Friday, March 15, 2019

Visit us at LenoxCC!

[] [] [] Tuesday, March 19, 2019  ~1-3pm   
Meeting in Lenox Community Center, Room 110 
Topic -- Portable Applications     
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.
Over 400 Real Portable Apps
Free, Legal, Safe, and Fully Portable
No Shovelware. No Bundleware.     
[] [] [] Tuesday, March 26, 2019  ~1-3pm     
Meeting in Lenox Community Center, Room 110
Topic --  "Bring In Your Box Day"   
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.

[] [] [] Tuesday, April 2, 2019 ~1-3pm  
Meeting in Lenox Community Center, Room 110
Topic -- TBA    
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.  

[] [] [] Tuesday, April 9, 2019  ~1-3pm     
Meeting in Lenox Community Center, Room 110
Topic -- Windows 7 and 10 discussion   
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.  

[] [] [] Tuesday, April 16, 2019  ~1-3pm   
Meeting in Lenox Community Center, Room 110 
Topic -- TBA     
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.

[] [] [] Tuesday, April 23, 2019  ~1-3pm     
Meeting in Lenox Community Center, Room 110
Topic --  "Bring In Your Box Day"   
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.

[] [] [] Tuesday, April 30, 2019  NO MEETING
It's The Fifth Tuesday Of The Month!
"Bring In Your Box Day" (every fourth Tuesday!)  The first four Senior Computer Buddies to contact me may bring in their windows computer and get advice about using it. We can supply the ac cord, keyboard,  mouse and monitor for your desktop or tower computer. It's  helpful to tell me before Tuesday if you are bringing in  your unit.      
 Regular Meetings:     

1pm Specific Topic or Open topics discussion [except bring in your box days]
2pm Help session. Some help  opportunities may be simultaneous as a buddy installs  recommended software while another buddy asks a  question.   
All Senior Computer Buddies will benefit from our best-effort attempts in solving unusual or common problems.  Sometimes just emailing a detailed question about your computer operation problem can result in  an answer which precludes the need to drag your box  in.   
The group is not a class in learning computer operation, but a discussion of topics for computer users, with best-effort help available.. 
There are two chromebase computers available for browsing, without printing capability.
We also have a Windows Ten and Linux computer available for you to try.

Please review your Senior Program Newscaster Newsletter and the ISD 283 Community Education Catalog for Computer Classes.   

The buddies blog is back!
 It's not fancy, and you can see it at

 John McHugh
 SLP City Hall Cable TV Office
 Community TV Coordinator, ParkTV15/96
 SLP Senior Program Mentor at LCC
 5005 Minnetonka Boulevard
 jmchugh [at]
 "We Believe Our Public Service Makes A

 City Hall has free wireless internet,
 provided by City Of SLP. It's a "Park Public Wireless Spot"!
 It is also available at The Rec Center, Lenox Community Center [west end] and Westwood Nature Center! Bring your  laptop and try it: confirm that your computer has detected  SL-Public. Connect to it. Then open a browser and navigate  to  A "landing page" will appear where you  must click "Accept" to the terms and conditions for free internet access.
 * * *
 Did you find something other Senior Computer Buddies should read?
 Send a link to John!   

====== Links from 3-15-2019 email ==========================    

How Do I Decompress All the Files that Windows Compressed for Me?

Out-of-Office Replies are Evil

Crank Your Password Strength Up to 11!

Should I Use Facebook to Log In to Other Sites When Offered?

Chkdsk Cannot Run Because the Volume Is in Use by another Process" -- What Does It Mean and How Do I Fix It?

2018's Most Popular "Ask Leo" Articles

Who Is the Administrator of my Home Network?

What Is Pagefile.sys? Can I Delete It?

Can I Copy Windows 10 System Files to Another Drive?
Googling Strangers: One Professor's Lesson On Privacy In Public Spaces
March 10, 2019   by FRANCESCA PARIS & Scott Simon
Kate Klonick, assistant professor of law at St. John's University, gave her students an optional assignment for spring break: Try to identify a stranger based solely on what they reveal in public.
Charlotte Lehman could hear the man reading his credit card number out loud from across the Starbucks.
He was speaking to a companion, but his voice carried over the music to where Lehman sat. Surrounded by a dozen or so people, the speaker also divulged his phone number a­­nd home address.
After that, all it took for Lehman to identify him was a quick Google search. She was able to find the man's full name, what he does for a living and his professional website. She even heard him sharing a password.
Lehman, a third year law student, wasn't Googling the stranger for fun. She was on a homework assignment from her professor — to "de-anonymize" someone in a public place.<snip>

====== Links from 3-8-2019 email ==========================    

Topic -- weather on line    
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.

====== Links from 3-1-2019 email ==========================    

How Can an Employer Recover Information I've Erased?

A Drive with All My Data is Showing as Unformatted -- What Do I Do?

How Do I Keep My Kids Safe from Internet Garbage?

====== Links from 2-22-2019 email ==========================
20 great free streaming services for cord cutters
BY JARED NEWMAN   02.11.19  
The best thing about cutting the cable cord is that you get a lot more control over your monthly TV bill. Instead of spending $100 per month or so on a bloated bundle of TV channels, you can throw together a few streaming services like Netflix or Hulu and save a lot of money.
Alternatively, you can take things to the extreme and trim your TV bill to zero dollars per month. These days, there are so many free streaming services that you can watch hours of TV every night and spend nothing.
Whether you’re chasing that mythical $0 TV bill, or just trying to pad out your paid subscriptions with a few more things to watch, here are 20 free streaming TV services you ought to know about.<snip>
15 amazing Google tricks you never knew before now Kim Komando, Special for USA TODAY Jan. 15, 2019  “Google it.” We use this phrase every day. Once upon a time, the word “Google” just indicated a very long number. Today, it’s a verb.
That extends to physical products as well.
But the world's most powerful search engine can do more than find things. Yes, the full G-Suite is a game-changer, and many of us have uploaded our entire digital existence to Drive; but most users don't even realize how much power they have with a simple browser, thanks to Google's many features and tricks.
While you’re at it, find out what Google knows about you through its “takeout” feature. It’s free and tells you what the search giant knows about you. (Hint: If you’ve got multiple Google accounts, you’ll need to sign out and sign in for each.) If you never realized you could run two searches simultaneously or convert your screen to Klingon, read on. Google will grant you access to pretty much all of human knowledge, but even that is only the tip of the iceberg.<snip>
Google isn't the only way to search online. Here are 7 services you should try instead Kim Komando, Special for USA TODAY  Jan. 25, 2019 Google isn’t everything. Yes, it’s the most powerful search engine ever created. Yes, it processes 40,000 searches per second. And yes, Google is the go-to search engine for the majority of us.
Still, Google doesn’t know everything, and there are some resources that are actually better than Google at finding certain information. Some sites index streaming movies, others archive GIFs. Other search engines may not have the omniscience of Google, but they are far more committed to your privacy.
For those special searches, here are seven search sites you can use other than Google. These services cover a range of themes and needs, but you’re almost guaranteed to find one useful – and you might find yourself consulting it over and over. The best part: They’re basically all free.<snip>
How to stop your smartphone from tracking your every move, sharing data and sending ads Kim Komando, Special to USA TODAY Published Feb. 14, 2019 It's not just your smart TV, it's your phone, computer, home appliance with Internet. How to handle it all, on Talking Tech.
Your phone knows where you are standing or sitting at this moment. Most people know that. How else could you use GPS? While location tracking is essential for directions, it also helps big tech sell you things.
“Targeted advertising” is a massive phenomenon. Companies are eager to flood your screen with ads, which are primarily influenced by your day-to-day habits. Facebook, Apple, Microsoft, Amazon, Google and many others make money off mobile ads, and they need this information to power their data-mining machines.
Why is your phone allowed to track you and share that data with unknown third parties? In short, you gave it permission. Typical data-sharing policies are buried within pages and pages of privacy policies and terms of agreements.
Companies usually have a reasonable explanation, such as Apple tracking personal calls and emails to prevent fraud, which many consider an invasion of privacy.
No matter what device you use, accessing the internet subjects you to behavioral tracking. If this practice bothers you, all hope is not lost.<snip>

Topic -- android operating system on "remix pc"     
Windows 7 computers [3] available for web browsing.   
Please sign in on the buddy sheet when you arrive.

====== Links from 2-19-2019 email ==========================    
What Security Software Do You Recommend?
Microsoft, We Deserve Better
Updates to Windows seemingly can't be trusted, and yet they're forced on us. Something must change.
In recent weeks, I’ve seen calls from several sources suggesting that Microsoft stop, take a breath, and seriously review their update process.
I agree. This madness must end. Or at least slow down.
Most people should still take updates, backing up first.
Taking updates feels akin to Russian Roulette.
Microsoft can do better, and I offer specific actions they can and should take.
Coping with Windows 10
Do All These Software Updates Take Up More and More Disk Space?
How Do I Figure Out My Windows Edition?

Use BitLocker to Bypass Potential Self-Encrypting Drive Vulnerabilities
Can I Reassign My Drive Letters?
How Do I Fix Jagged Fonts in Windows 10?
How Do I Stop Websites from Pestering Me About Notifications?
Using OneDrive for Nearly Continuous Backup
Back Up Smartphone Photos Using OneDrive
Has a Hacker Really Hacked My Email Account?
====== Links from 2-11-2019 email ==========================    
How Do I Change the Default Mail Program in Windows?
I Have Two Facebook Accounts, How Do I Delete Just One of Them?
Don't Lose Your Phone: Here's What Can Happen (and How to Prepare)
How Can I Use a Password Manager for My Security Questions?
What's the Difference between a Hub, a Switch, and a Router?
Why Can't I Undelete these Files?

====== Links from 2-1-2019 email ==========================
How to protect the photos trapped on your iPhone (and untrap them) You don’t have to leave photos on your phone, where they could be lost. Protect them by saving them to the cloud and printing them.
By Jessica Teich Globe correspondent  January 10, 2019
Quick: If there were a fire in your house and you could save only one material item, what would it be? Did you, like so many others, think of photo albums and home videos? It’s a sensible answer: “Your photos are your life story,” says Mike Hagan, a photographer and the author of “Thousands of Images, Now What?”
Today, we use our phones as cameras and photo albums. What if there was a proverbial fire in your phone, maybe in the form of a drop into a puddle, a bad fall, or a theft? What would happen to those photos and memories? Would you know how to recover them?
“Having offsite photo storage is really essential,” says Chris Sanchez, a professional photographer and founder of Boston Photography Workshops. “You just never know what’s going to happen to your phone or device.”
One way to get internet access for your computer is by using a smartphone as a hotspot. A new company, mintmobile, offers various plans, starting with 3gb/$15/mo. To 12gb/$25/mo.
Of course that's the intro rate...
And their cheapest smart phone is $54
Here's a coverage map:
It's a 4g connection, up to 12mbps.
So, if you're angry at your current provider and are considering changing....
Once you visit their website, it's purely coincidental that their ads appear on other pages...yes?
[John is still using his freedompop hotspot instead of spending more, as above]
Marie Kondo tries to get my digital life in order Thu January 31, 2019 New York (CNN Business) - On a recent Saturday morning, while my wife and infant slept in their peaceful, newly uncluttered rooms, I opened my laptop, clicked "select all," and looked at the frightening total.
I knew it would be bad. I didn't realize "bad" meant there would be 27,897 files on my computer. Almost immediately, my resolve to get my digital life in order weakened. Then I heard Marie Kondo's voice in my head -- or more accurately, in my inbox. "The biggest mistake with digital tidying is focusing too much on what to discard," Kondo wrote me in an e-mail earlier that week, by way of a translator, by way of a publicist, by way of a naive hope that a Netflix star could rescue an overtired new parent from being buried alive in his own digital clutter. The focus, she told me, should be on "what's valuable to you and on what you want to keep in your life. "With that soothing advice in mind, I resumed my digital tidying.<snip>
Home / EDOCS / Commission Documents /
Commissioner Jessica Rosenworcel Releases Responses to Her Call for Free Robocall Blocking Tools for Consumers
Bureau(s): Office of Commissioner Rosenworcel Files
Your digital identity has three layers, and you can only protect one of them
By Katarzyna Szymielewicz   January 25, 2019
Co-founder of Panoptykon Foundation
Your online profile is less a reflection of you than a caricature.
Whether you like it or not, commercial and public actors tend to trust the string of 1s and 0s that represent you more than the story you tell them. When filing a credit application at a bank or being recruited for a job, your social network, credit-card history, and postal address can be viewed as immutable facts more credible than your opinion.
But your online profile is not always built on facts. It is shaped by technology companies and advertisers who make key decisions based on their interpretation of seemingly benign data points: what movies you choose to watch, the time of day you tweet, or how long you take to click on a cat video.
Many decisions that affect your life are now dictated by the interpretation of your data profile rather than personal interactions. And it’s not just about advertising banners influencing the brand of the soap you buy—the same mechanics of profiling users and targeting messages apply to political campaigns and visa applications as much as supermarket metrics. When advertising looks like news and news look like entertainment, all types of content are profiled on the basis of your data.
So what story does your data tell about you?<snip>
FaceTime Bug Lets iPhone Users Eavesdrop, in a Stumble for Apple The FaceTime bug could also give a caller access to a live feed of the recipient’s camera.
By Brian X. Chen   Jan. 28, 2019
SAN FRANCISCO — The iPhone as an eavesdropping device? Watch out. It can happen.
On Monday, Twitter and other social networking sites lit up with anxious Apple users after the news site 9to5Mac reported on a strange glitch in the company’s iPhones. The issue: It turns out that an iPhone user can call another iPhone user and listen in on that person’s conversations through the device’s microphone — even if the recipient does not answer the call.
The problem was the result of a bug and involves Apple’s FaceTime app for placing video and audio calls over an internet connection. The bug could also give a caller access to a live feed of the recipient’s camera.
On Monday night, Apple said it had disabled Group FaceTime, the feature that was causing the glitch.
The glitch is embarrassing for Apple, which is set to report disappointing financial earnings on Tuesday. The Silicon Valley company has long positioned itself as a protector of user privacy offering more secure devices than its rivals.<snip>
Home » News & Events » Blogs » Tech@FTC » Time to rethink mandatory password changes Time to rethink mandatory password changes
By: Lorrie Cranor, Chief Technologist | Mar 2, 2016 Data security is a process that evolves over time as new threats emerge and new countermeasures are developed. The FTC’s longstanding advice to companies has been to conduct risk assessments, taking into account factors such as the sensitivity of information they collect and the availability of low-cost measures to mitigate risks. The FTC has also advised companies to keep abreast of security research and advice affecting their sector, as that advice may change. What was reasonable in 2006 may not be reasonable in 2016. This blog post provides a case study of why keeping up with security advice is important. It explores some age-old security advice that research suggests may not be providing as much protection as people previously thought.<snip>
Two-Factor Authentication Might Not Keep You Safe The online security “best practice” is still vulnerable to phishing attacks.
By Josephine Wolff   Jan. 27, 2019
Ms. Wolff is an assistant professor at the Rochester Institute of Technology.
Here’s how two-factor authentication is supposed to work: You log in to your bank account or email inbox, and after correctly entering your password, you are prompted to confirm the login through an app on your cellphone, a one-time code sent to you via text message or email, a physical YubiKey device or even a phone call. That app, text message, email, YubiKey or phone call is your “second factor,” intended to ensure that even if the person trying to log in isn’t really you, he or she still can’t gain access to your accounts without access to your phone or YubiKey.
You might find two-factor authentication mildly irritating, and there’s a chance you might not even notice the extra step in the login process anymore. Regardless, you probably feel a certain comfort in the idea that at least your money or your inbox is well protected. But like so many other commonly accepted best practices in computer security, we actually know very little about how well two-factor authentication works.<snip>
T-Mobile’s new 600MHz hot spot is intended to provide broadband to rural customers By Dami Lee  Jan 25, 2019 Today, T-Mobile announced the launch of the Coolpad Surf, a 600MHz mobile hot spot that’s aiming to bring service to rural areas. It’s the first mobile hot spot to support Band 71, or 600MHz LTE, which T-Mobile recently won the spectrum license for from the Federal Communications Commission Broadcast Incentive auction last April. A number of phones have been released with Band 71 support since then, including the iPhone XS and XR, Samsung Galaxy S9, and the OnePlus 6T. T-Mobile says that Band 71 is designed to provide better coverage for rural customers, which has traditionally been a weak point for the carrier.
The Coolpad Surf (which is a sick name), has a 2,150mAh battery that can last up to 48 hours on standby and gets around five hours of use on one charge. It can be used with up to 15 devices at once. In addition to support for Band 71, it also offers support for 4G LTE Bands 2, 4, 12, and 66, and 3G Bands 1, 2, and 4. The device costs $72, and data plans start at $10 a month for 2GB of data and go up to $85 a month for 22GB of data.
T-Mobile plans to bring the hot spot to its budget brand Metro later this month, only it’ll go by the less cool name of MetroSMART Hotspot, with different pricing and data plans.
The Coolpad Surf is available now on T-Mobile’s website:
Big tech firms still don’t care about your privacy <snip>  Unfortunately, you’re not reading this on Earth 2, and we don’t live in that privacy-sensitive marketplace. So you shouldn’t be surprised if we “celebrate” the faux-liday of Data Privacy Day by learning about yet another data breach.
Maybe it’ll be an epic-scale incident involving hundreds of millions of people, a few million passports included. Perhaps it will be a more mundane breach that exposes only names, email addresses and encrypted passwords that you please please please didn’t use elsewhere. Or it could be a boutique breach that compromises only credit cards that you can easily replace.
The one thing it won’t be is a surprise. Because unlike Data Privacy Day, data breaches happen a lot more than once a year.

====== Links from 1-25-2019 email ==========================    
How Can I Make the Text on My Screen Larger?
By Joseph Cox and Jason Koebler   Jan 23 2019
Data Broker That Sold Phone Locations Used by Bounty Hunters Lobbied FCC to Scrap User Consent Zumigo, which sold the location data of American cell phone users, wanted the FCC to remove requirements around user consent.
Earlier this month Motherboard showed how T-Mobile, AT&T, and Sprint were selling cell phone users’ location data that ultimately ended up in the hands of bounty hunters and people unauthorized to handle it. That data trickled down from the telecommunications giants through a complex network of middlemen and data brokers. One of those third parties was Zumigo, a company that gets location data access directly from the telcos and then sells it for a profit.<snip>
Study: On Facebook And Twitter Your Privacy Is At Risk—Even If You Don't Have An Account     by JOSHUA E. BROWN   PUBLISHED 01-21-2019
Identity and actions can be predicted from friends—undermining idea of 'individual choice' on social media A new study shows that privacy on social media is like second-hand smoke. It's controlled by the people around you.
Individual choice has long been considered a bedrock principle of online privacy. If you don't want to be on Facebook, you can leave or not sign up in the first place. Then your behavior will be your own private business, right?
The new study presents powerful evidence that the answer to that question is no.
The team of scientists, from the University of Vermont and the University of Adelaide, gathered more than thirty million public posts on Twitter from 13,905 users. With this data, they showed that information within the Twitter messages from 8 or 9 of a person's contacts make it possible to predict that person's later tweets as accurately as if they were looking directly at that person's own Twitter feed.<snip>
Less than a year remains on Windows 7’s free security updates. After January 14, 2020, those who cling to that obsolete operating system will be ever more likely to be hacked or infected with malware. Windows 7 was released in July 2009, and is still in use on 37% of all desktop computers.<snip> [John says your clicking habits are more important than updates]
You can send a SMS to a mobile phone without the need of a third-party service — you can do so directly within your email client by emailing the right carrier. Don’t know what mobile carrier your friend uses?
Find out here: Our system is setup to only allow 1 lookup per day. If you need to do more lookups you can easily purchase more lookup credits.
For quick reference, we’ve put together a list of some of the most common U.S. service providers and their corresponding gateway addresses below. However, keep in mind there are different addresses for regular messages (SMS) and those that include photos and other media (MMS). For more information, check out our full article on how to send a text message via email.
  SMS Gateway  MMS Gateway
Boost Mobile
U.S. Cellular
Virgin Mobile
Note: For T-Mobile, include “1,” which is the U.S. country code, before the phone number.     
The U. S. Postal Service’s heart is in the right place but its head seems to be elsewhere. A free USPS service called “Informed Delivery” intended to cut down on mail fraud has actually been used by ID thieves to run up bogus credit card bills in victims' names. Security researchers say the weak identity verification used by USPS made the scam possible. Here is how the scam works, what you can do to protect yourself, and what USPS should have done in the first place. <snip>

====== Links from 1-18-2019 email ==========================
You Deserve Privacy Online. Here’s How You Could Actually Get It
Tim Cook  Jan. 16, 2019     Cook is CEO of Apple
We all deserve control over our digital lives. That’s why we must rein in the data brokers
In 2019, it’s time to stand up for the right to privacy—yours, mine, all of ours. Consumers shouldn’t have to tolerate another year of companies irresponsibly amassing huge user profiles, data breaches that seem out of control and the vanishing ability to control our own digital lives.
This problem is solvable—it isn’t too big, too challenging or too late. Innovation, breakthrough ideas and great features can go hand in hand with user privacy—and they must. Realizing technology’s potential depends on it.
That’s why I and others are calling on the U.S. Congress to pass comprehensive federal privacy legislation—a landmark package of reforms that protect and empower the consumer. Last year, before a global body of privacy regulators, I laid out four principles that I believe should guide legislation:<snip>
How to stream PC music to another device -- Making the connection between a PC and a Blu-ray player is easier than it sounds.
By Steve Alexander  JANUARY 16, 2019
Q: I’m trying to stream music from my Windows 10 PC to my Samsung Blu-ray player (model BD-J5700) using the Windows “cast to device” feature. When I did this with my previous PC, the music went over my home Wi-Fi network to my Blu-ray player, then played on my TV’s stereo speakers.
But with this PC, the “cast to device” software doesn’t seem to recognize the Blu-ray player, even though both the player and PC are connected to the Wi-Fi network. I’m being told to “follow the directions in the DLNA installation/instruction manual to set up devices and files,” but I don’t know what that means. What should I do?<snip>
Another huge database exposed millions of call logs and SMS text messages
Zack Whittaker  1-15-2019
An unprotected server storing millions of call logs and text messages was left open for months before they were found by a security researcher.
If you thought you’d heard this story before, you’re not wrong. Back in November, another telecoms company, Voxox, exposed a database containing millions of text messages — including password resets and two-factor codes.
This time around, it’s a different company: Voipo, a Lake Forest, Calif. communications provider, exposed tens of gigabytes worth of customer data.
Security researcher Justin Paine found the exposed database last week, and reached out to the company’s chief technology officer. Yet, the database was pulled offline before Paine even told him where to look.<snip>
Digital  Psychology
Why it pays to declutter your digital life
If we feel overwhelmed by ‘stuff’, most of us believe physical clutter is the culprit. But researchers are finding that having too many digital files could be the problem, too.
By Kelly Oakes   7 January 2019
I have a confession: there are 20,577 unread emails in my inbox, 31,803 photos on my phone and 18 browser tabs currently open on my laptop. Digital clutter has invaded my life and I have no idea what to do with it.
With the storage capacity of our devices increasing with every upgrade and cloud storage plans costing peanuts, it might not seem like a problem to hold on to thousands of emails, photos, documents and various other digital belongings.
But emerging research on digital hoarding – a reluctance to get rid of the digital clutter we accumulate through our work and personal lives – suggests that it can make us feel just as stressed and overwhelmed as physical clutter. Not to mention the cybersecurity problems it can cause for individuals and businesses and the way it makes finding that one email you need sometimes seem impossible.<snip>
How to Disable All of Windows 10’s Built-in Advertising
 Chris Hoffman     April 4, 2017
Windows 10 has a lot of built-in advertising. This isn’t just about the free upgrade offer: Even if you purchase a new PC that comes with a Windows 10 license or spend $200 for a copy of Windows 10 Professional, you’ll see ads in your operating system. You can, however, disable a lot of it.<snip>
The Last Windows 7 ISO You’ll Ever Need: How to Slipstream the Convenience Rollup
Chris Hoffman   July 5, 2017
Microsoft has finally released a “Convenience Rollup” for Windows 7 that combines updates from the past few years into one package (like a service pack). Microsoft doesn’t offer ISO images with these updates integrated, but you can create your own in a few simple steps.
That way, whenever you install a fresh copy of Windows 7 in the future, you won’t have to wait for it to download several years worth of updates (and reboot multiple times). It’ll have everything it needs up through May 2016.<snip>
Intimidated by computers? New to email or the web? Want to stay safe online or understand how your operating system works? Learn all of this and more in our Technology section.
Office 2016
Excel 2016
Word 2016
PowerPoint 2016
Access 2016
Beyond Email
Email Basics
Internet Basics
Internet Explorer
Internet Tips
Tech Savvy Tips and Tricks
Use Information Correctly
Using the Web to Get Stuff Done
Search Better
Linux Mint Resources
Ubuntu Resources
Internet Safety
Internet Safety for Kids
Computer Basics
Basic Computer Skills
Mouse Tutorial
Typing Tutorial
Computer Science
macOS Basics
Windows Basics
Windows 10
Windows 8
Windows 7
Windows XP
Windows 98
The Internet makes available more good books, old and new, than one person can read in a lifetime. Here are a few examples of where you can find quality reads free of charge...
There has never been a better, easier, cheaper time to be a bibliophile. If you don’t know that word, that’s OK; this article is for people who like books, too. Here are five sources for free ebooks:<snip>
The State pages listed below have an alphabetical listing of Cities and Towns. Publicly accessible locations like cafes, restaurants, etc. are listed first and Hotels, Inns and other accommodation type listings are at the end of the Free Wi-Fi location listings.
[I could not email them to suggest they list our municipal buildings with free wifi]

====== Links from 1-11-2019 email ==========================
Opinion Exchange
The 'deepfake' threat is coming to a computer screen near you
By Editorial , Washington Post    January 07, 2019 -
A despairing prediction for the digital future came from an unlikely source recently. Speaking of "deepfakes," or media manipulated through artificial intelligence, the actress Scarlett Johansson told the Washington Post that "the internet is a vast wormhole of darkness that eats itself." A stark view, no doubt, but when it comes to deepfakes, it may not be entirely unmerited. The ability to use machine learning to simulate an individual saying or doing almost anything poses personal and political risks that societies around the world are ill-equipped to guard against.
Johansson's comments appeared in a report in the Post about how individuals' faces, and celebrities' faces in particular, are grafted onto pornographic videos and passed around the web -- sometimes to blackmail, sometimes just to humiliate. But deepfakes could also have applications in information warfare. A foreign adversary hoping to influence an election could plant a doctored clip of a politician committing a gaffe. Convincingly edited video could confuse military officers in the field. The ensuing uncertainty could also be exploited to undermine journalistic credibility; tomorrow's deepfake may be today's "fake news."<snip>
Be wary of callers claiming to be from Verizon telling you to reset your phone for 5G coverage
Posted: 09 Dec 2018, by   Alan Friedman
Just because someone claims to be from Verizon when you answer the phone doesn't make it true. And based on this report published today, the call could end up hitting you in the wallet or purse. For example, consider what happened to a Delaware resident who received a call from someone claiming to work for Verizon. Surely not by coincidence, the call was made to a smartphone belonging to a Verizon customer.
The fake Verizon employee told the recipient of the call that Verizon was switching from 4G to 5G and to expect service disruptions over the next few days. He then told the Verizon customer that to keep service going during the switch-over, she would need to reset her password.<snip>
How Facebook made it impossible to delete Facebook We’ve adapted our entire culture around Facebook. That makes “just quitting” easier said than done.
By Aja Romano    Dec 20, 2018
Amid staggering new reports of Facebook both intentionally sharing and unintentionally leaking the private information of its users, questions about how much regulation and oversight Facebook needs are once again surfacing — and many users are feeling the urge to quit the platform altogether.
To say Facebook has had a rough time of it lately would be putting it mildly. Between its inconclusive efforts to tackle Russian bots and other forms of political manipulation, its ongoing “fake news” woes, its controversial politics, its role in facilitating hate speech and exacerbating hate crimes, and its friction with authorities over its many data breaches, the social media giant is caught in a public reckoning that is perhaps long overdue.
But Facebook users, in the middle of what seems to be a moment of broader cultural backlash against social media and technology, are also clearly grappling with the ramifications of their use of the platform.<snip>
How Much of the Internet Is Fake? Turns Out, a Lot of It, Actually.
By Max Read
<snip> How much of the internet is fake? Studies generally suggest that, year after year, less than 60 percent of web traffic is human; some years, according to some researchers, a healthy majority of it is bot. For a period of time in 2013, the Times reported this year, a full half of YouTube traffic was “bots masquerading as people,” a portion so high that employees feared an inflection point after which YouTube’s systems for detecting fraudulent traffic would begin to regard bot traffic as real and human traffic as fake. They called this hypothetical event “the Inversion.” <snip>
INTERNET SECURITY: Everything You Need to Know (80-page ebook)
Send Free Text Messages, With or Without a Phone!
Category: Mobile , Telephony
If your mobile phone carrier charges you to send or receive a text, here's good news. There are several ways to send a free text message, and with some of them you don't even need a mobile phone. If you've ever wanted to send a quick text message and you didn't have a phone handy... or there's no cellular service where you are... or you hate paying international texting rates, read on!
How to Send Text Messages For Free
Text messaging is a wildly popular feature of cell phones, and one of the industry's fattest cash cows. But ironically, the growing popularity of smartphones is threatening the enormously profitable SMS text message, as free text messaging services that use data connections challenge traditional cellular SMS service.
Text messages brought a whopping $20 billion to cell phone companies last year; Verizon alone earned $7 billion in text message revenue. Profit margins are high, too. The cost of delivering a text message is estimated at one-third of a cent. Most wireless operators charge 10 to 20 cents per text message, or a flat monthly rate of around $20 for unlimited text messaging. International text messages can cost even more.<snip>

====== Links from 12-21-2018 email ========================== 
Why your internet choices just got narrower  Updated, Mon December 17, 2018
Editor's Note: Mitchell Baker is co-founder and chair of the Mozilla Foundation and the Mozilla Corporation. The views expressed here are the author's.      
(CNN) - Microsoft recently gave up on developing its own browser technology, opting to use Google's instead. News coverage focused on how Microsoft was waving the "white flag" to Google after losing a popularity contest, but some stories also noted how Microsoft's action might lead to a better browsing experience for consumers on Windows.<snip>      
Thanks to Dwight Lindberg for the presentation on installing windows 10 after upgrading the harddrive...AND additional system memory REALLY helps!
Here's related links:

Links from AskLeo:     

It's not a secret that I'm a big fan of cloud storage, and Dropbox in particular. If you have a smartphone and take pictures with it, automated upload is one reason why.
Back Up Smartphone Photos Using Dropbox

Find a file you're itching to delete, but you're just not sure if you should? You'll want to read Is it Safe to Delete This File? to figure out if, and how, you can, safely.
Is it Safe to Delete This File?

I'm seeing more occurrences of external drives that when plugged in make the connection sound but still don't appear in Windows File Explorer.
Why Doesn't My External Drive Appear When Plugged In?

I talk about backing up all the time. I talk about backing up your email frequently as well. If you use webmail you can't rely on the provider's own backups (they're not made for you anyway); you need to back it up yourself.
Back Up Your Email Using Thunderbird

Last week I said that it's no secret that I'm a big fan of cloud storage, and Dropbox in particular. This week I go into detail as to why I'm using it more than ever. Perhaps my thought process will help you decide if, and which, cloud service might work for you.
Five Reasons I Went All-in with Dropbox

Do I Need to Update My BIOS Regularly?

Terms we take for granted, but often misuse? While the difference might seem pedantic, do you know the difference between the web and the internet?
What's the Difference Between the Web and the Internet?

We've all seen it, but just what the heck does it mean? Internal Server Error is usually out of our control, but there are a few things we can try to get past it.
What's an "Internal Server Error" and How Do I Fix It?

Web-based or desktop-based email? It's not quite a religious argument, but there are definitely some pros and cons to each. The difference is worth understanding, particularly when it comes to backing up.
What are the Pros and Cons of Web-based Email Over Desktop Email?

In recent weeks, I've seen calls from several sources suggesting that Microsoft stop, take a breath, and seriously review their update process. I agree. This madness must end. Or at least slow down.
Microsoft, We Deserve Better

While I'm ranting, how about "free speech"? It's not what you think it is, and it doesn't apply in all the places you think it does.
What are the Internet's Rules about Free Speech?

Finally, let me offer up some ideas on where those Facebook friend suggestions come from. As weird as they probably seem, if you look deeper they kinda make sense (even if they are still annoying). I don't know about you, but I feel better.
Where Do Facebook Friend Suggestions Come From?

====== Links from 12-14-2018 email ==========================    

Busting Some Facebook Myths

Email Hacked? 7 Things You Need to Do NOW

Can My ISP See I'm Using a VPN?

How Do I Recover My Facebook Password?

Can I Use a Charger that Provides the Same Voltage but a Different Amperage?

How Do I Send an Email that Can't Be Traced Back to Me?

BoxCryptor: Secure Your Data in the Cloud

How Do I Upgrade Windows from 32-bit to 64-bit?

====== Links from 12-7-2018 email ==========================    

Can I Convert an External USB Hard Drive into an Internal One?

Why is there so much spam? It's very simple, really. Spam works.

====== Links from 11-30-2018 email ==========================    

Do "Fix All Your Windows Problems" Utilities Work?
Are there some programs which really are the cure-alls they claim to be?
To quote the old aphorism: “If it seems too good to be true, it probably is.”

Why Does a Scan of a Simple Text Document Result in Such a Large File?

Your Router's Two IP Addresses
I was completely unaware that your router has two IP addresses.
Indeed it does.
It's an important part of understanding how information travels between your computer and the internet services you use.
It's also important to know when asking questions and interpreting answers.

How Do I Remove My Personal Data from My Computer Running Windows 10?
I'm very tempted to simply say you can't.
It's exceptionally difficult to do. Windows stores so much information in so many nooks and crannies, it's nearly impossible to know what to delete and from where.
Let's look at a couple of approaches.

Where is Windows Defender's Vault?
I don't know where on disk the files are stored. Fortunately, that doesn't matter, since you can use Windows Defender itself to manage the contents of the vault. Even better, you probably don't need to do a thing.

How Can I Send a Document to Someone Securely?
While there are many approaches, there's really only one pragmatic approach.

Backing Up a Machine that Won't Boot
Your most recent work seems to be locked up inside a hard drive you can't access.
There may be a way to back it up before dealing with the crash.

Is it Safe to Share My Internet Connection with My Neighbor?

What's the Difference Between,, and Now

====== Links from 11-21-2018 email ==========================    

Blocking email by the “From:” address is seriously overrated; it's effectively useless.
It promises to prevent email from a specific sender from reaching you, but if the sender determined, the block is easily bypassed. And spammers are determined … boy, are they determined! Blocking senders is useless in the war against spam.
I'll explain why, and what I do instead.

What's a Relay Server?
Relaying is a fundamental way that email travels from your outbox to your recipient's inbox.

Should I Turn My Computer Off at Night?
There are two issues at play here: the power used by a computer left running 24 hours a day, and the stress on hardware components being repeatedly turned off and on.

How Do I Get Rid of All this Spam?!?!

Why Does My Network Not Work After Resuming from Standby?

Why Do Windows Updates Mess Up My Computer?

Does Getting Porn Spam Mean You've Been Surfing Porn Sites?

Why I (Still) Don't Like Challenge/Response Spam Blockers

How Do I Uninstall and Reinstall Internet Explorer in Windows 10?

What External Drive Should I Get?

What Can a Website I Visit Tell About Me?

====== Links from 11-9-2018 email ==========================    

Be sure to delete browser cookies and clear your browser history on a regular basis. It's easy. In Chrome, Edge, Firefox, Internet Explorer, or Opera, simply press Ctrl+Shift+Del to bring up a dialog that lets you choose which elements of browser data you want to clear.

The Comprehensive Guide to Quitting Google   by Brendan Hesse
Despite all the convenience and quality of Google’s sprawling ecosystem, some users are fed up with the fishy privacy policies the company has recently implemented in Gmail, Chrome, and other services. To its credit, Google has made good changes in response to user feedback, but that doesn’t diminish the company’s looming shadow over the internet at large. If you’re ready to ditch Google, or even just reduce its presence in your digital life, this guide is here to help.
Since Google owns some of the best and most-used apps, websites, and internet services, making a clean break is difficult—but not impossible. We’re going to take a look at how to leave the most popular Google services behind, and how to keep Google from tracking your data. We’ve also spent serious time researching and testing great alternatives to Google’s offerings, so you can leave the Big G without having to buy new devices or swear fealty to another major corporation.
Things get sketchy when the entity overseeing [a tech] ecosystem starts dipping into your data or manipulating your experience.
Our Goal Is Decentralization
Google, Apple, Microsoft, and other similar companies offer “ecosystems”—centralized, cross-platform software and hardware suites where all your devices can connect and sync with the same data and apps.
These ecosystems are extremely convenient, but they can pose security risks. While centralization isn’t the issue, per se, things get sketchy when the entity overseeing that ecosystem starts dipping into your data or manipulating your experience.
That’s why, for the majority of this guide, we’ll be looking at how to decentralize your digital presence with third-party and open-source solutions (though alternatives from Apple, Microsoft, and other companies will be discussed where appropriate, as well as some Google compromises you can make).
For all the benefits of going open-source, there are also tradeoffs: While you’ll be out from under the monolithic shadow of peering tech companies, you’ll also be trading in the full interconnection, synchronization, and data consolidation you get from catch-all ecosystems like Google’s.
However, with a little time and effort, you can MacGyver a decent cross-platform system for yourself. Let’s get started.<snip>

article about Yahoo search, found in firefox.
Why You Should Use Yahoo Search (No, Really)
The fact that you don't use Yahoo for anything else may be its best quality.
By Evan Dashevsky   December 19, 2014
Last month, Firefox announced that it was switching its default search from Google to Yahoo. The news was met with a tidal wave of meh. And that reaction was completely understandable. Many of you reading this have probably all but forgotten about both companies—particularly Yahoo—and mentally relegated them to being a thing that grandparents use to search for MapQuest directions in public libraries.
Until a few months ago, that was basically my opinion of Firefox and Yahoo. However, we here at PCMag recently rekindled our love affair with Firefox, and I'm here to tell you why you should at least consider reevaluating Yahoo.<snip>

How to Set Up and Use Google Docs Offline
You can work on your Google Drive files offline, but only if you take a few steps before you reach an Internet-free zone.
By Jill Duffy   June 22, 2015
I recently started working entirely in the cloud. My work files live in Google Drive, and I use Google Docs, Sheets, and Slides for the majority of my business work.
One problem, which I mentioned when describing my transition to working entirely in the cloud in last week's column, is that working offline is possible but that requires setting it up ahead of time.
Sure, that sounds reasonable. Before you work offline, of course you need to set up a few things in advance! The problem happens when you don't realize you won't have Internet access. You know what they say about assumptions...
Maybe you board an airplane thinking there will be Wi-Fi, and there isn't. Or you arrive at a hotel where you expected Wi-Fi, but the ISP is down. What if a storm knocks out your Internet access at your home? Or maybe you were so excited about a trip to Tahiti that you plum forgot to set up offline access. It happens.
If you don't want this to happen to you, you need to set up Google Drive offline access now. Here's how.<snip>

How tech companies deceive you into giving up your data and privacy
Editor's note: This talk was presented at a TED Salon event given in partnership with Samsung.
Have you ever actually read the terms and conditions for the apps you use? Finn L├╝tzow-Holm Myrstad and his team at the Norwegian Consumer Council have, and it took them nearly a day and a half to read the terms of all the apps on an average phone. In a talk about the alarming ways tech companies deceive their users, Myrstad shares insights about the personal information you've agreed to let companies collect -- and how they use your data at a scale you could never imagine.<snip>

Screen Mirroring and Casting       
Miracast is extremely versatile and offers a host of mirroring capabilities. While it works with Android devices, it is especially useful for mirroring PCs. Like AirPlay, its Achilles’ heel is relying on your device’s internal resources, which ties it up and drains the battery. Still, if Android (and especially PC) mirroring is your game, Miracast-compatible devices may be worth checking into.      
How is Miracast related to Wi-Fi Direct?     
Wi-Fi Direct allows devices to connect directly to each other, without the need for a Wi-Fi access point (AP). It simply requires the push of a button, the entry of a PIN, or tapping two NFC-capable devices together. Wi-Fi Direct allows source and display devices to discover one another and provides the underlying device-to-device connectivity for Miracast. Miracast builds upon Wi-Fi Direct with mechanisms to negotiate video capabilities, setup content protection (if needed), stream content, and maintain the video session. 
====== Links from 11-2-2018 email ==========================    

Disappearing disk space is a very common scenario.
Somehow, no matter how much we have, disk space never seems enough.

How Could My Bank Account Have Been Hacked if I Have Good Security?

For those with short attention spans, I'll start with what you need to do differently, beginning yesterday.
In the past, the traditional advice on passwords was:
Eight characters long, minimally
Never use names or words, at least not without mangling them somehow Never use combinations of names or words, at least not without mangling them somehow Use a combination of upper and lowercase letters and digits Use at least one special character — something other than a letter or digit — if the system will let you Those rules are no longer sufficient. Even if you carefully follow them all you're left with a password that remains very susceptible to many types of compromises.<snip>

What is OneDrive?
OneDrive is very similar to other cloud storage services, like DropBox, Google Drive, Box, and others.
At its most basic, it's simply file storage space on Microsoft's servers (aka “in the Cloud”). By storing files there, you can access them anywhere, from almost any device with an internet connection.
You can, of course, access your OneDrive files by visiting Once you log in with your Microsoft account, all the files and folders you've added to OneDrive will be available to you, along with the ability to create more folders and upload more files.<snip>

This New Trick Will Change How You Use Google Docs Forever
By Patrick Lucas Austin   October 26, 2018
Google’s making it easier for everyone — especially power Google Docs users who spend their days in the company’s office software — to quickly start new projects right from the Chrome browser.
In a tweet a Google account, the company announced a new list of shortcuts to create documents, slideshow presentations, spreadsheets, sites, and forms right from your web browser. The best part? It works in any browser, not just Google Chrome.
You can type,, or in your web browser to make a new Google Doc, just like you would type a website address. Use,, or for new Google Sheets. or will open a new Google Form. Make new Slides with,, or,, or are for making new Google Sites.<snip>
====== Links from 10-26-2018 email ==========================
10 Best Android Browsers To Enhance Your Web Browsing In 2018
December 25, 2017
Web Browsers are one of the most significant pieces of software on your device that serves as a window to access the World Wide Web. Mostly, a browser app is always pre-installed on every Android device. However, not all the browsers can provide you with a smooth and reliable browsing experience.
There are a lot of third-party web browsers available in the Play Store which can give a fast browsing experience and will consume as little data as possible. We have hand-picked ten best Android browsers which come with all the necessary features and top-notch performance.
Note: The list of browsers is just a compilation and not in order of preference. You’re advised to choose one that suits your needs.<snip>
8 Best Android File Manager And File Explorer Apps Of 2018
Best file manager apps for Android
January 23, 2018
Android’s file manager app is a vital piece of software on the device. The user-visible file system allows you to browse files, downloads, manage storage space, move things around and lot more. Although some manufacturers pre-install an Android file manager app on their devices, they are not robust and lack many features compared to other third-party file managers. Here, we provide a list of 8 best file managers which are rich in features and also free to download.
Note: This list isn’t in order of preference; it’s a compilation of the best file explorers. You’re advised to choose one as per your need.<snip>
8 Best Android Office Apps To Boost Your Productivity In 2018
March 2, 2018
Office application is an essential suite that allows you to create powerful spreadsheets, documents, presentations, etc., on a smartphone. Moreover, Android office apps come with cloud integration so that you can directly access the reports from the cloud, edit them, or save them online.
To meet the productivity need of Android users, the Play Store offers an extensive collection of Android office apps. But, we have saved you the hassle of going through each one of them and provide you a list of the best office apps for Android. The apps that we have picked are all free, although some do have Pro version or extra features available for in-app purchases. You can also refer to this list if you’re looking for Microsoft Office alternatives for your PC.
Note: This list isn’t in an order of preference; it’s a compilation of the best Android Office apps. You’re advised to choose one as per your need.<snip>
How to Clear Your Search History Off of Google's Servers With the Company's Latest Update
By Mike Epstein   10-24-2018
Google, one of the biggest stashers of our personal data, just updated Google Search—Aka Google-dot-com—to make it easier for you to review and edit what search data the company stores. The Google Search page now features a link below the search bar that will take you directly to a new data privacy hub that lets you scroll through and delete parts of whole swaths of your search history. It also gives you easy access to “Google-wide” controls, such as tracking activity on Google’s sites and ad personalization.<snip>

Upcoming at MicroCenter:
3710 Highway 100 South, St. Louis Park, MN 55416
Registration is required for workshops since space is limited;
Sign-up sheets are available only in-store at Tech Support or the Customer Service area.
Smartphones & Tablets Saturday, Oct. 27 and Sunday, Oct. 28  2:00 p.m.
Device functions, Product features, Display, battery life, Data storage and transfer, OS and applications, Carrier specific, unlocked, service features .
Form factor and accessories Build Your Own Saturday, Nov. 3 and Sunday, Nov. 4
2:00 p.m. Choosing components by specification Minimizing Electro-Static Discharge (ESD) Installing CPU and memory, Installing motherboard in case, Power connections and issues with ACPI, Installing video cards, hard disks, optical drives, System testing throughout build process
Upcoming Clinics
Saturday, 11/10 and Sunday, 11/11 » 2:00 p.m. - Back up & Restore
Saturday, 11/17 and Sunday, 11/18 » 2:00 p.m. - Windows 10 Basics
Saturday, 11/24 and Sunday, 11/25 » 2:00 p.m. - Thanksgiving. No Clinics.
Saturday, 12/1 and Sunday, 12/2 » 2:00 p.m. - No clinics until after the holidays.

Windows includes a feature in Windows 8 and 10, a “Metered Connection” option you can set for specific WiFi networks. To use this in Win 10, open the Settings app, select Network & Internet, choose Wi-Fi, choose “Manage known networks,” pick your phone’s hotspot, select Properties and enable “Set as metered connection.”
For windows 8.1:
Turn Android into free WiFi Hotspot (no root)
FoxFi is now part of PdaNet+, a top Android software downloaded by millions! PdaNet+ will provide you with multiple connection options - USB, WiFi and Bluetooth.
FoxFi enables WiFi Hotspot on your Android phone - no tether plan or rooting required! You can connect your tablets, computers or game console with WPA2 security. FoxFi usage is covered under your phone's existing data plan. Check to see if WiFi mode is supported on your phone model.
If WiFi mode is not supported on your phone model, please use USB mode or Bluetooth mode in PdaNet+ instead. It supports all phones.
PdaNet+ is one of the top Android applications of all time. PdaNet+ shares the Internet access of your Android phone with your computer or tablet. PdaNet+ works on all Android phones without rooting. It also does not require a tether plan, that will save you $20/month from most carriers.
PdaNet+ supports connection using WiFi, USB Tether or Bluetooth DUN. There is no speed limit in PdaNet+.
PdaNet+ for Android
Note: Free edition will interrupt your usage and requires you to turn back on.
Change the User Agent string on your web browser so that when you browse the internet using it, it just looks like it's the Android browser using the data connection.
How it's done (for Firefox):
Go into mozilla's address bar, type in "about:config", create a new string and name it "general.usreagent.override". Paste the info below as the value (only when tethering):
general.useragent.override;Mozilla/5.0 (Linux; U; Android 2.2.1; en-us; ADR6400L Build/FRG83D) AppleWebKit/533.1 (KHTML, like Gecko) Verzion/4.0 Mobile Safari/533.1
**Note- if you don't change it back to what it was before every time you're done tethering, some content on websites won't show up because the website thinks you're on a mobile device. Hulu, for example, won't load anything since it says your mobile device isn't supported (which really means the user agent string is doing its job).
OR, just dedicate a browser for that use and keep the User Agent settings for that purpose.
Why does my computer not detect my phone?
These are common things to check (please check in the order listed):
Ensure that "USB debugging" is enabled on your phone.
Enable "USB debugging" manually as follows:
From your phone's home screen, press the Menu key.
Choose Settings.
Choose Applications.
Choose Development.
Enable USB debugging.
Users of Android 4.0+ Ice Cream Sandwich should enable USB debugging as follows:
From your phone's home screen, press the Menu key.
Choose Settings.
Choose Developer options.
Enable USB debugging.
Check your phone's USB connection type. Most phones will require that Android's USB connection type be set to a "Charge only" mode. A handful (mostly some Motorola devices) require that the type be set to USB storage mode.
Connect your phone to your computer and make sure that "USB debugging" is enabled as described in the previous point.
Pull down the notification pane by swiping from top to bottom on your phone's screen.
Tap on the notification item called USB connection type.
Finally, experiment with the type. Most phones will require a "Charge only" mode. A few will require that a USB storage mode be activated instead, so try toggling until you see what is right for your phone.

Windows XP (possibly Vista/7) users. It might be necessary to kickstart Windows into seeing your device when it is connected. To do this:
First, enable USB debugging on your phone:
From your phone's home screen, press the Menu key.
Choose Settings > Applications > Development.
Turn on USB debugging.
Plug your phone into your computer.
Go to the Windows Device Manager by clicking on the Windows Start button. Choose Run (Search on Vista/7), and type in devmgmt.msc.
You should see a list of devices connected to your computer.
If Windows has drivers for your phone, the phone will be listed near the top as an "Android" or "ADB" device. You can stop if this applies to you, as Windows has installed the proper drivers for your phone.
If Windows is missing drivers for your phone, the phone will be listed under "Other devices". If this applies to you, please continue.
Right-click on the "Other device" that corresponds to your phone.
Choose "Update Driver..."
You should see a Windows Hardware Update Wizard appear. Let Windows search for and install drivers/software automatically, but decline any options about connecting online to Windows Update.
Windows should then take a few seconds to install the driver.
On Windows XP, this Hardware Update Wizard process may repeat automatically a few times, so repeat as necessary, waiting about 30-60 seconds for everything to settle down.
After doing this, Windows should identify your device as some sort of "Android" or "ADB" device near the top of the Device Manager list. Klink should now see your device.
If your phone is still not detected, it might help to power down and restart the device, especially if it was working previously. Unfortunately, some phones have buggy USB implementations and others overheat when used for too long, so be mindful of this possibility. (For example, you might want to keep the phone cool to see if that improves stability.)

====== Links from 10-19-2018 email ==========================    

Thanks to Dwight Lindberg for showing the buddies his use of  "Artist's Eye Free", an app which he got from Google Play for his android smart phone.
We viewed a short video demo, found here:
Artist's Eye drawing aid app for Android: Dwight also found an app for his sister's iPhone which is similar:
And, searching for Lucida on google play, there are several similar apps:
All of these allow you to trace/copy a picture on your smart phone to a drawing pad/surface.
My Good Life: How I fell for a scam
By KATY READ , STAR TRIBUNE   October 17, 2018
I got taken by what has since become one of the most ridiculously notorious scams out there: the fictional “Windows Repair Department.” Googling “windows repair scam” produces 12 million results. According to my rigorous scientific research (i.e., casual conversations and Facebook comments), almost everybody has gotten a call from them.<snip>

How to Tell if Your Email, Computer, or Facebook Has Been Hacked

Every once in a while, things become corrupted on your hard disk in such a way that Windows 7 is unable to boot. From the MBR (Master Boot Record) to other information critical at boot time, if it's not there, you can't boot.
Fortunately, Windows includes diagnostic and repair tools on your Windows setup disc.
Fixing Windows 7 Boot Problems

Why Does My Microsoft Word Document Display Differently on Different Computers?

How Could My Bank Account Have Been Hacked if I Have Good Security?

What's the Difference Between a Router, a Wireless Router, and a Wireless Access Point?

How Do I Choose a Good Password?

Why Did Deleting a Desktop Icon Delete the Program?

I've looked at your answers for problems that seem like they relate to mine, but everything seems to be “check this” or “it might be that”. Why can't you just give me the specific steps I need to solve my problem? Why can't I get a straight answer?

That's why I wrote an article on the topic: What Information Should I Provide When Asking for Help?

Your fan is a definite possibility, but first we should talk about … dust bunnies.
Continue Reading: My Computer Has Started to Shut Down Randomly. Could it Be the Fan?

Recovery partitions not having a drive letter is actually a good thing.
How Do I View the Contents of My Hidden D: Drive?

I Think I've Been "Phished", What Should I Do?

How Do I Gain Access to My Deceased Relative's Computer?

Will a Hacked Website Leak My Email Address?

Is it Safe to Just Turn Off an External USB Drive Without "Safely Removing" First?

====== Links from 9-28-2018 email ==========================    

John recommends the MUTE TAB extension for both Firefox and opera browsers. When you select it, it  prevents you from hearing the undesired audio from "auto-play" videos on a web page. Just be sure to un-mute when you want to hear a Youtube video or something else.

Senior Computer Buddy Robert Stryk passed along this tip:
Mozilla has some views about what can be done to protect privacy They’ve put together a list of 13  privacy extensions, all made to help give you more control of your personal information.
Security experts say Chrome 69’s ‘forced login’ feature violates user privacy A new feature in the latest version of Google  Chrome that logs users into the browser when they sign in to a Google site has come under fire.
Until recently, it was the user’s choice to log-in to the browser. Now, any time that you sign in to a Google site in Chrome 69 — like Google Search, Gmail or YouTube — Chrome will also log you in, too.
But the change has left users unclear why the “feature” was pushed on them in the first place. Many security folks have already panned the move as unwanted behavior, arguing it violates their privacy. Some users had good reasons not to want to be logged into Chrome, but now Chrome seems to takes that decision away from the user.<snip>
Up for Grabs: Taking Charge of Your Digital Identity AARP National Survey of Internet Users Age 18+ by Karla Pak, Doug Shadel, Alicia Williams, AARP Research, August 2018 | Comments: 0 Americans aren’t valuing their own digital identity Americans spend an increasing amount of online time shopping, managing their money and engaging in social media. Yet many are not always careful to protect their digital identity from being compromised, a new AARP survey finds.
To maximize safety online, security experts suggest people use unique passwords for their accounts, freeze their credit—not just when suspicious activity surfaces—and set up online access to their bank and credit card accounts to monitor them. AARP’s national survey of about 2,000 adults, however, finds that most are not taking these steps, leaving themselves vulnerable to fraud.
In the survey, AARP quizzed adults by asking eight questions intended to gauge how savvy they were about managing their digital identity. Nearly three-quarters (73%) failed the quiz, answering half or fewer of the questions correctly. (Take the quiz to test your online security smarts.) <snip>

====== Links from 9-21-2018 email ==========================
Chromebooks versus Windows laptops: Which should you buy?
In the fight between a Google Chrome OS-powered Chromebook and a Microsoft Windows PC, it boils down to cost versus convenience.
By Mark Hachman    Senior Editor, PCWorld    Aug 27, 2018
Table of Contents
•What’s the difference between a Chromebook and a PC?
•Is a Chromebook or laptop better for office work?
•Which is better for web browsing, a Chromebook or Windows PC?
•Can a Chromebook play games as well as a Windows PC?
•Which offers more apps, Chromebooks or Windows PCs?
•What’s it like using a Chromebook versus a Windows PC?
•Which is more secure, a Chromebook or a Windows PC?
•Which Chromebook or laptop should I buy?
•Which is better, a Chromebook or laptop?
Should I buy a Chromebook or a Windows laptop? Whether you’re seeking out the best computer for your child or just weighing which inexpensive computer is right for your home, considering a Chrome OS-powered Chromebook as a PC alternative is a smart choice—and we can help you choose the right one.
Who should buy a Windows PC?
A notebook PC powered by Microsoft Windows offers several advantages: Windows offers the most flexibility to run just about any app, as well as the choice of any browser you choose. You can tweak and configure your PC as you choose.
Windows laptops for the budget buyer
That convenience demands more computing horsepower, and often a higher price compared to most Chromebooks. Prices can soar into the thousands of dollars, and if you need a powerful PC for gaming or video editing, Chromebooks really don’t offer that much competition. But you’ll find some great deals among our more affordably priced, top Windows picks.
Who should buy a Chromebook?
A Chromebook powered by Google’s Chrome OS is a simpler, more optimized affair, a locked-down PC that’s little more than the Chrome browser—but it can be hundreds of dollars cheaper than a comparable Windows PC, too. Updates occur behind the scenes, so you can just open the lid and go. Google handles all the security, too. The Internet offers much of what you’ll need, whether it be working within web apps or Chrome plugins. But it’s the workarounds and little inconveniences that you may find annoying in the end.
If you’d like, read on to dive deeper into the differences between the two, as well as some recommendations on what to buy. Just be aware that the conversation will center around inexpensive machines that can accomplish basic tasks. Chromebooks can’t hold a candle to $2,000 gaming PCs, though some cloud gaming services might allow them to eventually.<snip>
Home/ Productivity Software  Updated
The best free Microsoft Office alternatives Battle of the free office suites.
By Michael Ansaldo
Freelance contributor, PCWorld    Oct 2, 2017
Microsoft Office is the king of office productivity suites, but it doesn’t inspire warm, fuzzy feelings in all users. Parsing the ever-expanding list of features—many of which you’ll never use—can feel like stepping into a cockpit without a pilot’s license. The ribbon interface, introduced a decade ago, has many fans, but others pine for the static menus of the early aughts. And then there’s Office’s hefty price tag.
Fortunately, alternatives abound, ranging from web apps to freemium and open source desktop installations, many of which are compatible with Microsoft Office docs. We compared six of the most popular free office suites to see how well they replicate the most commonly used features of Microsoft Office.<snip>

====== Links from 9-7-2018 email ==========================
Open Glossary of Edge Computing
Towards a Common Lexicon
The Open Glossary of Edge Computing seeks to provide a concise collection of terms related to the field of edge computing. The purpose of the glossary is to improve communication and accelerate innovation through a shared vocabulary, offering a vendor-neutral platform with which to discuss compelling solutions offered by edge computing and the next generation Internet.
The Open Glossary is now an official project under the stewardship of The Linux Foundation, which is helping to implement a community-driven process to develop and improve upon this shared lexicon, The official version of the Open Glossary is available via this GitHub repository. Proposed edits, clarifications and suggestions are made by filing GitHub issues or creating “pull requests.” Each issue, addition or suggested change will be evaluated by the community for inclusion. To contribute to the glossary, refer to our Contributing Guide.
The Open Glossary is presented under the Creative Commons Attribution-ShareAlike 4.0 International license (CC-BY-SA-4.0) in order to encourage use and adoption. Code contributions to the project are licensed under the Apache License, version 2.0 (Apache-2.0).
Open Glossary of Edge Computing [v0.9.0-Beta]
•Version: v0.9.0-beta
•Date: June 12, 2018 1:28 PM Pacific Time
•License: Creative Commons Attribution-ShareAlike 4.0 International (CC-BY-SA-4.0) Overview The Open Glossary of Edge Computing is a freely-licensed, open source lexicon of terms related to edge computing. It has been built using a collaborative process and is designed for easy adoption by the entire edge computing ecosystem, including by open source projects, vendors, standards groups, analysts, journalists, and practitioners.<snip>

====== Links from 8-31-2018 email ==========================
$9.95 a month + tax
15 Mbps
Veterans Program
Internet access at home opens the door to a world of knowledge and opportunities for you. Comcast Internet Essentials offers affordable Internet for the home. You can qualify if you are a verified veteran and receive state or federal assistance.
Do you qualify?
Find out if you're eligible for Internet Essentials by looking at the checklist below.
Start your application today!
Eligible Veterans:
Must be a low-income veteran.
Must receive federal or state public assistance.
Do not have outstanding debt to Comcast that is less than a year old. Veterans with outstanding debt more than one year old may still be eligible.
Live in an area where Comcast Internet service is available but have not subscribed to it within the last 90 days.
First Things First
New to the internet? This is a great place to start. Here, you'll find an overview on how to connect to and navigate the internet—including tips on using search engines, social media platforms, and email.
[Provided by Comcast...some good info here.]
6 common habits that put you at risk for identity theft Data breaches and hacks are often unavoidable, but security experts say there are some everyday habits that put consumers even more at risk.
by Emily Long   Aug.20.2018
Before providing your credit card information or social security number over the phone, make sure that it’s absolutely necessary.
According to a report by Javelin Strategies, U.S. residents lost $16.8 billion to fraudsters in 2017, and the number of victims increased 8 percent over the previous year.
U.S. residents lost $16.8 billion to fraudsters in 2017.
Unfortunately, identity thieves are getting smarter, which means that consumers have to be even more vigilant when it comes to protecting their personal information and their financial well-being. Thieves are launching more complex schemes, but consumers also don’t think twice about many common practices that put their data — and their money — at risk.
Google's Android P launches with a new name – it's Pie – and focuses on screen-time addiction Edward C. Baig, USA TODAY Published  Aug. 6, 2018 That’s the yummy new moniker for the latest version of Android that Google finally revealed on Monday, the same day that Android 9 Pie comes out of its beta test phase and starts showing up via an over-the-air update on all of the company’s Pixel smartphones.
Google, of course, has been naming versions of Android after appetizing treats for years – thus, Pie follows, among others, Oreo, Nougat, Marshmallow, and Lollipop.
As in the past –alas – if you’re one of the many people who own a branded Android handset that’s not from Google, you’ll have to wait as long as until the end of the year (and possibly beyond) before P is made available on your device.<snip>
The Digital Literacy Library is part of Facebook’s Safety Center as well as a larger effort to provide digital literacy skills to nonprofits, small businesses, and community colleges. Though it feels like a step in the right direction, curiously missing from the lesson plans are any mentions of “fake news.” Facebook has worked on a news literacy campaign with the aim of reducing the spread of false news before. But given the company’s recent announcements admitting to the discovery of “inauthentic” social media campaigns ahead of the midterm elections, it’s strange that the literacy library doesn’t call attention to spotting potential problems on its own platform. [Good general info for senior computer buddies, too. See below]

Facebook's Digital Literacy Library
Find lesson plans designed by experts to help young people develop skills needed to navigate the digital world, critically consume information and responsibly produce and share content. Designed to be interactive and engaging, these lessons involve group discussions, activities, quizzes, and games that have been built in consultation with teens. Use them either collectively or individually in the classroom, as part of after-school programs, or even at home.
Participants will learn about public Wi-Fi networks and their benefits and risks. More specifically, they will learn to recognize unsecured Wi-Fi when it is available to them, understand the tradeoffs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
Participants will learn how to keep their online information more secure by using and maintaining strong passwords. Participants will learn about the principles of strong password design, the potential problems of password sharing. They will also learn how to keep their passwords safe, and how to take steps to prevent unauthorized access to their accounts.
Participants will learn about malicious online users who might attempt to use security weaknesses to gather information about them. Participants will be able to describe the risks of being online, develop strategies to engage in safer behaviors, identify spam messages, and explain who should ask for their password.

How to I stop my homepage from changing? – If your home page keeps changing after you have set it, I start to suspect malware. Time for a thorough malware scan and cleaning.

Let’s Retire the Phrase ‘Privacy Policy’
People assume it means their information will be kept private. Nothing could be further from the truth.
By Joseph Turow   Mr. Turow is a professor of communication.   Aug. 20, 2018
True or false:
“When a website has a privacy policy, it means the site will not share my information with other websites or companies without my permission.”
According to my research — a nationally representative phone survey conducted in January and February — a majority of Americans think this is true.
It isn’t. Not even close. <snip>

====== Links from 8-24-2018 email ==========================    

How Do I Delete My Facebook Account?

This Is Why I Back Up

How Do Chrome and Chrome Relate?

What's the Difference Between Hibernate and Sleep?

Facebook Hacked? What You Need to Do NOW

Will a Scheduled Backup Wake My Machine Up If It's Sleeping?

====== Links from 8-9-2018 email ==========================    

Should I Cover Up My Webcam When I'm Not Using It?

Can My ISP See What I'm Doing If I Use a Virtual Machine (VM)?

How Do I Create a Bootable USB Thumb Drive from an ISO?

Why Do Things Disappear from the Clipboard When I Close a Program?

The First Eight Things to Do with Your New Computer

Is it Safe to Install a Higher Wattage Power Supply in My Computer?

Why Does My IP Address Have a Bad Reputation? And What Do I Do?

How Do I Fix a Cyclic Redundancy Check Error When I Try to Copy a File?

Where's the Recycle Bin on My USB Drive?

How Do I Clean Up After Windows Update?

How Can I Automatically Reply to Spammers To Tell Them to Stop?

How Do I Print Pictures from Websites So They Look Good?

====== Links from 8-3-2018 email ==========================
Your cell phone number is more important and less secure than your Twitter password Nick Selby, Opinion contributor Published July 27, 2018 It's shockingly easy for hackers to hijack your digital life using phone numbers. The public should press Congress and carriers to improve security.
On July Fourth, hackers accessed computers at the social media aggregator Timehop. They stole 21 million user records. Timehop executives quickly realized that the most sensitive compromised records weren’t email addresses, names or even dates of birth. Their top concern was the 4.9 million stolen customer phone numbers.
The mobile phone number has become society’s primary authentication token. If you forget the password to your bank account, you recover it by entering the digits texted to your phone number. That’s how the bank “knows” you’re you.
Compared with email and online banking, there’s almost no security to protect a phone number from being stolen. Using information and tools available easily and cheaply online, “SIM swapping” attacks can be mounted against any phone number.
Once the bad guys have hijacked your phone number, they can reset your email password and lock you out while they systematically take over your online banking, retirement accounts, photos ... every aspect of your digital life. Regaining control can take days — and you might never get back easily transferred assets, like cryptocurrency.<snip>
Some Amazon reviews are too good to be believed. They're paid for
Business  Ryan Kailath    · NPR ·  Jul 30, 2018 
In shadow marketplaces, positive reviews for Amazon products are bought and sold. The company says it's cracking down and that it estimates that less than 1 percent of reviews are fake.
Travis is a teenager living in a small town in the Northeast. He enjoys hunting and shooting, and keeps a rifle at home. But with several younger siblings around the house, he wanted to make sure his gun was safe. So he ordered a trigger lock on Amazon, to prevent the gun from firing.
"The reviews were great, five-star reviews," says Travis, who asked that NPR use only his first name to avoid scrutiny and possible legal attention. "[They] said it worked great, locked perfectly, the combination system worked great."
It didn't.
"The combination doesn't even matter; the lock just opens," Travis says. "It's cheap plastic, it will pull apart as soon as you give it any force."
Thankfully, he realized this immediately, went to a store, and purchased a proper trigger lock for his gun. Everyone at home is fine.
Travis rues the experience, and the stellar reviews that led him to purchase the faulty lock in the first place. He didn't realize it at the time, he says, but he's now certain that those glowing reviews were paid for. And that many of the people who gave the trigger lock excellent reviews may never have opened the package in the first place.

How Should I Back Up My Computer Before an Operating System Upgrade or Reinstall?

Does Bounced Email Mean All the Recipients Didn't Get My Message?

Why Does My Email Sometimes Show Up with Funny Characters Like "=0D" In It?

What's the Difference Between Windows 10 Home vs Pro Editions?

My Mouse and Keyboard Stopped Working, but Work Elsewhere. How Do I Fix Them?

I Deleted a File by Mistake, Can I Get It Back?

Do I Need All These Partitions?

How Do I Find Out What Program Is Using All My CPU?

Is Online Document Conversion Safe?