Search
    Google
    Tip of the Day Blog
    The Web

Entries from August 1, 2004 - August 31, 2004

Friday
Aug202004

RUOK? A Tutorial for Parents

     TIP OF THE DAY

RUOK? A Tutorial for Parents


RUOK? A Tutorial for Parents

By DAVID POGUE
New York Times

Published: August 19, 2004

DEAR Mom and Dad,

I made it to college! The MapQuest directions were mostly right, nothing fell off the roof on the Interstate, and you were both such troupers when I backed out of the driveway. No tears, no mush - I'm proud of you.

Anyway, my roommates are really cool. Within an hour, we had hooked up our TiVo's, connected our laptops to the college's wireless network, and found outlets for our digital cameras and cellphones.

But there's one little bit of business I wanted to clear up. The last thing you shouted out as I pulled away was, "Write lots of letters!"

Now, you guys have been pretty cool parents for 18 years, but let's get one thing straight: Nobody writes letters anymore. In fact, they pretty much don't even write anymore. I may keep in touch with occasional cellphone calls and e-mail messages like this one. But hey, it's not 1998 anymore. Mostly, people my age would rather IM, Skype or text each other.

My roommates say you probably don't have any idea what those things are, and I guess that's right; none of those communications channels were around when you went off to school. They're all Internet and cellphone developments. So here's a little guide, a cheat sheet for communicating with your college kid in the modern era.

First of all, let's talk about instant-messaging software, or IM. The big three are AOL Instant Messenger (AIM), MSN Messenger (from Microsoft) and Yahoo Instant Messenger. All three programs are free (from www.aim.com, messenger.msn.com, and messenger.yahoo.com, respectively; you don't have to be an America Online member to use AIM).

They're all pretty much alike, too: when you want to chat with me, you double-click my name in a list of your chat buddies. If I'm online at the moment, my computer "rings" to let me know that you want to talk. Then we type back and forth in a tall, skinny window.

The beauty of IM-ing is that I can carry on chats with a bunch of people at once, in different windows. Unlike e-mail, it doesn't require me to wait around to get a reply. And unlike telephones, chatting is free - and I don't even have to take off my iPod earphones while I'm doing it.

All three programs are available for both Mac and Windows, so it doesn't matter what kind of computer you're using. (Some Mac fans prefer the better-looking AIM-compatible iChat program from Apple.) On the other hand, all three programs use mutually incompatible chat networks. If you're on AIM, you can't chat with someone on MSN.

Someday, the companies say, they'll make their networks interoperable; then again, they've been saying that for years. Geeks like me can use a free program like Trillian Basic (www.trillian.cc), which can communicate with all three big networks - and several others - at once. As an authorized mom and dad, you probably don't need to bother; you'll probably find one network to be plenty (the one I use).

If I'm not at my computer when you need to reach me, you can always text me. Yes, "text" is a verb these days: "He texts, she texts, whatever the pretext."

Texting is shooting out very short typed messages from cellphone to cellphone. It's really great in movies, in class, in restaurants, at loud concerts and anywhere else you can't really talk on the phone. It's probably like passing notes was in your day, except that now you can pass them to anyone on the planet and you're much less likely to get caught.

Most modern cellphones offer texting; it costs about 10 cents to send one message, although if you text as much as I do, you'll sign up for a monthly plan (100 messages for $2, for example). Basically, you press your phone's Menu button, scroll down to Messages, and then pick New Message (or something similar). The address is just my cellphone number.

The message has to be pretty short - 160 characters, max. That's part of the fun. Partly because of that length limitation, and partly because it's hard to type out words on the phone's number keys, we use shorthand constantly. BCNU means "Be seeing you," PCM means "please call me," L8R is "later," 2MORO is "tomorrow," WAN2 is "want to," and so on. Most of it you can figure out just by saying the letters and numbers out loud, like these: NE1, RUOK, B4, OIC.

People use these codes in IM chats and even e-mail, too, just to save time. (Oh, that reminds me: Now that I'm out of the house for good, I can finally tell you what POS means. It's "Parent over shoulder.")

Skype is another free chat program (from the creators of the Kazaa file-swapping service). But this time, you don't type; you talk and you listen, using your PC as a telephone and the Internet as the phone company. (You can get the software from skype.com; it's for Windows only. On Macs, iChat can serve the same purpose, although iChat and Skype can't call each other.)

With a headset and a high-speed Internet connection like a cable modem or D.S.L., the quality is fantastic - much better than a telephone - and it's free, free, free. Over 19 million people have downloaded Skype, which they're using to make free phone calls all over the world. (Some of the other IM programs have audio chat features, too, but they feel grafted on. Skype was born for Internet calls.)

If you guys want to catch up on what's new with me, Skype is a perfect way to do it without worrying about the phone bill. The downside, of course, is that you and I both have to be at our PC's to make the call.

A new service called Skype Out lets you make PC calls to regular phone numbers, not other computers. It's cheap (about two cents a minute within the United States), but it's not free. Besides, having to go PC-to-PC is no biggie; trust me, my dorm room isn't big enough for that to be an inconvenience. Just text me when you want to Skype.

That's pretty much it for the communications channels we're using daily here at school. But since I know you're going to miss me, I'll let you in on one other technology you may learn to love while I'm away.

What if there's something you just have to see to believe, like a certain essay grade or a certain body piercing? That's when you'll be glad you had me exactly 18 years before the invention of Internet video chats.

Yes, I'm talking about video chatting, which is also free if you have a high-speed Internet connection. You and I each need a PC headset and a Web cam - a cheap, spherical, plastic eyeball that plugs into the computer - and a copy of the free SightSpeed software at www.sightspeed

.com. Then, whenever you want to see me face to face, double-click my name in your buddy list. SightSpeed video calling is free for 15 minutes a day, or one of us could sign up for a monthly plan (like $5 per month, unlimited).

The video is far superior to the tiny, jerky, time-delayed effect of the IM chat programs and programs like Windows Messenger. It's not nearly as good as Apple's iChat, which offers a still bigger, smoother, clearer picture and never costs anything. But SightSpeed is available for Mac and Windows, and permits video calls between them. (You can also cross the Mac-Windows chasm by using iChat on the Mac, and either AIM 5.5 or AOL 9 on the PC.)

So that's your lesson in how to keep in touch. If you have any questions, IM or text me. Ms U, lov U, alw thinkN of U. CU L8R!

E-mail: Pogue@nytimes.com
Wednesday
Aug182004

Busting the Biggest PC Myths

   TIP OF THE DAY


Busting the Biggest PC Myths


Excerpted from:
Busting the Biggest PC Myths
 http://www.pcworld.com/news/article/0,aid,116572,00.asp

Gregg Keizer
From the August 2004 issue of PC World magazine

Magnets zap your data.

For venerable floppies, this statement holds true. We placed a 99-cent magnet on a 3.5-inch floppy for a few seconds. The magnet stuck to the disk and ruined its data.

Fortunately, most modern storage devices, such as SD and CompactFlash memory cards, are immune to magnetic fields. "There's nothing magnetic in flash memory, so [a magnet] won't do anything," says Bill Frank, executive director of the CompactFlash Association. "A magnet powerful enough to disturb the electrons in flash would be powerful enough to suck the iron out of your blood cells," says Frank.

The same goes for hard drives. The only magnets powerful enough to scrub data from a drive platter are laboratory degaussers or those used by government agencies to wipe bits off media. "In the real world, people are not losing data from magnets," says Bill Rudock, a tech-support engineer with hard-drive maker Seagate. "In every disk," notes Rudock, "there's one heck of a magnet that swings the head."

Want to erase data from a hard drive you plan to toss? Don't bother with a magnet. Overwrite the data that is stored on the media instead. For flash, fill up the drive with anything, like pictures of your beloved dachshund. Unlike with magnetic media, from which experts can usually recover at least some overwritten data, once new data is written to flash media, the old data is gone forever. To overwrite the contents of a hard drive, try Eraser from Heidi Computers.

Using a cell phone on a plane interferes with the navigation and communications systems of the aircraft.

"I've never experienced a navigational problem that could be traced to a cell phone," says one veteran pilot who didn't want his identity revealed. "From everything I've read, cell phones and most avionics shouldn't conflict."

So why do flight attendants make you put away your gear before takeoffs and landings? "That's more for making sure [we] have people's attention and for [individual] safety," he says. "If I have to hit the brakes and abort a takeoff, I don't want a laptop flying across the cabin."

The Federal Aviation Administration, which regulates cell phone use in a plane, has a different view: "The concern is that cell phones would conflict with onboard avionics," says Paul Takemoto, the FAA's electronics guru.

Is there scientific proof that cell phones can make planes go haywire? Some. In 2003 the Civil Aviation Authority--the FAA of the United Kingdom--ran tests using simulated cell phone signals in a chamber (not in an actual aircraft) and found problems. In some cases, the compass froze, some instruments displayed errors, and audio communications were difficult to hear due to interference.

Until additional tests prove otherwise, Takemoto says, the FAA prefers to err on the side of caution.

If you don't 'stop' a USB device before unplugging it from a PC, you'll screw things up.

When you unplug a USB device without first "stopping" it in Windows (accomplished by clicking the Remove Hardware icon in the taskbar), your PC makes a bing-bong sound and usually pops up a message scolding you for the move or warning that what you just did can delete data saved on USB storage devices or damage hardware.

We're cautious about unplugging a device while it's still writing data (an action USB flash-drive makers always warn against) because doing so can cause major damage. Case in point: One PC World editor unplugged an external USB hard drive that was doing some activity in the background; he lost all his data and damaged the drive itself.

If you wait until the device stops writing data and then pull the drive out, you're unlikely to experience serious problems. Although Windows takes you to task for such rashness, even Microsoft downplays the peril. The company told us that any damage will "depend on the USB device, but in general [unplugging a USB peripheral] shouldn't affect the system."

To see if the task has negative effects, we unplugged and plugged a bunch of USB devices, including a camera, a printer, a USB flash drive, and a scanner, without first "stopping" them in Windows. The only problem was Windows' failure to recognize our USB flash drive after we had unplugged it and then immediately plugged it in again. If that happens to you, wait a few seconds between unplugging and plugging. If that doesn't work, reboot Windows. And if that doesn't work, run the Add Hardware wizard from the Control Panel to make Windows "see" the USB device. For more on USB devices, visit USBMan.

Cookies track everything you do on the Internet.

When cookies first appeared, some Web users got bent out of shape because they thought cookies would track their every move online. Wrong.

Sure, cookies can perform limited tracking when you're browsing Web pages. And some persistent cookies can trace your movements from site to site. For instance, cookies from DoubleClick, a company that feeds targeted Web ads to users, track your surfing to any DoubleClick-enabled site to make sure that you don't see the same advertisement over and over.

But most cookies are far less intrusive. A cookie used by Amazon.com, for example, to personalize the Web site for you doesn't pay any attention to what you do when you head to another shopping site such as Barnes and Noble.

If you're worried about cookies, turn them off in your browser (although doing so will render many sites virtually unsurfable). In IE, choose Tools, Internet Options, click the Privacy tab, and click Advanced to override automatic cookie handling. Also, consider opting out of DoubleClick's site-to-site cookie tracking.

Terrible things happen if you turn off your PC without shutting down Windows.

Don't touch that switch! According to Microsoft, if you turn off your PC without first shutting down Windows, your hard drive could become more fragmented, files could become corrupted, and you could lose data.

Maybe Microsoft's warning holds some water, but we wouldn't worry about straining the system or harming Windows. We ran 30 iterations of an informal test, turning off a pair of systems running Windows XP without first shutting down Windows. Each time we left documents open in Word, Outlook, and Quicken. And we left our Internet connection up and running.

After we turned each PC back on, we ran Symantec's Norton Disk Doctor and the Windows disk checker to see if the hard drive had suffered any ill effects. We reopened the applications that we had left running and reconnected to the Internet.

Problems? Disk Doctor found no disk errors, and our files were intact--at least up to the last time they were saved, but not always to the point of the last edit made. Outlook recovered without a glitch, and so did Quicken. (We didn't check disk fragmentation because some hard-drive experts told us that defragging today's faster, bigger drives has little to no effect on performance.)

If you're uneasy about just switching off the PC, change the Power Options settings. From the Control Panel, open Power Options, click the Advanced tab, and under 'Power buttons' select Hibernate. Now whenever you push the power button, Windows will save itself in its current state. Turn the computer on later, and Windows will pop up, just as you left it, in a lot less time than the system would take to boot.

Opting out of spam gets you even more spam.

You've heard the advice. Don't reply to spam. If you do, you'll get even more because you've just told the spammer that your e-mail address is legit.

"No one has done a complete test of this because it's difficult, if not impossible, to prove beyond a doubt," says Ari Schwartz, associate director for the Center for Democracy & Technology. With spam accounting for as much as 83 percent of all Internet-delivered messages in the United States, he says, "if you do opt out and get more spam, how will you know you wouldn't have received it anyway?"

Sometimes opting out does work. Last year CDT researched spam sources by creating e-mail accounts, seeding them through various venues, noting the amount of spam that each account received, and opting out. Many companies complied with the opt-out requests within two weeks.

"Knowing who to opt out from is key," says Schwartz. "Opting out of legitimate companies drops you off their lists, but when you do that with 'real' spammers, the results are unclear."

Regardless of whether you opt out, spammers have various tools to grab addresses. You can't completely protect your inbox, but you can take defensive measures, such as keeping your e-mail address off public sites, says Schwartz.

If you're still looking for a good spam filter, try Cloudmark's SpamNet, or another program recommended in "Spam-Proof Your In-Box."

Hackers can destroy data on your computer's hard drive.

"The MyDoom.f worm took a step back into an era where viruses actually attacked data," says Bryson Gordon, a senior manager with McAfee Security. Although viruses and worms that attack files are relatively uncommon, they are nightmare number one for anyone connected to the Internet.

Among other nefarious activities, MyDoom.f sniffed around on infected PCs looking for Word, Excel, and graphics files and then randomly deleted some of what it found. Of the people whose PCs got the worm, 40 percent lost Word files and 60 percent lost Excel files.

Today's hackers want to hijack systems, not destroy them. Rather than wipe out data, worms and viruses want intact PCs to send spam or to attack Web sites. "Just like a biological virus, if a computer virus kills the host before it propagates, it can't propagate," says Allen Householder, an Internet security analyst with the U.S. Computer Emergency Response Team, which is now part of the Department of Homeland Security.

Turning off your PC daily to save power shortens its life.

Here's a topic that provokes debate. One side argues that turning the PC on and off stresses components. The other side says it's a good thing; even the best programs and the OS can get cranky without occasional shutdowns.

There's no definitive answer. Most authorities, however, lean toward the idea that shutting off does more good than harm--plus it saves power. Kevin Krewell, editor in chief of the Microprocessor Report, supports that side of the debate. "Processors typically have a ten-year life span," he says, so a PC will be dead weight before switching it on and off could affect the CPU.

Tip: If you're using Windows XP, right-click the desktop, choose New, Shortcut, type shutdown -s -t 00, click Next, give the shortcut a name (for example, Shutdown), and click Finish. Next time you need to shut down, click the shortcut icon.

The government reads everyone's e-mail.

Okay, so we thought this myth was spawned by the same conspiracy theorists who gave us the Gunman on the Grassy Knoll, the Illuminati, and Area 51. After all, how much time does the government really have on its hands?

"It's obviously a myth," says Marc Rotenberg, Georgetown University law professor and executive director of the Electronic Privacy Information Center. If a privacy watchdog doesn't buy the myth, no one should, right? Wrong.

"The government may not be reading everyone's e-mail now," he adds, "but that doesn't mean it's not interested in doing that in the future. In a few years, the government might be reading everyone's e-mail." Fortunately, we Americans have the Fourth Amendment. Government agencies--the FBI, the CIA, and the NSA--can't read your e-mail without probable cause, except under special circumstances related to espionage.

The Patriot Act allows the government to read all e-mail of a suspect and of all people who communicate with that suspect. But even privacy watchdogs like Rotenberg don't claim that everyone's e-mail gets the once-over yet.

In the end, conspiracy junkies may feel vindicated. "There are programs that can sort through mass amounts of e-mail, looking for suspicious keywords," says Ari Schwartz of the CDT. He says because intelligence agencies haven't been open about whether they are using such software, you can't rule out the possibility that the government is checking up on you.

If you're feeling uneasy, download an encryption utility such as PGP Freeware, and read "Products for the Paranoid."


Only a pricey surge protector can keep your devices safe.

"I don't see a direct relationship between the cost of a surge protector and the protection it provides," says Joe Wilson, a senior electrical engineer with Eugene Water and Electric Board, the utility company that serves Eugene, Oregon. "Most surge protectors are based on the same sort of technology, and the response time (how fast they switch on) is similar across the board.

"Often, the more expensive protectors add some simple bells and whistles, such as status lights to indicate that the device is working," says Wilson. "But that doesn't mean they're going to protect your computer any better."

And don't get caught up in the energy dissipation (most often expressed in joules) and response time features that some surge protectors tout, Wilson advises; they're not a reliable indication of quality. Instead, just make sure that the surge protector is UL 1449 rated, which means that it meets the Underwriter Laboratory's tested standard.

There's no question that surge protectors are necessary to protect sensitive computer gear from surges or spikes in the power supply. Although most of us think of outside surges and spikes as the prime suspects, homegrown problems, like those created by appliance motors cycling on and off (think fridge, washer and dryer, and air conditioner), are more common.

Surge-protected power strips won't protect your data during blackouts or brownouts, but an uninterruptible power supply will. UPSs include a battery for maintaining power and enabling you to save data before your PC shuts down. Newer UPSs have a software component that lets you automate backup and set up shutdown procedures. (For a review of UPSs, see "Power Protection.") A brownout (flickering lights or a snap-off/snap-on of the power) won't trip a protector, but a lightning strike will.

Warning: The newer the microprocessor, the more susceptible it is to power spikes. The greater the number of transistors packed into a chip, the less tolerant it is of excess voltage, says Wilson. If you use an aging computer without a surge protector, it may survive a spike. A newer PC, on the other hand, will fry.

If you don't periodically run your laptop batteries down to zero, you'll lose battery life.

This belief stems from a syndrome that plagued old-fashioned laptop batteries--the bulky nickel cadmium variety. With those batteries, performance degraded if the battery wasn't periodically discharged fully. (If you use a NiCd-powered laptop, discharge the battery every three months.)

Newer laptops use lithium ion batteries that have no memory, says Isidor Buchmann, the founder of Cadex, a Canadian manufacturer of battery chargers and analyzers. They don't need to be discharged to maintain their life, he says. Lithium ion batteries prefer a partial rather than a full discharge. Nonetheless, every 30 charges or so, you should run them down to zero. This measure isn't to preserve the battery but to recalibrate the fuel gauge--the indicator on the laptop screen that shows how much battery juice and time remain.

Tuesday
Aug172004

Keyboard shortcuts for international characters in Word

        TIP OF THE DAY

Keyboard shortcuts for international characters in Word

For keyboard shortcuts in which you press two or more keys simultaneously, the keys to press are separated by a plus sign (+) in Microsoft Word Help. For keyboard shortcuts in which you press one key immediately followed by another key, the keys to press are separated by a comma (,). To type a lowercase character using a key combination that includes the SHIFT key, hold down the CTRL+SHIFT+symbol keys simultaneously, and then release them before typing the letter.
Friday
Aug132004

Digital memories survive extremes

TIP OF THE DAY

Digital memories survive extremes

Digital memories survive extremes

Holiday-makers capturing precious memories on digital cameras need not worry about losing their snaps.

The memory cards in most cameras are virtually indestructible, found Digital Camera Shopper magazine.

Five memory card formats survived being boiled, trampled, washed and dunked in coffee or cola.

Digital cameras are becoming commonplace, with 12.5 million sold in the US last year, compared with 12.1 million film cameras.

In the UK, 18% of the population have digital cameras.

Survival of the fittest

Five memory cards for digital cameras were subjected to a range of tests.

The formats were CompactFlash, Secure Digital, xD, Memory Stick and Smartmedia.

Even some of the thinner cards that appear to be fragile fared well in the trial.

They were dipped into cola, put through a washing machine, dunked in coffee, trampled by a skateboard, run over by a child's toy car and given to a six-year-old boy to destroy.

Perhaps surprisingly, all the cards survived these six tests.

Most of them did fail to get through two additional tests - being smashed by a sledgehammer and being nailed to a tree.

Even then, data experts Ontrack Data Recovery were able to retrieve photos from the xD and Smartmedia cards.

Tough little things

"We've tested the durability of the leading memory card forms and have found that even if your camera doesn't remain intact, your precious memories should," said Geoff Harris, editor of Digital Camera Shopper.

"We knew modern memory cards were durable, but had no idea they would be quite so tough."

However he added that people should still make a back up copy of photos, to avoid accidentally deleting such prized memories.

The results of the test are bad news for photography processing services.

Photo printing retailers are seeing a drop off in traditional camera film processing.

Instead, they are pushing services that turn electronic images into prints. Around eight out of 10 digital pictures are thought to never make it into printed form at all.

In the US, tens of thousands of self-service kiosks have sprung up, where consumers can edit and make photos directly from a memory card.

Story from BBC NEWS:
http://news.bbc.co.uk/go/pr/fr/-/2/hi/technology/3939333.stm

Published: 2004/08/01 07:19:37 GMT

© BBC MMIV
Thursday
Aug122004

Responsible Parenting Or Spying?

TIP OF THE DAY

Responsible Parenting Or Spying?


From Lockergnome:

Responsible Parenting Or Spying?

Q: My twelve-year-old son is allowed to get on our family computer in order to research information for homework and do a little bit of e-mail and instant messaging. I'm worried about him accidentally (or purposely) finding his way to some of the adult Web sites and content on the Internet. What software can I employ to protect and monitor him?

A: It's unfortunate that these types of concerns have to be present in our minds. The Internet can be a very dangerous place for young kids who have no idea what they're doing. It's sad to say that a lot of this harmful content is being targeted at your children. Without parental control software installed on your computer, this underground world of filth is open to your curious kids.

There are numerous pieces of software that are targeted at monitoring computer activities, but I'm going to point you to software that is specifically designed for parents. Look at the capabilities of the programs to determine what will work in your situation. There's a common argument that using this type of software can be considered spying on your kids. Some parents oppose it, while others employ it. You may not want to use this type of a solution for older teenagers, but it's great for younger children.

Brandon Watts