Thursday, November 8, 2018

Visit us at LenoxCC!

 [] [] [] Tuesday, November 13, 2018  ~1-3pm      
Meeting in Lenox Community Center, Room 110    
Topic -- Windows 7 and 10 discussion    
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive.   
[] [] [] Tuesday, November 20, 2018  ~1-3pm      
Meeting in Lenox Community Center, Room 110  
Topic -- TBA      
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive. 
[] [] [] Tuesday, November 27, 2018  ~1-3pm      
Meeting in Lenox Community Center, Room 110 
Topic --  "Bring In Your Box Day"    
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive.        
[] [] [] Tuesday, December 4, 2018 ~1-3pm   
Meeting in Lenox Community Center, Room 110
Topic -- TBA     
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive.   
[] [] [] Tuesday, December 11, 2018  ~1-3pm      
Meeting in Lenox Community Center, Room 110
Topic -- Windows 7 and 10 discussion    
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive.   
[] [] [] Tuesday, December 18, 2018  ~1-3pm    
Meeting in Lenox Community Center, Room 110  
Topic -- TBA      
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive. 
[] [] [] Tuesday, December 25, 2018 
NO MEETING Building is closed   
[] [] [] Tuesday, January 1, 2018 ~1-3pm   
NO MEETING Building is closed   
[] [] [] Tuesday, January 8, 2018  ~1-3pm      
Meeting in Lenox Community Center, Room 110     
Topic -- Windows 7 and 10 discussion    
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive.   
[] [] [] Tuesday, January 15, 2018  ~1-3pm      
Meeting in Lenox Community Center, Room 110      
Topic -- TBA      
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive. 
[] [] [] Tuesday, January 22, 2018 
Topic --  "Bring In Your Box Day"    
Meeting in Lenox Community Center, Room 110      
Windows 7 computers [3] available for web browsing.    
Please sign in on the buddy sheet when you arrive.      

[] [] [] Tuesday, January 29, 2018     
NO MEETING....5th Tuesday!     
"Bring In Your Box Day" (every fourth Tuesday!)  The first four Senior Computer Buddies to contact me may bring in their windows computer and get advice about using it. We can supply the ac cord, keyboard,  mouse and monitor for your desktop or tower computer. It's  helpful to tell me before Tuesday if you are bringing in  your unit.      
 Regular Meetings:     

 1pm Specific Topic or Open topics discussion [except bring in your box days]  2pm Help session. Some help  opportunities may be simultaneous as a buddy installs  recommended software while another buddy asks a  question.   
 All Senior Computer Buddies will benefit from our best-effort attempts in solving unusual or  common problems.  Sometimes just emailing a detailed  question about your computer operation problem can result in  an answer which precludes the need to drag your box  in.     
 The group is not a class in learning computer operation, but a discussion of topics for computer  users, with best effort help available..    
 Please review your Senior Program Newscaster Newsletter and the ISD 283 Community Education  Catalog for Computer Classes.   

 The buddies blog is back!
 It's not fancy, and you can see it at

 John McHugh
 SLP City Hall Cable TV Office
 Community TV Coordinator, ParkTV15/96
 SLP Senior Program Mentor at LCC
 5005 Minnetonka Boulevard
 Jmchugh [at]
 "We Believe Our Public Service Makes A

 City Hall has free wireless internet,
 provided by City Of SLP. It's a "Park Public Wireless Spot"!
 It is also available at The Rec Center, Lenox Community  Center [west end] and Westwood Nature Center! Bring your  laptop and try it: confirm that your computer has detected  SL-Public. Connect to it. Then open a browser and navigate  to  A "landing page" will appear where you  must click "Accept" to the terms and conditions for free  internet access.
 * * *
 Did you find something other Senior Computer Buddies should read?
 Send a link to John!   

====== Links from 11-9-2018 email ==========================
Be sure to delete browser cookies and clear your browser history on a regular basis. It's easy. In Chrome, Edge, Firefox, Internet Explorer, or Opera, simply press Ctrl+Shift+Del to bring up a dialog that lets you choose which elements of browser data you want to clear.,2817,2480401,00.asp
The Comprehensive Guide to Quitting Google   by Brendan Hesse
Despite all the convenience and quality of Google’s sprawling ecosystem, some users are fed up with the fishy privacy policies the company has recently implemented in Gmail, Chrome, and other services. To its credit, Google has made good changes in response to user feedback, but that doesn’t diminish the company’s looming shadow over the internet at large. If you’re ready to ditch Google, or even just reduce its presence in your digital life, this guide is here to help.
Since Google owns some of the best and most-used apps, websites, and internet services, making a clean break is difficult—but not impossible. We’re going to take a look at how to leave the most popular Google services behind, and how to keep Google from tracking your data. We’ve also spent serious time researching and testing great alternatives to Google’s offerings, so you can leave the Big G without having to buy new devices or swear fealty to another major corporation.
Things get sketchy when the entity overseeing [a tech] ecosystem starts dipping into your data or manipulating your experience.
Our Goal Is Decentralization
Google, Apple, Microsoft, and other similar companies offer “ecosystems”—centralized, cross-platform software and hardware suites where all your devices can connect and sync with the same data and apps.
These ecosystems are extremely convenient, but they can pose security risks. While centralization isn’t the issue, per se, things get sketchy when the entity overseeing that ecosystem starts dipping into your data or manipulating your experience.
That’s why, for the majority of this guide, we’ll be looking at how to decentralize your digital presence with third-party and open-source solutions (though alternatives from Apple, Microsoft, and other companies will be discussed where appropriate, as well as some Google compromises you can make).
For all the benefits of going open-source, there are also tradeoffs: While you’ll be out from under the monolithic shadow of peering tech companies, you’ll also be trading in the full interconnection, synchronization, and data consolidation you get from catch-all ecosystems like Google’s.
However, with a little time and effort, you can MacGyver a decent cross-platform system for yourself. Let’s get started.<snip>,2817,2473745,00.asp
article about Yahoo search, found in firefox.
Why You Should Use Yahoo Search (No, Really)
The fact that you don't use Yahoo for anything else may be its best quality.
By Evan Dashevsky   December 19, 2014
Last month, Firefox announced that it was switching its default search from Google to Yahoo. The news was met with a tidal wave of meh. And that reaction was completely understandable. Many of you reading this have probably all but forgotten about both companies—particularly Yahoo—and mentally relegated them to being a thing that grandparents use to search for MapQuest directions in public libraries.
Until a few months ago, that was basically my opinion of Firefox and Yahoo. However, we here at PCMag recently rekindled our love affair with Firefox, and I'm here to tell you why you should at least consider reevaluating Yahoo.<snip>,2817,2486399,00.asp
How to Set Up and Use Google Docs Offline
You can work on your Google Drive files offline, but only if you take a few steps before you reach an Internet-free zone.
By Jill Duffy   June 22, 2015
I recently started working entirely in the cloud. My work files live in Google Drive, and I use Google Docs, Sheets, and Slides for the majority of my business work.
One problem, which I mentioned when describing my transition to working entirely in the cloud in last week's column, is that working offline is possible but that requires setting it up ahead of time.
Sure, that sounds reasonable. Before you work offline, of course you need to set up a few things in advance! The problem happens when you don't realize you won't have Internet access. You know what they say about assumptions...
Maybe you board an airplane thinking there will be Wi-Fi, and there isn't. Or you arrive at a hotel where you expected Wi-Fi, but the ISP is down. What if a storm knocks out your Internet access at your home? Or maybe you were so excited about a trip to Tahiti that you plum forgot to set up offline access. It happens.
If you don't want this to happen to you, you need to set up Google Drive offline access now. Here's how.<snip>
How tech companies deceive you into giving up your data and privacy
Editor's note: This talk was presented at a TED Salon event given in partnership with Samsung.
Have you ever actually read the terms and conditions for the apps you use? Finn L├╝tzow-Holm Myrstad and his team at the Norwegian Consumer Council have, and it took them nearly a day and a half to read the terms of all the apps on an average phone. In a talk about the alarming ways tech companies deceive their users, Myrstad shares insights about the personal information you've agreed to let companies collect -- and how they use your data at a scale you could never imagine.<snip>
DEED Launches Tool to Measure, Report Broadband Access
Check Speed Minnesota will give insight into consumer experience, inform policymakers
 October 26, 2018       | Economic Development 
ST PAUL - The Minnesota Office of Broadband Development, located within the Minnesota Department of Employment and Economic Development (DEED), today launched a new tool that will allow Minnesotans to test, map and report various broadband internet speeds across the state. is a benchmarking tool designed to gather information about the high-speed internet consumer experience in Minnesota. By answering a few questions and running a speed test, the input captured will help create a better overall picture of broadband in the state.<snip>

Screen Mirroring and Casting
John uses this:  Elegiant --     
Miracast is extremely versatile and offers a host of mirroring capabilities. While it works with Android devices, it is especially useful for mirroring PCs. Like AirPlay, its Achilles’ heel is relying on your device’s internal resources, which ties it up and drains the battery. Still, if Android (and especially PC) mirroring is your game, Miracast-compatible devices may be worth checking into.      
How is Miracast related to Wi-Fi Direct?     
Wi-Fi Direct allows devices to connect directly to each other, without the need for a Wi-Fi access point (AP). It simply requires the push of a button, the entry of a PIN, or tapping two NFC-capable devices together. Wi-Fi Direct allows source and display devices to discover one another and provides the underlying device-to-device connectivity for Miracast. Miracast builds upon Wi-Fi Direct with mechanisms to negotiate video capabilities, setup content protection (if needed), stream content, and maintain the video session. 
====== Links from 11-2-2018 email ==========================
Disappearing disk space is a very common scenario.
Somehow, no matter how much we have, disk space never seems enough.
How Could My Bank Account Have Been Hacked if I Have Good Security?
For those with short attention spans, I'll start with what you need to do differently, beginning yesterday.
In the past, the traditional advice on passwords was:
Eight characters long, minimally
Never use names or words, at least not without mangling them somehow Never use combinations of names or words, at least not without mangling them somehow Use a combination of upper and lowercase letters and digits Use at least one special character — something other than a letter or digit — if the system will let you Those rules are no longer sufficient. Even if you carefully follow them all you're left with a password that remains very susceptible to many types of compromises.<snip>
What is OneDrive?
OneDrive is very similar to other cloud storage services, like DropBox, Google Drive, Box, and others.
At its most basic, it's simply file storage space on Microsoft's servers (aka “in the Cloud”). By storing files there, you can access them anywhere, from almost any device with an internet connection.
You can, of course, access your OneDrive files by visiting Once you log in with your Microsoft account, all the files and folders you've added to OneDrive will be available to you, along with the ability to create more folders and upload more files.<snip>
This New Trick Will Change How You Use Google Docs Forever
By Patrick Lucas Austin   October 26, 2018
Google’s making it easier for everyone — especially power Google Docs users who spend their days in the company’s office software — to quickly start new projects right from the Chrome browser.
In a tweet a Google account, the company announced a new list of shortcuts to create documents, slideshow presentations, spreadsheets, sites, and forms right from your web browser. The best part? It works in any browser, not just Google Chrome.
You can type,, or in your web browser to make a new Google Doc, just like you would type a website address. Use,, or for new Google Sheets. or will open a new Google Form. Make new Slides with,, or,, or are for making new Google Sites.<snip>
====== Links from 10-26-2018 email ==========================
10 Best Android Browsers To Enhance Your Web Browsing In 2018
December 25, 2017
Web Browsers are one of the most significant pieces of software on your device that serves as a window to access the World Wide Web. Mostly, a browser app is always pre-installed on every Android device. However, not all the browsers can provide you with a smooth and reliable browsing experience.
There are a lot of third-party web browsers available in the Play Store which can give a fast browsing experience and will consume as little data as possible. We have hand-picked ten best Android browsers which come with all the necessary features and top-notch performance.
Note: The list of browsers is just a compilation and not in order of preference. You’re advised to choose one that suits your needs.<snip>
8 Best Android File Manager And File Explorer Apps Of 2018
Best file manager apps for Android
January 23, 2018
Android’s file manager app is a vital piece of software on the device. The user-visible file system allows you to browse files, downloads, manage storage space, move things around and lot more. Although some manufacturers pre-install an Android file manager app on their devices, they are not robust and lack many features compared to other third-party file managers. Here, we provide a list of 8 best file managers which are rich in features and also free to download.
Note: This list isn’t in order of preference; it’s a compilation of the best file explorers. You’re advised to choose one as per your need.<snip>
8 Best Android Office Apps To Boost Your Productivity In 2018
March 2, 2018
Office application is an essential suite that allows you to create powerful spreadsheets, documents, presentations, etc., on a smartphone. Moreover, Android office apps come with cloud integration so that you can directly access the reports from the cloud, edit them, or save them online.
To meet the productivity need of Android users, the Play Store offers an extensive collection of Android office apps. But, we have saved you the hassle of going through each one of them and provide you a list of the best office apps for Android. The apps that we have picked are all free, although some do have Pro version or extra features available for in-app purchases. You can also refer to this list if you’re looking for Microsoft Office alternatives for your PC.
Note: This list isn’t in an order of preference; it’s a compilation of the best Android Office apps. You’re advised to choose one as per your need.<snip>
How to Clear Your Search History Off of Google's Servers With the Company's Latest Update
By Mike Epstein   10-24-2018
Google, one of the biggest stashers of our personal data, just updated Google Search—Aka Google-dot-com—to make it easier for you to review and edit what search data the company stores. The Google Search page now features a link below the search bar that will take you directly to a new data privacy hub that lets you scroll through and delete parts of whole swaths of your search history. It also gives you easy access to “Google-wide” controls, such as tracking activity on Google’s sites and ad personalization.<snip>

Upcoming at MicroCenter:
3710 Highway 100 South, St. Louis Park, MN 55416
Registration is required for workshops since space is limited;
Sign-up sheets are available only in-store at Tech Support or the Customer Service area.
Smartphones & Tablets Saturday, Oct. 27 and Sunday, Oct. 28  2:00 p.m.
Device functions, Product features, Display, battery life, Data storage and transfer, OS and applications, Carrier specific, unlocked, service features .
Form factor and accessories Build Your Own Saturday, Nov. 3 and Sunday, Nov. 4
2:00 p.m. Choosing components by specification Minimizing Electro-Static Discharge (ESD) Installing CPU and memory, Installing motherboard in case, Power connections and issues with ACPI, Installing video cards, hard disks, optical drives, System testing throughout build process
Upcoming Clinics
Saturday, 11/10 and Sunday, 11/11 » 2:00 p.m. - Back up & Restore
Saturday, 11/17 and Sunday, 11/18 » 2:00 p.m. - Windows 10 Basics
Saturday, 11/24 and Sunday, 11/25 » 2:00 p.m. - Thanksgiving. No Clinics.
Saturday, 12/1 and Sunday, 12/2 » 2:00 p.m. - No clinics until after the holidays.

Windows includes a feature in Windows 8 and 10, a “Metered Connection” option you can set for specific WiFi networks. To use this in Win 10, open the Settings app, select Network & Internet, choose Wi-Fi, choose “Manage known networks,” pick your phone’s hotspot, select Properties and enable “Set as metered connection.”
For windows 8.1:
Turn Android into free WiFi Hotspot (no root)
FoxFi is now part of PdaNet+, a top Android software downloaded by millions! PdaNet+ will provide you with multiple connection options - USB, WiFi and Bluetooth.
FoxFi enables WiFi Hotspot on your Android phone - no tether plan or rooting required! You can connect your tablets, computers or game console with WPA2 security. FoxFi usage is covered under your phone's existing data plan. Check to see if WiFi mode is supported on your phone model.
If WiFi mode is not supported on your phone model, please use USB mode or Bluetooth mode in PdaNet+ instead. It supports all phones.
PdaNet+ is one of the top Android applications of all time. PdaNet+ shares the Internet access of your Android phone with your computer or tablet. PdaNet+ works on all Android phones without rooting. It also does not require a tether plan, that will save you $20/month from most carriers.
PdaNet+ supports connection using WiFi, USB Tether or Bluetooth DUN. There is no speed limit in PdaNet+.
PdaNet+ for Android
Note: Free edition will interrupt your usage and requires you to turn back on.
Change the User Agent string on your web browser so that when you browse the internet using it, it just looks like it's the Android browser using the data connection.
How it's done (for Firefox):
Go into mozilla's address bar, type in "about:config", create a new string and name it "general.usreagent.override". Paste the info below as the value (only when tethering):
general.useragent.override;Mozilla/5.0 (Linux; U; Android 2.2.1; en-us; ADR6400L Build/FRG83D) AppleWebKit/533.1 (KHTML, like Gecko) Verzion/4.0 Mobile Safari/533.1
**Note- if you don't change it back to what it was before every time you're done tethering, some content on websites won't show up because the website thinks you're on a mobile device. Hulu, for example, won't load anything since it says your mobile device isn't supported (which really means the user agent string is doing its job).
OR, just dedicate a browser for that use and keep the User Agent settings for that purpose.
Why does my computer not detect my phone?
These are common things to check (please check in the order listed):
Ensure that "USB debugging" is enabled on your phone.
Enable "USB debugging" manually as follows:
From your phone's home screen, press the Menu key.
Choose Settings.
Choose Applications.
Choose Development.
Enable USB debugging.
Users of Android 4.0+ Ice Cream Sandwich should enable USB debugging as follows:
From your phone's home screen, press the Menu key.
Choose Settings.
Choose Developer options.
Enable USB debugging.
Check your phone's USB connection type. Most phones will require that Android's USB connection type be set to a "Charge only" mode. A handful (mostly some Motorola devices) require that the type be set to USB storage mode.
Connect your phone to your computer and make sure that "USB debugging" is enabled as described in the previous point.
Pull down the notification pane by swiping from top to bottom on your phone's screen.
Tap on the notification item called USB connection type.
Finally, experiment with the type. Most phones will require a "Charge only" mode. A few will require that a USB storage mode be activated instead, so try toggling until you see what is right for your phone.

Windows XP (possibly Vista/7) users. It might be necessary to kickstart Windows into seeing your device when it is connected. To do this:
First, enable USB debugging on your phone:
From your phone's home screen, press the Menu key.
Choose Settings > Applications > Development.
Turn on USB debugging.
Plug your phone into your computer.
Go to the Windows Device Manager by clicking on the Windows Start button. Choose Run (Search on Vista/7), and type in devmgmt.msc.
You should see a list of devices connected to your computer.
If Windows has drivers for your phone, the phone will be listed near the top as an "Android" or "ADB" device. You can stop if this applies to you, as Windows has installed the proper drivers for your phone.
If Windows is missing drivers for your phone, the phone will be listed under "Other devices". If this applies to you, please continue.
Right-click on the "Other device" that corresponds to your phone.
Choose "Update Driver..."
You should see a Windows Hardware Update Wizard appear. Let Windows search for and install drivers/software automatically, but decline any options about connecting online to Windows Update.
Windows should then take a few seconds to install the driver.
On Windows XP, this Hardware Update Wizard process may repeat automatically a few times, so repeat as necessary, waiting about 30-60 seconds for everything to settle down.
After doing this, Windows should identify your device as some sort of "Android" or "ADB" device near the top of the Device Manager list. Klink should now see your device.
If your phone is still not detected, it might help to power down and restart the device, especially if it was working previously. Unfortunately, some phones have buggy USB implementations and others overheat when used for too long, so be mindful of this possibility. (For example, you might want to keep the phone cool to see if that improves stability.)

====== Links from 10-19-2018 email ==========================    

Thanks to Dwight Lindberg for showing the buddies his use of  "Artist's Eye Free", an app which he got from Google Play for his android smart phone.
We viewed a short video demo, found here:
Artist's Eye drawing aid app for Android: Dwight also found an app for his sister's iPhone which is similar:
And, searching for Lucida on google play, there are several similar apps:
All of these allow you to trace/copy a picture on your smart phone to a drawing pad/surface.
My Good Life: How I fell for a scam
By KATY READ , STAR TRIBUNE   October 17, 2018
I got taken by what has since become one of the most ridiculously notorious scams out there: the fictional “Windows Repair Department.” Googling “windows repair scam” produces 12 million results. According to my rigorous scientific research (i.e., casual conversations and Facebook comments), almost everybody has gotten a call from them.<snip>

How to Tell if Your Email, Computer, or Facebook Has Been Hacked

Every once in a while, things become corrupted on your hard disk in such a way that Windows 7 is unable to boot. From the MBR (Master Boot Record) to other information critical at boot time, if it's not there, you can't boot.
Fortunately, Windows includes diagnostic and repair tools on your Windows setup disc.
Fixing Windows 7 Boot Problems

Why Does My Microsoft Word Document Display Differently on Different Computers?

How Could My Bank Account Have Been Hacked if I Have Good Security?

What's the Difference Between a Router, a Wireless Router, and a Wireless Access Point?

How Do I Choose a Good Password?

Why Did Deleting a Desktop Icon Delete the Program?

I've looked at your answers for problems that seem like they relate to mine, but everything seems to be “check this” or “it might be that”. Why can't you just give me the specific steps I need to solve my problem? Why can't I get a straight answer?

That's why I wrote an article on the topic: What Information Should I Provide When Asking for Help?

Your fan is a definite possibility, but first we should talk about … dust bunnies.
Continue Reading: My Computer Has Started to Shut Down Randomly. Could it Be the Fan?

Recovery partitions not having a drive letter is actually a good thing.
How Do I View the Contents of My Hidden D: Drive?

I Think I've Been "Phished", What Should I Do?

How Do I Gain Access to My Deceased Relative's Computer?

Will a Hacked Website Leak My Email Address?

Is it Safe to Just Turn Off an External USB Drive Without "Safely Removing" First?

====== Links from 9-28-2018 email ==========================    

John recommends the MUTE TAB extension for both Firefox and opera browsers. When you select it, it  prevents you from hearing the undesired audio from "auto-play" videos on a web page. Just be sure to un-mute when you want to hear a Youtube video or something else.

Senior Computer Buddy Robert Stryk passed along this tip:
Mozilla has some views about what can be done to protect privacy They’ve put together a list of 13  privacy extensions, all made to help give you more control of your personal information.
Security experts say Chrome 69’s ‘forced login’ feature violates user privacy A new feature in the latest version of Google  Chrome that logs users into the browser when they sign in to a Google site has come under fire.
Until recently, it was the user’s choice to log-in to the browser. Now, any time that you sign in to a Google site in Chrome 69 — like Google Search, Gmail or YouTube — Chrome will also log you in, too.
But the change has left users unclear why the “feature” was pushed on them in the first place. Many security folks have already panned the move as unwanted behavior, arguing it violates their privacy. Some users had good reasons not to want to be logged into Chrome, but now Chrome seems to takes that decision away from the user.<snip>
Up for Grabs: Taking Charge of Your Digital Identity AARP National Survey of Internet Users Age 18+ by Karla Pak, Doug Shadel, Alicia Williams, AARP Research, August 2018 | Comments: 0 Americans aren’t valuing their own digital identity Americans spend an increasing amount of online time shopping, managing their money and engaging in social media. Yet many are not always careful to protect their digital identity from being compromised, a new AARP survey finds.
To maximize safety online, security experts suggest people use unique passwords for their accounts, freeze their credit—not just when suspicious activity surfaces—and set up online access to their bank and credit card accounts to monitor them. AARP’s national survey of about 2,000 adults, however, finds that most are not taking these steps, leaving themselves vulnerable to fraud.
In the survey, AARP quizzed adults by asking eight questions intended to gauge how savvy they were about managing their digital identity. Nearly three-quarters (73%) failed the quiz, answering half or fewer of the questions correctly. (Take the quiz to test your online security smarts.) <snip>

====== Links from 9-21-2018 email ==========================
Chromebooks versus Windows laptops: Which should you buy?
In the fight between a Google Chrome OS-powered Chromebook and a Microsoft Windows PC, it boils down to cost versus convenience.
By Mark Hachman    Senior Editor, PCWorld    Aug 27, 2018
Table of Contents
•What’s the difference between a Chromebook and a PC?
•Is a Chromebook or laptop better for office work?
•Which is better for web browsing, a Chromebook or Windows PC?
•Can a Chromebook play games as well as a Windows PC?
•Which offers more apps, Chromebooks or Windows PCs?
•What’s it like using a Chromebook versus a Windows PC?
•Which is more secure, a Chromebook or a Windows PC?
•Which Chromebook or laptop should I buy?
•Which is better, a Chromebook or laptop?
Should I buy a Chromebook or a Windows laptop? Whether you’re seeking out the best computer for your child or just weighing which inexpensive computer is right for your home, considering a Chrome OS-powered Chromebook as a PC alternative is a smart choice—and we can help you choose the right one.
Who should buy a Windows PC?
A notebook PC powered by Microsoft Windows offers several advantages: Windows offers the most flexibility to run just about any app, as well as the choice of any browser you choose. You can tweak and configure your PC as you choose.
Windows laptops for the budget buyer
That convenience demands more computing horsepower, and often a higher price compared to most Chromebooks. Prices can soar into the thousands of dollars, and if you need a powerful PC for gaming or video editing, Chromebooks really don’t offer that much competition. But you’ll find some great deals among our more affordably priced, top Windows picks.
Who should buy a Chromebook?
A Chromebook powered by Google’s Chrome OS is a simpler, more optimized affair, a locked-down PC that’s little more than the Chrome browser—but it can be hundreds of dollars cheaper than a comparable Windows PC, too. Updates occur behind the scenes, so you can just open the lid and go. Google handles all the security, too. The Internet offers much of what you’ll need, whether it be working within web apps or Chrome plugins. But it’s the workarounds and little inconveniences that you may find annoying in the end.
If you’d like, read on to dive deeper into the differences between the two, as well as some recommendations on what to buy. Just be aware that the conversation will center around inexpensive machines that can accomplish basic tasks. Chromebooks can’t hold a candle to $2,000 gaming PCs, though some cloud gaming services might allow them to eventually.<snip>
Home/ Productivity Software  Updated
The best free Microsoft Office alternatives Battle of the free office suites.
By Michael Ansaldo
Freelance contributor, PCWorld    Oct 2, 2017
Microsoft Office is the king of office productivity suites, but it doesn’t inspire warm, fuzzy feelings in all users. Parsing the ever-expanding list of features—many of which you’ll never use—can feel like stepping into a cockpit without a pilot’s license. The ribbon interface, introduced a decade ago, has many fans, but others pine for the static menus of the early aughts. And then there’s Office’s hefty price tag.
Fortunately, alternatives abound, ranging from web apps to freemium and open source desktop installations, many of which are compatible with Microsoft Office docs. We compared six of the most popular free office suites to see how well they replicate the most commonly used features of Microsoft Office.<snip>

====== Links from 9-7-2018 email ==========================
Open Glossary of Edge Computing
Towards a Common Lexicon
The Open Glossary of Edge Computing seeks to provide a concise collection of terms related to the field of edge computing. The purpose of the glossary is to improve communication and accelerate innovation through a shared vocabulary, offering a vendor-neutral platform with which to discuss compelling solutions offered by edge computing and the next generation Internet.
The Open Glossary is now an official project under the stewardship of The Linux Foundation, which is helping to implement a community-driven process to develop and improve upon this shared lexicon, The official version of the Open Glossary is available via this GitHub repository. Proposed edits, clarifications and suggestions are made by filing GitHub issues or creating “pull requests.” Each issue, addition or suggested change will be evaluated by the community for inclusion. To contribute to the glossary, refer to our Contributing Guide.
The Open Glossary is presented under the Creative Commons Attribution-ShareAlike 4.0 International license (CC-BY-SA-4.0) in order to encourage use and adoption. Code contributions to the project are licensed under the Apache License, version 2.0 (Apache-2.0).
Open Glossary of Edge Computing [v0.9.0-Beta]
•Version: v0.9.0-beta
•Date: June 12, 2018 1:28 PM Pacific Time
•License: Creative Commons Attribution-ShareAlike 4.0 International (CC-BY-SA-4.0) Overview The Open Glossary of Edge Computing is a freely-licensed, open source lexicon of terms related to edge computing. It has been built using a collaborative process and is designed for easy adoption by the entire edge computing ecosystem, including by open source projects, vendors, standards groups, analysts, journalists, and practitioners.<snip>

====== Links from 8-31-2018 email ==========================
$9.95 a month + tax
15 Mbps
Veterans Program
Internet access at home opens the door to a world of knowledge and opportunities for you. Comcast Internet Essentials offers affordable Internet for the home. You can qualify if you are a verified veteran and receive state or federal assistance.
Do you qualify?
Find out if you're eligible for Internet Essentials by looking at the checklist below.
Start your application today!
Eligible Veterans:
Must be a low-income veteran.
Must receive federal or state public assistance.
Do not have outstanding debt to Comcast that is less than a year old. Veterans with outstanding debt more than one year old may still be eligible.
Live in an area where Comcast Internet service is available but have not subscribed to it within the last 90 days.
First Things First
New to the internet? This is a great place to start. Here, you'll find an overview on how to connect to and navigate the internet—including tips on using search engines, social media platforms, and email.
[Provided by Comcast...some good info here.]
6 common habits that put you at risk for identity theft Data breaches and hacks are often unavoidable, but security experts say there are some everyday habits that put consumers even more at risk.
by Emily Long   Aug.20.2018
Before providing your credit card information or social security number over the phone, make sure that it’s absolutely necessary.
According to a report by Javelin Strategies, U.S. residents lost $16.8 billion to fraudsters in 2017, and the number of victims increased 8 percent over the previous year.
U.S. residents lost $16.8 billion to fraudsters in 2017.
Unfortunately, identity thieves are getting smarter, which means that consumers have to be even more vigilant when it comes to protecting their personal information and their financial well-being. Thieves are launching more complex schemes, but consumers also don’t think twice about many common practices that put their data — and their money — at risk.
Google's Android P launches with a new name – it's Pie – and focuses on screen-time addiction Edward C. Baig, USA TODAY Published  Aug. 6, 2018 That’s the yummy new moniker for the latest version of Android that Google finally revealed on Monday, the same day that Android 9 Pie comes out of its beta test phase and starts showing up via an over-the-air update on all of the company’s Pixel smartphones.
Google, of course, has been naming versions of Android after appetizing treats for years – thus, Pie follows, among others, Oreo, Nougat, Marshmallow, and Lollipop.
As in the past –alas – if you’re one of the many people who own a branded Android handset that’s not from Google, you’ll have to wait as long as until the end of the year (and possibly beyond) before P is made available on your device.<snip>
The Digital Literacy Library is part of Facebook’s Safety Center as well as a larger effort to provide digital literacy skills to nonprofits, small businesses, and community colleges. Though it feels like a step in the right direction, curiously missing from the lesson plans are any mentions of “fake news.” Facebook has worked on a news literacy campaign with the aim of reducing the spread of false news before. But given the company’s recent announcements admitting to the discovery of “inauthentic” social media campaigns ahead of the midterm elections, it’s strange that the literacy library doesn’t call attention to spotting potential problems on its own platform. [Good general info for senior computer buddies, too. See below]

Facebook's Digital Literacy Library
Find lesson plans designed by experts to help young people develop skills needed to navigate the digital world, critically consume information and responsibly produce and share content. Designed to be interactive and engaging, these lessons involve group discussions, activities, quizzes, and games that have been built in consultation with teens. Use them either collectively or individually in the classroom, as part of after-school programs, or even at home.
Participants will learn about public Wi-Fi networks and their benefits and risks. More specifically, they will learn to recognize unsecured Wi-Fi when it is available to them, understand the tradeoffs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
Participants will learn how to keep their online information more secure by using and maintaining strong passwords. Participants will learn about the principles of strong password design, the potential problems of password sharing. They will also learn how to keep their passwords safe, and how to take steps to prevent unauthorized access to their accounts.
Participants will learn about malicious online users who might attempt to use security weaknesses to gather information about them. Participants will be able to describe the risks of being online, develop strategies to engage in safer behaviors, identify spam messages, and explain who should ask for their password.

How to I stop my homepage from changing? – If your home page keeps changing after you have set it, I start to suspect malware. Time for a thorough malware scan and cleaning.

Let’s Retire the Phrase ‘Privacy Policy’
People assume it means their information will be kept private. Nothing could be further from the truth.
By Joseph Turow   Mr. Turow is a professor of communication.   Aug. 20, 2018
True or false:
“When a website has a privacy policy, it means the site will not share my information with other websites or companies without my permission.”
According to my research — a nationally representative phone survey conducted in January and February — a majority of Americans think this is true.
It isn’t. Not even close. <snip>

====== Links from 8-24-2018 email ==========================    

How Do I Delete My Facebook Account?

This Is Why I Back Up

How Do Chrome and Chrome Relate?

What's the Difference Between Hibernate and Sleep?

Facebook Hacked? What You Need to Do NOW

Will a Scheduled Backup Wake My Machine Up If It's Sleeping?

====== Links from 8-9-2018 email ==========================    

Should I Cover Up My Webcam When I'm Not Using It?

Can My ISP See What I'm Doing If I Use a Virtual Machine (VM)?

How Do I Create a Bootable USB Thumb Drive from an ISO?

Why Do Things Disappear from the Clipboard When I Close a Program?

The First Eight Things to Do with Your New Computer

Is it Safe to Install a Higher Wattage Power Supply in My Computer?

Why Does My IP Address Have a Bad Reputation? And What Do I Do?

How Do I Fix a Cyclic Redundancy Check Error When I Try to Copy a File?

Where's the Recycle Bin on My USB Drive?

How Do I Clean Up After Windows Update?

How Can I Automatically Reply to Spammers To Tell Them to Stop?

How Do I Print Pictures from Websites So They Look Good?

====== Links from 8-3-2018 email ==========================
Your cell phone number is more important and less secure than your Twitter password Nick Selby, Opinion contributor Published July 27, 2018 It's shockingly easy for hackers to hijack your digital life using phone numbers. The public should press Congress and carriers to improve security.
On July Fourth, hackers accessed computers at the social media aggregator Timehop. They stole 21 million user records. Timehop executives quickly realized that the most sensitive compromised records weren’t email addresses, names or even dates of birth. Their top concern was the 4.9 million stolen customer phone numbers.
The mobile phone number has become society’s primary authentication token. If you forget the password to your bank account, you recover it by entering the digits texted to your phone number. That’s how the bank “knows” you’re you.
Compared with email and online banking, there’s almost no security to protect a phone number from being stolen. Using information and tools available easily and cheaply online, “SIM swapping” attacks can be mounted against any phone number.
Once the bad guys have hijacked your phone number, they can reset your email password and lock you out while they systematically take over your online banking, retirement accounts, photos ... every aspect of your digital life. Regaining control can take days — and you might never get back easily transferred assets, like cryptocurrency.<snip>
Some Amazon reviews are too good to be believed. They're paid for
Business  Ryan Kailath    · NPR ·  Jul 30, 2018 
In shadow marketplaces, positive reviews for Amazon products are bought and sold. The company says it's cracking down and that it estimates that less than 1 percent of reviews are fake.
Travis is a teenager living in a small town in the Northeast. He enjoys hunting and shooting, and keeps a rifle at home. But with several younger siblings around the house, he wanted to make sure his gun was safe. So he ordered a trigger lock on Amazon, to prevent the gun from firing.
"The reviews were great, five-star reviews," says Travis, who asked that NPR use only his first name to avoid scrutiny and possible legal attention. "[They] said it worked great, locked perfectly, the combination system worked great."
It didn't.
"The combination doesn't even matter; the lock just opens," Travis says. "It's cheap plastic, it will pull apart as soon as you give it any force."
Thankfully, he realized this immediately, went to a store, and purchased a proper trigger lock for his gun. Everyone at home is fine.
Travis rues the experience, and the stellar reviews that led him to purchase the faulty lock in the first place. He didn't realize it at the time, he says, but he's now certain that those glowing reviews were paid for. And that many of the people who gave the trigger lock excellent reviews may never have opened the package in the first place.

How Should I Back Up My Computer Before an Operating System Upgrade or Reinstall?

Does Bounced Email Mean All the Recipients Didn't Get My Message?

Why Does My Email Sometimes Show Up with Funny Characters Like "=0D" In It?

What's the Difference Between Windows 10 Home vs Pro Editions?

My Mouse and Keyboard Stopped Working, but Work Elsewhere. How Do I Fix Them?

I Deleted a File by Mistake, Can I Get It Back?

Do I Need All These Partitions?

How Do I Find Out What Program Is Using All My CPU?

Is Online Document Conversion Safe?