The Random Access
The Newsletter of the Computer Users Group of Greeley Colorado
SEPTEMBER  2014
Issue 27-09
We are located in Beautiful Greeley, Colorado .. just East of the Famous ROCKY MOUNTAINS S E P T 13
Dear CUGGers,   Our regular Second-Saturday  meeting is coming up this Saturday, same time same place 1:00 pm to 3:30 pm Classroom 2  Greeley Senior Activity Center, 1010 6th Street, Greeley. The West Parking lot is FREE on Saturdays
H O M E PRESENTER'S Page From CUGG Members From APCUG From WWWeb Special Interest Groups GADGETS Page About Us S P O N S E R S PAST Issues H O M E
President’s Corner
.
The Random Access
As many people are using Internet, it is no surprise that criminals are seeking new, innovative ways to scam you into giving up access to sensitive data and your computer devices for their own use. They know that many users are not very savvy about computer security and how to detect a scam, so they will continually try to trip up anyone they can through spam, counterfeit websites, text messages, unsolicited phone calls, and fake security alerts. There are many ways they will try to trip you up, and no one is beyond fooling if the ploy is well-designed, and new scams are being devised every year. Your best weapon is to be very cautious and skeptical. Although this short article is not an exhaustive list of the ways you can be fooled and robbed, it will hopefully arm you with basic information that you need in order to protect yourself. Verify with Whom You are Dealing   A cardinal rule to keep in mind before giving out personal data, money, or access to your computer, is to verify with whom you are dealing. In October 2005, my predecessor, Jamie Leben, gave an excellent presentation on computer security (to download his PowerPoint files, please visit www.cugg.org/presentations.htm#0510_security). To protect yourself and your assets, you should always confirm that anyone you deal with by email, chat, text, or phone is who they claim to be, and that they have a right to the information they request of you. If you receive a phone call about a problem with your banking or credit card count, or a security problem with your computer, or anything else that requires you to give up your personal data or provide access to your computer, hang up. If you receive electronic communication such as a text or email, do not respond. If you are concerned enough to follow up, then look up the person's or company's contact information from a trustworthy source. If it has to do with your bank or credit card, then call the phone number listed on your bank or credit card statement. For computer products or services, look for contact information or a web site address in the product documentation, invoice, or on the product packaging. For a government agency, look it up in the phone book or an official publication. Be careful of searching for a company's web site on the Internet, as scammers set up websites with a URL that is similar to that of a legitimate company, and then gladly fleece you for sub-standard support, or to gain control of your computer. As a rule, never give up any information--name, birth date, credit card number, banking information, password, or anything else--to someone you do not know. A common scam that has been around for a while, operating out of call center in India, is one in which someone calls you out of the blue, claiming to be with Microsoft or a company affiliated with Microsoft. The reason for the call is that they supposedly detected a malware infection on your computer and will assist in "cleaning" it. They will attempt to convince you to allow them remote access to your computer, which they may then infect with software that will collect your personal information or perform any other of number of functions. They will also attempt to convince you to give up payment information such as a credit card number or PayPal account, so they can then steal your money, ostensibly as payment for "services" or to "renew" an expired Microsoft license. Microsoft does no such thing, nor do any of their legitimate affiliates (see www.microsoft.com/security/online-privacy/avoid-phone- scams.aspx). Pop-ups   Malicious websites can produce pop-ups that make a variety of claims such as your computer is infected, the registry is "poor," your computer is running slow, etc. Don't believe it. It is too easy for someone to concoct a website pop-up that looks sophisticated enough to be a legitimate warning. I have even seen one that contained animated graphics of what appeared to be an active scan of the user's hard drive for malicious software. No web site is checking your computer for problems. Do not click on the pop-ups--close them. Do not call a phone number listed on the pop-up or purchase any software you supposedly need. Do not trust a pop-up for a product you've never heard of and never installed on your computer. If you cannot close a pop-up, it may be safest to shut down or reboot your computer to get out of the site. Then be certain not to return to the website. Other pop-ups may be produced by malicious software that is installed on your computer by a "drive-by download." These can be more troublesome, as they can take up residence on your computer and not go away no matter what you click or even if you reboot. Some, such as fake warning that you supposedly did some criminal, thus necessitating the FBI to lock you out of your computer, can be especially difficult to close or remove. As a rule, you always want to be certain you have a current anti-virus program installed before you connect to the web. The program should automatically download and install updates when they become available, and should always have an active subscription. (You should also keep up- to-date with the latest software updates for your operating system.) Some programs may require you to renew your subscription every year, so be certain to do so. In addition to having good anti-virus software, I have found the free version of Malwarebytes Anti-Malware (www.malwarebytes.org/) to be a good additional tool for finding and removing troublesome software that other anti-virus software may miss. The free version does not constantly run in the background, so it won't interfere with other software such as Norton AntiVirus, which is always running. You should also be careful of the websites you visit. If you do not know what a site is about, it is best not to go there. But then, even legitimate sites can be hacked into to serve up malware to visitors, so be certain your anti-virus software is up-to-date. Some browsers such as Google Chrome and Mozilla Firefox can warn you if they detect the site may be dangerous. Email Security   Don't believe everything you receive in email. If it sounds too good to be true, it is. A common scam is the "Nigerian 419" scam in which a person supposedly from Nigeria or other foreign country needs help moving millions of dollars from a bank account to another account overseas (never mind that it would be illegal to do so). All you need to do is to give your account information so they can transfer the money and leave you with a tidy fee for your assistance. A variation of this scam is that someone has supposedly died and left no heirs, so you have been chosen because of your reputation to be the lucky recipient of the money. Do not fall for them. Too many people have lost money, which is why these scams are profitable and continue to be propagated. Never share sensitive personal or financial information by email; you might just as well write it on a piece of paper and post it on a public bulletin board for the world to see. File attachments are another concern. Too often times, you may receive email with an important attachment to be opened. The message may be "spoofed" to make it appear to be from someone you know or from a legitimate company. The scam runs the gambit of a picture of a promising romantic match, an airline ticket you supposedly purchased, an invoice for an online purchase, a form for claiming an undeliverable shipment, details about an ACH transfer, an important Windows update, etc. As a rule, never open a file attachment from someone you do not know; just delete the email. Never open a file attachment that appears to be from someone you know, if you did not expect to receive the file. If you think you know the person, call or write to confirm that the attachment is legitimate. Unless you can confirm it is legitimate, do not open it. As for "official" communications regarding unpaid taxes, money transfers, failure to show up for jury duty or a court case, or other governmental or financial matters, you should expect to receive it as U.S. mail, not as an email message or attachment. Also, be suspicious of email that appears to be from a company or government entity with whom you know you have never shared your email address.
Eric Moore
Presenter’s Page
1:05 Exporting email and saving attachments - Eric Moore 1:25 Email POP3 & IMAP what are they and which is better         Frank Whiteley and Don Wiegel            Q & A - Eric Moore 2:15 Installing a Solid State Drive (SSD) - Ron Mettler 2:35 What is new with Amazon - Eric Moore 3:05 Gadgets - Don Wiegel
Starting in August .. I will RECORD the meeting in AUDIO (Stereo). I will post them to this page after the meeting or the Following Month. This is an experiment .. If you-all want this to continue Please send me an email
APCUG Articles    Our Users Group belongs to this National association. User Groups Newsletter Sites
3 Better Ways to Store Your Files than On the Desktop By Joel Lee, MakeUseOfCom.com, May 5, 2014 http://www.makeuseof.com/tag/3-better-ways-store-files-desktop/ http://bit.ly/1iiLU2u Did you know that storing files directly on your desktop can harm your productivity? I used to be one of “those” people who downloaded files straight to the desktop. If you can identify with that, then I have good news for you: you can do better. Desktop storage is simple, sure, but it comes with hidden drawbacks you may not know about. Kick the bad habit with these alternative file storage methods. They may not be as convenient but I promise that you’ll learn to love them in the long run. The urge to save files to the desktop is understandable. It provides immediate access with a single click, which means that it’s tempting to turn the desktop into a de facto headquarters for storage. But unless you are strict with maintenance, you’ll eventually succumb to these issues: No file protection. As noted by PC World, certain directories are not affected by System Restore, the most recognizable location being My Documents. Files on the desktop are affected by System Restore, which can result in unexpected file disappearances. No file backups. Many file backup programs ignore desktop files by default. Most programs worth their salt will allow you to change the settings and include the desktop if necessary, but all it takes is one forgetful moment to accidentally lose an important desktop file. Clutter, clutter, clutter. The story is always the same. You begin your desktop collection with a few documents. Over time, the collection grows to include images, music, programs, zip files, and more documents. Suddenly, finding the right document takes more time than actually opening it. Separate Drive Partitions One bit of computer wisdom that you should learn is this: “Never save data on the same partition as your operating system.” In Windows, the location of the desktop on the file system does reside on the same partition as the operating system itself. Why is this important advice? Because you want to avoid putting all of your eggs in the same basket. Let’s say that you happen to contract a mild virus or malware that attacks your operating system. It might wipe all files related to the operating system itself OR it may affect the entire partition that holds the operating system. By losing the operating system, you lose all of your saved data as well. But if you installed Windows to the C: partition and stored all of your files on the D: partition, your files on D: would be safe even if C: were wiped clean. The only way D: would be affected is if the physical hard drive itself was wiped or damaged. One additional benefit of having separate partitions is that you can reinstall Windows without losing your saved data. Tina has written on the subject of resizing Windows partitions, so check it out if you want to take advantage of this feature. http://bit.ly/1lfBCDe Use Windows Libraries Every installation of Windows comes with a directory called My Documents. In Windows 7, it was renamed to Documents and came with a couple of buddies: Music, Pictures, and Videos. They’re called libraries and you’ve probably seen them before, but never really used them, right? Well, you should reconsider. In truth, these four libraries are special. They aren’t just directories; they’re collections of multiple directories. In each library, you can specify different directories to be included and that library will show the content from all included directories. It sounds more complicated than it is. Think of it like this: You can save your videos to many different locations and link those directories to the Videos library. Then, whenever you access the Videos library, you’ll see all of those files in one place. It’s just as convenient as storing everything on the desktop, yet infinitely more flexible and organized. For more details on how to take advantage of this feature, check out Chris’s writeup on how to use Windows Libraries. http://bit.ly/1iMkORF Store Files in the Cloud Cloud storage has been a big buzz term over the past few years and for good reason. While cloud-related solutions like Dropbox, G+ Drive, or Microsoft OneDrive come with privacy concerns <http://bit.ly/1lzsQ4F>, they also offer many benefits and I think people are too quick to throw the baby out with the bathwater. Here’s how it works: You set aside one or more directories that automatically sync with whatever service you’re using (comparison of cloud storage services). These files can be accessed from anywhere and they can be set to private or public. Why is this better than storing straight on the desktop? Immediate backups. Due to automatic synchronization, you rarely need to worry about lost files. If your computer gets wiped somehow, those files still reside on the cloud and you can always retrieve them again. Revision history. Not every cloud service offers a revision history, but most do and it’s an important feature. Basically, the service will track every change that’s made to the file (it may be limited to the last X changes) and allow you to instantly revert to a past version if necessary. One Drive (aka SkyDrive) comes integrated with Windows 8 and can help you keep your files synced. Need Quick Access to Files? Sometimes convenience wins out over practicality and reason. The desktop is great because it allows for immediate access, right? With one small compromise, you can maintain that convenience. The answer is to use shortcuts. Creating a shortcut is as simple as dragging a file using the right mouse button to where you want the shortcut to appear, then selecting Create shortcut here from the menu. Even if a shortcut gets wiped, the actual file will still be safe. But instead of putting the shortcuts on the desktop, why not take it one step further? Right click on any file shortcut and select either Pin to taskbar or Pin to start menu. It’s a self-explanatory feature that works just as well as, if not better than, traditional desktop shortcuts. I use it day in and day out and I wouldn’t have it any other way. Conclusion Ultimately, personal preference will always win. For those of you who have been “desktopping” for years, you’ll probably find it near impossible to break the habit. I still do it from time to time, though I try my best to clean up after myself when I realize what I’m doing. It just doesn’t make sense to store everything on the desktop anymore. Do you clutter up your desktop with files and folders galore? If so, are you convinced enough to try a safer method of file storage? Share your thoughts with us in the comments! http://www.makeuseof.com/tag/3-better- ways-store-files-desktop/
The Month That Was 
July  Meeting
Special Interest Group 
Wednesday     3rd WEEK of this MONTH
Computer User’s 101
S E P T 17
6pm - 8:30pm Your Questions & Answers
We meet Wednesday this month at 6:00 pm at the Greeley Senior Center, 1010 6th Street.
Hosted by: Don Wiegel
I will be here at 6 pm .. Bring your Cameras and Manuals and I will explain the CONTROLS and how to use them. Anything about Digital Photography .. The Internet .. How to Use YOUR Digital DEVICES. Location:  Senior Activity Center  (Same room as the Monthly meeting) Hosted by: Don Wiegel Don brings his Ultrabook Win8.1 (64) 4-Core Laptop, his iPod 64G, and  his SAMSUNG G4 Smartphone  to this event. He will answer questions on how he uses these devices, and will demonstrate, by Request, any of the “MANY” programs he has installed on his computer. Adobe Photoshop Elements 12 .. AudaCity 1.3 Beta .. MAGIX Music Maker 17 .. MS Auto Collage Maker .. SmartDraw VP .. ACDSee Pro 7 .. Lauyn TOWeb Xara Designer Pro 10 ... Dynamic Auto-Painter .. MAGIX PhotoStory Pinnacle Studio 14 .. Pictures to Exe .. Many Others 2 1/2 Hours of: Your Questions and My Answers This is the time & place to ask those questions that don't get asked in larger group events. The focus is the new beginner to the advanced beginner  .. We usually have a lot of fun while learning .. I will also answer most of your Questions, usually with DEMOs  (Time Permitting).
ANDROID  -  Operating System
The Random Access
Donald E. Wiegel
I have decided to start a new page devoted to the Google Android products. I own a Android phone and NEXUS 10 tablet. I will outline my experiences with this system. Lets get started ....  
App’s
Garfield Daily
TED
ColorNote Notepad Notes
Dropbox
Google Drive
VIDEOS on the WWWeb
The Random Access
G A D G E T S
The Random Access
by Mr. Gadget C O O L  GADGETS of the Month
Hi .. I'm the Publisher of this newsletter .. Also known as "Mr. GADGET". Each Month I go to the ENDs of the Internet to find *GADGETS* for the 20 minute presentation at the monthly meeting.  Below are this MONTHS picks .. Just “CLICK” on most of the pictures to go to the SOURCE.       ..... This is a *FUN* few minutes .....
Wifi SCANNER
Watch VIDEO in Web Site
Watch VIDEO in Web Site
The “GOOD” Old Days
LED Folding 360 Area Lantern
Activity & Sleep Tracker
12’ x 8’ Wall Mural
Fountain 33”x20” Fountain 27”x26”
Watch VIDEO in Web Site
R2-D2 USB Car Charger
Just FOR the FUN-OF-IT
USB 3.0 4-Port Hub
Bluetooth In-Car Speakerphone Watch VIDEO in Web Site
 18” Flexible OLED Display
GOOGLE’s .. SmartWatch
V I D E O S V I D E O S INFO that MOVES INFO that MOVES Watch Preview Watch Preview
Levitating Bluetooth Speaker
Watch VIDEO in Web Site
Finger Vein Authentication
Motorola's new Bluetooth Headset
Electric Bikes for All Terrains
Google’s Vibrating Spoon
NASA successfully tests microwave thruster
Contact 
Don Wiegel Publisher dwiegel@comcast.net
Erick Moore Webmaster moore.e.s@att.net
The Random Access
We need you to submit Articles for this newsletter   .. No rules .. Just some of your interesting              Tips & Tricks
S U B M I T S U B M I T
About 
Newsletter The Random Access newsletter is published monthly on CUGG's website. The content consists of original reviews, advice, viewpoints, and other material written by CUGG members. We encourage members to contribute whenever possible for the benefit of members and the public. As you can see from the Sign to the right .. The Instructions, even though technically right, can be confusing.  This groups main mission is to provide clarification. Which comes first .. The Horse .. Or the Cart ??? .
The Random Access
City of Greeley
The City of Greeley is a Home Rule Municipality that is the county seat and the most populous city of Weld County, Colorado, United States.. Greeley is situated 50 miles North of the Colorado State Capitol in Denver. It is known as the 50 mile city, as it is also:   50 miles from the capital of Wyoming (Cheyenne). The only City in the USA to be 50 miles from TWO State Capitals. •  50 miles from Estes Park in the Rocky Mountain National Forest. •  50 miles from Fort Morgan, the last of the plains cities on the prairie. The majority of the state is dominated by the mountain ranges and range lands of the Rocky Mountain West, while the Eastern most section of the state includes part of a high altitude prairie region known as the High Plains. According to 2006 Census Bureau estimates, the population of the city is 87,596.  Greeley is the 12th most populous city in the State of Colorado and the most populous city of Weld County .
The Random Access
CUGG -  S P O N S O R S
The Random Access
S P O N S O R S
Past Issues
.
The Random Access
2014
2013
JAN JAN FEB FEB MAR MAR APR APR MAY MAY JUN JUN JUL JUL AUG AUG SEP SEP OCT OCT NOV NOV DEC DEC
JAN JAN FEB FEB MAR MAR APR APR MAY MAY JUN JUN JUL JUL AUG AUG SEP SEP OCT OCT NOV NOV DEC DEC
zz zz