with a need for only limited routable IP address. PPPoE WAN knowledge about the inside and outside means that the router will be connected of the networks it services. The Internet to a VPN (Virtual Private Network) for Domain Name Server routers in the secure communication. The only other backbone have massive address list entry in the quick setup is to assign the configuration tables to keep track of. DOMAIN of the ISP so that the router All routers work within the TCP/IP knows where to send its data. This protocol standards. Routers have two Addtron router is working through my separate, but related jobs. First, they Roadrunner connection at this time. make sure that user data does not go Most of these routers have advanced where it should not go. This is crucial setup steps as well. The primary setup for keeping volumes of data from to be concerned with is the DHCP clogging the connections of bystanders. (Dynamic Host Configuration Second, the router makes sure that Protocol) built into the router. This information does go to the proper function allows the user to set up the destination address. internal network as a TCP/IP Broadband Router Configuration addressing scheme. The usual DHCP In general, nearly all of this class of addressing scheme installed in the routers are set up by using a browser to router is a Class C IP addressing set, log-on the router Web page using an normally 192.168.1.1. With the DHCP Internet protocol address pre-set into function turned on, each computer NIC the router. Most are set with one of the in the network can be set to receive it’s Class C non-routable IP addresses, IP address dynamically. Windows 95/ 192.168.X.X, with a submask of 98/Me, Windows 2000, and Windows 255.255.255.0. This allows up to 256 XP all are ready to receive the IP users on one transmittable IP address. address dynamically. The router The general settings that must be set up controls the IP addressing to each in the router Web page, are made using computer and handles the NAT (Net- one’s browser. work Address Translation) between it Most of these broadband routers and the ISP IP address. NAT, by the have a quick setup page. In the Addtron way, is a basic line of defense against ADR-200 router I am now testing, the hackers. The 192.168.X.X IP quick setup asked for the WAN IP setup. addressing scheme is also non-routable 22 to the outside world. DHCP functions individual and SOHO users. And, they in the router are setup via the router are not hard to setup. Web page setup scheme. John Woody and Michael Espinoza Broadband Routers On The Market are both on the Board of Directors of These routers are shelf items at the Alamo PC Organization in San computer stores. They can be obtained Antonio, Texas, and they serve as from catalog vendors, local computer co-chairs of the PDA SIG. stores, and wholesalers. Their cost is John is a generally from $59 to $300. Keep in networking communications mind that you get what you pay for. consultant specializing in small The lower end routers do not have as office/home office networks, training many functions as the upper end setup, and internet connectivity. models. I recommend that one pay for Michael the upper end models in order to gain is owner of Technology Coaching, a the security from hackers. training and consulting firm that Vendors include Linksys, $93 to specializes in the PDA market. $159; Addtron Technology, $98 to $120; Multitech, $275 to $500; What Is A CPU Sonicwall Tele2, $529 to $4,150; Zoom; SMC Networks, $109 to $259; Farallon, By Lee Alexander $109 to $264; Xsense, $94 to $279; Macon Users Group Netgear, $259; Watchguard, $359 to The core of a PC is its CPU (Central $1,999; Asante, $145 to $329; Cisco, Processing Unit). It is an IC $1,139 to $2,319; and Netopia, $309 to (Integrated Circuit) of tiny transistors $639. One’s pocketbook and sense of arranged in logic gates to perform the security should determine one’s router Boolean operations that carry out the of choice. instructions of the software code. I have installed Linksys, Addtron, Popularly, the type of the PC is and Multitech broadband routers. identified by the CPU’s development. A Each presented it’s own quirks in 386 PC meant the CPU was an 80386 installation. None was hard to do. unit. The next progression was the I personally like the Multitech line 80486, and Intel dropped the five because I get good Customer Service digit numerical designation with its help and a lifetime warranty. The Pentium (5- series) chip. Addtron router is a good shelf product IC’s are fabricated by a complex and has a good warranty. process involving photolithography and Conclusion the doping (adding positive and Broadband Internet connections provide negative materials) of a thin, single each of us the ability to have high speed crystal, silicon wafer. The generations connections to the Internet. Adding a of the CPU are astounding in their broadband router into the mix allows growth parameters. The aforementioned individuals and SOHO users the ability 80286, in 1982, was comprised of to set up and operate networks at home 134,000 transistors using 1.5 micron or in the small business. This class of technology. The 1.5 microns refers to routers is within the price range of the smallest line width of the process. 23 A micron is one millionth of a meter memory within the CPU. They hold the (0.000001 m), equivalent to 0.000004 temporary data for the internal inches. A human hair is about 0.002 workings of the CPU. This allows for a inches thick; one hair would cover 2000 much faster operation than looking up side-by-side lines. Jumping ahead to an address of main RAM and fetching 1993, Intel’s Pentium CPU contained its contents. 3.1 million transistors and used 0.8 Transistor—in the case of the most micron lines. The present top Pentium, common FET’s (Field Effect Transistors), the P4, has 55 million transistors and three elements comprise the solid state employs 0.13 micron technology and switch: the Source, the Drain, and the runs at just over 3 GHz (Gigahertz). Gate. The signal to the gate toggles the What’s inside and what does it do? device on/off (open/closed). Address—a number used within the ALU (Arithmetic Logic Unit)—the CPU to locate a specific piece of data. area in the CPU where arithmetic (!) Often used in place of the actual value, and Boolean logic operations are it can be more compact and act quicker. carried out; such as incrementing a Bus—an arrangement of conductors counter or summing values. The to carry data between logical units in intermediate results are kept in registers. the CPU. Buses are specified in terms Control Unit – implements the four of bit-width, the number of bits basic steps for an instruction: transmitted simultaneously. Intel’s 1. Fetch—sending the address of buses are 32 bits wide. the next word in the instruction over Cache Memory—there are two the address bus and placing the value in types: L1 (primary) resides on the CPU the proper register. chip and is much faster than the 2. Decode—transferring the data to off-chip L2 in the Pentium II and III the Decoder where the machine CPU’s. The latest P4 PGA (Pin Grid language is translated into binary code. Array) has the L2 cache on-chip but in 3. Execute—performing the math a separate location for efficiency. and logic that controls the data flow. Clock Speed—the frequency of 4. Store—recording the results in cycles performed by the CPU in the the correct registers. tick of the clock on the mother board. FPU (Floating Point Unit)—the Noted in MHz or GHz , it is not always a ALU can only perform integer math, direct indication of performance. using whole numbers. Some Logic Gate—a circuit of transistors applications, notably CAD and other that outputs a signal (data) depending graphic intensive programs (games) upon the data input. Gates come in a require fractional values. Prior to the variety of configurations: AND, OR, 486 family, this was a separate chip on NAND (not AND), and NOR. the mother board. Basically, the computer sees the output Instruction Set—machine language as TRUE or FALSE. code stored permanently within the RAM—not part of the CPU. It is CPU. It comes in two flavors: CISC the destination for the instructions and (Complex Instruction Set Computer) data from the CPU. and RISC (Reduced Instruction Set Registers—small elements of Computer). RISC has fewer commands, 24 and they are all the same word length Instruction cache, it finds none and goes for faster operations, but require more on to main memory. The OS sends the transmissions. Intel CPUs use CISC. Prefetch the collected data of eight Prefetch unit—a small core of letters and a command to compile memory holds the next instruction and (translate) and compare the data with a compares it to the contents of the cache known stored value. The new instruction, and CPU’s main memory. This occurs addresses, and data are sent to the while the Decode and Execute units go Decode unit where it again converted about their tasks. to binary code. All this is now passed Let’s follow some action on your on to the ALU for processing. The PC. Suppose you reach a point where Control unit sends the first letter of the the OS () requests a stored password (in the OS) as binary password, and you have previously set code along with the address of your the PW to AardVark. Hitting the A on first typed letter, which has been stored the keyboard sends the data through in the Data cache. The ALU runs a RAM to the processor. As this is not an Boolean compare on each bit of the instruction, the CPU recognizes it as binary code for the first letter. The data but does not know what to do with result, a TRUE or FALSE, is stored in it. It therefore sends the data to the a memory register until the comparison Prefetch unit, where it joins the line of is complete for each character. pending data/instructions. The Prefetch A parallel “computation” has found unit scans the CPU’s main memory for an instruction in the main memory to an instruction, wherein the software tells provide access if the information from the Prefetch to send the code via the the Prefetch unit, the Instruction cache, data bus to the instruction cache. There and the Decode unit all result in a final it is assigned an address for future use. condition of TRUE from the ALU. Now The Prefetch unit then sends the you can proceed—or gracefully quit. address and the data code to the For a more detailed view of CPUs Decode unit. The Decode unit and their features, you can visit translates the data, the instruction with and scroll down to it, and its address into binary code. The Comparison: CPU Road Map. translated information is then sent to the Control unit, which is told to store the data in the Data cache and wait for Ultimate Backup—Part 2 further instructions. Almost Multiple Removeable simultaneously, the letter A appears Hard Drives on your monitor (due to the built in instructions) via the Data bus. The By Warner Mach process is repeated for the remaining SEMCO Member seven letters of your password. A year ago I had two machines When you hit Enter, a new custom built. One was for my mom, and procedure begins. The BIOS (Basic one was for me. The machines were the Input/Output System) runs the same, each having two removeable hard command to read through the Data bus drives. The primary concern in the case to the Prefetch unit. Checking the of my mom’s machine was ease of 25 recovery in case of a problem. The commercial interests want you to view concerns in the case of my machine the operating system and the hardware were ease of recovery and the ability to as being ‘wedded’ together. use different operating systems. In the Disadvantages of multiple June issue of the DATA BUS is an removeable hard drives: article describing my successful (1) Makes machine somewhat experience in the case of my mom’s heavier. machine. (2) Somewhat expensive to buy It is amazing to me that it is separate disks. necessary to have a machine like this (3) You may have to check with custom built. Why don’t we see such Microsoft on how many copies you are machines at Comp USA or Best Buy? allowed to have. Corporate server experts regularly use Considerations: machines like this. I was telling the (1) Linux: You have to spcify LILO server guy at work about my machine, boot system rather than GRUB (GRUB and he said, “Yea, I have a machine like is the default for Red Had 8.0); that to test out new stuff!” In my view, otherwise the Ghosted clone will not it is even more important for individual boot. users to have such a simple backup (2) XP Ghost cloning is very fast system. (around four minutes). Linux is longer Advantages of multiple removeable (around 15 to 20 minutes). hard drives: (3) Set up some kind of labeling (1) You can backup to another system. I purchased some 4"x2" physical disk and remove the clone removeable labels to put on the bottom from the machine. Recovery consists of the inner drawers. in switching the problem disk with the (4) You have to ‘freeze’ the good disk. hardware when you are ready to go. Get (2) You can have special disks for the number of internal drawers and special purposes; for example, for disks that you will need at the time of games or for digital photography. purchase. If you go back to get more Games seem to frequently interfere with you will discover that technology has other programs. In the case of digital moved on. photography you generally have to (5) Be aware of master/slave install a system from a CD-ROM. jumpering on the drive. Your machine Every time you want to use a new should be set up to be all master. digital camera the system that comes (6) Ghost 2002 or 2003 is required with it wants to take over certain image for XP. Ghost 2003 is easier to work designations (like .jpg or .mpg). with; you don’t have to capture and type (3) You can use different operating a long ID sequence. systems (98, XP, Linux). (7) You want to use a boot diskette (4) You don’t have to be afraid to for cloning. As far as I know, you have do dangerous experiments. to load Ghost on a ‘windoze’ machine It is actually a sort of paradigm shift before creating a diskette. to separate the hardware and operating (8) Be sure that inner drawer is system in your mind. I believe that firmly pushed into connector and the 26 key is locked when attempting cloning Security Testing Online or booting. Successes: Fraud Or Not? My major project was a success. I can By Greg West clone XP and Linux (Red Hat version 8.0) and back up disks using Recently, while researching material, I Norton Ghost. came across an article which discussed Failures: “Spring Cleanup” and computer (1) Because of differences in disks maintenance. The first suggestion was (all Maxtor): (i) I could not use 7200 to run your computer through an online RPM (Ultra ATA/133) disks in place of test to see whether your system is secure 5400 RPM (Ultra ATA/100). The 7200 or insecure. The current warnings of RPM clone would boot and do simple updating patches, Spam attacks, and things, but I could no longer get the overall computer safety, prompted me DVD drive to work. (ii) I could not use to say “why not,” as I clicked into the 5400 RPM 19 GB ‘Ultra DMA’ hard “NanoProbe Technology Internet drive in the removeable hard drive Security Testing for Windows Users” system. The machine would not that uses a program called: Shields UP!! recognize it. . Suspecting a scam of (2) The Alohabob ‘PC Relocator’ re- some sort, I figured I would attempt to quires an operating system on both trick this program. I would run the test ends. It is not possible to do simple twice, once with my firewall turned off cloning from machine to machine. and another test with it operating. Furthermore, the target machine has to My curiosity peaked immediately have an equal or higher operating after my first click when I received a system. message that I “was about to view pages Last week my friend Fred and I over a secure connection,” a more than ordered, for him, a multiple removeable familiar message indeed. So I continued hard drive system. He has had a history on, yet still mostly skeptical that there of installing one piece of software only was some sort of come-on to reach out to see other hardware and software and take my money. No sooner than I functions disappear, so a reliable clicked the “ok” button did I receive this backup system is a good investment. strange message: We went to the local ‘mom and pop’ “Greetings Gregory! Without your computer store and told them what we knowledge or explicit permission, the wanted. He got a fairly high-end Windows networking technology which machine (four 80 GB disks), a 1.8 Mhz connects your computer to the Internet AMD machine, for around $1200. He may be offering some or all of your could easily have ordered a less computer’s data to the entire world at expensive machine and would have this very moment! (For example . . . kept it under $1000. that’s how I know your name!)” At the July 13 SEMCO meeting Next I was given a choice of testing Warner demonstrated his machine and my “Shields” or “Ports.” I clicked on presented the information in this “Shields” and became even more article to the SIG Intermediate group. skeptical when I received this message: 27 “Preliminary Internet connection anyone could gain casual entry into established! Your computer has your system due to its connection to the accepted an anonymous connection Internet. Several of your private names from another machine it knows nothing are being served up to the Internet by the about! (That’s not good.) This Windows networking system. (see ShieldsUP! web server has been permit- below) While it’s unlikely that this ted to connect to your computer’s highly information can be exploited, you should insecure NetBIOS File and Printer Shar- know what anyone can learn about you ing port (139). Subsequent tests con- and your system.” ducted on this page, and elsewhere on But the kicker was that my User this website, will probe more deeply to Name, my Computer’s Name, and my determine the extent of this system’s Workgroup was identified on vulnerability. But regardless of what screen. I knew I had to go to the next more is determined, the presence level and test my Ports. Here are the and availability of some form of results of the Port testing: Internet Server HAS BEEN CON- It declared that my Port 80 (http) was FIRMED within this machine…and open and that “having port 80 ‘open,’ as it is accepting anonymous connections!” it is here, causes intruders to wonder The message continued to give the how much information you might be full details of its findings, or willing to give away.” non-findings: The test program also found my Port “The rest of this website explains the 139 (Net BIOS) was open, and I implications and dangers of your present received this warning: configuration and provides complete and “As you probably know by now, the thorough instruction for increasing the NetBIOS File Sharing port is the single security of this system. At the moment, largest security hole for networked any passing high speed Internet scanner Windows machines. The payoff from will quickly spot this computer as a finding open Windows shares is so big target for attack. The phrase you must that many scanners have been written remember is: ‘My port 139 is wide just to find open ports like this one. OPEN!’ Unable to connect with Closing it should be a priority for you!” NetBIOS to your computer. The attempt Well, I must admit I was becoming a to connect to your computer with tad worried, but still I was skeptical NetBIOS protocol over the Internet towards the reality of these results. Next (NetBIOS over TCP/IP) FAILED. But, I wanted to run these test using my Zone as you can see below, significant Alarm Firewall operating. Here are the personal information is still leaking out results of testing both my shields of your system and is readily available and ports: to curious intruders. Since you do not On the Shield’s test with Zone Alarm appear to be sharing files or printers Firewall on I got the same first “GREET- over the TCP/IP protocol, this system is INGS” message as without it, only this relatively secure. It is exposing its time it did not contain my name. The NetBIOS names (see below) over the results were amazingly secure. The Internet, but it is refusing to allow Shield’s UP test could not find my Port connections, so it is unlikely that 139, nor was it able to connect with my 28 NetBIOS to my computer. Here are the that a port (or even any computer) results of the Shield’s test: exists at this IP address!” “Your Internet port 139 does not Not a fraud, only success! My appear to exist! One or more ports on confidence in firewalls stands firm, this system are operating in FULL sound, and free of worry. STEALTH MODE! Standard Internet Greg West is the Editor of SCUG behavior requires port connection REPORT, the newsletter of the Sarnia attempts to be answered with a success Computer User’s Group (SCUG), or refusal response. Therefore, only an Sarnia, Ontario, Canada. He can be attempt to connect to a nonexistent reached at . computer results in no response of There is no restriction against any either kind. But YOUR computer has non-profit group using this article as DELIBERATELY CHOSEN NOT TO long as it is kept in context, with proper RESPOND (that’s very cool!), which credit given to the author. This article represents advanced computer and port is brought to you by the Editorial stealthing capabilities. A machine Committee of the Association of configured in this fashion is well Personal Computer User Groups hardened to Internet NetBIOS attack (APCUG), an international and intrusion. Unable to connect with organization of which this group is a NetBIOS to your computer. All attempts member. to get any information from your computer have FAILED. (This is very uncommon for a Windows networking- based PC.) Relative to vulnerabilities The Windows Registry from Windows networking, this computer appears to be VERY Demystified SECURE, since it is NOT exposing ANY of its internal NetBIOS networking By Dale Oliver protocol over the Internet.” My firewall came through with shining colors and The Windows registry can be thought with full security. of as a database that contains Next was the Port test with the information about everything relating firewall operating. This test reported my to your computer, including the Port 80 was open (http). However, this operating system, installed software is my connection to the net, and my programs, preferences, settings, file firewall blocks the incoming attacks as locations, drivers, hardware, etc. they are produced, giving me the choice Virtually everything about how your whether to accept or reject; but nothing system operates can be controlled comes through without my acceptance. through the registry. Registry settings So this warning is ok. can cause your computer to run very The next warning I received was inefficiently, or run very fast and again concerning Port 139. This time I efficiently. got the same message, that it could not The Windows registry first appeared get through to this port. Also, “There in Windows 3.1. It was much simpler is NO EVIDENCE WHATSOEVER then, consisted of a single file named 29 REG.DAT, and had only a limited scope open whenever Windows is running, so compared to the modern Windows they must be copied from a DOS prompt registry. Windows 9x versions of after resetting their attributes from registries touch virtually every detail hidden, system, read-only prior to of how the system operates, and copying. Additionally, using RegEdit consists of two files found in the allows you to select only the particular \WINDOWS directory: SYSTEM.DAT registry keys you want to export, which and USER.DAT. Windows NT can be very handy if you only want to registries are spread over a number fiddle with limited parts of the registry of files. and not reinstate the entire registry The registry can be easily modified, contents to “undo” your changes. and is far less mysterious than you are The items that appear as folders in led to believe. If you are comfortable the left pane of the Registry Editor changing preferences in programs, such window are know as “keys,” and the as setting the default font or file contents of these keys are called locations in your word processing “values.” Much like the arrangement program, for example, you should feel of folders organizes the files on your comfortable changing the settings in hard drive, registry keys can contain the Windows registry. other keys as well as multiple values. Always follow this procedure when Unlike editing a document, changes making changes to the registry: made to the registry are immediate. You 1. Backup the registry. don’t manually save the changes. They 2. Make the desired changes to the are instituted the moment you change registry. something in the registry. There is also 3. Test the changes. no “undo” feature in RegEdit per se, so 4. Restore the registry if you notice you will want to pay attention and not problems. be sloppy if you decide to make changes 5. Delete the old backup after a to the registry. Remember, a current period of time (a week or so) of backup of the registry is important in problem-free use. case you goof something up and need DEMO: Backing up the Registry: to undo your changes. 1. Click Start > Run (or Window Windows automatically checks the key + R). registry and makes a backup of the 2. Type regedit and press Enter. existing one every time you restart your 3. Make sure My Computer is computer. If the Registry Checker highlighted in registry window. software notices a problem, it 4. Click Registry > Export Registry automatically replaces the registry with File from main menu. the latest known good backup copy. It 5. Name the export file and click does not, however, fix references to the Save button. missing files or programs. That requires DEMO: Restoring the Registry: aftermarket software. Some well-known Double-click the desired backup file. vendors include FixIt, System This process is even better than Mechanic, and Norton SystemWorks. manually copying the registry files, Microsoft used to offer a free since the registry files are constantly utility named RegClean to do this, but 30 they have since removed it from their keeps five separate copies of your download sites in an effort to “protect registry here, using the names users from themselves.” You can still RB001.CAB through RB005.CAB. find copies at various places around the More advanced users can modify the Web, such as John Woram’s site . \Windows\ folder to configure a BEWARE that RegClean does not work number of specific features relating to with all versions of Windows, namely registry backups, including the number newer versions such as XP and 2000. of backup registry copies to keep. DEMO: Manual Check: Read the article on CAB files at To manually run the Registry Checker software, go to Start > Programs > to learn more about how CAB files work. Accessories > System Tools > DEMO: Customize: System Information. From the System Simply browsing the contents of the Information program’s main menu, registry without making changes can select Registry Checker. The System be a very enlightening experience, and Information program provides a can help you understand a lot about powerful tool for looking at many of how your system works. However, there the inner workings in your system. are also many very helpful and For example, from the left pane, powerful things you can do by making select Software Environment > Startup simple changes to the Windows Programs to see all the “stuff” that runs registry settings. when the computer boots up. And you For a simple example of how you wonder why your computer takes so can make Windows suit your needs, long to boot! one of our club members complained DEMO: Configuration Manager: about the scrolling single-column From the main menu, select Tools > display of program selections in System Configuration Utility. Notice Windows 98. Don’t like it? Change it! that you can do neat things here like the Go to the registry key and add the Diagnostic Startup to help with following string value (right-click troubleshooting problems when your Advanced folder, select New > String computer boots. Value, type in StartMenuScrollPrograms; Also notice the different tabs, then press Enter). Now right-click the including the Startup tab. This also new entry and select Modify. Type false shows you everything that runs when into the Value Data field. Windows boots up, but gives you the For those of you who like to run choice to run the program or not. This Tweak UI, note the fact that it is can be a powerful troubleshooting aid basically nothing more than a fancy when you’re having problems with the registry editor. Windows booting up. For a very informative article on the DEMO: Storing Registry Backups: Windows registry written in plain By default, the automatic registry English, you may want to read a backups are stored in the very helpful article at:. 31 PC Pitstop choice, and I am assuming that you can and PC 911 configure your NIC in both computers are good sites to help you learn more for that protocol. If that is a problem about your computer and run tests that you may refer to a previous article that will suggest ways to improve system I wrote at . Having chronic BSOD’s and other Basically it is assigning a fixed IP unexplained errors while using to the two computers. Both computers Windows 98? Check out:. should also have set file and printer WinGuides sharing in Network properties. Next, has good information about how to tune the IP cannot be a public IP such as up your PC, tweak the registry to those used on the Internet. We will use increase system performance and the most often used one for private reliability, etc. networks, and that is 192.168.xxx.xxx. An amazing site for information All IPs are four bytes, and a byte can about how to tweak the registry and support numbers from 0 to 255. The various other parts of Windows to xxx I have shown just indicates that maximize your computer’s broadband numbers from 0-255 are acceptable. connection can be found at . use should be 192.168.100.10 and Dale Oliver is a member of the 192.168.100.11. Once I have fixed the Southwest Arkansas PC Users Group. third byte (100 in this case) all computers in the workgroup can use any numbers from 1 to 254 to be Making A Two-Computer recognized in the workgroup. Configuring in Network properties Network is next. In Windows 9x and ME right By Frank Fahey click on Network Neighborhood and then properties. In the General tab that For a while I have known that you can comes up select TCP/IP -> “Your NIC,” create a two-computer network without and then click on Properties below the a hub/switch, but both computers with box. The first tab that comes up is IP an installed network adapter (NIC). Address. Select Specify an IP address, This would be the simplest network for and two boxes become available to moving data quickly between two enter an IP Address and a Subnet Mask. computers and/or sharing a printer. If Put 192.168.100.10 or 11 (the the purpose were to share an Internet assignment for the particular computer) connection this would not be the best and enter 255.255.255.0 in the subnet approach. So to verify how to do it I mask. Select the WINS Resolution tab took two laptops with one having a and verify that it is disabled. Next built in 10/100 Ethernet connection and select the Gateway tab and enter either the other a 10/100 PC Card. I knew that 192.168.100.10 or 192.168.100.11 for the TCP/IP protocol would be the best the one used in the IP address. Click on 32 add, and the number will appear for the ably should share full rights on the se- gateway. Click on the DNS tab and lected drive or folder. You can share verify that it is disabled. Click on the floppy, all hard, CD, and ZIP drives. Bindings tab, and you should see client For printers you click on Start->Set- for Microsoft Network and File and tings->Printers and right click on your Printer sharing selected. In Windows printer and select sharing. All shared 2000 and XP you will be right clicking items have an open hand under the icon. on My Network Places and then You do need to install the shared printer selecting local connection and right on the other computer. Open Add New clicking for properties. The information Printer, select network printer in the is the same but presented a little Printer Wizard and answer the other differently. Basically, all the above questions. Generally, the other com- information should now be the same, puter supplies the printer driver. and you should enter it in the Sharing computers is great for appropriate areas. moving data and backup protection. The final item needed is a cable Frank Fahey is a member of the called a Cat5 Crossover cable. Hilton Head Island Computer Club Category 5 or 5E covers the current . cables used to connect Ethernet devices. A crossover cable has special connections of some of the wires to permit uplink from a hub/switch to a Spam Sleuth Version 2.0 hub/switch or to connect directly two Software Review computers. You need to purchase the crossover cable in a length to fit your By Franz Breidenich particular use. Typical lengths are from SEMCO Member 3 to 100 feet, and you can find a source locally at a store selling network parts, Spam Sleuth is a spam elimination or try entering “cat5 crossover cable” program. I received this program on a on the Google search line to find many CD that had all the various software more sources. Plug the cable into both published by Blue Squirrel and a paper computers and you are finished. manual with the activation code (VIP However, now we have to decide Key) pasted on its cover. The manual what is to be shared. In the network we had a total of 76 pages with the last two have created each computer decides on pages being an index. what is to be shared, and if the sharing To start the installation you install is to have passwords or read only the Spam Sleuth files on your hard drive. properties. In general, you freely share After installing the files it gives the in the environment that we have just set choice to read the README.TXT. This up. If you double click and open My option may be of help in getting started Computer or open Windows Explorer, with the software. When you first start right clicking on any drive or folder the program the InstantX registration will have a Sharing selection. It changes dialog box appears. Blue Squirrel wants somewhat between Win 9x and ME you to register the program even if you and Win 2000 and XP but you prob- did not buy the program. 33 The next step is the Configuration all my friends’ e-mail addresses into Wizard, which discusses the two ways this list from my address books. You to set up the program. POP3 Proxy mode can also use an asterisk as a wildcard. and Polling mode are the choices. The For example, *@company.com would manual has more then a page devoted put all the people who have to these two choices. The default mode company.com e-mail addresses on my is the Polling mode. To change the friends list. mode, select the account and make the Mailing List Analyzer change on Page 2 of 4 of the Similar to the Friends Analyzer is the Configuration Wizard. In the Mailing List Analyzer. If a company’s Configuration Wizard you also verify address is on the mailing list, its that the information is correct for your messages will come through. I have e-mail account. The last window asks tested this feature, and it works. how you connect to the Internet. The Spammers Analyzer Spam Sleuth manual also has setup Spammers Analyzer is the second most instructions for Hotmail and AOL powerful Analyzer. If an e-mail address accounts. But in order to use this is on this list, it will go directly to the program with Hotmail and AOL spam file. The program comes with a accounts you must purchase an list of companies that send out spam additional program called “WEB2POP” already entered in this Analyzer. from Blue Squirrel for about $10.00. To Analyzer The next section of the manual goes To Analyzer will filter out messages into Spam Detection Basics. It tells how sent to “Homeowner,” “Resident,” or the spam problem is getting worse “Car owner.” In order to use this list, every year. The manual then describes you list your own e-mail addresses in how Spam Sleuth eliminates spam. the To Analyzer, and when you get a Spam Sleuth uses many different message addressed to “Homeowner,” it criteria, some of which are Spam add points to the score. If you get positive and others that are Spam an e-mail message that has many “To” negative. Each of these criteria has or “CC” addresses on the e-mail, you either negative or positive points can add points to the score. Here again assigned to it. If the message has 190 you can set the threshold and number points or greater, then Spam Sleuth puts points for these messages. it in its spam file for 30 days. If the Good Word Analyzer message has 10,200 points, it puts the Good Word Analyzer will allow you to message in permanent trash. The user put a subject that interests you in the can change these settings according to good word list. In my case I would put his or her needs in the score area. SEMCO on my good word list, so I will Let’s look at these criteria, which be sure to see any message I receive the author calls “analyzers.” with that word. I would put Friends Analyzer SEMCO=10,000, so that it would The Friends Analyzer is the most deduct 10,000 points from my score powerful one. If the sending e-mail for this e-mail. address is on this list, the e-mail will be Bad Word Analyzer passed through the program. I dumped Bad Word Analyzer will allow the user 34 to assign words like mortgage or Viagra, Korean Character sets. You can add a high score, so they will go directly in others if you want. to the spam file. There are already many HTML Volume Analyzer words in this file, words like “cash,” HTML Volume Analyzer will look for “Click here,” “loan,” and many others. messages that have loud colors, big Profanity Analyzer fonts, embedded pictures, and other Profanity Analyzer has a list of profane professional techniques not generally words in it. You cannot see the words used by amateurs. that are on this list, but if you type in a Blacklists Analyzer profanity it will tell you if the word is Blacklists Analyzer has the IP address on the list. Here, as in all the other lists, of all the spam servers in their listing. you can add words and change the score. When you activate this list, it will go Attachment Analyzer out to the blacklist servers you have Attachments Analyzer will remove selected and check those servers to see attachments that have executable files if the sender of your message is on their and put them in the spam file. I tested blacklist. You should not select more this feature, and it worked as stated. than one or two of these servers Spam Sleuth removed the attachment because of the time it takes to search and let the e-mail into the Inbox. I was the listings. then able to go to the spam file, mark HTML Remover Analyzer the file as not spam, and put the HTML Removal Analyzer is a unique attachment into the Inbox. Be aware feature of Spam Sleuth. In its default that most of these files come from mode it will remove HTML script and, people who are on your friends list. as a result, you may lose some flying Most virus checkers should also pick logos, but you will not be directed to up these as viruses before you open the another web page. If you like plain text, message (if they are viruses). then HTML Removal can take out much Subject Analyzer of the fancy text formatting. It can also Subject Analyzer looks at spacing, remove links; if you have kids, this capitalization, and also looks for the may be a feature you want to use. There sometimes legally required “ADV” to are two kinds of images that can appear determine if the message is spam. in e-mail, internal and external. The The Michigan legislature is trying most dangerous, the external, are on an to pass a law requiring this wording external web site, so the sender will for advertizing spam. This Analyzer also know if you access these images. HTML looks for other tricks that Spammers Removal can remove these images, Web use so that the ISPs will not screen out Bugs, and Read Receipt Requested from the messages. The default score for the your e-mail. word “ADV” is 150 points, but the user Valid Sender Analyzer can change it. Valid Sender Analyzer checks to see if Charsets Analyzer the e-mail has a valid From address and Charsets Analyzer checks for foreign if it matches the Reply To address. In character sets and will eliminate many some cases the From address may be of these messages. By default the vacant, and the Reply To address goes program will eliminate Chinese and to a spammer. Finally, it checks to see 35 if the Reply To address is a valid program will stop most of the spam IP address. and let the valid e-mail in. I do not Turing Analyzer think that anybody will be 100% Turing Analyzer is turned off by successful in eliminating all the spam default because it sends out e-mail. This and allowing all the valid messages in. option sends a challenge to any e-mail Advanced Features detected as spam. If the message goes The last 12 pages of the manual cover through, then most likely the e-mail is the advanced features of the program. not spam. The author recommends that These features include Program you turn the option on. Updates, Logging, Hidden Settings, and Bayesian Analyzer more. The author has Tips and Tricks Bayesian Analyzer looks at your in this section. This section also previous e-mail and learns the includes Customer Support and characteristics of good e-mail and Reference Material. spam. This requires some work on the Conclusion part of the user to train the analyzer. Spam Sleuth 2 is a great program E-Mail Stamps Analyzer that one has to use for a while in order With the E-mail Stamps Analyzer to get the full benefit of its spam you request the sender to give you elimination powers. In just a few days money to open up his mail. Not too I have improved my spam rejection and many spammers will pay to have their am receiving more of the valid e-mail. mail picked up. This is by default turned You can order this program, with a off. The author recommended either this 50% user group discount at $14.97, option or the Turing option, but not both. using the a form you can pick up at Bouncer Analyzer the next SEMCO meeting. Or, the Bouncer Analyzer makes the sender software can be downloaded from the think that they have reached an invalid Blue Squirrel website at . ISP that the message could not be You can also obtain a Blue Squirrel delivered. With this option you may Catalog CD. This catalog contains miss important messages. The author all the various software Blue Squirrel recommends the Turing option instead. publishes, but they give you only the This is the last of the Analyzer paper manual and activation code for options. the software you purchase. Also you Configuring and Operating can call 800-403-0925 to obtain Spam The next approximately 40 pages of the Sleuth, but be sure to tell them that you manual are on how to configure this belong to SEMCO and want the user program. It explains every line on group price of $14.97. every window used to configure and Franz Breidenich can be reached operate Spam Sleuth. My advice would at . be to read every one of these pages in order to get the most out of the program. In order to maximize your use of Spam Sleuth you must tweak the settings and options so that the 36 Digital Camera Flash screen or a point on your printed picture. A few other things are also Cards done when converting the cell data to How Many Photos Will picture data. They Hold Now let’s do the Math. Suppose you have a 5 MegaPixel digital camera. By John Hoffmann This means you can set about One must go back and ask, “What are 5,000,0000 pixels of picture data from you going to take pictures of? side-to-side across the sensor. Now Portraits, scenery, grandkids growing recall that each pixel is 24-bits (8 each up? All of the above I assume. for Red, Green, Blue) that can produce The following is MEMORY 101, I 16 Million colors—a very common guess. A digital sensor (CCD for setup for your computer viewers. Then Charged Coupled Device) is a small there are 8 bits per byte—OK! card made up of many photocells 5,000,000 pixels per picture times 24 which respond to light intensity to bits (on or off data, i.e. 0 or 1s) per generate a given voltage. The voltage pixel divided by 8 bits per byte equals represents shades of gray, but can be 15,000,000 bytes per picture. We converted into colors. Each cell is then usually say 15 Megabytes, or 15 MB. digitized into a 24-bit pixel, which So, you want a Flash card? How represents a point on your computer about buying a 128-MB card for about

Letter From The Editor

In the last weekend of June the Rochester Lions Club conducted the 2003 Detroit Metropolitan All American Soap Box Derby on the 3rd Street Hill east of Main Street in Rochester. It’s billed as “The Greatest Amateur Racing Event in the World.” You should have seen it. I went for old time’s sake, since I was a participant myself in 1936 through 1940. In case you didn’t know, this is a race of gravity-powered cars driven by 8-17 year old kids who build the cars themselves. This event was well organized and run by the Lions, and in color and excitement it was much like it was in 1936. But there were some notable differences. In 1936 in Chicago there were 700 entrants, and racing occupied 4 days. Rochester had about 50 cars. In 1936 the cars were all built from scratch over a period of many months, and there was a great variety in appearance and speed. Materials for my car cost $7.81. This year the cars were assembled in an afternoon from kits purchased from the Derby for over $300, and they were all nearly identical, so they all reached the finish line in almost the same time. Most notably, the 1936 race was for boys only; this year, to a casual observer, there appeared to be as many girl drivers as boys. (What do you suppose that means?) I never won any prizes for speed in my 5 years of racing, but one year I won a 6-tube “portable” radio (that must have weighed 20 lbs) for having the best designed brakes; I wasn’t fast but I could stop good. Bill 37 $70, although I heard they can be had BOARD MEETING for $40. 128 MB divided by 15 MB per 7/13/2003 highest resolution picture yields 8 Carol Sanzi pictures. WOW! Flash cards do come in the Gigabyte memory amounts, but Board Members Present: they cost more than the camera. President Gary DeNise, Treasurer Roger If that is not enough pictures, be Gay, Secretary Carol Sanzi, prepared to lower your quality SIG-Advanced Chairman Franz standards. Compressing the data so less Breidenich, SIG-IBM Co-Chairman memory is used reduces the Tom Callow, Warner Mach representing storage requirements. Now one loses SIG-IBM Intermediate Chairman quality as the picture is uncompressed; Jack Vander-Schrier, Publications i.e., not all the original pixels were Committee Chairman Bill Agnew, and stored, and the missing ones are Members at Large Bob Clyne and calculated out via math techniques. Chuck Moery. Arriving late was My Nikon 5700 5 Megapixel Vice-President Vic Charns. The meeting camera has compression levels of 4, 8, was called to order at 12:09 p.m. and 16. OK, now, so I am on a long Old Business: vacation and will take lots and lots of Treasurer Roger Gay reported that the pictures of Granny, etc. For my bank balance is $4809.10 with $30 not 128-MB card and maximum deposited. SEMCO’s membership compression, I can take about 16 times stands at 83 with renewals due from 8, or 128 pictures. That ought to be Donald Pullem, Keith Kossuth, Al enough. Lewis, and Robert J. Rucinski. Tom John Hoffmann is the Digital Callow moved to reimburse Warner Camera SIG Leader for the Coastal Mach $9.20 for refreshments. Franz Area Users Group, Corpus Christi, Breidenich seconded the motion, and it Texas. You can contact him at: was carried. . New Business: Gary DeNise suggested that it’s time to register for the APCUG Fall meetings, Tip: which take place in November. The cost I received an e-mail the other day that increases as the date approaches. showed a list of a dozen recipients’ A discussion was held regarding the e-mail addresses in the “To” field, and revision of the membership renewal a 2-sentence message. I needed to print form. Directors will review the current the message for my wife, but I failed to form and have suggestions next month. notice the small down arrow at the end Warner Mach moved to adjourn. of the list of addresses. I punched the Tom Callow seconded the motion, and print button and got 12 pages of e-mail it was carried. The meeting adjourned addresses along with the message. at 12:45 p.m. When you send a message like that, unless everyone needs to see the list, Tip: Writing an article about your please put one recipient address in the computer experiences for the DATA “To” field and the rest in “bcc.” BUS will make you feel good. 38 SPECIAL INTEREST GROUPS (SIGs)

SIG-IBM SIG-IBM INTERMEDIATE Tom Callow Jack Vander-Schrier Warner Mach

August 10: Free (Or Almost Free) August 10: Basic Video Editing And Utilities: SIG-IBM Co-Chairman Recording: Long time SEMCO Tom Callow will demonstrate utilities member and former SEMCO President to tweak your computer, or just make Bob Clyne will demonstrate how to do life easier on your computer. basic editing of video and how to record TAX DEDUCTIBLE such video to DVD. DONATIONS Beth Fordyce is accepting NOVICE-IBM GROUP Macintosh computers, components, peripherals, manuals and software Rotating Volunteer Hosts (working or broken) for Immaculate Heart of Mary School August 10: Q&A: Discussion PreK–8th grade, 175-200 students for computer science classes. directed by the Audience. Contact Beth 734/453-0349 7pm–10pm or SIG-ADVANCED [email protected] You may also contact the school Franz Breidenich directly: Sister Mary Stephanie Holub 19940 Mansfield Oct. 6: (No meeting in Sept.) Meetings (Greenfield/8-Mile area, Detroit) held first Monday, 6:45 pm, at the 313/272-0990 Oak Park Library. The library is located THANKS at 14200 Oak Park Blvd., Oak Park, MI. Your DATA BUS editor, and all Phone: (248) 691-7480. Directions: SEMCO members, owe a great debt 14200 Oak Park Blvd. is 9 1/2 Mile of gratitude to Beth Fordyce and Bob Road, located west of Coolidge. Best Clyne for their undying efforts to route from freeway is to take I-696 to proofread each issue of the DATA the Coolidge exit. Head south on BUS, correcting all the editor’s Coolidge for 1/2 mile to Oak Park Blvd. goofs. Without their work it would and turn right. Topic: Wide ranging be hard to read and much sloppier. discussion of computers and computing.

September 2003 DATA BUS DEADLINE (7th day after meeting) SEMCO & SIG DATA, & MEMBERS’ ADS - Deadline: Sun, Aug. 17, 11:59pm. Members’ personal ads are free. To mail, use Editor address on Page 2; e-mail address: . PLEASE send to arrive sooner than deadline if possible. BUSINESS ADS - Deadline: Second Friday monthly. Mail unfolded camera-ready copy; payment in full made out to SEMCO, to the Editor (address Pg 2). 39 Bill Agnew CALENDAR-OF-EVENTS [email protected] OTHER GROUPS (to post monthly computer group info)

AAIICI (American Association of Individual Investors, Computerized Investors) Aug. 23–Saturday, 10am-noon (4th Saturday); W. Bloomfield Huntington Bank, Orchard Lk Rd., S.of Maple Rd. Info: Jack Lockman at 313-341-8855 or . Topic: To be announced. DCOM Computer Club Aug. 8–Friday, 6:30 - 8:30pm (2nd Friday); Henry Ford C.C., Patterson Tech Bldg, Ford Rd/ Evergreen, Rm T143, Parking Lot C. Info: Doug Piazza 313-582-2602. Delta Computer Club Aug. 28–Thursday, 7 pm (last Thursday); Bay de Noc C. C., Escanaba. Info: Gordon Nelson, Pres. & Editor at or 906-428-1014. DPUG, (Detroit Palm Users Group) Sept. 11–Thursday, 7pm (No meeting in August); Kensington Community Church, northwest corner John R & Square Lake Rds, Troy, MI. . Free membership. MacGroup Detroit Aug. 24–Sunday, 3pm-5pm (Special Day); Bloomfield Twp. Library, 1099 Lone Pine Rd. (corner of Telegraph Rd.). Info: Terry White, or 313-571-9817. . Topic: 17th Anniversary Celebration. MacTechnics, (MAC User Group) Aug. 16–Saturday, (3rd Saturday); Coffee 9:00am, SIGs 9:30am, Main meeting 11:00am. Mack Open School, 920 Miller Road, Ann Arbor, MI 48103. ). Info: Cassie at or 313-971-8743. MCUG (Michigan Computer Users Group) Aug. 21–Thursday, 7pm (3rd Thursday); 35271 Rockingham Dr, Sterling Hts., MI 48310- 4917; Info: Jerry Zinger, Pres., 810-792-3394. Michigan Apple Computer User Group Aug. 14–(2nd Thur), MAC SIG; Aug. 14–(2nd Thur), Golden Masters SIG; Aug. 21–(3rd Thur), Green Apple SIG; Eagles Hall in Clawson, 174 Bowers St (one block North of 14-Mile and one block East of Main). Carl Pendracki 248-647-8871 or . Web: . Oak Park Computer Club Meets every Friday, 10:15am at Oak Park Recreation Bldg., Oak Park Blvd. west of Coolidge. SHCC (Sterling Heights Computer Club) Sept. 2–Tuesday, 7:30pm (1st Tuesday, No Meeting August); Carpathia Club, 38000 Utica Rd, Sterling Hts, Pres. Don VanSyckel at , 586-731-9232; Web: . SVCA (Saginaw Valley Computer Assoc.) Sept. 11–Thursday, 6:30-9:00pm (No meeting in August); Zauel Library, Shattuck & Center Rds., Saginaw. Web: . Wayne State U. Mac User Group Aug. 9–Saturday 10:00am-Noon (2nd Saturday); at Mich.com, 21042 Laurelwood, Farmington. Info: Lorn/JoAnn Olsen 248/478-4300 or Denny MeLampy 248-477-0190.

40 SPECIAL MEMBER BENEFIT Telesthetic ISP Service JULY ● $5.95 per month plus $5 setup fee REFRESHMENT ● Rate for SEMCO members only DONORS ● Unlimited hours ● Billing by e-mail, credit card Warner Mach, Coordinator Long Distance Phone Service Betty MacKenzie ● Without ISP service: $2.95/month Carol Sanzi plus usage charge Roland Maki ● 4.5cents/min 24/7 (plus taxes, etc.) ● Billing plus call detail by e-mail ● 30 sec minimum, then 6 sec billing increment ● Visa or Mastercard Contact SEMCO member John Lodden or Customer Service or 1-800-807-4515. SEMCO has arranged for this offer solely as a Your SEMCO membership benefit for its members. Telesthetic, LLC is an card is good for a $1 discount (not independent business, and SEMCO does not act valid with any other offer) on for Telesthetic as agent or in any other capacity. SEMCO makes no representations or admission to warranties as to the services provided by Teles- A1-Super Computer Sales thetic and expressly disclaims any and all war- ranties and liability. shows. See www.a1-supercomputersales.com or www.a1scs.com for show schedule.

COMPUTER RESOURCE PEOPLE This is a list of members willing to be resources for other members to call when they have hardware or software questions. Are you willing to help members learn? Which software programs are you familiar enough with? It is not necessary to be an expert, but just have some familiarity with the program and be willing to help someone starting to learn it. Please give this some thought and volunteer at the next group meeting. Almost Anything: Vander-Schrier MS Office for Windows: Callow AutoCAD: Comptois, Gay MS Word: Clyne Genealogy: Cook Networking: Callow IBM PC Hardware Issues: Clyne, Gay, Yuhasz Novell Netware: Yuhasz Operating Systems: Callow, Clyne, Yuhasz Quicken: Clyne, Gay MAC Hardware and OS Issues: Yuhasz Geocaching: Cook Clyne, Bob—810-387-3101, 9am-10pm ...... [email protected] Callow, Tom—248-642-1920 9am–5pm ...... [email protected] Comptois, Jerry—248-651-2504, anytime ...... [email protected] Cook, Stephen—313-272-7594, eves ...... [email protected] Gay, Roger—248-641-7799, 9am-10pm ...... [email protected] Vander-Schrier, Jack—586-739-7720,12-8pm ...... [email protected] Yuhasz, Steve ...... [email protected]

41 SOUTHEASTERN MICHIGAN COMPUTER ORGANIZATION, INC.

SEMCO CALENDAR—August/September SCIENCE & ENGINEERING BUILDING, OAKLAND UNIVERSITY, ROCHESTER, MICHIGAN

August 10–SUNDAY (Meet 2nd Sunday) SEMCO Board Meeting at 12:00 noon, Room 164. For Officers and SIG Chairpersons. Other members are invited to attend.

SEMCO General Meeting at 1:30 pm, Room 164. Special Interest Groups (SIGs) SIG-IBM 1:45 pm, Room 164. Program: Free (Or Almost Free) Utilities: SIG-IBM Co-Chairman Tom Callow will demonstrate utilities to tweak your computer, or just make life easier on your computer. SOCIAL PERIOD 3:15 pm, Room 172. Refreshments! (Reminder: We must maintain a neat environment.) NOVICE-IBM GROUP 3:45 pm, Room 168. Program: Q&A, Audience- Directed Discussion. SIG-IBM Intermediate 3:45 pm, Room 164. Program: Basic Video Editing And Recording: Long time SEMCO member and former SEMCO President Bob Clyne will demonstrate how to do basic editing of video and how to record such video to DVD. Oct. 6–MONDAY , 6:45 pm (No meeting in Sept.), SIG-ADVANCED Oak Park Public Library, 14200 Oak Park Blvd.,Oak Park, MI. Phone: (248) 691-7480. Directions: Oak Park Blvd. is 9 1/2 mile Road, located west of Coolidge. Best route from freeway is to take I-696 to the Coolidge exit. Head south on Coolidge for 1/ 2 mile to Oak Park Blvd., and turn right. Info: Franz Breidenich 248-398-3359. TOPIC: Wide-ranging discussion of computers & computing.

Sept. 14–SUNDAY (Meet 2nd Sunday). SEMCO, 1:30 pm. Topics: To be announced. http://www.semco.org PUBLIC INVITED (Please copy this and the next page to post on your bulletin board) 42 MAIN CAMPUS of OAKLAND UNIVERSITY City of Auburn Hills Walton Boulevard

Drive

East Oakland N Meadow Brook RoadRavine Drive West

Oakland Dr.

To City of S Squirrel Road Pontiac Wilson Blvd. 3 Miles

West Campus University Drive Pioneer Drive KL

INTERSTATE MICHIGAN 75 HHS DHE PSS Exit #79 SEB PL Varner Drive Meadow Brook Road Meadow 38

Library Drive Pioneer Drive

Lonedale Road

MAP LEGEND SEB Science and Engineering Building DHE Dodge Hall of Engineering KL Kresge Library Note: SEMCO meetings are in the Science (west) wing of the Science and Engineering Building. DIRECTIONS Driving north on I-75 (from Detroit and suburbs), take Exit 79 (University Drive), stay to the right on University Drive to campus entrance. Turn right (south) on Squirrel Road (at traffic light which is just outside campus); turn left on Pioneer Drive (next street to left). Turn left off Pioneer Drive onto Library Drive (second left) toward Kresge Library. Turn left before you get to the buildings, into parking lot 38 on the left. Proceed to the far end of the parking lot and up to the next lot. After parking, enter the first set of glass doors (at the SE corner of the building). Member of

The meetings at Oakland University are sponsored by the University’s Academic Computer Services (ACS). SEMCO thanks Oakland University and ACS for their assistance.

43 Dated Material FIRST CLASS MAIL

August 10 September 14 SEMCO: A Community Organization Helping People for the 21st Century

SEMCO (future meetings) SouthEastern Michigan SouthEastern Inc. Computer Organization, Box 707 P.O. Hills, MI 48303-0707 Bloomfield 44