The Random Access
The Newsletter of the Computer Users Group of Greeley Colorado
Issue 27-11
We are located in Beautiful Greeley, Colorado .. just East of the Famous ROCKY MOUNTAINS NOVEMBER 8
Dear CUGGers,   Our regular Second-Saturday  meeting is coming up this Saturday, same time same place 1:00 pm to 3:30 pm Classroom 2  Greeley Senior Activity Center, 1010 6th Street, Greeley. The West Parking lot is FREE on Saturdays
H O M E - ABOUT Us - ABOUT Our CITY Special Intrest Groups - COMPUTERS 101 A R T I C L E S - From CUGG - From APCUG From WWWeb - VIDEOS - LINKS M O N T H L Y - PRESIDENTS Corner - GADGETS - PRESENTERS Page - The MONTH that WAS - BACK Issues OPERATING Systems - ANDROID - APPLE (Future Page)
President’s Corner
The Random Access
Last month, Bob Gostischa gave a guest presentation for CUGG on the topic of securing your computer and recommended software to install. It was an informative and useful presentation overall, which most of our attendees evidently enjoyed. I plan to check out a number of the programs that he recommended. One of our long-time members, Ron Mettler followed up last week with his own thoughts about the software mentioned in Bob's presentation. Ron made some good points that are worth considering (as well as sharing some of his recommendations): Memory-resident Programs:  Any program that loads when Windows starts and is always running is by definition a memory-resident program. Such programs may be useful and even necessary. A number of programs called processes are loaded by Windows at boot-time and remain running constantly, serving the needs of the user and the operating system. Some may be installed by the user to perform additional, specialized functions. A prime example is an anti-virus program such as Norton AntiVirus, McAfee, Avast!, and AVG AntiVirus. By always running in the background, an anti-virus program is better able to detect and stop any malware before it takes control of the computer, destroys data, or steals the user's personal information. Because memory-resident programs use up memory and processor time, they do slow the computer down a bit. This is a reason why you are advised not to install two memory- resident anti-virus programs—they can significantly slow your computer and could conflict with each other, causing stability issues with Windows. I do want to note that multiple anti-virus programs can be installed on the same computer without issues, as long as only one is a memory-resident program. A good example of one that is not memory-resident is the free version Malwarebytes Anti-Malware. It only runs when you open it. As such, it can be a useful tool to check your system which may otherwise be protected with a memory-resident program such as Norton AntiVirus. I sometimes use it at home and at work to get a "second opinion" about a suspected malware infection. Driver Update Programs:  Some third-part programs are designed to check your computer's hardware drivers and download and install new versions when they are released. Ron recommends against such programs, as not all drivers updates are required. Windows Update has the ability to check for driver updates and mark any that are recommended, as they fix known hardware issues. I also refrain from spending the time to download and install an updated driver, unless I know it is necessary. I should also add that you don't require a third-party program to check for driver updates—they are available from the manufacturer's website. If your computer is made by a company such as Dell, HP, or Apple, you will find driver updates on their websites. If you purchased and added a hardware device such as a sound card, graphics card, or DVD drive, you can find driver updates on the website of the device's manufacturer. I do not recommend installing drivers that are hosted on non-manufacturer websites, as they could contain malicious software. (The same applies to software updates—always go to the manufacturer's website, not a third-party site.) Any documentation that comes with your computer and devices should include the addresses of their websites, where you can safely search for and download driver updates. Tag-along Programs:  More and more, you will find that many programs that you download to install will come bundled with other unrelated, third-party software. Such software is not only unnecessary, but could be malicious, waste of disk space, and slow down your computer. When installing software, be careful to read every prompt before proceeding. If you see an option to install something else that you were not intending to install, then be certain to uncheck the option to install it. Also be careful of website links that may mislead you to download and install something completely different than what you want, or which have options that will automatically install additional software and change your program settings. (A prime example of this is the Flash Player updates on Adobe's site. If you are not watchful, you may end up installing Google Chrome and letting it take over as your default web browser.) As a final note, be certain to research a new program before installing it. Sites such as PC Magazine and PC World review software and give their recommendations as to what is worthwhile and what is not. Also, CUGG is composed of members who have had years or even decades of computing experience and are willing to serve as resources of information if you have questions or need advice. No question is a "dumb" question, so please speak up if you wish to know whether someone has had experience with a particular program and can provide advice on whether it is safe and worthwhile to install. Just by asking, it is an opportunity for you and other members to learn something new.
Eric Moore
Presenterís Page
We will RECORD most meetings in AUDIO (Stereo). They will be posted to this page after the meeting or the Following Month. This is an experiment .. If you-all want this to continue Please send me an email
RECORDINGS  The Recordings are usually posted within 10 days ater the Meeting.  A Members eMail will be sent to inform everybody
APCUG Articles    Our Users Group belongs to this National association. User Groups Newsletter Sites
Back to Basics Finding Programs on Your Computer Jim Cerny, 2nd Vice President, Sarasota PCUG, FL May 2014 issue, PC Monitor jimcerny123 (at) When you turn your computer on, Windows (the master supervisor program, also called the “operating system”) starts and, after a few moments, displays your start screen called the Desktop. This is where you begin using your computer and decide what you want to DO with your computer – that is, select what program you want to run. On the Desktop are: ICONS – those little symbols with words underneath them. Most of these icons represent programs and you “double-click” your left mouse button on the icon of the program you want to run and use. Each program runs in a “window” (hence the term “Windows” for the operating system). The programs you use should have an icon on the desktop. However, most people new to using a Windows computer may not realize that your computer – all computers – come with many programs already installed on the computer. And, over time, you (or someone else using your computer) may have downloaded or installed more programs. Not all these programs have icons on your desktop. To see ALL the programs on your computer, left click once on the “Start” button (or “Start orb”) which is in the lower left corner of your desktop screen. This will open the start MENU which has all kinds of goodies. On this start menu, very near the bottom, is a rectangular box with the words “All programs” on it. Move your mouse arrow to that box and wait - it will open a list of ALL your programs on your computer. There are two important things about this list that you should know. First it is a long list and you will have to use the scrollbar on the right side to see the whole list. You can “scroll down” by putting your mouse arrow on the scrollbar gray slider, hold down the left mouse button, and then drag the mouse down. This will “drag” the scrollbar and show you the rest of the list. The second thing is that there are so many programs they are organized into FOLDERS. Scroll down this list until you see the list of folders – a “folder” has a small yellow icon that looks like folder to the left of the name. The first FOLDER in the list should be the “Accessories” folder of programs. It is this particular folder that we will use for the rest of this article because all Windows computers have it (no matter what version of Windows you are running on your computer). Left click once on the Accessories folder to open it. This will give you a list of all the programs in that folder. All these programs come with Windows so they are on ALL Windows computers. To open or run any program from the “All programs” list, you just left-click once on the name of the program you want to start. We are going to look at three of these programs, so left click on each of these to open them: Click on “Calculator” and a small calculator window will appear on your screen. You can move this window around by dragging the top part of the window with your mouse. It works just like any calculator – just click on the keys with your mouse. Notice that you can click on the “View” menu and change it to a “scientific” calculator and you can click on the “History” option (Windows 7 version or later) to see a list of your calculations. The nice thing about using this calculator is that you can “Copy” and “Paste” any result into your document or email. Click on the “Paint” program and you can draw and have fun creating your own work of art. You can learn how to use this enjoyable program by clicking on the small blue circle with a white “?” in the upper right of the window. Click on “WordPad”. This is a free word-processing program that works just like the Microsoft Word program – except that WordPad has far less features. It works fine for writing letters and creating documents. The beauty of using WordPad is knowing that everyone who has Windows has it, whereas not everyone may have the Word program. The “All Programs” list contains all the programs on your computer and you can run any program on this list by left-clicking on it once. But to REMOVE a program from your computer you need to use the “Uninstall or change a program” feature which we will not go into here. If you want to create a shortcut on your desktop to one of these programs, here is one way to do it: Find the program you want on the all programs list. Move your mouse arrow on that program: Hold down the “Ctrl” key (the Control key) on your keyboard Hold down the left mouse button and DRAG to your Desktop area The reason you must hold down the Ctrl key first and hold it down while you drag is so that you will make a COPY (also called a “shortcut”) icon on your desktop and NOT MOVE the program from the all programs list. You should ALWAYS keep ALL programs on your All Programs list. If you DELETE a program icon from your desktop, you will not be deleting the program from your computer, only removing the “shortcut” icon from your desktop. You can also find any program from the start menu by entering the name of the program you want in the “Search programs and files” box just below “All programs”. Personally, I find the Calculator, WordPad, and Paint programs fun and helpful, and I am sure you will too. I have made icons (shortcuts) for them on my desktop. How Safe Are Wi-Fi Hotspots? By Larry McJunkin The Retired Geek Technical Tips for the Non-Technical “Over 50” Crowd Many of us travel a lot, whether in business or just to visit our families and friends. We use our computers, smartphones and tablets in hotels, restaurants, and other places, but are these Wi-Fi “Hot Spots safe?  We all assume it’s safe to connect to the Wi-Fi network at our local Starbucks, airport, waiting area where we have our cars serviced, hospital, or even at a relative’s home. But it is a really bad idea…a very bad idea! There are many reasons you wouldn’t want to do this. Let’s look at the various types of Wi-Fi network. Ad-hoc Networks & Access Point Networks Basically, there are two types of Wi-Fi networks accessible by your computer: ad-hoc networks and traditional access point networks. Ad-hoc networks are getting a little outdated, but they still exist. They connect devices directly to each other, while access point networks connect devices to a central router. For example, you could connect two laptops or your laptop and your phone together without the need for a router or any other networking hardware. This would create an ad-hoc network. This is different from a traditional access point network where each device connects to a router, like you most likely have in your house. Unsecured Network A network is deemed unsecured just by virtue of the fact there is no password required to access it. If you’re able to click on a network in your smartphone or tablet and connect to it without a password, you are connecting to an unsecured network, and that makes the device you’re using susceptible to hacking…plain and simple. So, that “free public Wi-Fi” network you encounter at the airport is nothing more than an ad-hoc network that was probably started long ago as a service to travelers, but still persists to this day. Basically, when you connect to this type of network, you are most likely connecting to another computer. And when you connect to that other computer, your computer “could” also be set up to broadcast the “free public Wi-Fi” network to other devices around you, essentially allowing access to all your private data to anyone within range. This is not good! Why You Shouldn’t Connect to Unsecured Networks Let’s say you’re sitting in a coffee shop and decide you want to check your email to kill some time. You scan the available networks and find one that’s open and doesn’t require a password. You connect and start surfing. Coffee and free Wi-Fi, how good does it get…right? Wrong! A hacker who is also fond of coffee shops and could be located within range of the router you connected to. He’s waiting for someone just like you to connect to the network so he can start a middleman attack. Within a few minutes, he could easily gain access to all your passwords, including bank accounts, email, and anything else he wants. You may not think this is possible…but with today’s software and technology, it is! How to Stop Wi-Fi Crime So how can you help prevent all this from happening? For starters, you can use *only* a secured network that encrypts all of your data. This will ensure your data is safe and scrambled as it travels between you and its destination”. Now, if a hacker were to intercept your message, they would see nothing but a bunch of scrambled garbage. Of course, no security measure is 100% safe, but at least good encryption will help a lot. Tips for connecting to unfamiliar wireless networks…if you must do so: 1. Save the really important tasks, such as online banking and other finances, for home. 2. Try not to connect to any “public” or “unsecured” networks. If you absolutely need access to the internet, pay a few bucks for the secure option... 3. When on a Wi-Fi network, look for websites that begin with “https” in the address bar, then try to use only these secure sites. 4. If you really want maximum security, use a VPN. Lastly, tell all your friends and family to follow these Wi-Fi safety tips. You just may save someone from a major financial or identity theft disaster.
The Month That Was 
October Meeting
Special Interest Group 
Wednesday     3rd WEEK of this MONTH
Computer User’s 101
6pm - 8:30pm Your Questions & Answers
We meet Wednesday this month at 6:00 pm at the Greeley Senior Center, 1010 6th Street.
Hosted by: Don Wiegel
I will be here at 6 pm .. Bring your Cameras and Manuals and I will explain the CONTROLS and how to use them. Anything about Digital Photography .. The Internet .. How to Use YOUR Digital DEVICES. Location:  Senior Activity Center  (Same room as the Monthly meeting) Hosted by: Don Wiegel Don brings his Ultrabook Win8.1 (64) 4-Core Laptop, his iPod 64G, and  his SAMSUNG G4 Smartphone  to this event. He will answer questions on how he uses these devices, and will demonstrate, by Request, any of the “MANY” programs he has installed on his computer. Adobe Photoshop Elements 12 .. AudaCity 1.3 Beta .. MAGIX Music Maker 17 .. MS Auto Collage Maker .. SmartDraw VP .. ACDSee Pro 7 .. Lauyn TOWeb Xara Designer Pro 10 ... Dynamic Auto-Painter .. MAGIX PhotoStory Pinnacle Studio 14 .. Pictures to Exe .. Many Others 2 1/2 Hours of: Your Questions and My Answers This is the time & place to ask those questions that don't get asked in larger group events. The focus is the new beginner to the advanced beginner  .. We usually have a lot of fun while learning .. I will also answer most of your Questions, usually with DEMOs  (Time Permitting).
ANDROID  -  Operating System
The Random Access
Donald E. Wiegel
I have decided to start a new page devoted to the Google Android products. I own a Android phone and NEXUS 10 tablet. I will outline my experiences with this system. Lets get started ....  
Garfield Daily
ColorNote Notepad Notes
Google Drive
VIDEOS on the WWWeb
The Random Access
The Random Access
by Mr. Gadget C O O L  GADGETS of the Month
Hi .. I'm the Publisher of this newsletter .. Also known as "Mr. GADGET". Each Month I go to the ENDs of the Internet to find *GADGETS* for the 20 minute presentation at the monthly meeting.  Below are this MONTHS picks .. Just “CLICK” on most of the pictures to go to the SOURCE.       ..... This is a *FUN* few minutes .....
Mirror Case for iPad
USB 3.0 Mobile Adapter Drive
Just FOR the FUN-OF-IT

Visit for breaking news, world news, and news about the economy

Don Wiegel Publisher
Eric Moore Webmaster
The Random Access
We need you to submit Articles for this newsletter   .. No rules .. Just some of your interesting              Tips & Tricks
Newsletter The Random Access newsletter is published monthly on CUGG's website. The content consists of original reviews, advice, viewpoints, and other material written by CUGG members. We encourage members to contribute whenever possible for the benefit of members and the public. As you can see from the Sign to the right .. The Instructions, even though technically right, can be confusing.  This groups main mission is to provide clarification. Which comes first .. The Horse .. Or the Cart ??? .
The Random Access
City of Greeley
The City of Greeley is a Home Rule Municipality that is the county seat and the most populous city of Weld County, Colorado, United States.. Greeley is situated 50 miles North of the Colorado State Capitol in Denver. It is known as the 50 mile city, as it is also:   50 miles from the capital of Wyoming (Cheyenne). The only City in the USA to be 50 miles from TWO State Capitals. •  50 miles from Estes Park in the Rocky Mountain National Forest. •  50 miles from Fort Morgan, the last of the plains cities on the prairie. The majority of the state is dominated by the mountain ranges and range lands of the Rocky Mountain West, while the Eastern most section of the state includes part of a high altitude prairie region known as the High Plains. According to 2006 Census Bureau estimates, the population of the city is 87,596.  Greeley is the 12th most populous city in the State of Colorado and the most populous city of Weld County .
The Random Access
The Random Access
Past Issues
The Random Access