Thursday, March 8, 2018

Visit us at LenoxCC!

 [] [] [] Tuesday, March 13, 2018  
Windows 7 & XP discussion and tips
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-3pm      
Please sign in on the buddy sheet when you arrive.    
[] [] [] Tuesday, March 20, 2018  
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-3pm      
Please sign in on the buddy sheet when you arrive.    
[] [] [] Tuesday, March 27, 2018  
"Bring In Your Box Day"    
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-3pm      
Please sign in on the buddy sheet when you arrive.    
[] [] [] Tuesday, April 3, 2018  
Topic TBA [make a request]     
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-3pm      
Please sign in on the buddy sheet when you arrive.    
[] [] [] Tuesday, April 10, 2018  
Windows 7 & XP discussion and tips     
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-3pm      
Please sign in on the buddy sheet when you arrive.    
[] [] [] Tuesday, April 17, 2018  
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-3pm      
Please sign in on the buddy sheet when you arrive.    
[] [] [] Tuesday, April 24, 2018 
1 hour only, John has to record at Susan Lindgren school at 3pm      
"Bring In Your Box Day"    
"Windows 10", Chromebase & LINUX Ubuntu Mate computers set up, available to try out, ~1-2pm      
Please sign in on the buddy sheet when you arrive.     
"Bring In Your Box Day" (every fourth Tuesday!)         
The first four Senior Computer Buddies to contact me may bring in their windows computer and get advice about using it. We can supply the ac cord, keyboard, mouse and monitor for your desktop or tower computer. It's helpful to tell me before Tuesday if you are bringing in your unit.      
Regular Meetings:      
1pm Specific Topic or Open topics discussion [except bring in your box days]    
2pm Help session. Some help opportunities may be simultaneous as a buddy installs recommended software while another buddy asks a question.   
All Senior Computer Buddies will benefit from our best-effort attempts in solving unusual or common problems.    
Sometimes just emailing a detailed question about your computer operation problem can result in an answer which precludes the need to drag your box in.     
The group is not a class in learning computer operation, but a discussion of topics for computer users, with best effort help available..         
Please review your Senior Program Newscaster Newsletter and the ISD 283 Community Education Catalog for Computer Classes.   

The buddies blog is back!
It's not fancy, and you can see it at

John McHugh
SLP City Hall Cable TV Office
Community TV Coordinator, ParkTV15/96
SLP Senior Program Mentor at LCC
5005 Minnetonka Boulevard
Jmchugh [at]
"We Believe Our Public Service Makes A Difference"

City Hall has free wireless internet, provided by City Of SLP. It's a "Park Public Wireless Spot"! It is also available at The Rec Center, Lenox Community Center [west end] and Westwood Nature Center! Bring your laptop and try it: confirm that your computer has detected SL-Public. Connect to it. Then open a browser and navigate to     
A "landing page" will appear where you must click "Accept" to the terms and conditions for free internet access.   
* * *
Did you find something other Senior Computer Buddies should read?   
Send a link to John!   

====== Links from 3-8-2018 email =====================================================    

OS in schools, survey results

A Guide to Snapchat for People Who Don’t Get Snapchat
By Tiffany Peón   Feb. 7, 2018
Snapchat is fun, and millions use it to stay in touch and share their lives with one another every day. It has an unearned reputation for being difficult to use, but it’s not, after you get the basics. Once you’re in and have a few friends to share with, it’s easy. If you don’t have anyone to show you, you don’t get it, or you’re just wondering what the fuss is about, let us help.
Let’s approach this from an angle you may already be familiar with: A slide show. We know, slide shows are boring. Stick with us, this one’s worth it.<snip>
Your iPhone Slowed Down. Here’s What to Do When the Solution Is Just as Slow.
Tech Fix By BRIAN X. CHEN   JAN. 31, 2018
When Kathryn Schipper discovered in December that her iPhone had slowed down because it needed a new battery, she unknowingly walked into the middle of a growing Apple controversy — and is now mired in the continuing fallout.
Late last year, Apple said a software feature was slowing down iPhones that had aged batteries, immediately drawing accusations that the company was trying to force people to upgrade to its newest iPhones. In response, Apple said customers could get their iPhone batteries replaced at its stores for a discounted price of $29, down from $79.
Yet when Ms. Schipper, who lives in Seattle, took her iPhone 6 Plus, purchased in 2014, to an Apple store in early January, she was told that the store was out of replacement batteries for at least two weeks. An Apple representative later left her a voice mail message with a new estimated wait time: up to four months.<snip> Let’s not wait around. Here’s a guide to other solutions to keep an iPhone running in the absence of an Apple battery replacement.<snip>
Getting a Fresh Start With Windows 10
Tech Tip By J. D. BIERSDORFER JAN. 31, 2018 The Fresh Start feature in newer versions of Windows 10 provides another way to do a clean installation of the system on the computer. Credit The New York Times Q. How do you do a clean installation of Windows 10 these days with no DVDs to reload the program?
A. Microsoft added a new “Fresh Start” utility to the system last year with its Windows 10 Creators Update. The tool is designed to preserve all your personal data and settings before downloading a clean, uncluttered copy of Windows 10, installing it on your computer and restoring your files and settings.<snip>
Changing Country Codes With Google
Tech Tip By J. D. BIERSDORFER JAN. 12, 2018 Q. I used Google Hangouts for the first time in Berlin. Now, if I enter a new contact into Google Contacts, it assumes the phone number is German and I have to manually change it each time. Is there a way to change the default country?
A. If your Google account seems to think you are still in Germany, one place to check for a “default country” designation is in the settings for the Gmail account that is associated with your Google Hangouts calls. In a web browser, log into that Gmail account and click the gear-shaped Settings icon in the upper-right corner of the Gmail window.<snip> For those unfamiliar with the software, Google Hangouts can be used to make video calls, as well as telephone calls from the computer’s web browser; you need to have a Google Account and compatible hardware. A Google Hangouts app is available for Android and iOS devices, as is a Chrome browser extension. Google Hangouts can also send and receive text messages between users and groups.
Sharing High-Resolution Photos by Email
Tech Tip By J. D. BIERSDORFER  JAN. 16, 2018 Q. How do I make sure I am sending a photo at the highest possible resolution when I attach it to an email message on my phone?
A. Before you send the photo, check the image-size settings when you attach the image to the message so you know you have selected a high-resolution picture. If you pick a low-resolution photo from the start, that is what your recipient will get.<snip>
See Everything That Starts Up With Windows 7
Tech Tip By J. D. BIERSDORFER    JAN. 17, 2018
Q. I have a few programs in my Windows 7 Startup folder, but my PC is slow. I think there’s a lot more happening when the computer boots up. Is there one place to look to see everything that’s running instead of poking around in a bunch of different windows?
A. If you want a detailed overview of all the programs, services, drivers, tool bars and other bits of code that start up along with Windows, Microsoft has a free utility for you. The program is called Autoruns. It has been around for several years and works on several recent versions of Windows. A page on Microsoft’s site calls it “the most comprehensive knowledge of auto-starting locations of any start-up monitor.”<snip>
A Beginner’s Guide to Backing Up Photos  By TERRY SULLIVAN   JAN. 11, 2018
“I’ve seen it all,” says the award-winning National Geographic photographer Ami Vitale, about backing up her photos. “I’ve had hard drives fail throughout my career. For example, back when I first started as a photographer, I had a very nice hard drive system in my home, and the whole thing failed.” In retrospect, Ms. Vitale says, she would have definitely set the system up differently.<snip> But right now, most websites, including social media and even photo-printing sites, aren’t designed to truly store photos. That’s because when you back up your photos, you want to be able to retrieve an image file that is as close to, if not identical to, the original photo you captured on your phone or digital camera. That’s also why you want to carefully choose a backup solution, whether it’s online or an external hard drive.
Risky business
Unfortunately, preserving the original photo isn’t the only issue you’ll face when backing up your images. You also need to know that there’s no completely foolproof method to backing up your images. There’s always risk. Store images on a hard drive connected to your computer, and, as Ms. Vitale notes, it can fail. Upload images to an online backup service and you face a different problem: You might think using a cloud service from an established company — like Apple, Google, or Amazon — would be safe. <snip> A version of this article appears in print on January 18, 2018, on Page B6 of the New York edition with the headline: A Beginner’s Guide to Backing Up Photos.
Is the Answer to Phone Addiction a Worse Phone?
By NELLIE BOWLES   JAN. 12, 2018
SAN FRANCISCO — I’ve gone gray, and it’s great.
In an effort to break my smartphone addiction, I’ve joined a small group of people turning their phone screens to grayscale — cutting out the colors and going with a range of shades from white to black. First popularized by the tech ethicist Tristan Harris, the goal of sticking to shades of gray is to make the glittering screen a little less stimulating.
I’ve been gray for a couple days, and it’s remarkable how well it has eased my twitchy phone checking, suggesting that one way to break phone attachment may be to, essentially, make my phone a little worse. We’re simple animals, excited by bright colors, it turns out.
Silicon Valley companies like Facebook and Google know this, and they have increasingly been turning to the field of applied neuroscience to see how exactly brains respond to color in the apps, what brings pleasure and what keeps the eye. New research shows how important color is to our understanding of priorities and emotion.<snip> “You don’t buy black-and-white cereal boxes, you buy the really stimulating colored one, and these apps have developed really cool tiles, cool shapes, cool colors, all designed to stimulate you,” Ms. McKelvey said. “But there’s a vibrant world out there, and my phone shouldn’t be it.”
She decided to make the switch to gray as well. But it was trickier than she expected.
“It took like 40 minutes to figure it out. They buried the setting,” she said. “You have to really want to do it.” (If you want to try, here are some tips.)  <snip>
What You Need to Do Because of Flaws in Computer Chips By CADE METZ and BRIAN X. CHEN  JAN. 4, 2018 On Wednesday, a group of security experts revealed two security flaws that affect nearly all microprocessors, the digital brains of the world’s computers. These flaws, called Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from smartphones, PCs and the cloud computing services that many businesses rely on.
Some of the world’s largest tech companies have been working on fixes for these problems. But the researchers who discovered the flaws said one of them, Spectre, is not completely fixable. “It is a fundamental flaw in the way processors have been built over the last decades,” said Paul Kocher, one of the researchers who discovered these flaws.
Here is a guide to what you need to know and what you should do. <snip> What about phones and PCs?
Phones and PCs are more difficult targets. Before they can exploit the chip flaws, hackers must find a way of getting their software onto your device. They could fool you into downloading an app from a smartphone app store. Or they could trick you into visiting a website that moves code onto your machine.<snip>
Dealing With Destructive System Updates
Tech Tip By J. D. BIERSDORFER    DEC. 29, 2017
Q. Just got the latest upgrade for Windows 10, and my installed LibreOffice disappeared. What do I do?
A. Operating system updates have been known to cause problems with existing programs, because of software incompatibilities or installation issues. The recent Windows 10 Fall Creators Update was no exception, with a community forum thread on missing apps and other problems generating several hundred posts since October.
Microsoft released an update on Nov. 14 that attempts to fix the missing-apps issue. If you have not applied any updates in the past several weeks and want to see if the company’s patch improves things, run Windows Update on your PC and install the latest software.
If you have not been able to update your computer or want to attempt a manual workaround, earlier suggestions from Microsoft have included repairing or uninstalling (and then reinstalling the app) from the Windows Store or from your original installation files. For those comfortable using the Windows PowerShell utility, another workaround may let you restore several missing apps at once through typed commands, though it may not do much if you have already tried repairing or reinstalling the programs. Instructions for using the PowerShell approach can be found here.<snip>
5 New Year’s Resolutions to Protect Your Technology The cybersecurity nightmares of 2017 highlight the need to protect yourself. Here are some resolutions for living a safer digital life this new year.
By Brian X. Chen  Dec. 27, 2017
If 2017 taught you anything about personal technology, it’s that the onus is on you to protect your personal data and devices.
Tech companies aren’t going to do that for you. (In fact, they are generally the ones failing you.) So why not make protecting yourself your New Year’s resolution?
Last year, I recommended some resolutions for making your tech less frustrating, like doing regular maintenance on your devices, being a strategic shopper and purging the e-waste  sitting around your home.
But this year’s cybersecurity nightmares, from the ransomware attack to the Equifax hack, underscored the need to protect yourself. Here are some recommendations for living a safer digital life this new year.   <snip>
Update Your Software
Read Privacy Policies
Delete Unnecessary Apps
Use a VPN
Protect Your Hardware
PERSONAL TECH   Resuming Camera Uploads With Dropbox
Tech Tip By J. D. BIERSDORFER   DEC. 22, 2017
Q. I had my iPhone and iPad set up to send all my photos to my Dropbox account, so I could access them on my PC. Suddenly, about six weeks ago, they no longer do this and I can’t figure out how to reset it so they will. It is possible that I told my iPhone to send my photos to the iCloud library on that day, but I don’t remember for sure. Please help!
A. If you think you may have inadvertently diverted your automatic photo uploads to Apple’s iCloud Photo Library service from Dropbox, you can reverse the process. To do so on an iPhone running iOS 10.3 and later, go to the home screen and tap Settings. On the Settings screen, tap your Apple ID account name at the top. On the next screen, tap iCloud. On the iCloud screen, tap Photos and turn off the iCloud Photo Library service.<snip>
Escaping a Malware Trap    Tech Tip By J. D. BIERSDORFER    DEC. 27, 2017
Q. How do you get out of a fake tech-support scam page without having to reboot the whole computer?
A. Depending on the malware powering the fraudulent page and your browser settings, you have a few escape routes. Some malicious pages can be particularly persistent in trying to scam you, by repeating audio loops about “infections” and interfering with shortcuts for closing page tabs. If you have your browser set to automatically reopen page tabs, you may also be back where you started with the unwanted page even after you quit the program and open it again.<snip>

Q: I have some .jpg pictures from the 2000s that I can’t open after updating my PC to Windows 10. What can I do?
Dan Nichols, Colorado Springs, Colo.
A: Tell Windows 10 what program should open your photos. Go to the start button and type “default” in the search box. In the resulting list, click “default app settings.” From the “default apps” list, choose photos. You will get a list of apps that can open a photo. Either choose one, or download a different app (see for free ones).
The Looming Digital Meltdown  by Zeynep Tufekci   JAN. 6, 2018
For computer security professionals, 2018 started with a bang. A new class of security vulnerability — a variety of flaws that affect almost all major microprocessor chips, and that could enable hackers to steal information from personal computers as well as cloud computing services — was announced on Wednesday. The news prompted a rush of fixes, ruining the holiday vacations of system administrators worldwide.
For an ordinary computer user, there is not much to panic about right now. Just keep your software updated so you receive the fixes. And consider installing an ad-blocker like uBlock Origin to protect against ads that carry malware that could exploit these vulnerabilities. That is about all you can do.
However, as a citizen of a world in which digital technology is increasingly integrated into all objects — not just phones but also cars, baby monitors and so on — it is past time to panic.
We have built the digital world too rapidly. It was constructed layer upon layer, and many of the early layers were never meant to guard so many valuable things: our personal correspondence, our finances, the very infrastructure of our lives. Design shortcuts and other techniques for optimization — in particular, sacrificing security for speed or memory space — may have made sense when computers played a relatively small role in our lives. But those early layers are now emerging as enormous liabilities. The vulnerabilities announced last week have been around for decades, perhaps lurking unnoticed by anyone or perhaps long exploited.<snip>
‘Password,’ ‘Monkey’ and the Other Terrible Passwords We Choose By NIRAJ CHOKSHI  DEC. 20, 2017 This year’s worst passwords, according to one creator of security applications, include “starwars,” “iloveyou,” “monkey,” “hello,” “freedom,” “qazwsx” and “trustno1.” Credit Damian Dovarganes/Associated Press The list of this year’s 25 “worst” passwords says a lot about us.
“Starwars” (No. 16) reflects a resurgent force in popular culture.
“Whatever” (No. 23) and “letmein” (No. 7) seem to speak to an exasperation with online security itself.
And “password” (No. 2) speaks to our collective lack of creativity.
They are among the 11 new entrants to the annual “worst passwords” list, compiled by SplashData, a company that creates applications for password management and security. The popularity and simplicity of those passwords pose risks for those who use them, the company said.
“Hackers know your tricks, and merely tweaking an easily guessable password does not make it secure,” Morgan Slain, SplashData’s chief executive, said in a news release. “Our hope is that our Worst Passwords of the Year list will cause people to take steps to protect themselves online.”<snip>

Keeping Data Secure When Your Laptop Is in the Shop
Tech Tip  By J. D. BIERSDORFER   DEC. 6, 2017
Q. I need to take my laptop to get its dead battery replaced, but I’m worried about other people being able to see my files. How can I make sure no one working on the computer can get into my personal information?
A. Your computer repair shop probably has a checklist of things to do before you drop off the laptop, but start by doing a full backup of your system so you have a copy of all your files in case something inadvertently happens when the machine is open on the work table. <snip> As for the security of the data on the drive, you can lock up personal folders that you would like to keep private with encryption software — or encrypt the whole hard drive if you do not think the technicians will need to log into the computer. Windows 10 Professional includes a utility called BitLocker, and macOS has a disk-encryption tool called FileVault you can use to lock up the contents of your disk behind a password<snip>

Turning Off Programs That Start Up When You Do
Tech Tip  By J. D. BIERSDORFER    DEC. 7, 2017
Q. When I restart my Mac, an old mail program I no longer use insists on opening. There doesn’t seem to be a start-up items folder on the computer, so where is this coming from and how do I stop it?
A. Frequently used programs that start up when your computer does save you the trouble of opening them manually, but if you no longer use one of them, head to the Mac’s System Preferences. You can get there by clicking the gear-shaped icon in the desktop dock or going to the Apple menu icon up in the top-left corner of the screen and selecting System Preferences.
In the System Preferences box, click the Users & Groups icon. On the left side of the window that opens, click the name of your user account, and on the right side of the window, click the Login Items tab. A list of all the apps and programs that open automatically when you log into the Mac appears. <snip> To change the apps that start up with Windows 10, right-click the Start menu button (or press and hold it for a few seconds on a touch-screen device) and choose Task Manager from the menu.
In the Task Manager box, select More Details and then click or tap the Startup tab to see a list of apps.<snip>
Cropping Photos With Mac Preview
Tech Tip  By J. D. BIERSDORFER   NOV. 22, 2017
Q. How do you crop an image in the Mac Preview program? I don’t see a cropping icon in the tool bar. Or do I need another program?
A. You can crop photos, graphics and PDF files right in Preview, the Mac’s built-in image-editing and viewer program. To crop a photo or graphic open on your screen, you must first select the area of the image you want to keep.
Drag the mouse cursor over the part of the photo you want, which creates a dotted line around the area. Click and drag the blue dots on the corners and center of the outlined box on the screen to adjust the selected portion of the image and then press the Command and K keys to delete everything outside dotted lines. (As an alternative, you can also click on Tools in the Preview menu bar and choose Crop.)<snip>
How to Create Windows 10 Start Menu Folders
Tech Tip By J. D. BIERSDORFER   NOV. 30, 2017
Q. My Windows 10 Start menu is too full. Is there a way to condense the tiles so they don’t take up as much space?
A. Windows 10 allows you to choose different sizes for the tiles on the Start menu, and you can resize the menu itself to suit your needs. If neither of those options appeals to you, another space-saving approach is to group app tiles into folders on the Start menu.<snip>
Punting iPhone Calls to Voice Mail
Tech Tip  By J. D. BIERSDORFER NOV. 29, 2017 Q. When I get a call on my iPhone, sometimes I have a button to decline the call and sometimes I just get a “slide to answer” option. Why is this, and how can I send a call to voice mail that I don’t want to answer if I don’t have a Decline button to ignore it?
A. When the iPhone is unlocked and you have an incoming call, you see the red Decline and the green Accept button on the screen. However, if the screen is locked because you are not using the phone at the moment, you just see the “slide to answer” control.
While the lack of a Decline button on the lock screen may be an effort to stop accidental hang-ups when you are fumbling around with a ringing phone, Apple has included a few ways to dump a caller to voice mail without having to unlock the phone. When the screen is locked and an unwanted call comes in, you can decline to answer and punt it to voice mail by quickly pressing the Sleep/Wake button twice; its location, on the top or side of the phone, varies depending on your model.<snip>
The Best Ways to Share Your Smartphone Photos
Tech Fix By BRIAN X. CHEN   NOV. 29, 2017
<snip>“There are a few really clever photo sharing tools, but as smart as they are, you might still need to teach family members how they work,” said R. C. Rivera, a professional photographer in San Francisco.
So here are some tips for the quickest and most efficient ways to share digital photos, based on my tests and interviews with professional photographers.
Sharing With Google Photos
If you have a modestly sized family, chances are some members use iPhones but others use Androids. The quickest method for everyone to share pics is to rely on a photo storage service that supports both devices.
Mr. Rivera said that most of his family in the United States used iPhones, but that his relatives in Asia all used Android devices. So he goaded his family to use Google Photos, which is included on Android devices and works on iPhones.
After you sign up for Google Photos, each photo you take is automatically backed up to Google’s cloud. From there, you can create albums <snip> Moving Photos Between Apple Devices For families that entirely rely on iPhones, there’s a major benefit: the ability to share photos among devices almost instantly. Apple phones and computers have AirDrop, a tool that transfers pictures directly between devices via a wireless Bluetooth or Wi-Fi connection.<snip>
Slowing iPhone Battery Drain
Tech Tip By J. D. BIERSDORFER NOV. 6, 2017 Q. Why does the iPhone battery drain so much? I have an iPhone 6 and consider myself a “normal” user of the iPhone. I have gone to Apple’s website and done everything suggested to slow the drain, but sometimes by 6 p.m. I’m down below 50 percent. What else can I do?
A. Battery drain can be caused by a number of factors, including the age of the battery itself. The iPhone 6 was released in 2014, and if you purchased the device around that time and have been using it regularly for three years, the battery may be losing its ability to hold a charge. Having an authorized service provider replace the battery or investing in an external battery are two options for a failing power cell.
<snip>The phenomenon of perceived slowdowns is so widespread that many believe tech companies intentionally cripple smartphones and computers to ensure that people buy new ones every few years. Conspiracy theorists call it planned obsolescence.
That’s a myth. While slowdowns happen, they take place for a far less nefarious reason. That reason is a software upgrade.
“There’s no incentive for operating system companies to create planned obsolescence,” said Greg Raiz, a former program manager for Microsoft who worked on Windows XP. “It’s software, and software has various degrees of production bugs and unintended things that happen.”
Here’s what happens: When tech giants like Apple, Microsoft and Google introduce new hardware, they often release upgrades for their operating systems. For example, a few days before the iPhone 8 shipped in September, Apple released iOS 11 as a free software update for iPhones, including the four-year-old iPhone 5S.
The technical process of upgrading from an old operating system to a new one — migrating your files, apps and settings along the way — is extremely complicated. So when you install a brand-new operating system on an older device, problems may occur that make everything from opening the camera to browsing the web feel sluggish.
“It’s like changing the plumbing of the house without changing anything else,” said Scott Berkun, an author and a former manager for Microsoft who oversaw engineers that worked on Windows operating systems and web browsers.
The good news is that because tech companies are not intentionally neutering your devices, there are remedies for when you think your three-year-old iPhone or your seven-year-old Windows computer has become slow or short-lived. Here’s a guide to speeding up your troubled gadgets, based on interviews with information technology professionals and operating system experts.
Tech companies make it simple to upgrade to a new operating system by pressing an “update” button, which seamlessly migrates all your apps and data over. While that’s convenient, it isn’t the best way to ensure that things will continue running smoothly.
A better practice is backing up all your data and purging everything from the device before installing the new operating system. This “clean install” works more reliably because the engineers developing operating systems were able to test this condition more easily, Mr. Raiz said.<snip>
The Key to Getting Shadow-Free Mac Screenshots Tech Tip By J. D. BIERSDORFER NOV. 15, 2017 Q. How do you take a screenshot of just a single window on the Mac, and is there a way to get rid of that fake shadow around it?
A. While the keyboard shortcut of the Command, Shift and 3 keys pressed together takes a picture of the Mac’s entire screen, pressing the Command, Shift and 4 keys allows you to select a specific area of the screen to capture. If you press the Command, Shift and 4 keys and then press the space bar immediately, you can click the highlighted window to take a cropped screenshot of just that window.
<snip> Windows 10 users have several ways to take screenshots of all or part of their desktops. Pressing the Windows key and the PrtScn key snaps the full desktop, while pressing the Alt and PrtScn keys usually captures the active window; key combinations may vary based on the computer hardware.
Managing Email on Multiple Devices
Tech Tip By J. D. BIERSDORFER  NOV. 10, 2017 Q. How do I efficiently manage my email with three devices: computer, phone and tablet? Do I have to read, save, delete email three times, or can I easily sync them?
A. Most mail programs give you the choice of two ways to set up an account on a computer or mobile device — either with the IMAP (Internet Message Access Protocol) standard or POP (Post Office Protocol). If you want to keep your mailbox in sync across multiple devices, choose the IMAP method.
Microsoft Office Mobile Apps: Free or With a Fee
Tech Tip By J. D. BIERSDORFER   NOV. 7, 2017
Q. Do you need a paid subscription to use the Microsoft Office mobile apps? I thought they were free for Android and iOS devices.
A. The ability to use the Microsoft Office mobile apps without having to pay a subscription fee depends on the device you are using — and what you want to do with the programs. The free touch-screen editions of Word, Excel and PowerPoint allow you to do basic tasks (like create a file and enter text into it) on most smaller tablets and phones. You do need to sign up for a free Microsoft account to use Microsoft Office Mobile for Android, or the iOS versions of Word, Excel and PowerPoint on an iPhone, iPad or iPod Touch. The files are stored on Microsoft’s OneDrive cloud server.<snip> If the price is too steep for you, Apple iWork, Google Docs, Dropbox Paper and Zoho’s office apps are among the free or inexpensive alternatives.

====== Links from 3-2-2018 email =============

Can I Use Office 2003 with Windows 10?
what I see as your alternatives with respect to Windows 10 and Office 2003.<snip>

Why Can't I Talk To a Real Person?
Don't get frustrated when the free or low-cost service you signed up for offers little to no customer support. It's exactly what you should expect as part of the complex equation that allows you to use it for free. The lack of support is the additional “price” you agree to pay.
Make different choices. If you really do need live support, or if the support options you find don't meet your needs, then find an alternative service more to your liking. And don't be surprised if it's not free. Depending on your reliance on a service, good customer support can be worth every penny you pay for it.<snip>

What Does It Mean to Register a Domain?

Can I Password Protect a Folder?
I decided it was time to reinstall Windows 10 “from scratch” on my Dell Latitude laptop due to performance issues, suspected misconfigurations, and general cruft on the machine. Yes, I could have dealt with all the individual issues, but a completely clean reinstall would take less time and result in a significantly “cleaner” machine.
It used to be that “reformat and reinstall” was something Windows needed every year or two. That's no longer the case, in my opinion, for most Windows 10 users. It's quite reasonable to expect a stable Windows 10 installation (with updates, of course) to remain in place for the life of the machine.
As you might guess, though, I don't fall into the category of “the majority of Windows 10 users”. With all the testing, installing, uninstalling, configuring, reconfiguring, and more, I tend to be rather hard on my Windows installations.
So, it was time to start over.<snip>
Q: I recently noticed two huge files named hiberfil.sys and pagefile.sys taking up a bunch of space on my disk. I can't delete 'em, or if I do they come back when I reboot. What are they and how do I get rid of them?
A: Hiberfil.sys and pagefile.sys are support files for two features in Windows. While you might be able to get rid of them, you might not actually want to.<snip>
Internet safety: 8 steps to keeping your computer safe on the internet – Internet safety is difficult, yet critical. Here are eight key steps to keep your computer safe on the internet.
How Do I Use an Open Wi-Fi Hotspot Safely? – Open Wi-Fi hotspots at coffee shops, airports, and other public places are opportunities for hackers to steal information and more. I'll review how to stay safe.
A vulnerability was disclosed in the WPA2 security protocol that, in the worst case, could allow an attacker to potentially gain access to some or all of the encrypted information transmitted over a Wi-Fi connection.
This isn't a bug, and it's not a failure of one manufacturer or another. This is a weakness in the protocol itself.
If you use Wi-Fi on any device, it's worth understanding how big of a risk this might be, and what steps, if any, you might want to take.<snip>
The lesson here, of course, is to choose long, complex passwords. The longer the better, in fact. I now use passwords with 20 random characters whenever I can. I let LastPass create and remember them for me.
Yes, it's possible that even those can be compromised by malware such as keyloggers, which is why I also advise adding two-factor authentication to your important accounts. With two-factor authentication enabled, even knowing the password isn't enough to get in.<snip>
Why don't anti-malware tools work better than we want or even expect them to?
Malware is malware, and that includes viruses, spyware, ransomware, rootkits, zombies, and gosh knows what else.
No matter what program you run, there's still a chance your computer will get infected.<snip>
I'm not suggesting you get the Office 365 subscription. I'm also not suggesting you go the one-time purchase route.
I'm suggesting you do the math.
Don't let the fact that it's a subscription spook you away from what may very well be a more cost-effective solution. Choose what's right for you by more objective standards than “I don't like subscriptions”.
And while you're at it, be sure to factor in OpenOffice and LibreOffice, both of which are free. In many (though not all) cases, they can be suitable alternatives as well.<snip>

====== Links from 2-26-2018 email =============

====== Links from 2-9-2018 email =============

Is Mobile Broadband More Secure than Wi-Fi?
By and large, data connectivity through the cellular network is more secure than open Wi-Fi.
That's not a reflection of some inherent security difference in the technology, but more a reflection of just how ubiquitous and insecure open Wi-Fi really is.

How Can I Tell If a Website is Safe?

Recuva: a Free, Easy Undelete and File Recovery Tool

How Does a VPN Protect Me?
A VPN, or Virtual Private Network, is one approach to securely connect to a remote resource. Depending on the VPN, that privacy can extend from one end of the connection to the other, or it can protect you only for a certain portion.

What's the Difference Between Spam and Junk Mail?

12 Steps To Keep from Getting Your Account Hacked

The Four Characteristics of Computer Speed There are four separate characteristics that contribute to how fast or slow a computer appears to work.
•CPU: speed and usage
•Disk: its speed and how frequently it's being accessed
•Internet: its speed and how much data is being transferred
•RAM: the amount available, and the amount in use Whenever I encounter a machine reported as being “slow”, I look at each of these aspects to help narrow the problem.

How Do I Edit a Reply?

Creating a Backup Image Using EaseUS Todo Free

Using OneDrive for Nearly Continuous Backup

Reinstalling Windows 10 From Windows 10: "Reset This PC"

Why Can't I Just Use One Password Everywhere?