{"conf": "computer", "generated_at": "2026-04-26T08:00:02.954878Z", "threads": [{"num": 1, "subject": "Let's all get to know each other!", "response_count": 14, "posts": [{"response": 1, "author": "MEgabiT", "date": "Tue, Dec 17, 1996 (11:26)", "body": "Hi I've been using Intel PC for 9 years now (last 4 years under Windows) and SPARC workstations for 5 years. My area has been CAD/CAM/CAE (I'm the Polish distributor for Computervison and Moldflow) and - since last year - the Internet. Speaking of the latter - well, just overhelmed by the possible (or impossible) \"standards\" to jump on (various kinds of Java for one example)."}, {"response": 2, "author": "terry", "date": "Tue, Dec 17, 1996 (22:08)", "body": "Welcome Peter!"}, {"response": 3, "author": "drymartini", "date": "Sat, Dec 28, 1996 (00:40)", "body": "Started with a TRS80, then an Atari 8-bit, then AtariST, then that great hack by Dave Small that turned the Atari into a Mac, meanwhile getting a PC-XT clone, followed by 286, 386, 486, P6. I help people with their systems and networks. A specialty is empowering the computer phobic, especially women. I want to get a bunch of them to warch (drill) in the DooDah parade or maybe an eastern equivalent or the Corporate Cup parade in nearby Olean, NY. They'll be dressed in power clothes and be carrying (brandis ing) notebooks and palmtops. Oh, I also have another great hack, a Canon LBP4 series printer that thinks it's a LaserWriter, PostScript and all, dating back to when PS laser printers cost $2000. The QMS JetScript board is in the system box. I love my Hackintoshes, and enjoy hearing about all sorts of neat hacks. Using computers as learning/teaching aids is another topic that excites me. What can others share about this? Techniques, software, sources, disk-based interactive training?"}, {"response": 4, "author": "terry", "date": "Sat, Dec 28, 1996 (01:03)", "body": "I started with an Apple ][, then a ][+, then a //e, then a Mac Plus, a Mac IICX, and IBM PC, an XT, 286, 386, 486/33, 486/66, Pentium and then the three Unix Intel based boxes that make up the Spring. Soemwhere down that road I had an Amiga 1000, a few Toshiba Notebooks, and an Austin Notebook. I'm sure I'm forgetting some systems that I've had. I still have a working //e with a Profile hard drive that runs Appleworks. This system was great for its time. My next system will most likely be a dual Pentium Pro with 128mb ram, 4 2gb hard drives, a superfast video capture/svga card, a 21\" SVGA monitor, and an Intel Pro100 ethercard."}, {"response": 5, "author": "drymartini", "date": "Sat, Dec 28, 1996 (21:09)", "body": "Oh yes, there was a Momenta. And a no-name monstrosity a guy had started to build while taking some correspondence course. And for a while there was an Altos unix machine, which bent my head severely because I didn't know unix commands; and it seemed odd for a machine to have 6 serial ports but no mouse. It is fascinating to see the hardware people are still using. If these were cars, they's be wearing antique or classic plates. And they are doing useful work. One of my clients is upgrading from-- a PC-XT clone with dual 360k floppies, a giant keyboard that functions as a daisy-wheel printer, booting with a DOS 2.X floppy, running WP whatever on the other floppy. Handling the correspondence and other document prep for a busy attorney. Now, that machine was built to last!"}, {"response": 6, "author": "terry", "date": "Sat, Dec 28, 1996 (22:39)", "body": "I've always believed you can do just about everything you need to on an old boatanchor running dos and a program like Micrsoft Works."}, {"response": 7, "author": "fanatic", "date": "Wed, Jan  1, 1997 (15:26)", "body": "I'm new to the internet, I have a packard bell with quat speed cd-rom and a pentium processor. I am having trouble with my downloaded version of Eudora Light. I can't figure out how to set it up in my Windows 95 Can anyone help?"}, {"response": 8, "author": "fanatic", "date": "Wed, Jan  1, 1997 (15:29)", "body": "I'm new to the internet, I have a packard bell with quat speed cd-rom and a pentium processor. I am having trouble with my downloaded version of Eudora Light. I can't figure out how to set it up in my Windows 95 Can anyone help?"}, {"response": 9, "author": "terry", "date": "Wed, Jan  1, 1997 (15:47)", "body": "Ask this question in the Eudora Light topic in the 'apps' conference ok?"}, {"response": 10, "author": "sibakhi", "date": "Sun, Mar 30, 1997 (15:05)", "body": "Well , i am a new user for Yapp and it was interesting for me to know about the sprig.com but i do not know how to navigate through this very interisting web site ,from what i have read ,sharing ideas and consulting each other is a very good thing to do and it is important for me to share ideas over seas any how i would like from you to send me an e-mail explaining how can be productive in this web site . Thanks ; Husam"}, {"response": 11, "author": "terry", "date": "Sun, Mar 30, 1997 (17:12)", "body": "The best way is to access the built in help menus and to join the yapp conference iteself. Type help at the ok prompt and that will get you started. If you have any specific questions, I'll be glad to field them. And welcome aboard!"}, {"response": 12, "author": "confusius", "date": "Wed, Jun 18, 1997 (05:04)", "body": "Hi I am from Norway, working in Finland for the time being. I have worked with Intel PC for 10 years, running Windows and Linux. My PC is a 'self'-made version. All the hardware is bought separetly and mounted by me. Strange thing.. It still works.. Nice to meet you all. Regards dag norland. dag.norland@confusius.com www.confusius.com is up and running in a few days now. I bought my own domain, doesn't everyone do now that now a days ?"}, {"response": 13, "author": "terry", "date": "Wed, Jun 18, 1997 (13:03)", "body": "Welcome dag, I'm NOrwegian descended on my dads side. Every run in to the name Walhus before in your travels around Norway. Is tthis name in your local phonebook. Wahat city are you in?"}, {"response": 14, "author": "donnal", "date": "Sat, Sep 20, 1997 (23:48)", "body": "Anyone here using Java for enterprise application development? computer conference Main Menu"}]}, {"num": 10, "subject": "Microsoft", "response_count": 8, "posts": [{"response": 1, "author": "terry", "date": "Tue, Nov  3, 1998 (06:55)", "body": "The Halloween Document Microsoft has confirmed that this internal document, which was leaked to Eric Raymond, is authentic. It is the Microsoft strategy to deal with Linux and other free software platforms, referred to as \"Open Source Software\" or OSS by the MS author. Eric Raymond has placed an annotated version of the document on the web at: http://www.tuxedo.org/~esr/halloween.html"}, {"response": 2, "author": "tami", "date": "Fri, Nov  6, 1998 (05:19)", "body": "From: Lenny Foner To: tami@gnu.org Cc: foner@media.mit.edu Subject: Microsoft admits VinodV memo is authentic Date: Mon, 2 Nov 1998 18:20:34 -0500 www.slashdot.org's lead story is currently: Microsoft admits VinodV memo is authentic ESR writes \"The Wall Street Journal called me less than an hour ago to quiz me about the Halloween Document. I gave them the sound bites they were looking for. In the process I found out that they've already talked with Microsoft -- and Microsoft has officially admitted that the memorandum is genuine! This fact should become public knowledge no later than tomorrow evening (Nov 3) when the WSJ story runs. As you peruse your WSJ tomorrow, the distant noise you hear will be me -- laughing my butt off at the people who leapt to accuse me of having been hoaxed, or even of perpetrating the hoax myself.\" For those that can't wait, news.com is also confirming it . Thanks to David Fred for this link. ------- end -------"}, {"response": 3, "author": "terry", "date": "Fri, Nov  6, 1998 (09:18)", "body": "Thanks for posting the updated url!"}, {"response": 4, "author": "KitchenManager", "date": "Sat, Nov  7, 1998 (11:03)", "body": "Yes, thanks, TeknoSlut!"}, {"response": 5, "author": "terry", "date": "Mon, Nov  9, 1998 (10:16)", "body": "The how convenient department: Microsoft needs competitor and voila! Microsoft Responds to Internal Memo Regarding the Open Source Model and Linux Posted: November 5, 1998 On Monday, Nov. 2, Open Source obtained and posted an internal Microsoft memo on the open source model and the Linux operating system. Since that time, part 2 of the document has also been posted. These memos, written by engineer Vinod Valloppillil, were originally distributed within Microsoft on Aug. 11, 1998, and were intended to stimulate internal discussion on the open source model and the operating system industry. The practice of researching and assessing competitors is standard procedure at the company; one which our shareholders and customers would expect. It is important to note that these memos represent an engineer's individual assessment of the market at one point in time. These memos are not an official statement by Microsoft on the issue of open source software or the Linux model. The existence of these documents demonstrates the vigorous competition that exists in the operating system industry. Microsoft does see Linux as one of many competitors in the lower-performance end of the general purpose server industry and the small to medium-size ISP industry. Microsoft also recognizes and has identified several challenges inherent to this particular business model (many which are outlined in part one and part 2 of these memos.) Furthermore, Microsoft has an obligation to its customers, business partners and stakeholders to monitor competition, one part of which is encouraging active interest by knowledgeable engineers and active discussion of the issues. Linux and the Open Software Source Model - A Question and Answer Session With Ed Muth Enterprise Marketing Group Manager, Microsoft Corp. Catalyst: Internal Microsoft memos in the press regarding the open source model and Linux in particular. Q: Are the Halloween documents posted on Open Source genuine? A: Although Microsoft has not attempted to perform a line-for-line review of the posted documents, they do appear to be confidential Microsoft documents with annotation, sent internally to select staff and management on Aug. 11, 1998. Q: What was the purpose of creating these documents? A: It is standard practice at Microsoft to research, write about, and assess all competitors, from both a business model and technical perspective. We would be doing a disservice to our shareholders and customers if we were not monitoring and assessing market conditions and competitive offerings. Accordingly, such assessments of technical, business, and competitive issues are a routine practice across all industries and types of companies. Honesty and creative ideas in such documents are critical to effective communication and the free flow of ideas. It is always unfortunate when a company\ufffds confidentiality is compromised, as it was in this case by the unauthorized or unintentional release of this document. Q: Is this an official Microsoft response to the open source model and Linux in particular? A: No. These documents do not represent an official Microsoft position or road map. They are technical analyses written by a staff engineer that represent the thoughts of one individual at one point in time. They were intended to encourage an informed internal discussion of issues by marketing and engineering middle managers. Q: Who is Vinod Valloppillil and what is his role at Microsoft? A: Vinod is a staff engineer who, from time to time, is chartered with the responsibility of monitoring and analyzing market conditions and competitive offerings. His analyses are intended to spur internal discussion about industry trends and market dynamics. He is not an official company spokesperson. Q: How did these documents get leaked to the press? A: At this point we cannot confirm how the documents were distributed outside the company or who is responsible for the action. Q: Does Microsoft consider Linux a competitor? A: Yes. Linux is a competitor on the client and the server. My analysis is that Linux is a material competitor in the lower-performance end of the general purpose server industry and the small to medium-sized ISP industry. It is important to recognize that Linux, beyond competing with Microsoft, is also, and perhaps even more frequently, an alternative or competitor to other versions of UNIX. The operating system industry is characterized today by vigorous competition. This competition, of which Linux is only a part, exists at the technology level as well as in terms of business models, applications, channels and alliances. Q: The first document talked about extending standard protocols as a way to \"deny OSS projects entry into the market.\" What does this mean? A: To better serve customers, Microsoft needs to innovate above standard protocols. By innovating above the base protocol, we are able to deliver advanced functionality to users. An example of this is adding transactional support for DTC over"}, {"response": 6, "author": "ratthing", "date": "Mon, Jan 18, 1999 (13:36)", "body": "From the Wall Street Journal... Activist Groups Want State To Abandon Microsoft Fare The geeks of Texas are launching yet another charge at Bill Gates. A handful of activist groups are calling on state officials to abandon software sold by Microsoft Corp. and other commercial vendors in favor of \"open source\" products -- software that can be installed and copied without charge, and repaired and modified by the user. The loose coalition includes the Dallas-based Open Records Project, which publishes public information on the Internet; Geek Garrison, a Dallas-based group whose members seek to use their technological prowess to solve social problems; and the Texas office of Public Citizen, a consumer-advocacy organization. Open-source software, argues the coalition, would slash costs for state agencies. And, adds Russell Fish of the Open Records Project, \"it's a great way to torpedo the Microsoft monopoly.\" The group's goal is a legislative resolution encouraging agencies to consider open-source software. Well-known examples of open-source software include Netscape Communications Corp.'s Navigator Web browser and the Linux operating system. Most state agencies buy their own computer products, and no rules require any particular software brand or prohibit open-source products. But state computer officials caution that switching to new software could create training and other transition costs that wipe out any price savings. For some members of the coalition, the push for open-source software is only part of a broader assault on the Redmond, Wash.-based giant. Tom \"Smitty'' Smith, director of Public Citizen's Austin-based Texas office, hopes that the effort will prod the state to join an existing multistate antitrust lawsuit against the company. \"This is a small example of what the domination by Microsoft of the computer industry is costing taxpayers and consumers,'' Mr. Smith says. Asks a Microsoft spokesman, \"Are they looking to hurt Microsoft or looking to help the state? It appears it's a way to get at Microsoft and not to help the state.'' --Michael Totty"}, {"response": 7, "author": "terry", "date": "Thu, Jan 17, 2002 (04:21)", "body": "Infotech Microsoft announces corporate strategy shift toward security PTI/AP Washington, January 17: Microsoft Chairman Bill Gates has announced to employees a major strategy shift across all its products, including its flagship Windows software, to emphasise security and privacy over new capabilities. In e-mail to employees obtained Wednesday by the Associated Press, Gates referred to the new philosophy as \"trustworthy computing\" and called it the \"highest priority\" to ensure computer users continue to venture across an increasingly Internet-connected world. Gates said the new emphasis was \"more important than any other part of our work. If we don't do this, people simply won't be willing\ufffdor able\ufffdto take advantage of all the other great work we do.\" \"When we face a choice between adding features and resolving security issues, we need to choose security,\" Gates continued. \"Our products should emphasise security right out of the box.\" The dramatic change comes after the discovery of major security problems in Microsoft products, such as a flaw in the latest versions of Windows that allow hackers to seize control of a user's computer. Another problem allowed the Code Red viruses to cripple hundreds of thousands of computers running Microsoft products."}, {"response": 8, "author": "terry", "date": "Thu, Jan 27, 2005 (03:49)", "body": "Microsoft: No licence, no Windows updates All Windows users will have to validate their copy of Windows as genuine before downloading any software or drivers from the Microsoft download site. From the middle of the year Microsoft will roll out a mandatory Windows validation process. The process is being piloted currently for Czech, Chinese and Norwegian versions of Windows. The decision to enforce validation will help Microsoft fight against counterfeit software and will also help IT departments and consumers to check that they have bought valid products. Invalid software licences has been a problem for users in the past, particularly when they have tried to obtain discounts on Microsoft volume licensing and ended up buying counterfeits rather than legitimate licence. This is what happened in 2002 to Clackmannanshire Council in Scotland. When the council needed to extend its MS Select desktop licences a supplier offered extra licences more cheaply than were available under the Select agreement. The deal turned sour when an audit, done in co-operation with Microsoft, revealed that the new licences were counterfeit. Through the validation process, users will be required to enter authentication details on the Microsoft website. According to Microsoft, users will be alerted if an invalidate licence is found. Unless authentication of the software is validated, the user will be unable to download software updates such as the latest releases of device driver software. For the time being, security patches will not be affected. Alex Hilton, anti-piracy manager at Microsoft, said, \"If users do not succeed in validating the software, they will still have access to security patched.\" from http://www.computerweekly.com/articles/article.asp?liArticleID=136387&liArticleTypeID=1&liCategoryID=1&liChannelID=1&liFlavourID=1&sSearch=&nPage=1 computer conference Main Menu"}]}, {"num": 11, "subject": "best deals on computers", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Wed, Nov 11, 1998 (09:43)", "body": "Intel - Pentium II 350Mhz 128MB - PC100 (1-128MB 16MBX64 100MHZ SDRAM Module) Matrox - Millenium G200 8MB AGP SGRAM Creative Labs - Ensoniq PCI (ES-1370) OEM US Robotics - 56.6Kbs V.90 (5687) Internal - Microsoft Windows 98 ASUS - P2B98 440BX/ATX/AGP/SINGLE Acer - 36X Internal CD-ROM Drive EIDE (636A) Maxtor - 8.4GB 10ms/ 5200rpm/ 256K/ Ultra DMA Mitsumi - Mitsumi 1.44MB Internal Floppy Drive ACER - 104 Windows 95/98 Membrane Keyboard EDO - High Resolution PS/2 Mouse 17\" - EDO Elite .27dp, 1280x1024, NI EDO - 120W Amplified Speakers EDO - Mid Tower Case ATX w/235W P/S IOMEGA - 100Mb Internal ZIP drive w/one cartridge Price: $1,492 from http://www.edomicro.com"}, {"response": 2, "author": "terry", "date": "Wed, Nov 11, 1998 (12:47)", "body": "PCZones has a UMAX P2 400MHz with a Viewsonic 17\" monitor and similar specs otherwise (except 64MB RAM instead of 128 and 60 watt speakers instead of 120) for $1599. The online catalogue is a little confusing: the specs sheet says 6.4MB HD, but the ads and lead-ins and frontpiece say 8.4 MB. With that in mind, here's the listed specs: Umax 400MHz Pentium II CPU PROCESSOR: 400MHz Intel Pentium II processor CACHE: 512K Level 2 SYSTEM RAM: 64MB SRAM CHIPSET/BUS: Intel BX chipset VIDEO: 8MB VRAM; Matrox video card HARD DISK DRIVE: 6.4GB CD-ROM DRIVE: 32X FLOPPY DISK DRIVE: 1.44MB 3.5\" NETWORKING: NetGear 10/100 PCI Card AUDIO: Yamaha 3D with WaveTable MODEM: 56K fax/modem V.90 ViewSonic Optiquest Q71 17\" Monitor VIEWABLE SIZE: 16.0\" PLUG AND PLAY: yes DOT PITCH: 0.27mm LOW RADIATION: MPR-II HORIZONTAL FREQUENCY: 30-70KHz NONINTERLACED RESOLUTIONS: 1280x1024 at 80Hz, 1024x768 at 105Hz ONSCREEN CONTROLS: yes MAC COMPATIBLE: yes computer conference Main Menu"}]}, {"num": 12, "subject": "free pc ... the time has come", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Thu, Feb 11, 1999 (11:10)", "body": "See http://www.wired.com/news/news/business/story/17854.html An excerpt: A Free PC? Gimme! by Craig Bicknell 3:00 a.m. 11.Feb.99.PST Would you hand over personal information -- your income, interests, and Net-surfing and spending habits -- in exchange for, say, a free computer? Heck, yes! That's the answer more than half a million people have given Free-PC.com since the new company posed the question Monday. \"It's been overwhelming,\" said spokesman Steve Chadima, \"We knew it would be popular, but we didn't know how popular it would be.\" In case you missed it the first time, here's the deal: You go to Free-PC's Web site, and fill out a questionnaire that asks your age, salary, interests, what electronic gadgets you own, the age and gender of your family members, and more. In return, Free-PC gives you a brand spanking new Compaq Presario computer with free Internet access and email. The catch? Advertisers inundate your new computer with pitches tailored to your very specific, self-defined desires. What's more, they watch where you go online, and what you buy. Free-PC figures it'll make a lot more in targeted ad fees than it spends on the giveaway computers. Moreover, it hopes that its new model will ultimately make PCs available to everyone, regardless of income. \"This makes ubiquitous computing a real possibility,\" said Chadima. But what about that personal data? While the company insists that it will never sell or expose the information it gathers, privacy advocates point out potential problems. For instance, while Free-PC might not sell data, it could be bought by a company that will. \"In the event of a sale, all that data is inherited by the buyer, and there's very little the consumer can do to stop them from using it\" anyway they please, said Jason Catlett, president of Junkbusters. Should Free-PC remain independent, advertisers might still be able to match an individual and his data."}, {"response": 2, "author": "CotC", "date": "Fri, Feb 26, 1999 (16:17)", "body": "I signed up for it a couple of days ago. Now I guess I'll just wait and see if they \"approve\" me. Then, if they do, I'll have to see how restrictive their aggreement is, and whether I can get away with wiping the drive and installing Linux or Solaris or something... computer conference Main Menu"}]}, {"num": 13, "subject": "motherboards", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Thu, Mar  4, 1999 (08:44)", "body": "Some great advice from an ex roomie, Mark: I've found a good board/CPU combination that's excelllent for overclocking and the price is cheap! The Abit motherboard with the Intel Celeron 300A processor allows you to overclock the CPU (and safely, I hear) to 450Mhz. For the board model and details, check with the techies at TC Computers (www.tccomputers.com). The combo is cheap and is a good idea if you want to upgrade to a 100Mhz front-end-bus system. I'll also recommend to you a good sound combo for all applications, including realistic gameplay and audio. The Soundblaster Live! (www.sblive.com) is phenomenal. Ya just have to hear it to believe it. Couple that with the Altec Lansing ADA305 speaker system, and you've got some awesome sound going! Prices are more than reasonable at buycomp.com. For video, I've found that a good all-around video card are the nVidia Riva TNT chip cards (usually 16Mb). In a recent review (I think I saw it at Tom's Hardware), the Hercules card was rated the best b/c of its ability to be overclocked pretty damn well (has it's own heat sink and fan). I have the Diamond Viper 550 (Riva TNT) because I bought it before the review came out. Without details, the ratings were Hercules > Diamond Viper 550 > STB Velocity 4400 for the Riva TNT cards. And if you're buying system(s) I've found that TC Computers is a very good source for motherboards/CPUs/cases/memory. They have a knowledgeable sales staff and good prices. They also carry a good line of cases which are sturdy and easy to manipulate. For all else, Buycomp.com has consistently evidenced the lowest prices. I'm currently running an 350Mhz AMD system (bought it before I learned about the Abit board + Celeron 300 combo) with 128Mhz PC-100 memory, Diamond Viper 550, SoundBlaster Live, and Altec Lansing ADA305 speakers. For a Socket 7, less-than-PII system, it runs pretty damn well. computer conference Main Menu"}]}, {"num": 14, "subject": "virus", "response_count": 57, "posts": [{"response": 1, "author": "terry", "date": "Mon, Mar 29, 1999 (13:01)", "body": "Feds issue warning as email virus spreads By Stephen Shankland and Kim Girard Staff Writers, CNET News.com March 29, 1999, 7:40 a.m. PT update A tricky new computer virus spreading across the Internet continued to paralyze corporate email systems across the globe this morning as experts grappled with how to stop it. Network managers moved quickly over the weekend to control the virus, called W97M Melissa, which takes advantage of users' email address books to replicate extremely quickly. As reported previously by CNET News.com, once activated, W97Melissa, uses a combination of Microsoft Word macros and Microsoft Outlook on a user's PC to send copies of a list of 80 pornographic Web sites. It works with either Word 97 or Word 2000, according to antivirus companies TrendMicro, McAfee, and Network Associates. The program is somewhat devious in that it sends itself from the email addresses of people who are likely to be familiar contacts, arriving as email with the subject line \"Important message from...\" followed by the sender's name. The body says \"Here is that document you asked for...don't show anyone else ;-).\" The email includes an attached Word file \"list.doc,\" which includes the porn sites' addresses. It could take more than several days to get the virus under control, experts said. TrendMicro is warning that 20 to 30 variants of the virus could show up by tomorrow, making filtering the virus at the email server level even more difficult. \"This has the potential to get worse before it gets better,\" said Jeff Carpenter, team leader of Carnegie Mellon's Computer Emergency Response Team (CERT). As of last night, more than 100 organizations had called CERT for help, he said. \"We've never seen something spread like this before.\" Carpenter said companies are taking steps to combat the virus by posting warnings for employees on their front-door entrances, rolling out new versions of antivirus packages to protect PCs, advising employees not to open email attachments from users they do not know, and disabling macros in Microsoft Word. Over the weekend, CERT issued an advisory detailing how users can combat Melissa. Carpenter said companies such as law firms and accounting firms are particularly wary about the risk, as confidential information from a word document can leak out via email as a result of the virus. The virus doesn't appear to cause any damage to infected computers except in rare cases when the minutes of the current time match the date--for example at 4:26 p.m. on March 26. In this instance, the virus will insert the Bart Simpson quotation, \"Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game's over. I'm outta here,\" into a user's active document. Because the virus sends itself to potentially thousands of contacts contained in a user's address distribution list, however, there's a possibility that the virus could overwhelm mail servers. Users won't get the virus by opening up a message, only by opening the attached document. Experts are warning people not to open documents attached to messages from people they don't know. Even the FBI and the National Infrastructure Protection Center have issued an unprecedented public warning about the virus. Michael Vatis, director of the NIPC, stated in a memo, \"Email users have the ability to significantly affect the outcome of this incident. I urge [them] to exercise caution when reading their email over the next few days and to bring unusual messages to the attention of their system administrator.\" The virus first was spotted last Friday, according to TrendMicro and others. It is believed to have originated in Western Europe and was first discovered on the alt.sex newsgroup. \"We've been swamped all day with customers calling in with this,\" said Dan Schrader, director of product marketing at TrendMicro, when contacted last Friday. \"It's spreading extremely quickly. Twenty major corporate sites have called us.\" Melissa is similar to an \"autospam\" virus called \"Share Fun\" that emerged in March 1997, Schrader said, but that virus was buggy and not as effective. There have been viruses that spread through the address books in the past, \"but never this effectively,\" Schrader said. Network Associates estimated the virus has already hit hundreds of thousands of computers. Microsoft shut down outbound mail so it wouldn't impact customers or partners last Friday. However, after installing filtering software the company resumed outbound mail service. Waggener Edstrom, Microsoft's public relations agency, also got hit by Melissa, which brought the agency's email system down. Intel was hit internally as well. Twenty of Network Associate's largest clients were infected; one firm alone said it had reached 60,000 computers. \"The propagation rate has been alarming,\" a company spokesperson said. Tom Moske, a network administrator at USWeb/CKS, ran into the virus this afternoon when the virus spread itself from people in his company who ha"}, {"response": 2, "author": "terry", "date": "Fri, Apr  2, 1999 (09:08)", "body": "Date: Tue, 30 Mar 1999 16:51:23 -0800 From: Rob Slade Subject: Melissa macro virus A report prepared by Robert M. Slade The following is an attempt to bring together the information about the Melissa virus. It is taken from the most reliable available sources. Additional sites have been listed at the end of the article. I have not added a copyright line to this message in order to allow it to be used as needed. I will be posting the latest updated version of this article at http://sun.soci.niu.edu/~rslade/melissa.txt and http://victoria.tc.ca/techrev/melissa.txt . The virus, generally referred to as W97M.Melissa.A (with some variations: Symantec, in a rather strained effort to be cute, seems to be calling it \"Mailissa\"), is a MS Word macro virus. This means that, if you don't use Word, you are safe. Completely safe. (Except for being dependent upon other people who might slow their/your mail server down. More on that later.) If you need to look at MS Word documents, there is a document viewer available (free, as it happens) from Microsoft. This viewer will not execute macros, so it is safe from infection. In the messages about Melissa, there have been many references to the mythical and non-existent \"Good Times\" virus. Note that simply reading the text of a message still cannot infect you. However, note also that many mailers, in the name of convenience, are becoming more and more automated, and much of this automation concerns running attached files for you. As Padgett Peterson, author of one of the best macro virus protection tools, has stated, \"For years we have been saying you could not get a virus just by \"opening E-Mail. That bug is being fixed.\" Melissa does not carry any specifically damaging payload. If the message is triggered there will be text added to the active document. The mailout function can cause a large number of messages to be generated very quickly, and this has caused the shutdown of a number of corporate mail servers. If you have Word set with macros disabled, then the virus will not active. However, relying on this protection is a very dangerous proposition. Previous macro viruses have also killed macro protection in Word, and this one does as well. The name \"Melissa\" comes from the class module that contains the virus. The name is also used in the registry flag set by the virus. The virus is spread, of course, by infected Word documents. What has made it the \"bug du jour\" is that it spreads *itself* via e-mail. We have known about viruses being spread as attachments to e-mail for a long time, and have been warning people not to execute attachments (or read Word documents sent as attachments) if you don't know where they came from. Happy99 is a good example: it has spread very widely in the past month by sending itself out as an e-mail attachment whenever it infects a system. Melissa was originally posted to the alt.sex newsgroup. At that time it was LIST.DOC, and purported to be a list of passwords for sex sites. I have seen at least one message theorizing that Melissa is someone's ill-conceived punishment for viewers of pornography. This hypothesis is extremely unlikely. Sending a virus to a sex related newsgroup seems to be a reliable way to ensure that a number of stupid people will read and/or execute your program, and start your new virus off with a bang. (No pun intended.) If you get a message with a Melissa infected document, and do whatever you need to do to \"invoke\" the attachment, and have Word on your system as the default program for .doc files, Word starts up, reads in the document, and the macro is ready to start. If you have Word's \"macro security\" enabled (which is not the default) it will tell you that there is a macro in the document. Few people understand the import of the warning, and there is no distinction between legitimate macros and macro viruses. Because of a technical different between normal macros and \"VBA objects,\" if you ask for a list of the macros in the document, Melissa will not show up. It will be visible if you use the Visual Basic Editor, but only after you have loaded the infected file. Assuming that the macro starts executing, several things happen. The virus first checks to see if Word 97 (Word 8) or Word 2000 (Word 9) is running. If so, it reduces the level of the security warnings on Word so that you will receive no future warnings. In Word97, the virus disables the Tools/Macro menu commands, the Confirm Conversions option, the MS Word macro virus protection, and the Save Normal Template prompt. It \"upconverts\" to Word 2000 quite nicely, and there disables the Tools/Macro/Security menu. Specifically, under Word 97 it blocks access to the Tools|Macro menu item, meaning you cannot check any macros. It also turns off the warnings for conversion, macro detection, and to save modifications to the NORMAL.DOT file. Under Word 2000 it blocks access to the menu item that allows you to raise your security level, and sets your macro virus detection t"}, {"response": 3, "author": "KitchenManager", "date": "Sun, May  2, 1999 (13:32)", "body": "'tis probably true..."}, {"response": 4, "author": "MarciaH", "date": "Mon, Dec 13, 1999 (13:58)", "body": "COMPUTER VIRUSES STAR TREK VIRUS Invades your system in places where no virus has gone before. MR. SPOCK VIRUS You can only access logical files. MOTHER VIRUS Generally harmless, but does not allow access to your SVGA graphics; \"They're too sharp and could poke an eye out!\" MOTHER-IN-LAW VIRUS When you try to run a file, a message appears: \"You're not good enough to run this program.\" THE TEENAGER VIRUS Your PC stops every few seconds to ask for money. THE CHILD VIRUS It constantly does annoying things, but is too cute to get rid of. HEALTHCARE VIRUS Tests your system for a day, finds nothing wrong, and sends you a bill for $4500. QUANTUM LEAP VIRUS One day your PC is a laptop, the next day it is a Macintosh, then a Nintendo. THE PRISON VIRUS It locks up your system. CENSOR'S VIRUS It decides what you're allowed to run. AIRLINE VIRUS You're in Dallas, but your data is in Singapore. PBS VIRUS Your PC stops every few minutes to ask for money. TEXAS VIRUS Makes sure that it's bigger than any other file."}, {"response": 5, "author": "sprin5", "date": "Fri, May  5, 2000 (07:37)", "body": "Dateline: 5/4/00 The \"I Love You\" worm is spreading world-wide at an extremely rapid pace, slipping past firewalls and antivirus programs. Discard emails with the subject \"I Love You\" and attachments titled \"LOVE-LETTER-FOR-YOU.TXT.VBS.\" Because variants are likely to occur fairly soon, be very careful about opening any attachments - especially with a VBS extension. Reports of massive infections world-wide are rampant. Public relation and investment banks in Asia have been hit particularly hard with this outbreak. After infection users are not able to send and receive email. Many servers are crashing because of all the traffic generated by the worm. Antivirus developers are being pounded with calls and requests for information. Many sites have a server to busy error on the Internet because of all the users attempting to reference online information about the I Love You worm. The I Love You worm uses multiple methods for infecting and spreading through computer systems. The name of the attachment, \"LOVE-LETTER-FOR-YOU.TXT.VBS,\" is designed to fool users into thinking the attachment is a harmless text (.txt) file. This worm attempts to send only one email to each user of a Microsoft Outlook address book on an infected computer. Because this worm is spreading so quickly, individuals may see 100 or more I Love You emails from 100 or more associates (different computers) infected with the worm! -------------------------------------------------------------------------------- TECHNICAL DETAILS Virus Type Worm, Trojan Origin may be from the Philippines, as indicated by text at the beginning of code for this malware: rem barok -loveletter(vbe) rem by: spyder / ispyder@mail.com / @GRAMMERSoft Group / Manila,Philippines Email Subject I Love You Email Attachment LOVE-LETTER-FOR-YOU.TXT.VBS Email Body kindly check the attached LOVELETTER coming from me. Files Created or Modified Following infection MSKERNAL32.VBS, LOVE-LETTER-FOR-YOU.TXT.VBS, and LOVE-LETTER-FOR-YOU.HTM are created in the Windows System directory. WIN32DLL.VBS is copied into the Windows directory. If the WinFAT32 subkey is not found on the infected machine the worm creates it and copies itself to the Windows Systems directory as WINFAT32.EXE to run a Trojan each time the computer is booted. The following registry keys are modified to boot the malware each time the computer is booted: HKEY_LOCAL_MACHINE\\Software\\MicrosoftWindows\\CurrentVersion\\Run\\MSKernel32 HKEY_LOCAL_MACHINE\\Software\\MicrosoftWindows\\CurrentVersion\\RunServices\\Win32DLL The start page for Internet Explorer is set to download WIN-BUGSFIX.EXE. If WINFAT32.EXE does exist the following registry key is created, \"HKLM\\Software\\Microsoft\\WindowsCurrentVersion\\Run\\WIN-BUGSFIX\". The Trojan part of this worm creates a hidden window \"BAROK...\", which runs in memory following a successful Trojan infection of a machine. The Trojan also attempts to delete the following registry keys: Software\\Microsoft\\Windows\\CurrentVersionPolicies\\Network\\HideSharePwds Software\\Microsoft\\Windows\\CurrentVersionPolicies\\Network\\DisablePwdCaching .DEFAULT\\Software\\Microsoft\\WindowsCurrentVersion\\Policies\\Network\\HideSharePwds .DEFAULT\\Software\\Microsoft\\WindowsCurrentVersion\\Policies\\Network\\DisablePwdCaching Infection Attempts This worm infects immediately after the VBS attachment is run by a user. Following infection the worm attempts to infect VBS and VBE files on local and network computers. This worm also searches for files with extensions JS, JSE, CSS, WSH, SCT, HTA, JPG, JPEG, MP2, and MP3. When found, the worm creates a file with the same name but with a VBS extension. For example, cool.jpg becomes cool.jpg.vbs Within mIRC the worm creates a script.ini file in the mIRC program directory to send the LOVE-LETTER-FOR-YOU.HTM to others in a chat room. Using MAPI, the worm also calls Microsoft Outlook applications to send an email with the worm to each user in the address book. Damage May disable sending and receiving of email and crash email servers. Overwrites infected files. Removal Instructions 1. Download an update to your current antivirus program, or download and update a new antivirus program, and run a scan for ALL files. In an idea situation this will remove malware from your computer. If not, follow instructions below. 2. See Files Created or Modified section above to locate and remove files from infected drives. Also scan all email files and delete \"I Love You\" messages and emails with a LOVE-LETTER-FOR-YOU.TXT.VBS attachment. 3. Use REGEDIT to edit the registry, fixing areas noted in Files Created or Modified above. Use REGEDIT with extreme care - for expert users only. To run REGEDIT select \"Run...\" from the start menu, enter REGEDIT, and press return. 4. Reset Internet Explorer start page to desired start location. Select \"Internet Options...\" from the View menu to enter desired changes. 5. Delete overwritten files and restore with backup copies. Prevention Many antivirus developers have already prov"}, {"response": 6, "author": "sprin5", "date": "Fri, May  5, 2000 (07:48)", "body": "I got one of these and promptly deleted it."}, {"response": 7, "author": "sprin5", "date": "Fri, May  5, 2000 (09:07)", "body": "http://www.zdnet.com/zdnn/stories/news/0,4586,2562032,00.html A new e-mail worm is rapidly spreading across the globe affecting users of Microsoft Windows running Microsoft Outlook. The ILOVEYOU worm (a.ka., VBS.LoveLetter.A) infects VBScripts, mIRC users and files on your hard drive (namely .jpg and .mp3 files). The worm makes changes to the Windows registry and copies the Outlook address book and e-mails itself to all of your contacts. (Previously, viruses such as Melissa and its variants only chose the first 50 addresses.) This new worm has been overloading e-mail servers around the world. ILOVEYOU arrives as e-mail with the subject line \"I Love You\" and an attachment named \"Love-Letter-For-You.txt.vbs.\" Opening the attachment infects your computer. The infection first scans your PC's memory for passwords, which are sent back to the virus's creator (a Web site in the Philippines which has since been shut down). The infection then replicates itself to everyone in your Outlook address book. Finally, the infection corrupts files ending with .vbs, .vbe, .js, .css, .wsh, .sct, .hta, .jpg, .jpeg, .mp2, .mp3 by overwriting them with a copy of itself."}, {"response": 8, "author": "sprin5", "date": "Fri, May  5, 2000 (09:14)", "body": "A good central source for information: http://www.zdnet.com/zdnn/special/lovebites.html"}, {"response": 9, "author": "sprin5", "date": "Fri, May  5, 2000 (09:15)", "body": "Authorities close in on 'ILOVEYOU' suspect Clues provided from chat rooms lead Filipino police to suspect the 'ILOVEYOU' author may be a young man living in a Manila suburb. By Sharon Buan, Reuters May 5, 2000 5:27 AM PT MANILA, Philippines -- The \"Love Bug\" virus wreaking havoc on computer systems worldwide appears to have originated in the Philippines, and the author may be a young man living in a Manlia suburb, police and local Internet firms said Friday. Police sources said the local National Bureau of Investigation was investigating the case following a request from the U.S. Federal Bureau of Investigation. A Manila Internet service provider (ISP) had earlier said the virus appeared to have first spread from two of its e-mail addresses. \"What happened is the author of the virus used two e-mail addresses through Supernet -- spyder@super.net.ph and mailme@super.net.ph,\" Jose Carlotta, chief operating officer of Access Net Inc., a Manila Internet company, told Reuters."}, {"response": 10, "author": "sociolingo", "date": "Fri, May  5, 2000 (14:03)", "body": "Latest variant I heard of on UK news this afternoon has 'joke' in the subject line. The ILOVEYOU virus brought the House of Commons to a stand still yesterday, and has caused widespread damage to most major UK companies. Thanks for all the good advice above."}, {"response": 11, "author": "MarciaH", "date": "Fri, May  5, 2000 (15:47)", "body": "You may add \"veryfunny\" and \"jokes\" to the files to delete. They showed up this morning."}, {"response": 12, "author": "sprin5", "date": "Fri, May  5, 2000 (16:41)", "body": "And who knows what else?"}, {"response": 13, "author": "MarciaH", "date": "Fri, May  5, 2000 (17:00)", "body": "Exactly! If these evil little minds are enjoying the chaos they are creating (and isn't that why they are doing it?!) they will continue to spawn more and more until they are arrested and their computers confiscated. Good point!!"}, {"response": 14, "author": "MarciaH", "date": "Fri, May  5, 2000 (18:33)", "body": "Friday - 16:30 05/05/2000, EST 'Love Bug' Takes New Forms to Smite Users NEW YORK (Reuters) - Copycat variants of the ``Love Bug'' virus labeled ``Joke'' and ``Mother's Day'' infected computers around the world on Friday, a day after the most widespread cyberattack ever wreaked havoc on business and government operations. Tens of millions of computers have been disabled so far, as the virus, first detected in Asia, spread around the globe, forcing network administrators to shut down e-mail systems at major companies and penetrating the Pentagon, the Central Intelligence Agency and Britain's Parliament. Security experts said the virus was far more devastating than last year's Melissa bug, with losses now counting in the billions from damaged data and the distractions of fighting the software scourge, and warned that it could take a while to stem the invasion. By one estimate, approximately 45 million computers around the world have been infected by various strains of the virus, according to Computer Economics, a research firm in Carlsbad, Calif. ``We estimate $2.61 billion of damage has been done,'' said Samir Bhavnani, a research analyst with Computer Economics. ``By Wednesday, the total can reach $10 billion. We see damages growing by $1 billion to $1.5 billion a day until the virus is eradicated.'' Other experts said actual damage estimates would be harder to pin down. Sal Viveros, group manager for Network Associates' (NETA.O) Total Virus Defense, told a conference call of reporters that his researchers have found as many of five different variants of the virus, although he didn't yet have details of the specifics of the variants. Business software maker Computer Associates International said it was relatively easy to create new strains of the virus. ``There's a potential that anyone who receives this virus can go to the Internet and (find) tools to change codes within the virus program that can give the e-mail or the attachment a new name,'' said Simon Perry, vice president for security products at Computer Associates International Inc. (CA.N). The Islandia, N.Y. is a leading maker of anti-virus software such as InoculateIT. For the time being, most of the virus variants are only cosmetically different from the original virus. ``Based on our research, we believe that the variants are coming from a number of different people,'' Perry said. LOVE BUG TAKES NEW FORMS TO TRICK USERS Technically, the software scourge is known as a worm, not a virus. ``Worms have the ability to self-replicate; viruses do not,'' said Jeff Carpenter, a security expert with the Computer Emergency Response Team, a Defense Dept.-funded clearinghouse at Carnegie-Mellon University in Pittsburgh. The original worm ``ILOVEYOU,'' works by enticing e-mail recipients to open an attached letter, only to cripple their e-mail systems. This so-called Love Bug continued to pop up in e-mail systems on Friday, even as variants appeared to pose new tricks for computer users. But the effect is unchanged: Upon opening the attachment using Microsoft software such as the Outlook program, it sends a copy of the worm to everyone in the user's address book and seeks to destroy a variety of files throughout a computer network, including picture and music files. The worm is being sent as an e-mail attachment and many sites are experiencing significantly increased electronic mail traffic. The worm can spread through network disk drives, Web pages, and via IRC (Internet Relay Chat), a communications system popular with computer aficionados, experts said. The damage is limited to users of the Microsoft Windows operating system, said Gene Hodges, president of McAfee, a maker of anti-virus software and a unit of Network Associates. ``We've seen no evidence of affected users of Apple, Linux or Unix operating systems,'' he added. In one new version designed to spoil the upcoming ``Mother's Day'' holiday that will be celebrated in the United States on May 14, a variant of LoveLetter sends e-mails which appear to be a confirmation of an electronic gift order. ``The Mother's Day version of this worm is quite cunning,'' said Mikko Hypponen, manager of anti-virus research at computer security firm F-Secure Corp.'s laboratories in Helsinki, Finland. ``The e-mail appears to be a confirmation of an order for 'Mother's Day diamond special,' and the attached file mothersday.vbs is portrayed as if it were an invoice. With only eight days to go until Mother's Day, this attack is quite credible,'' he said. F-Secure has identified five variants so far in its efforts to keep pace with the worldwide assault. Another variant appears to have originated in Lithuania, in which the subject line reads, ``Susitikem shi vakara kavos puodukui.'' In Lithuanian, the sentence translates into: ``Let's meet this evening for coffee.'' And still another has ``fwd: Joke'' in the subject line and an attached file called ``Very Funny.vbs,'' which when opened has a similar impact as the ``Love Bug"}, {"response": 15, "author": "MarciaH", "date": "Fri, May  5, 2000 (20:18)", "body": "'Love Bug' Hits Secret U.S. Military Computers WASHINGTON (Reuters) - The international ``Love Bug'' virus contaminated at least two classified U.S. military computer systems but the problems were quickly isolated and no damage was done, the Defense Department said on Friday. Pentagon spokesman Ken Bacon released a statement which did not directly identify the systems. But U.S. officials, who asked not to be identified, told Reuters that at least one of them belonged to the super-secret National Security Agency. Among NSA's tasks is to monitor millions of pieces of intelligence information gathered from around the world by U.S. spy satellites in space. Bacon said the electronic bug, which emerged Thursday and has infected millions of computers worldwide, had ``contaminated a classified internal e-mail system'' early on Thursday. He said the agency using the system reported that less than one percent of the network was contaminated and it was quickly isolated and cleaned by technicians. ``In addition, the Joint Task Force on Computer Network Defense reported this morning that one other classified system was infected by the 'Love Bug.' The virus was quickly detected and contained,'' he said. ``Because of protections built into classified computer systems, the impact of the virus was minimal'' and had no impact on military operations, the statement said, adding that the task force was investigating how the virus entered the classified systems."}, {"response": 16, "author": "MarciaH", "date": "Fri, May  5, 2000 (21:00)", "body": "nvestigators in the Philippines have traced the source of the 'Love' worm virus to a 23-year-old male in a Manilia suburb. But experts warn that the clues found in the source of the program may be false. Meanwhile, new copycat versions of the virus are spreading throughout e-mail systems around the world today."}, {"response": 17, "author": "MarciaH", "date": "Mon, May  8, 2000 (00:57)", "body": "Virus Hoax -- Elf Bowlers Get an Attitude Among the hundreds of so-called viruses that want to do horrible and evil things to your computer is a chain letter that says that the famous \"Elf-Bowl\" game contains a virus that will erase your hard drive. This is not true. The \"Elf-Bowl\" game is perfectly safe. HOWEVER, it is possible that a Trojan horse-type virus could attach itself to an EXE file. So, here are the specs on \"Elf-Bowl.\" Length: 1130496, CRC-32 : ae35e713. So, Bowl away! Watch out for the mooning!"}, {"response": 18, "author": "MarciaH", "date": "Tue, May 16, 2000 (14:07)", "body": "News / Bugs & Breaches High risk of virus spreading without attachments being opened (05/10/2000) As if security experts didn't have enough worries yet, reports are coming in that in the aftermath of the already numerous LoveLetter variants, new email viruses are now spreading without the intervention of the user. That's correct, the attachments carrying the payload, seem to auto-execute without the user opening them. The range of vulnerable machines also broadens as not only machines running Internet Explorer (IE) version 5.0 and/or Microsoft Office 2000 are vulnerable, but a user is now seemingly also vulnerable when the user has IE simply installed with the default security settings, without even using it. Needless to say this is a major flaw and could lead to enormous computer & network mayhem. Sources of the likes of Network Associates http://www.nai.com and SANS http://www.sans.org/newlook/home.htm all agree that this is by far the fastest growing virus distribution problem potent enough to cause a hugely destructive event - at least as large as the ILOVEYOU virus. Updating one's virus detection software, while important, is apparently not an effective solution for this problem. This additional hole needs also to be closed. Windows systems that have not yet been fixed for MS99-032 should be fixed ASAP, whether one does or does not use MSIE (Internet explorer) or Office 2000,even if you never open attachments of emails. The problem is allegedly caused by a programming bug in an Internet Explorer ActiveX control called scriptlet.typelib. Tools at Microsoft's security site http://www.microsoft.com/security/bulletins/ms99-032.asp are available though to close this initial hole at: http://www.microsoft.com/security/bulletins/ms99-032.asp The correction script may be run directly from: http://www.microsoft.com/msdownload/iebuild/scriptlet/en/scriptlet.htm SecurityWatch will of course keep a close eye on this alarming news, updates will be published as we receive them. Jimmy Kuo of Network Associates and Nick FitzGerald of Computer Virus Consulting Ltd. raised the visibility of this dangerous problem. _____"}, {"response": 19, "author": "MarciaH", "date": "Tue, May 16, 2000 (16:45)", "body": "Microsoft Adds New Security Features to Outlook May 15, 2000 (Tech Web - CMP via COMTEX) -- Microsoft said Monday it will offer new security features for its Outlook e-mail program in the wake of the destructive \"Love\" virus. The Outlook Email Security Update, scheduled to be available for free download the week of May 22, will offer three security features designed to combat viruses. One prevents users from accessing several file types when sent as e-mail attachments, including executables and batch files that contain executable code used to spread viruses. Another feature prompts customers with a dialog box when an external program tries to access their Outlook address books or send e-mail on their behalf. The third increases the default Internet security zone setting within Outlook from \"trusted\" to \"restricted,\" which disables most automatic scripting and ActiveX Controls from opening without the users permission. Microsoft (stock: Copyright (C) 2000 Cmp Media Inc. Tech Web on May 15, 2000"}, {"response": 20, "author": "MarciaH", "date": "Fri, May 19, 2000 (15:33)", "body": "********** VIRUS ALERT - VBS/Newlove.a ********** VBS/Newlove.a is a VB Script worm with virus qualities. McAfee AVERT has assessed it as a HIGH-risk threat. This worm searches all drives connected to the host system and replaces all files with copies of itself and it adds the extension .VBS to the original filename. The original file is then deleted. The worm uses Microsoft Outlook to send copies of itself to all entries in the address book. When this worm is first run, it places a copy of itself in the Windows folder and gives itself a name from either the Recent Documents folder, or uses a random name with a random extension. This worm will arrive in an email message with this format: Subject: Starts with \"FW: \" and is either a name from the Recent Documents folder or a random name Message: Empty Attachment: Is the randomly-selected VBS filename from the Windows folder This virus will run if Windows Scripting Host is installed. Running the email attachment received either accidentally or intentionally will install to the local system."}, {"response": 21, "author": "sprin5", "date": "Sat, May 20, 2000 (07:01)", "body": "I got an empty email body the other day and promptly deleted it. The outlook for Outlook is not that great these days."}, {"response": 22, "author": "MarciaH", "date": "Sat, May 20, 2000 (18:51)", "body": "Let's try this again. I just had a long post evaporate. Sumthin is not quite right, yet... Amyway, I downloaded and installed the Norton antivirus which froze my computer. That was yesterday. I could not boot it at all. It would shut down as soon as it tried to load my taskbar. So, I entered in safe mode and uninstalled the Norton program but saved the downloaded .exe file to reinstall it if their techies can figure it out. I think it may have to do with the fact that I enabled it to scan all drives for viruses at startup. There is an imbedded program (non-removable)which is the first to open on the taskbar. That is what would appear just before it closed down the entire system. But, until I hear agreement from others who know more than I do, my PC will continue tobe protected by my vigilance and Iris anti-virus (anyone hear of it?) which came installed on the computer."}, {"response": 23, "author": "vibrown", "date": "Tue, May 23, 2000 (13:29)", "body": "I'm glad you finally got your PC to boot. I use the virus scanner that comes with Norton Utilities at home, so I guess it doesn't behave the same way as Norton Antivirus. I never heard of Iris, but I'd stick with it for now. Does Iris update their data files, like McAfee and Norton?"}, {"response": 24, "author": "vibrown", "date": "Tue, May 23, 2000 (13:49)", "body": "I posted this in Geo 34, as well: Do you know the name of the embedded program? If it's in your Startup folder, you should be able to delete it from the Startup folder to keep it from running. If it's not there, it might be in the win.ini or system.ini file; at least I think Windows 95/98 still has those files...they would be in the c:\\windows or c:\\windows\\system directory. The only other place I can think of would be the Windows Registry, but you'd have to hunt through the Registry keys for it. There should be a Registry Editor program (regedit.exe or regedt32.exe) in the c:\\windows or c:\\windows\\system directory. (I'm not sure exactly where it is on Windows 95/98, and I'm on and NT system right now.)"}, {"response": 25, "author": "MarciaH", "date": "Tue, May 23, 2000 (13:58)", "body": "It is NEC Assistant and the computer is a NEC. There is a regedit but I wonder what else it would make unworkable if I removed it. Does it have its tentacles into the dial-up system or other things which might make it very nasty to deal with? It is a really complete program with internal libraries and program installers and wallpaper changer and all that - very much like the control panel windows supplies and which is what I use. How perilous is it to remove such a program?"}, {"response": 26, "author": "MarciaH", "date": "Tue, May 23, 2000 (14:01)", "body": "There is no option for doing so, but I am going to do a Google search for Iris to see if I can get to their website and talk to them about updates. So far I have just been V e r y careful....and lucky!"}, {"response": 27, "author": "vibrown", "date": "Tue, May 23, 2000 (17:54)", "body": "The Registry Editor (regedit.exe) is a program that allows you to add/delete/modify Windows registry keys. You don't want to delete regedit.exe; you would use it to search through the various registry keys for NEC, and try to figure out which was the program that was causing problems. I wouldn't try that unless you are sure of what the name of the NEC program is, and have some idea of what registry keys it sets. Can you find any way to uninstall the NEC assistant, either from some kind of NEC program folder, or through \"Add/Remove Programs\" in the Control Panel? Maybe NEC's web site would have some information or trouble-shooting tips."}, {"response": 28, "author": "MarciaH", "date": "Tue, May 23, 2000 (18:29)", "body": "Oh, I know better than to delete regedit.exe ... Yikes!!! No uninstall no showing up on the add/delete programs in the control panel, no getting it off the task bar, either! There is simply no way to rid of it without deleting the thing piece by piece. I think I will check with both NEC and Symantec and McAfee about this. One of them should know what to do - especially NEC. I'll go there first. Thanks for that suggestion. Did not think of it..."}, {"response": 29, "author": "vibrown", "date": "Tue, May 23, 2000 (18:40)", "body": "Sorry...just wanted to make sure you knew what I meant. :-) Deleting the program files without a proper \"uninstall\" might simply cause a new error to the effect of \"Can't find program *whatever*\", since there could still be some registry setting somewhere that is looking for that program at bootup. Trying to catch program conflicts is a real pain. That's the down side of having so many third-party software vendors selling Windows programs...no one can possibly test the millions of combinations of software products to find all interactions and side-effects."}, {"response": 30, "author": "MarciaH", "date": "Tue, May 23, 2000 (18:49)", "body": "Well, if I had had my druthers it would not have come with this stuff on it. However, it was the replacement for the W3.1 PC which was stolen, and it is so much superior that I dared not complain! NEC will be told and asked for suggestions other than \"Live With It\" which I just might have to do! Yeah, I know about picking pieces out and have boxes popping up telling you whatever is missing. What a pain!"}, {"response": 31, "author": "sprin5", "date": "Tue, May 23, 2000 (19:13)", "body": "Holy Cow Marcia, you may end up having to do a re-install from scratch."}, {"response": 32, "author": "MarciaH", "date": "Tue, May 23, 2000 (19:19)", "body": "Then I will need to be walked through it - might need to enlist my geek son... I got rid of IE that way and it was a huge pain but it was not as entwined in the entire system as this one is. It is supposed to run your computer if you are a mindless idiot who is clueless to boot. I resent its intrusiveness but it has not interfered with any other programs until I tried to install the \"alien\" anti-virus programs. If I could only get out of the startup file...but it does not show up there. How can I prevent something from loading when I cannot find where it is lodged and what is loading it at startup. Most peculiar."}, {"response": 33, "author": "MarciaH", "date": "Tue, May 23, 2000 (19:21)", "body": "Never did a reinstall on w95, but got so good at doing w3.1 I can do it in my sleep and nitpick the stuff out I don't want loaded. That's how I did the little laptop I was using when this one froze. I really don't want to do reinstall.....sheesh!"}, {"response": 34, "author": "sprin5", "date": "Tue, May 23, 2000 (19:27)", "body": "Maybe you can bump up the memory to 32mbs and put Win 98 on it. Have your geek son do it and take notes so you can do it yourself next time. And put CRT on it and some cool apps, except for the offending anti-virus program. Or better yet, *you* do the install with him talking you through it so you could do it yourself next time. That way doing a re-install will become what it should be, routing, painless and time consuming. (no way to do it fast)."}, {"response": 35, "author": "sprin5", "date": "Tue, May 23, 2000 (19:35)", "body": "And maybe the anti-virus program will work with 98."}, {"response": 36, "author": "MarciaH", "date": "Tue, May 23, 2000 (19:47)", "body": "Perhaps! I don't have 98 on disks. I have the equivalent with downloads and upgrades now running on this PC, however. Not thinking about 2000... Not sure they have it right, yet. The anti-virus will work as soon as I negate NEC Assistant. You can bet I will NOT include that program when / if I do reinstall."}, {"response": 37, "author": "MarciaH", "date": "Tue, May 23, 2000 (19:54)", "body": "Hey, I bought CRT long time ago at the last provider when I telnetted a lot. It is still on here with 5 different graphics viewers, media enablers and dozens of weather, and other earthly updaters... plus three different IM and an ICQ. I have more plugins than Central Texas Power and Light (or whatever your utility company is called). I will do the installing myself with David talking me through it and taking notes too. It is the only way I will learn it, and how I learned to do W3.1 Btw, David asked me how to login on Spring so I sent him the new user URL. Gotta behave myself here now...*sigh*"}, {"response": 38, "author": "sprin5", "date": "Wed, May 24, 2000 (09:16)", "body": "How much memory do you have in it and how much can you add?"}, {"response": 39, "author": "MarciaH", "date": "Wed, May 24, 2000 (15:49)", "body": "I have most of my 6.4 Gigs of memory and 64k Ram. It is expandable but not sure of the amount. I have zip drives for storage, as well."}, {"response": 40, "author": "MarciaH", "date": "Wed, May 24, 2000 (15:53)", "body": "More precisely, on my C drive I have 3.91GB free space and have used 2.47 MB (Where did the rest of the 6.4GB go?)"}, {"response": 41, "author": "sprin5", "date": "Wed, May 24, 2000 (17:32)", "body": "What processor is it running, sounds like it could run Windows 98."}, {"response": 42, "author": "MarciaH", "date": "Wed, May 24, 2000 (18:02)", "body": "266 MHz Pentium II with MMX technology"}, {"response": 43, "author": "sprin5", "date": "Wed, May 24, 2000 (19:16)", "body": "Yep, that's a pretty powerful little notebook."}, {"response": 44, "author": "MarciaH", "date": "Wed, May 24, 2000 (19:20)", "body": "No, that is the big PC. I'm gonna get me a little laptop for just me to use when this one behaves improperly. There is much to love about this computer with all the power to multitask that others apparently don't have. I am hesitant to mess with it too much. It has brought me joy I cannot imagine any other way of obtaining."}, {"response": 45, "author": "MarciaH", "date": "Thu, May 25, 2000 (00:44)", "body": "Security experts and federal government authorities warn that offspring of the dangerous e-mail virus are now on the loose. As a public service, we present the following list of \"I Love You\" variations and how to recognize them: - The \"I Love You, But I'm Shy\" virus never actually invades your computer but collects data about it worshipfully from afar. - The \"Unrequited Love\" virus causes your computer to be so obsessed with a virus-a virus that it can never have-that it can no longer function. - The \"Love The One You're With\" virus hangs around your computer, but the whole thing is just temporary until it can find the computer that it really wants to invade. - The \"Can't We Just Be Friends\" virus makes your computer think it's interested in invading. Then, just when your computer is getting excited about the invasion, it breaks off the connection with your computer, dashing its hard drive against the rocks. - The \"One Night Stand\" virus invades your computer, turns its hard drive upside down, then disappears after promising to come back sometime. But it leaves a twenty in your online bank account. - The \"Happily Married\" virus invades only one computer and stays with it for life. - The \"Unhappily Married\" virus spends a long time negotiating with a computer, finally invades it, and then strays to other computers from time to time. - The \"I Can't Commit\" virus hangs around a computer for a long time and frequently sends messages that it intends to invade, but is really just interested in playing with your computer's data. - The \"It's Just A Physical Thing\" virus invades your computer on a regular basis, but no meaningful data is ever exchanged. - The \"I Want A Divorce\" virus sends repeated, hard-to-read messages that your computer is never turned on, then finally leaves. But it returns some time later and takes half of your computer's best data in an ugly network session. - The \"Little Virus Of The Evening\" virus will do anything to your computer--if you're willing to pay the right price. - The \"Stalker\" virus spends unnatural amounts of time monitoring your computer, collecting data your computer has thrown away and trying to record its most intimate functions. - The \"Forever Single\" virus causes your computer to focus solely on other computers that are totally incompatible with it. - The \"Deadbeat Dad\" virus invades your computer, spawns an entirely new database, then refuses to help update it as it grows. - The \"Married Too Long\" virus splits your PC into two partitions that never interface-one that does too much online shopping and one that never does anything except monitor espn.com."}, {"response": 46, "author": "MarciaH", "date": "Sat, May 27, 2000 (12:30)", "body": "Here's new one - beware! I was talking on ICQ with someone in Honolulu last night and it crashed his computer: RESUME' Virus Saturday, May 27, 2000 WASHINGTON, D.C. -- A new and dangerous computer virus dubbed \"Killer Resume\" is spreading through e-mail systems using the Microsoft Outlook e-mail program, the FBI and computer industry sources said Friday night. Anti-virus industry sources reported that some corporate e-mail systems had already been infected, and some shut down, the FBI's National Infrastructure Protection Center said. The virus is carried in a file attached to an e-mail with the subject \"Resume -Janet Simons.\" The attachment is a Microsoft Word file called \"EX PLORER.DOC\" or \"RESUME.DOC,\" according to an alert posted on the Web site of Network Associates, a computer security company. If a computer user opens the attachment, the virus will spread itself by sending an e-mail to everyone in the user's e-mail address book, the company said. When the user closes the Word document, the virus will then delete important files on the user's computer. The FBI advised computer users to open no e-mail with this subject line, to deactivate the executive summary feature in Microsoft Outlook, and then delete the e-mail without opening it. The anti-virus industry was working on software patches to stop the virus, the FBI said. The government warning said the Memorial Day weekend could allow the virus to spread over the next three days with a potentially rapid surge in activity as business opens overseas on Monday and in the United States on Tuesday. Santa Clara, Calif.-based Network Associates said the virus was known as the \"Killer Resume\" because it arrives pretending to be a resume from a potential job applicant. Symantec AntiVirus Research Center of Cupertino, Calif., said the virus was \"extremely fast-spreading.\" The text of the message reads: \"To Director of Sales/Marketing, Attached is my resume with a list of references contained within. Please feel free to call or e-mail me if you have any further questions regarding my experience. I am looking forward to hearing from you. Sincerely, Janet Simons.\" Earlier this month, the spread of a computer virus that could have done more damage than the \"Love Bug\" was slowed by U.S. companies that had strengthened their defenses against attacks from the Internet. That virus, dubbed \"NewLove,\" infected thousands of computers around the world but failed to become an epidemic like the Love Bug, which reached millions three weeks ago. Safeguards put in place on corporate e-mail systems against the earlier virus stopped NewLove's spread. The FBI said the virus shared some characteristics with the Love Bug and have launched a search for the creator. The Love Bug arrived in e-mails with an \"ILOVEYOU\" subject line that enticed millions of recipients to open the attachment that activated the virus. Once news spread of the threat, infected e-mails were easily detected and deleted. Estimates of the damage caused by that virus go as high as $10 billion, mostly in lost work time."}, {"response": 47, "author": "sociolingo", "date": "Sat, May 27, 2000 (16:55)", "body": "I guess this can go in here: I downloaded a free firewall program for individual PCs which seems to be working really well and got a good write up in Internet magagzine. It's monitoring my ports while I'm online, and also monitors unautorised applications use of internet. anyway, have a look and see what you think http://www.zonelabs.com program is ZoneAlarm 2.1 and is free for personal use."}, {"response": 48, "author": "MarciaH", "date": "Sat, May 27, 2000 (19:35)", "body": "I thought firewalls were for NT computers who share programs and stuff... Terry????"}, {"response": 49, "author": "MarciaH", "date": "Sat, May 27, 2000 (23:36)", "body": "Guess not - at the bottom of the following is a firewall for pc's ******* VIRUS ALERT - W97M/Resume.a@mm ******** Dear McAfee.com Dispatch Subscriber: W97M/Resume.a@mm is a variant of the W97M/Melissa family with a very dangerous payload. McAfee AVERT has given it a risk assessment of MEDIUM--ON WATCH. This is a worm and it spreads through email with an attachment in this format: ------------------------------------------------------------ SUBJECT: Resume - Janet Simons TO: Director of Sales/Marketing, MESSAGE: Attached is my resume with a list of references contained within. Please feel free to call or email me if you have any further questions regarding my experience. I am looking forward to hearing from you. Sincerely, Janet Simons. ATTACHMENT: Explorer.doc ------------------------------------------------------------ If the file EXPLORER.DOC is opened, it forwards itself to everyone in your address book. When you close the attachment, it deletes files on your hard-drive. Please do not open the attachment. For more information about this worm, go to McAfee.com Virus Information Library. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1568 --McAfee.com _______________________Virus Fixes__________________________ Find out more about this virus. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1568 Become a McAfee.com Clinic subscriber and check your system online. To use VirusScan Online, click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1569 Purchase the latest copy of VirusScan, please click here. http://store.mcafee.com/category.asp?CatID=3&CategoryLevel=1&rfr=VSCALRT Upgrade to the latest VirusScan. Purchase the VirusScan Maintenance Plan which entitles you to 12 months of upgrades, click here. http://store.mcafee.com/category.asp?CatID=18&CategoryLevel=1&rfr=VRSPLN Download the latest DAT files, click here. http://download.mcafee.com/updates/updates.asp ____________________Clinic Subscribers______________________ If you are an ActiveShield user, get the latest update. Click here. http://clinic.mcafee.com/clinic/virusscan/activeshield/start.asp Surf the Web safely. Get McAfee.com Personal Firewall. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1458"}, {"response": 50, "author": "MarciaH", "date": "Wed, Jun 21, 2000 (23:47)", "body": "******* VIRUS ALERT - IRC/Stages.worm ******** Dear McAfee.com Dispatch Subscriber: IRC/Stages.worm is an Internet worm that began spreading rapidly on 6/19. McAfee AVERT has assessed it as a HIGH-RISK threat. McAfee.com Clinic users who used VirusScan Online after 6/16 have protection against this worm. The worm uses Microsoft Outlook to send copies of itself to all entries in the address book and through installations of Pirch, ICQ and mIRC.* It also spreads to all available mapped drives on your system. This worm will arrive in an email message with this format: SUBJECT: \"Funny\", \"Jokes\", or \"Life Stages\", sometimes followed by \"Text\" CONTENT: \"The male and female stages of life\" ATTACHMENT: \"LIFE_STAGES.TXT.SHS\" (the suffix \".SHS\" may be hidden) If the attachment is run, the user sees a list of jokes while the worm infects the system and attempts to send copies of itself to all addresses in Outlook address book, as well as through the other channels mentioned above. * Pirch is an internet relay chat client for Microsoft Windows 95/98/NT, mIRC is a shareware IRC chat client for Windows and ICQ lets you initiate IRC style chat sessions - it alerts you when your friends are online and lets you chat with them. --McAfee.com _______________________Virus Fixes__________________________ Find out more about this virus. Click here to go to the IRC/Stages.worm Help Center. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1585 Become a McAfee.com Clinic subscriber and check your system online. To use VirusScan Online, click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1586 Purchase the latest copy of VirusScan, please click here. http://store.mcafee.com/category.asp?CatID=3&CategoryLevel=1&rfr=VSCALRT Upgrade to the latest VirusScan. Purchase the VirusScan Maintenance Plan which entitles you to 12 months of upgrades, click here. http://store.mcafee.com/category.asp?CatID=18&CategoryLevel=1&rfr=VRSPLN Download the latest DAT files, click here. http://download.mcafee.com/updates/updates.asp ____________________Clinic Subscribers______________________ If you are an ActiveShield user, get the latest update. Click here. http://clinic.mcafee.com/clinic/virusscan/activeshield/start.asp Surf the Web safely. Get McAfee.com Personal Firewall. Click here. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1458 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~"}, {"response": 51, "author": "MarciaH", "date": "Wed, Jul  5, 2000 (15:52)", "body": "****NEW VIRUS ALERT**** Description: This worm spreads via Microsoft Outlook email and over IRC using mIRC or Pirch. Via email, the worm sends a message whose subject is constructed from the following terms: \"Fw:\", \"Life Stages\", \"Funny\", \"Jokes\" and \" text\". The body of the message may contain the text \"The male and female stages of life.\" The worm itself is attached as a file called LIFE_STAGES.TXT.SHS. When it runs, the worm displays some long humourous text about life. It then attempts to create copies of itself on all available network drives. It also moves the regedit.exe to the recycled folder and changes its name to recycled.vxd. Geoff Aldridge Conferencing Team Leader On-Line Applications Learning and Teaching Services The Open University"}, {"response": 52, "author": "MarciaH", "date": "Fri, Aug  4, 2000 (23:48)", "body": "YOU HAVE BEEN INFECTED WITH THE HONOR VIRUS! Since I'm too lazy to program a real virus, this virus works on the honor system. Please delete all the files on your hard disk drive. Then forward this message to everyone you know... Thank you for your cooperation."}, {"response": 53, "author": "MarciaH", "date": "Wed, Aug 23, 2000 (22:49)", "body": "ALERT: Internet Explorer and Netscape Vulnerabilities CatchUp Security Alert A message from CNET CatchUp.com August 23, 2000 ________________________________________________________________ Patch Available for Internet Explorer Vulnerabilities Microsoft has released a patch that eliminates two security vulnerabilities in Microsoft Internet Explorer. The weaknesses could allow a malicious Web site to read files on your computer. The Scriptlet Rendering vulnerability and Frame Domain Verification vulnerability affect Internet Explorer versions 4.0, 5.0, and 5.5. Click here to run CNET CatchUp Security Fixes: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0CIwp Click here to read the Microsoft Security Bulletin: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0DOii ________________________________________________________________ Update Available for Netscape Brown Orifice Vulnerability Netscape Communications has released Netscape Communicator 4.75, which patches a security hole that made computers vulnerable to file theft. The bug, dubbed Brown Orifice, concerns Netscape's implementation of Java. Without the update, Netscape lets an unsigned Java applet read and distribute files from a user's PC by acting as a Web server. This vulnerability has been identified in Netscape Communicator versions 4.0 through 4.74 on Windows, Macintosh, and Unix operating systems. This vulnerability does not affect Netscape 6 Preview Releases. Click here to update your browser with CNET CatchUp: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0CIun Click here to read the CERT Security Bulletin: http://2.digital.cnet.com/cgi-bin2/flo?y=e110BBFIG0JP0DOjj ________________________________________________________________"}, {"response": 54, "author": "terry", "date": "Fri, May  4, 2001 (01:12)", "body": "It's good to keep up with those patches."}, {"response": 55, "author": "terry", "date": "Thu, Sep 20, 2001 (11:12)", "body": "update A computer worm that spreads to both servers and PCs running Microsoft software flooded the Internet with data Tuesday, prompting the FBI to create a task force to investigate the attack, sources said. Known as \"Nimda\" or \"readme.exe,\" the worm spreads by sending infected e-mail messages, copying itself to computers on the same network, and compromising Web servers using Microsoft's Internet Information Server (IIS) software. \"It is extraordinary how much traffic this thing has created in a couple of hours,\" said Graham Cluley, senior security consultant for antivirus company Sophos. \"As far as we can see, it doesn't seem to be using any psychological tricks because it's all automated.\" Mailing lists for the security community quickly generated news of the worm, as infected servers scanned the Internet for vulnerable servers. Sources in the antivirus community told CNET News.com that the FBI has set up a \"task force\" to study the virus. The FBI held conference calls three times Tuesday night with antivirus experts to discuss the investigation, sources said. \"There was a task force set up today, and there were a lot of things discussed,\" said Vincent Gullotto, director of antivirus research at security software firm Network Associates. \"No evidence\" of terrorist link An FBI representative said the agency was \"assessing\" the incident, but so far it found no relationship between the online deluge and last week's terrorist attacks on the World Trade Center and the Pentagon. \"There has been no indication that this is linked (to Tuesday's) attack,\" said FBI spokeswoman Debbie Weierman. \"That is the question of the day.\" At a news conference Tuesday about last week's terrorist attacks, Attorney General John Ashcroft also spoke about the Internet worm. \"This could be heavier than the July activity with Code Red,\" he said. He noted that there is \"no evidence\" linking the worm, which he said may have first appeared on Monday, \"to the terrorist attacks of last week.\" The worm was noticed by several Silicon Valley companies. \"It does appear to be more aggressive than Code Red,\" said spokeswoman Pamela Sklar of network equipment maker 3Com. She added that the company's IT department received more hits per hour from Nimda than it did from Code Red, but that there was no direct effect on e-mail or Internet access. The worm's name sparked speculation about its origin. Nimda, for example, is the backward spelling of admin, the common shorthand for the system administrator. While the worm has text indicating that it may have originated in China, that is in no way hard evidence, experts said. Others pointed out that NIMDA is the name of an Israeli defense contractor. The worm apparently generates an avalanche of Internet traffic because of its multipronged attack on both servers and PCs. The server component of the virus exploits an old and previously patched flaw in IIS called the Unicode Directory Traversal vulnerability. Once a server is infected, the worm continues to scan for other vulnerable computers. In addition, the program takes control of the part of Microsoft's IIS software that delivers Web pages, allowing the virus to trump a request for any page--even invalid requests--and instead return a page infected with the virus. In addition to its ability to cross between servers and PCs, the Nimda worm seems to be more virulent because it automatically executes in Microsoft's Outlook e-mail software under the program's \"low\" security setting. \"There appears to be a MIME exploit,\" said Eric Chien, chief researcher for antivirus software maker Symantec's European operations. \"It appears that it is doing some kind of exploitation in e-mail.\" Nimda also appears to be capable of spreading by other means, including Internet relay chat (IRC), an online chat format, and by FTP for remotely exchanging files. \"My guess is we may also see it spread through Internet relay chat,\" said Alex Shipp, senior antivirus technologist at e-mail screening firm MessageLabs. And that may not be the end of it. \"We have also found an FTP component in there,\" Shipp said. \"It may be trying to download nasty stuff from some Web site somewhere--we're still not sure. We know it is using FTP, but we don't know how yet.\" MessageLabs said it stopped more than a hundred copies of the virus attached to e-mail messages within an hour of the first incident, which arrived from Korea at 12:10 p.m. GMT. Most of the Nimda copies captured by MessageLabs originated from the United States, leading the company to speculate that was where the virus originated. While thousands of people likely became aware of the worm when their in-boxes were flooded with e-mail, for some the damage was more severe. Mel Lower of Davenport, Iowa, who hosts Web sites for small businesses through EarthLink, said two of his customers' sites were inaccessible for much of Tuesday. Lower said he contacted EarthLink and was told that the worm \"crippled\" two Unix server farms. EarthLink"}, {"response": 56, "author": "terry", "date": "Sun, Feb  3, 2002 (09:17)", "body": "Times are getting tougher and security is becoming a huge concern. Look at what just happened to us. We're hardening up and making ourselves more resilient. I will spent most of tday on backups and making a redundant system."}, {"response": 57, "author": "terry", "date": "Wed, Dec  7, 2005 (23:31)", "body": "http://www.filehippo.com/ anti-spyware programs anti-virus programs and a lot more... computer conference Main Menu"}]}, {"num": 15, "subject": "Upgrading old PCs", "response_count": 6, "posts": [{"response": 1, "author": "aschuth", "date": "Tue, Jun  8, 1999 (12:42)", "body": "RAM: there is no such thing as ENOUGH memory. What was sufficient when you bought it, is likely to be too little today. Do you know how much RAM the PC has at the moment? When the machine boots up, it shows the size of RAM on the screen... Find out what and how much RAM your PC's mainboard can handle. Look in the documentation of the PC or board. If there is no documentation available, pull all power plugs (machine assumed switched off), open case, and look for a type name on the mainboard (the thing where all the stuff is sticking out from). Find out manufacturer (e.g. Asus), model/type and revision. On the WWW, all manufacturers offer support - look for the site in question (e.g. http://www.asus.com ). You can find all documentation to your board there. If necessary, print the details concerning memory/RAM for your type of board, and take it to a PC parts shop. Show them what it says, and see what they'll recommend. Note: Since you upgrade, in most cases you might want to upgrade to the maximum, getting the most out of your effort. No use to do half measures now, and go back to do something serious in 6 months."}, {"response": 2, "author": "aschuth", "date": "Sun, Jun 13, 1999 (05:38)", "body": "Processor Upgrade: Does anybody know how upgrading with IDT's WinChip processors works? Those are Socket 7 CPUs w/ AMD's 3D NOW! and Intel's MMX technology onboard, comparative in power with Pentium II processors. Supposedly the only choice for upgrading PCs with older mainboards with single voltage of 3,5 V. Plus they are supposedly REALLY inexpensive..."}, {"response": 3, "author": "KitchenManager", "date": "Sun, Jun 13, 1999 (10:16)", "body": "hopefully, you've got a Socket 7 on your motherboard, in which case you pop the old one out and the new one in...you may also have to do a bios upgrade..."}, {"response": 4, "author": "aschuth", "date": "Tue, Jun 22, 1999 (13:03)", "body": "Socket 7 'r' us. Ever done that before? Anyway, the WinChips (called W2 in Germany) are hard to come by... Asked in about 8 stores, and they wouldn't know what I'm talking about or order them! Gonna wait for some more dow, and go to a mailorder... There's more stuff I'd like to have..."}, {"response": 5, "author": "zx6rider", "date": "Sat, Dec  2, 2000 (11:58)", "body": "I have a Gateway Solo 5150 laptop. I bought it almost 2 years ago. It has a Pentium PII 330Mhrz processor an 96MB of RAM. Gateway doesn't upgrade laptops. I love my laptop... I don't need anything changed but the processor and maybe more RAM. Can I upgrade the processor on this computer?"}, {"response": 6, "author": "sprin5", "date": "Sat, Dec  2, 2000 (13:36)", "body": "I would dig around on Gateways website. Too bad Gateway's taking such a both on the market, but whoi ins't these days?\u001b[D\u001b[D\u007f\u007f computer conference Main Menu"}]}, {"num": 16, "subject": "Making Computing life Easier", "response_count": 114, "posts": [{"response": 1, "author": "MarciaH", "date": "Thu, May 25, 2000 (03:05)", "body": "Changing the Shut Down Screen Everyone is familiar with the shut down screen for Windows. What you may not know, however, is that you can change it to display an image different from those lovely clouds. The shut down screen is saved as a file called LOGOW.SYS in the Windows folder. Your paint program can open it up. The picture is actually 320 x 400 and Windows stretches it. To create your own display, make a picture that is 640 x 480. When you're done, set its size for 320 x 400 and save it as LOGOW.SYS in the Windows folder. Be sure that the picture uses no more than 256 colors. Tip provided by CNET Help.com"}, {"response": 2, "author": "MarciaH", "date": "Thu, May 25, 2000 (13:22)", "body": "The Rear Window Messenger This gadget contributes to a nicer decorum on the highway. The Rear Window Messenger is an LED Matrix sign contained in a plastic enclosure that mounts easily on your back window. The system comes programmed with three different messages: \"Sorry,\" \"Thanks,\" and \"Help.\" Just push a couple of buttons on the remote-control unit and up pops your little message for the guy who just let you in. Messages cannot be changed, and we think this is probably a good thing. The Rear Window Messenger runs on the car's 12-volt supply. It retails for $89.95 as item number 60256E at Hammacher-Schlemmer. They can be reached at (800) 543-3366 or on the web at http://www.hammacher.com ."}, {"response": 3, "author": "sprin5", "date": "Thu, May 25, 2000 (13:52)", "body": "Don't worry, there will an upgrade that changes with any message anyone wants, \"up yours\", \"let me in please\" and \"don't bother knockin'\" will become popular."}, {"response": 4, "author": "MarciaH", "date": "Thu, May 25, 2000 (13:56)", "body": "*laugh* It is frightening to think what may appear when they become self-programmable!"}, {"response": 5, "author": "MarciaH", "date": "Fri, May 26, 2000 (12:15)", "body": "Keep the Taskbar Out of Sight If you're tired of looking at the Taskbar all the time, just hide it! To enable this feature, from the Start Menu click on Settings and then Taskbar. The Taskbar Options tab will appear and you'll see a box that says \"Auto hide.\" Check that box to hide the Taskbar. To activate it, simply point the mouse at the bottom of the screen and the Taskbar should pop back up. Tip provided by CNET Help.com"}, {"response": 6, "author": "MarciaH", "date": "Tue, May 30, 2000 (14:33)", "body": "Lose the Extra Fonts If you have more fonts than you use, you're wasting precious disk space. To find out how many fonts are on your system, open the Fonts Control Panel (Start/Settings/Control Panel/Fonts). There you'll find a list of all your installed fonts. Double-click a font's name to get copyright info and file size, as well as an example of what the font looks like at sizes up to 72 points. Delete any unnecessary fonts and you'll free up a bunch of disk space. Tip provided by CNET Help.com"}, {"response": 7, "author": "MarciaH", "date": "Wed, May 31, 2000 (03:36)", "body": "CNET Microsoft Windows Tip of the Day - Tidy Up the Reg Tidy Up the Registry The Windows Registry is a database of all your system's settings and software. Whenever a Windows 95 or 98 program is installed, removed, or modified, Windows updates the Registry to reflect the change - or at least, that's how it's supposed to work. Real life is less tidy. System crashes, buggy uninstall programs, and plain old bad luck can clutter your Registry, leaving it full of improper associations, bogus lists of installed programs, and all sorts of other junk that can slow down and even crash your operating system. If you really know what you're doing, you can clean the Registry with RegEdit (the Windows Registry editor). For most users, though, we suggest a safer alternative: Microsoft's RegClean. This download hunts down and removes bogus Registry entries automatically. It can also reverse any changes you make and restore your previous Registry if something goes wrong. Most uninstallers, such as CleanSweep, also clean your Registry - and do a better job than the free RegClean. Make a routine of cleaning the Registry and Windows 98 will run faster and more reliably. Download RegClean at this site: http://download.cnet.com/downloads/0-10106-108-23283.html Read CNET's CleanSweep review by clicking here. http://www.cnet.com/software/0-3757-7-1559622.html"}, {"response": 8, "author": "MarciaH", "date": "Wed, May 31, 2000 (03:41)", "body": "Someone who knows about this, is it safe for me to do???? I need to get rid of junk in there (NEC assistant) and stuff... I'll pass it by David, as well..."}, {"response": 9, "author": "sprin5", "date": "Wed, May 31, 2000 (09:43)", "body": "Good tip. I've never tried either RegClean or CleanSweep, I'd check some authoritative reviews first. See if there are any caveats before messing with your registry."}, {"response": 10, "author": "MarciaH", "date": "Wed, May 31, 2000 (13:47)", "body": "I asked my son and he responded The registry is such a sensitive thing, I wouldn't fool with it if stuff is working okay. My machine at home has an intermittent freezing problem that I have been trying to fix. I bought the latest McAffee which came with FirstAid. FirstAid found about 43 problems in my registry in my computer that is 11 months old. It fixed the freezing problem, but caused others. In the course of fixing the other problems, I brought back the freezing problem. Again, if it works, don't fix it! Then I told him of various problems I have starting up and he responded Yuck, what a mess. Well, maybe you should try it then. Good luck! Guess I will try it - it comes from MicroSoft...!"}, {"response": 11, "author": "sprin5", "date": "Wed, May 31, 2000 (18:13)", "body": "As long as you have a backup machine and are prepared to restore your machine. You might want to use something like a rewriteable CDRom and a program like Nero Burning ROM to make a mirror image backup of your CDrom once you get it to a stable place. then you can always get back to that place."}, {"response": 12, "author": "MarciaH", "date": "Thu, Jun  1, 2000 (17:16)", "body": "CNET Microsoft Windows Tip of the Day - Go Easy on Video If your screen redraws slowly or you experience other video glitches, your video card may be working too hard. Some video cards claim to offer screen resolutions and color depths they can't actually support. If you think your card might be maxed out, try bumping down the color depth or screen resolution a notch in the Display Control Panel (Start/Settings/Control Panel/Display) or right-click the desktop and choose Properties. Unless you're a graphic designer, you probably won't notice the difference between 32-bit true color and 16-bit high color, anyway. Tip provided by CNET Help.com"}, {"response": 13, "author": "MarciaH", "date": "Thu, Jun  1, 2000 (17:17)", "body": "The best I have available is Iomega Zipdisks"}, {"response": 14, "author": "sprin5", "date": "Fri, Jun  2, 2000 (07:19)", "body": "That should work ok."}, {"response": 15, "author": "MarciaH", "date": "Fri, Jun  2, 2000 (12:46)", "body": "It is just such an intimidating thing to contemplate doing that I am hanging with the status quo so far......*sigh*"}, {"response": 16, "author": "MarciaH", "date": "Fri, Jun  2, 2000 (13:41)", "body": "Don't Autostart Anything Nothing's slower than having to wait for your computer to launch a bunch of programs each time it starts up. To stop a program from launching at start-up, just open C:WindowsStart MenuProgramsStartUp in Windows Explorer and delete that program's shortcut. Windows 98's System Information tool (Start/Programs/Accessories/System Tools/System Information) gives you an even more detailed list of autostarting programs. Just expand the Software Environment menu and choose Startup Programs. This will show you any programs that are automatically launched by the Registry. To keep these programs from autostarting, consult each application's help file. Tip provided by CNET Help.com"}, {"response": 17, "author": "MarciaH", "date": "Mon, Jun  5, 2000 (14:06)", "body": "Stop the Floppy Scan When Windows 98 boots up, it wastes time scanning for new floppy drives. You can reclaim these lost seconds via the System Control Panel applet (Start/Settings/Control Panel/System or right-click My Computer and choose Properties). Select the Performance tab, click the File System button, select the Floppy Disk tab, and uncheck the option \"Search for new floppy disk drives every time your computer starts.\" Voila! Tip provided by CNET Help.com"}, {"response": 18, "author": "MarciaH", "date": "Wed, Jun  7, 2000 (00:10)", "body": "Delete Junk Programs Unused programs clutter your hard drive, robbing you of valuable space and ultimately slowing down system performance. Hard drive clutter also causes conflicts with the useful apps on your system. Our test machines showed significantly faster performance and increased stability when we simply removed a few unused programs. To get your hard drive squeaky clean, use an uninstaller application, such as Norton's CleanSweep Deluxe from Symantec. CleanSweep keeps track of unused files, schedules cleanup jobs, and removes applications more completely than the Windows Add/Remove Programs utility. If you're on a budget and can't afford CleanSweep, try a shareware uninstaller or keep a close watch on the applications you install and remove any that cause problems. To read CNET's CleanSweep Deluxe review, click here. http://home.cnet.com/software/0-3757-7-1559622.html"}, {"response": 19, "author": "sprin5", "date": "Wed, Jun  7, 2000 (11:10)", "body": "If you have a Windows NT System, here are some good file system cleanup tips (even though this site has stopped updating). http://personal.cfw.com/~tkprit/files/filesroot.html"}, {"response": 20, "author": "MarciaH", "date": "Wed, Jun  7, 2000 (19:37)", "body": "Speed Up Reboots If you think Windows 98 takes too long to boot, you can remove the built-in two-second delay in the OS's start-up sequence. Here's what you need to do: 1. Under the Start button, select Find/Files or Folders. 2. Enter msdos.sys in the Named box and C: in the Look In box. Then click Find Now. 3. When the file appears, right-click it and select Properties from the pop-up menu. 4. Click to remove the check marks from the Read-Only and Hidden attributes, then click OK. 5. Right-click msdos.sys, select Open With from the pop-up menu, enter Notepad as the opening program, and then click OK. 6. Under Options, enter BootDelay=0 or BootDelay=1 on its own line. (This represents respective delays of zero seconds and one second, both of which are faster than the default.) 7. Close Notepad and save your changes on the way out. 8. Return msdos.sys to its hidden, read-only state. (Right-click it, select Properties from the pop-up menu, and check the Read-Only and Hidden check boxes. Then click OK.) 9. Quit and restart Windows. Warning: Any time you make changes to your SYS files, it's a good idea to back up your important files and have your original Windows disk on hand in case you need to reinstall. Tip provided by CNET Help.com"}, {"response": 21, "author": "MarciaH", "date": "Thu, Jun  8, 2000 (14:44)", "body": "Control Panel Shortcuts Your Control Panel makes easy work of configuring Windows 98, but if clicking through Start/Settings/Control Panel gets on your nerves, here's a quick fix: Open the Control Panel folder, select the icons of your frequently used applets (hold down Ctrl while you click for multiple selections), then drag them onto your Start button. The Start menu will open, allowing you to place your new Control Panel shortcuts wherever you want. We suggest leaving them in the root of the Start menu and renaming them something unique (go to C:\\Windows\\Start Menu in the Windows Explorer, right-click the icon, and choose Rename). That way, you can access them with just a click of the Windows key (or Ctrl-Esc if you don't have a Windows key) and the first letter or number of the shortcut's name. Tip provided by CNET Help.com"}, {"response": 22, "author": "MarciaH", "date": "Fri, Jun  9, 2000 (12:33)", "body": "Back Up Your Registry Files To be safe, manually back up the Registry before you make any changes. Go to Start/Programs/Accessories/System Tools/System Information. Once you've opened the System Information application, click Tools in the menu and select Registry Checker. After a quick scan of your system, Registry Checker will offer to make a backup. Click Yes to replace the oldest backup file with a fresh one. Tip provided by CNET Help.com"}, {"response": 23, "author": "sprin5", "date": "Fri, Jun  9, 2000 (15:36)", "body": "Real good idea! The registry is a fragile thing."}, {"response": 24, "author": "MarciaH", "date": "Fri, Jun  9, 2000 (19:47)", "body": "yup and mine is messed up already, I'm afraid"}, {"response": 25, "author": "sociolingo", "date": "Sat, Jun 10, 2000 (03:58)", "body": "Thanks for the reminder! Registry backed up today using Norton Utilities. Marcia, did you update your virus protection? (You told me to bug you about it.)"}, {"response": 26, "author": "MarciaH", "date": "Sat, Jun 10, 2000 (17:01)", "body": "nope - son busy and I really don't want to back up this one as it is.....but it IS better than having it go blank on me and my not being able to restore it. Which reminds me... Alexander reminded you and he has not responded to my email. I am most concerned!"}, {"response": 27, "author": "MarciaH", "date": "Sat, Jun 10, 2000 (17:05)", "body": "can't get around the NEC assistant problem"}, {"response": 28, "author": "sociolingo", "date": "Sat, Jun 10, 2000 (17:15)", "body": "I found my problem was the firewall my ISP had. Now I've changed ISP I don't have the problem anymore."}, {"response": 29, "author": "MarciaH", "date": "Sat, Jun 10, 2000 (23:36)", "body": "Fascinating. My firewall, though it was tedious to set up, makes my computer much more efficient. It is unobtrusive and is fun to check up on pings."}, {"response": 30, "author": "sociolingo", "date": "Mon, Jun 12, 2000 (12:11)", "body": "Yup, no problem with the personal PC firewall program I use, but the ISPs one was a PAIN!"}, {"response": 31, "author": "MarciaH", "date": "Mon, Jun 12, 2000 (16:16)", "body": "I finally deleted my firewall because it was making other problems on the computer. *Sigh* Access Taskbar Shortcuts With One Click If you want to quickly access an item but don't want to wade through your Start menu categories, make a super-shortcut from your taskbar. Simply right-click the taskbar located at the bottom of your screen. From the pop-up menu, select Toolbars/New Toolbar. From the New Toolbar dialog box, open the Start Menu folder from the Windows directory. You'll find that all items listed on your Start menu are in the Programs subdirectory of this folder. Choose the program or file you want to easily access and Press the OK button. A single-click shortcut should appear on your taskbar bar. Tip provided by CNET Help.com"}, {"response": 32, "author": "MarciaH", "date": "Tue, Jun 13, 2000 (17:02)", "body": "Optimize Your Virtual Cache Do you notice your system periodically stalling while the hard drive thrashes? This phenomenon is often caused by the Windows virtual cache feature. Like onboard caching, this cache is designed to reduce disk access, but it can easily grow large enough to put a dent in your performance. If you've got 32MB of RAM or more, try setting the cache size at a fixed number. We recommend 4MB for systems with less than 48MB of RAM and 8MB for those with 48MB or more. Here's how to set it up: 1. Run SysEdit. (Select Run in your Start menu, type SysEdit in the text box, and press Enter.) 2. Click the system.ini window. 3. Scroll down to the [vcache] section. If you don't see one, type in [vcache] as a new heading. 4. If you have 48MB of RAM or less, enter these two lines: MinFileCache=0 MaxFileCache=4096 5. If you have more than 48MB of RAM, enter these two lines: MinFileCache=0 MaxFileCache=8192 6. Close SysEdit, saving changes on the way out, and restart Windows. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes."}, {"response": 33, "author": "MarciaH", "date": "Wed, Jun 14, 2000 (17:18)", "body": "Hide Your Run Tracks Old DOS heads never poke around in Explorer to click program icons. They just select Start/Run, enter the filename, and start the program without any mouse work. Better yet, they press the Window key-R combo on their 104-key keyboard to launch the Run dialog. The only problem is that Run maintains a history list, which means people can see what you've been running. (The Start menu's Documents list was worse until Windows 98 let you right-click and delete items on it.) Here's how to cover your tracks in the Run dialog box: 1. Back up the Registry. 2. Launch RegEdit by selecting Run from the Start menu and entering RegEdit. 3. Under HKEY_CURRENT_USER, select Software/Microsoft/Windows/CurrentVersion/Explorer/RunMRU. 4. Find the items in the right hand pane that you want removed from the Run history list. 5. Select the commands you want removed one by one and press Delete to remove them. 6. Save your changes as you quit RegEdit and restart Windows. To remove the entire Run history (the useful entries and the ones you want kept secret) run TweakUI. Select Start/Control Panel and double-click the TweakUI icon. Click the Paranoia tab and select the histories you want to delete. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Click here for more information. http://www.help.com/cat/2/191/192/193/tip/4018.html"}, {"response": 34, "author": "MarciaH", "date": "Mon, Jun 19, 2000 (18:01)", "body": "Set The Current Date First If you lose all power to your PalmPilot (because of dead batteries, for instance), make sure to set the correct date before HotSyncing your data. If you don't, all the alarms stored in your PalmPilot that have passed will go off at once. This will also happen if you set your PalmPilot to a date before these alarms, then change it back to the correct time. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 35, "author": "MarciaH", "date": "Mon, Jun 19, 2000 (18:02)", "body": "Rename the Recycle Bin You can rename most anything on the Windows desktop by right-clicking its icon and selecting the Rename option. But the Recycle Bin doesn't have that option and we'd prefer to call it Trash, in honor of the Macintosh icon. Sure enough, both RegEdit and TweakUI make this easy to do. Here's the RegEdit way: 1. Open RegEdit (select Run in the Start menu and enter RegEdit in the text box). 2. Open HKEY_CLASSES_ROOT and locate CLSID (the Class ID option). Scroll down to the {645FF040-5081-101B-9F08-00AA002F954E} key and click it. 3. In the right hand window, double-click (Default) and change the name from Recycle Bin to whatever you prefer. 4. Click OK and close RegEdit. 5. To make the new name take effect, click once anywhere on the desktop and press the F5 key. And here's the TweakUI way to rename your recycle bin: 1. Select Start/Settings/Control Panel and launch TweakUI. 2. Under Desktop, right-click Recycle Bin and select Rename. 3. Type in the new name and click OK. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Click here for more information. http://www.help.com/cat/2/191/192/193/tip/4018.html Tip provided by CNET Help.com"}, {"response": 36, "author": "MarciaH", "date": "Tue, Jun 20, 2000 (18:24)", "body": "Customize the Start Menu Come on--do you really need your Start menu to include the item Log Off [your name]? If you're using a networked or shared computer, maybe. But the rest of us could happily axe the thing. (If you need to restart Windows, just select Restart from the Shut Down menu and hold down the Shift key.) Here's how you do it: 1. Back up your Registry and launch RegEdit. 2. Under HKEY_CURRENT_USER, select 3. Select Edit/New/Binary Value. 4. Name the new entry NoLogOff. 5. Press Enter and set the value to this: 01 00 00 00. 6. Save your changes as you quit RegEdit and restart Windows. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Software/Microsoft/Windows/CurrentVersion/Policies/Explorer . Click here for more information. http://www.help.com/cat/2/191/192/193/tip/4018.html Tip provided by CNET Help.com"}, {"response": 37, "author": "MarciaH", "date": "Tue, Jun 20, 2000 (18:27)", "body": "Palm OS Tip of the Day Attaching Notes To Appointments If you attach a note to the appointment, you can choose whether the note is added to all occurrences of that appointment or just the single appointment you selected. Also, a quick way to attach a note is to use the Attach Note Command graffiti stroke. Do a command stroke (lower left to upper right) and then do an \"A\". This is universally used in all the built-in applications. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 38, "author": "sprin5", "date": "Tue, Jun 20, 2000 (18:35)", "body": "Cool! Always looking for Palm tips."}, {"response": 39, "author": "MarciaH", "date": "Tue, Jun 20, 2000 (18:45)", "body": "That is the second one - just signed up for them the other day... For you, of course!"}, {"response": 40, "author": "sprin5", "date": "Wed, Jun 21, 2000 (08:39)", "body": "I wish I could find a better browser for my Palm VII. I've looked around. On my Palmphone, the telnet and email apps are awesome. I can really access anything on the net with the Palm Phone."}, {"response": 41, "author": "MarciaH", "date": "Wed, Jun 21, 2000 (14:16)", "body": "I'll keep mt eyes peeled for a good browser.. Palm OS Tip of the Day HotSync Time-Out Problems? If you're having a problem with HotSync timing out before it syncs your mail, try this before each HotSync: Hold both the down and up buttons and tap in the upper right corner of the screen. Tap OK in the dialog box that appears. This turns off the \"time-out\" feature, and your PalmPilot will wait patiently while your mail syncs. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com"}, {"response": 42, "author": "MarciaH", "date": "Wed, Jun 21, 2000 (14:18)", "body": "Windows Tip of the Day - Change Your Name Did your PC come with Windows 98 preinstalled? Do people snicker that your Office documents are stamped with an author name like \"Valued Gateway Customer,\" which brands you as a clueless newbie? This can be changed. Here's how: 1. Back up your Registry and launch RegEdit. 2. Under HKEY_LOCAL_MACHINE, select Software/Microsoft/Windows/CurrentVersion. 3. Double-click the RegisteredOrganization or RegisteredOwner options and type in your real name (or an interesting pseudonym, if you prefer). 4. Exit and restart Windows. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Click here for more information. http://www.help.com/cat/2/191/192/193/tip/4018.html Tip provided by CNET Help.com"}, {"response": 43, "author": "MarciaH", "date": "Wed, Jun 21, 2000 (14:28)", "body": "Fine-Tune Your Searches Fine-tune the way IE 5 searches for information on the Internet by clicking the Search button on the toolbar and selecting Customize. You can specify which search options appear in the window and which sites are used for a range of searches. If you select the Autosearch Settings button, you can alter how an Autosearch is performed and what happens when likely sites are returned."}, {"response": 44, "author": "MarciaH", "date": "Thu, Jun 22, 2000 (13:27)", "body": "Beware The Power Of AutoComplete In Internet Explorer, some sites' search fields will retain entries you've made in the past when AutoComplete is active. Try explaining why \"divorce law\" pops up as a possible match when your spouse uses HotBot for a search of his own. To turn off this part of AutoComplete, choose Tools/Internet Options, then click the Content tab. Click the AutoComplete button in the personal information section and uncheck the Forms box in the AutoComplete Settings dialog. - Internet Tip Provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_internet.txt.hp"}, {"response": 45, "author": "MarciaH", "date": "Thu, Jun 22, 2000 (13:29)", "body": "Palm OS Tip of the Day - Add Custom Info To An Address Book Entry Add Custom Info To An Address Book Entry The Address Book app provides four custom fields that you can rename anything you want. However, renaming a custom field affects all Address List entries using that field. To add custom information for a single entry without using a custom field, attach a note to the entry. Everything in the note will show up in the Address View, just as if you had used a custom field. This tip was submitted by PalmGear H.Q.. - Tip provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_palm.txt.hp"}, {"response": 46, "author": "MarciaH", "date": "Thu, Jun 22, 2000 (13:47)", "body": "Don't Play Favorites As if the Windows Start menu weren't already cluttered enough, IE 4 and later versions add a cascading menu to the Start menu that displays the Favorites folder. Too much! Luckily, the cascading menu is easy to remove. Here's how: 1. Back up your Registry. 2. Launch RegEdit (select Run from the Start menu, type RegEdit in the text box, and press Enter). 3. Under HKEY_CURRENT_USER, select 4. Select Edit/New/DWORD value. 5. Change the default name to NoFavoritesMenu. 6. Press Enter and change the contents of the Value Data to 1. 7. Save your changes as you quit RegEdit and restart Windows. The Favorites menu will still be available from windows in Explorer, but it won't be cluttering your Start menu. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Software/Microsoft/Windows/CurrentVersion/Policies/Explorer"}, {"response": 47, "author": "MarciaH", "date": "Fri, Jun 23, 2000 (18:16)", "body": "Remove Add/Remove Items So you uninstalled a program the Windows way--using Control Panel's Add/Remove Programs. And yet, the listing is still there and when you try to uninstall it, you get an error message. Or, perhaps you want to prevent someone from uninstalling a program somewhere down the line. One Registry hack can take care of both of these contingencies: 1. Make sure you have a current backup of the Registry. 2. Launch RegEdit. 3. Under HKEY_LOCAL_MACHINE, locate Software/Microsoft/Windows/CurrentVersion/Uninstall. 4. Under Uninstall, locate any keys you don't want and press Delete to remove them. 5. Save your changes as you quit RegEdit and restart Windows. Sure enough, Add/Remove Programs now doesn't list the item or items you've deleted. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Click here for more information. http://www.help.com/cat/2/191/192/193/tip/4018.html Tip provided by CNET Help.com"}, {"response": 48, "author": "MarciaH", "date": "Fri, Jun 23, 2000 (18:18)", "body": "Open Files Quickly You can open any file on your computer without opening Explorer using IE 5's desktop integration. Right-click the Taskbar and choose New Toolbar in the Toolbars menu. When the window pops up, choose My Computer and click OK. When you minimize the new toolbar, you can access any of your disk drives, or even the Control Panel and Dial-Up Networking, right from your Taskbar. - David Henderson - Internet Tip Provided by CNET Help.com"}, {"response": 49, "author": "MarciaH", "date": "Mon, Jun 26, 2000 (18:03)", "body": "Hide Annoying File Extensions Like any command line fan, we like to see the extensions of files we're exploring. But with some file types, such as icons, cursors, and (in some cases, when they've been changed) bitmaps, you don't need to see the extensions. Luckily, it's possible to suppress file extensions in some types of files, while all the others stay intact. Here's how: 1. Pick the file extension to suppress, then back up the Registry. 2. Launch RegEdit. 3. Under HKEY_CLASSES_ROOT, locate the file extension you want to suppress. 4. Right-click the extension name and select New/String Value. 5. Name the string value NeverShowExt and don't change the Data value. 6. Save your changes as you quit RegEdit and restart Windows. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. Click here for more information. http://www.help.com/cat/2/191/192/193/tip/4018.html Tip provided by CNET Help.com"}, {"response": 50, "author": "MarciaH", "date": "Mon, Jun 26, 2000 (18:04)", "body": "Get A Window On History Hitting Ctrl-H in Netscape Communicator brings up the History window, which has a record of all the sites you've visited. You can sort and search the URLs or site titles and link back to any pages you forgot to bookmark. To sort the History list, select the View menu and any of its options: By Title, By Location, By First Visited, By Last Visited, By Expiration, and By Visit Count. The menu also lets you sort any of these views in ascending or descending order. To search the list for a site or sites, select Edit/Search History List, choose from the drop-down boxes, and fill in the text box to define your search. To include an And parameter in your search, click the More button and fill out the second set of boxes that appears. Right-clicking And changes it to an Or parameter. - Internet Tip Provided by CNET Help.com"}, {"response": 51, "author": "MarciaH", "date": "Mon, Jun 26, 2000 (18:09)", "body": "Terry I can't find where you put your palm pilot program so here goes the hint for the day: Get A Window On History Hitting Ctrl-H in Netscape Communicator brings up the History window, which has a record of all the sites you've visited. You can sort and search the URLs or site titles and link back to any pages you forgot to bookmark. To sort the History list, select the View menu and any of its options: By Title, By Location, By First Visited, By Last Visited, By Expiration, and By Visit Count. The menu also lets you sort any of these views in ascending or descending order. To search the list for a site or sites, select Edit/Search History List, choose from the drop-down boxes, and fill in the text box to define your search. To include an And parameter in your search, click the More button and fill out the second set of boxes that appears. Right-clicking And changes it to an Or parameter. - Internet Tip Provided by CNET Help.com"}, {"response": 52, "author": "MarciaH", "date": "Tue, Jun 27, 2000 (16:09)", "body": "Use a Bitmap Image as a 16-Color Icon To use a bitmap image as a 16-color icon, rename the .bmp file to a file with an .ico extension. To do so, follow these steps: 1. In Windows Explorer, click Options on the View menu. 2. Click the \"Hide MS-DOS extensions for file types that are registered\" check box to clear it and click OK. 3. Locate the .bmp file you want to use as an icon. 4. Use the right mouse button to click the .bmp file and click Rename on the menu that appears. Rename the file with an .ico extension. Windows automatically recognizes that you want to use the bitmap image as an icon. The image is resized to icon size and converted to 16 colors. To use the .ico file as an icon for a shortcut, follow these steps: 1. Use the right mouse button to click the shortcut and click Properties on the menu that appears. 2. On the Shortcut tab, click Change Icon. 3. Type the name of the .ico file in the File Name box or click Browse and locate the .ico file. 4. Click OK and then click OK once more. This tip was submitted by Microsoft. Tip provided by CNET Help.com"}, {"response": 53, "author": "MarciaH", "date": "Wed, Jun 28, 2000 (22:39)", "body": "Boot to a Command Prompt by Default To configure Windows to boot to a command prompt automatically, follow these steps: 1. Restart your computer. For Windows 95, when you see the \"Starting Windows 95\" message, press the F8 key, and choose Command Prompt Only from the Startup menu. For Windows 98, press and hold down the CTRL key after your computer completes the Power On Self Test (POST) and then choose Command Prompt Only from the Startup menu. 2. Type the following lines. Press ENTER after each line: attrib -s -h -r msdos.sys edit msdos.sys 3. Change the line that reads BootGUI=1 to read: BootGUI=0 4. Save the msdos.sys file and close the editor. 5. Type the following line and press ENTER: attrib +s +h +r msdos.sys 6. Restart your computer. When the computer restarts, it automatically boots to a command prompt. To load the Windows graphical user interface (GUI), type win at the command prompt. This tip was submitted by Microsoft. Tip provided by CNET Help.com"}, {"response": 54, "author": "MarciaH", "date": "Wed, Jun 28, 2000 (22:41)", "body": "Have FTP Both Ways Downloading files from FTP servers via Netscape Navigator is nothing new, but Communicator allows you to upload files as well. The syntax for FTP is ftp://user:password@site.com/directory/ . If you leave out just the password but do put in the username ( ftp://username@ftp.site.com) , you'll be prompted for a password. This lets you bookmark the site so that no one else will have access to it. If you leave out the username and password, you use the standard anonymous FTP login, so it's ftp://site.com/ . While connected to an FTP URL, you can drag and drop files from your desktop to the Navigator window to upload them to the server (assuming you have the proper permissions). - Internet Tip Provided by CNET Help.com"}, {"response": 55, "author": "MarciaH", "date": "Thu, Jun 29, 2000 (13:20)", "body": "Walk Through Multiple Windows You can cycle through all open Navigator, Mailbox, and Discussion windows by repeatedly pressing Ctrl-Tab. This shortcut doesn't work in Composer, as it is not supported by a Mac. - Internet Tip Provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_internet.txt.hp"}, {"response": 56, "author": "MarciaH", "date": "Thu, Jun 29, 2000 (13:22)", "body": "Enable Support for Multiple Languages in Windows To install multiple language support in Windows, follow these steps: 1. Click Start, point to Settings, and click Control Panel. 2. In Control Panel, double-click Add/Remove Programs. 3. Click the Windows Setup tab. 4. Click the Multilanguage Support check box to select it. 5. Click OK. To enable support for a specific language after doing the above, follow these steps: 1. In Control Panel, double-click Keyboard. 2. On the Language tab, click Add. 3. Click the language you want to use and then click OK. 4. Click OK. This tip was submitted by Microsoft. Tip provided by CNET Help.com"}, {"response": 57, "author": "sprin5", "date": "Fri, Jun 30, 2000 (11:02)", "body": "Wow, I always use alt tab. Control tab is like lightnin'"}, {"response": 58, "author": "MarciaH", "date": "Fri, Jun 30, 2000 (22:29)", "body": "Start Disk Cleanup With a Command Line Disk Cleanup helps free up space on your hard drive by searching your drive, and then listing the temporary files, Internet cache files, and unnecessary program files that you can safely delete. To start the Disk Cleanup tool and specify the hard disk to clean by using a command line, use the following steps: 1. Click Start and then click Run. 2. In the Open box, type the following line and then press ENTER: c:\\windows\\cleanmgr.exe/[drive] Where [drive] is, type the drive letter of the hard disk you want to clean. This tip was submitted by Microsoft. Tip provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_windows.txt.hp"}, {"response": 59, "author": "MarciaH", "date": "Mon, Jul  3, 2000 (23:51)", "body": "Verify Faster To avoid having to reload a cached document, Navigator stores retrieved Web pages in memory caches and disk caches, and checks each newly requested document against both. This approach can save time if Navigator finds a document, but it can waste time if the program checks the caches too often. To avoid this delay, select Edit/Preferences from the main menu. Next, click the plus sign (the triangle on Macs) next to the Advanced category, then click the Cache category that appears. Under Document In Cache Is Compared To Document On Network, check either the Once Per Session or the Never option. - Internet Tip Provided by CNET Help.com"}, {"response": 60, "author": "MarciaH", "date": "Mon, Jul  3, 2000 (23:52)", "body": "Install and Run Clipboard Viewer The Clipboard Viewer is not installed by default in Windows. To install Clipboard Viewer, follow these steps: 1. Click Start, point to Settings, and click Control Panel. 2. In Control Panel, double-click Add/Remove Programs. 3. Click the Windows Setup tab. 4. Click System Tools and then click Details. 5. Click the Clipboard Viewer check box to select it and then click OK. 6. Click OK. To run Clipboard Viewer after you install it, click Start, point to Programs, Accessories, System Tools, and click Clipboard Viewer. You can use Clipboard Viewer to view the contents of the Clipboard. This tip was submitted by Microsoft. Tip provided by CNET Help.com"}, {"response": 61, "author": "sprin5", "date": "Tue, Jul  4, 2000 (08:10)", "body": "Office 2000 has a multiple clipboard which saves 10-12 items, but it becomes a hassle at a time like the little moron that runs around the screen getting in your way."}, {"response": 62, "author": "MarciaH", "date": "Tue, Jul  4, 2000 (12:32)", "body": "Is he worse than paper clip man on Word???"}, {"response": 63, "author": "MarciaH", "date": "Tue, Jul  4, 2000 (17:15)", "body": "Verify Faster To avoid having to reload a cached document, Navigator stores retrieved Web pages in memory caches and disk caches, and checks each newly requested document against both. This approach can save time if Navigator finds a document, but it can waste time if the program checks the caches too often. To avoid this delay, select Edit/Preferences from the main menu. Next, click the plus sign (the triangle on Macs) next to the Advanced category, then click the Cache category that appears. Under Document In Cache Is Compared To Document On Network, check either the Once Per Session or the Never option. - Internet Tip Provided by CNET Help.com"}, {"response": 64, "author": "MarciaH", "date": "Wed, Jul  5, 2000 (15:21)", "body": "Take Control Of Your Appearance To set Netscape Communicator to display your choice of text and background color for the Web pages you view, pull down the Edit menu and select Preferences/Appearance/Colors. On the right side of the dialog box, select a text color and a background color (you can also select colors for unvisited and visited links). If you select the Always Use My Colors overriding document check box, you will see your colors in place of those specified for the Web page. - Internet Tip Provided by CNET Help.com"}, {"response": 65, "author": "MarciaH", "date": "Thu, Jul  6, 2000 (16:09)", "body": "Create A Custom Toolbar Netscape Navigator 4.0 includes a new personal toolbar that makes it easier to manage the bookmarks folder. (The Mac version of Navigator doesn't include the personal toolbar.) The personal toolbar displays the links from the toolbar folder of the Bookmarks file. To see it, select View/Show Personal Toolbar from the main menu; if the toolbar is currently minimized, click its small horizontal bar to display the bar. To add the current Web page to the personal toolbar, move the cursor over the Page Proxy icon next to the Netsite box in the Location toolbar. When the cursor turns into a hand, drag the Page Proxy icon onto the Personal toolbar. To move an existing bookmark into the Personal toolbar, click the Bookmarks icon, select Edit Bookmarks from the drop-down list, select the appropriate bookmark, and drag it into the Toolbar Folder. It will immediately appear in the personal toolbar. You can even add your Messenger Inbox or a desktop folder to your customized toolbar. Just drag and drop its icon onto the toolbar. - Internet Tip Provided by CNET Help.com"}, {"response": 66, "author": "MarciaH", "date": "Fri, Jul  7, 2000 (17:15)", "body": "Fun With Folder Content Columns When examining a folder's contents in the Details view, all you see is columns! Mix it up a little by dragging column dividers to adjust column widths. If you're feeling really crazy, you can drag a column header (title) to another horizontal location to switch the order in which the columns display. Tip provided by CNET Help.com"}, {"response": 67, "author": "MarciaH", "date": "Fri, Jul  7, 2000 (17:17)", "body": "Kill Your Mouse Did you know Opera can be run exclusively from your keyboard? F8 takes your cursor to the Address field, while F9 makes normal navigation possible. Type 1 or 2 to switch between open windows. Esc works like the Stop button to stop the current document from loading. Ctrl-F2 opens your Hot List (similar to Favorites in Internet Explorer or Bookmarks in Netscape). These are only the most frequently used keyboard commands and shortcuts. Hit Ctrl-B to see the entire list. Click here to download Opera http://download.cnet.com/downloads/0-10058-100-1889857.html"}, {"response": 68, "author": "MarciaH", "date": "Mon, Jul 10, 2000 (13:22)", "body": "Stop Squinting Too young for reading glasses? Opera has the easiest zoom features of any browser around. Just click the arrow at the lower right corner of the screen, next to where it usually says \"100%.\" This will open a small menu where you can select a zoom setting from 20 to 1,000 percent of the original page, with instant results. You can also zoom in and out by hitting the plus (+) and minus (-) keys on your numeric keypad; hitting the multiplication key (*) defaults back to 100 percent. Opera will open all windows with your favorite setting by default. Just go to the Preferences menu, select Document Window, and adjust the default scaling. Click here to download Opera http://download.cnet.com/downloads/0-10058-100-1889857.html"}, {"response": 69, "author": "MarciaH", "date": "Mon, Jul 10, 2000 (22:55)", "body": "Lighten the Load With Disk Cleanup Windows 98 stores files in the Recycle Bin and in temporary directories for easier access. However, Windows saves so many files that eventually the waste can outweigh the ease. Speed up your computer and free some hard drive space with Disk Cleanup. From the Start button, select Disk Cleanup from System Tools in the Accessories menu. A pop-up window will appear to ask which drive you want to clean. Disk Cleanup will then quickly scan your hard drive to analyze the drive's wasted space. Once it finishes, the Disk Cleanup window will display the amount of wasted space for each file type that can be cleaned out. Check the boxes next to each file type you want to erase and press OK. The program will prompt you for deletion confirmation and clean your machine. Tip provided by CNET Help.com"}, {"response": 70, "author": "MarciaH", "date": "Tue, Jul 11, 2000 (16:14)", "body": "Cut and Paste Keyboard Shortcuts Make cutting and pasting in Windows 98 a snap with keyboard shortcuts. To quickly use the copy command, press Ctrl-C. To easily cut text or graphics, press Ctrl-X. To paste from the clipboard, press Ctrl-V. To quickly highlight the text you want to cut or copy, place the cursor at the start of the first character you want to select and depress the Shift key while using the arrow keys to highlight the selection. You can also quickly navigate through text moving one word at a time by depressing Ctrl and the arrow keys. To undo any command, press Ctrl-Z. Tip provided by CNET Help.com"}, {"response": 71, "author": "MarciaH", "date": "Tue, Jul 11, 2000 (18:10)", "body": "Stop Splashing Me! Tired of seeing that splash screen every time you start up Opera? Now you can make it stop. Open Notepad or any text editor, and edit the file in your Windows directory called opera.ini. There should be a section called [USER PREFS]. If not, go ahead and add one. Then enter (or edit) the following statement: SHOW SPLASH SCREEN = 0 Save your changes and Opera will never splash you again. Click here to dowload Opera http://download.cnet.com/downloads/0-10058-100-1889857.html - Internet Tip Provided by CNET Help.com"}, {"response": 72, "author": "MarciaH", "date": "Wed, Jul 12, 2000 (14:10)", "body": "Make Opera Support Java You can give Opera the Java support it needs! Download and install Sun's Java at http://www.operasoftware.com/support/operate.htm#35003 , then copy the file named NPJava32.dll from C:\\java plug-in\\bin to C:\\program files\\opera\\plugins. That's all there is to it. Click here to dowload Opera http://download.cnet.com/downloads/0-10058-100-1889857.html - Internet Tip Provided by CNET Help.com"}, {"response": 73, "author": "MarciaH", "date": "Wed, Jul 12, 2000 (14:45)", "body": "Use the Caps Lock and Num Lock Key Alerts Perhaps the capitalization and number lock keys are among the most useful keyboard keys, allowing the user to toggle between upper and lower case or between numbers and arrow keys on the numeric keypad. But they can also impede productivity when accidentally hit, changing case or function. Don't let yourself be caught in the wrong mode unawares. You can change your settings so that you're alerted whenever the Caps Lock or Num Lock key is hit. A mild, high-pitched tone will indicate that Caps Lock or Num Lock has been turned on, and a slightly lower tone will indicate that one of these features has been turned off. To activate these alerts, select Settings/Control Panel from the Windows 98 Start menu. Double-click the Accessibility Options icon. From the Accessibility Properties window, select the Keyboard tab. Under the ToggleKeys section, check the box labeled \"Use ToggleKeys,\" click the Apply button, and then click OK. Tip provided by CNET Help.com"}, {"response": 74, "author": "MarciaH", "date": "Thu, Jul 13, 2000 (19:29)", "body": "Fill in Web Forms With Ease If you want Opera to fill in Web forms it encounters with your personal information automatically (such as e-mail address and phone number), go to the Preferences menu and select Generic/Personal Information and fill in your details. From now on you will be able to copy those details into any text box or form you come across as you surf the Web. When you find a form, right-click in the text field and select the appropriate text to insert from the context menu."}, {"response": 75, "author": "MarciaH", "date": "Thu, Jul 13, 2000 (19:34)", "body": "Using the Windows Key Use your Windows key to open a variety of commands quickly. The Windows key, denoted by the Microsoft symbol on recent keyboards, will access the Start menu when it's pressed. You can also depress the Windows key and press the letter E to launch Windows Explorer. The Windows-F combination will launch the File Finder. To minimize all windows, press the letter M while holding down the Windows key. Conversely, you can maximize all windows by depressing the Windows key and pressing Shift-M. To access the Start menu's Run command, simply hold down the Windows key and press the letter R on your keyboard."}, {"response": 76, "author": "MarciaH", "date": "Fri, Jul 14, 2000 (13:18)", "body": "Manage the Size of the Recycle Bin If your Recycle Bin looks less like a bin and more like a dumpster, keep your trash manageable by setting its hard drive space. Make sure the percentage of disk space your Recycle Bin uses is small. To do so, right-click the Recycle Bin from your desktop. From the pop-up menu, select Properties. Click the Global tab from the Recycle Bin Properties window and select the radio button labeled \"Use one setting for all drives.\" Next, move the slider labeled \"Maximum size of Recycle Bin\" to control the percentage of hard disk space the Recycle Bin can occupy. Move the slider to the left so that the Recycle Bin occupies less space or move it to the right to increase maximum hard drive percentage."}, {"response": 77, "author": "MarciaH", "date": "Fri, Jul 14, 2000 (13:19)", "body": "Customize Your Cache Sometimes a browser's method of caching seems illogical. At times, pages visited recently have not been cached, while older pages remain cached. However, you can call the shots, and decide which pages you wish to cache and how often. Explorer users can do so by setting up an Internet Explorer subscription. To do so, when adding a site to your Favorites list, check the box labeled, \"Make available offline.\" Then, simply click on the Customize button to begin the Offline Favorite Wizard. First, decide whether you want subpages to be cached as well by choosing the \"Yes\" or \"No\" radio button and clicking Next. You can then decide how often you wish the page to be cached in the next step, by selecting \"I would like to create a new schedule\" and selecting the Next button. Decide how often you would like the page to be cached by specifying number of days, and a time to synchronize, and press Next. As most sites do not require a password, you can usually press Next to bypass the last step. Explorer will then cache the page according to your specifications. Netscape users can access Preferences from the Edit menu. Navigate to the Advanced/Cache directory from the Preferences window. You can then specify how much disk and memory space you wish to occupy with cached pages. You can also specify to which folder you wish to save cached pages. In addition, you can decide how often pages are compared to their cached copies, and then updated. Under the heading labeled, \"Document in cache is compared to document on network,\" select the radio button for \"Once per session,\" \"Every time,\" or \"Never,\" according to your preference. Click OK to save changes."}, {"response": 78, "author": "MarciaH", "date": "Mon, Jul 17, 2000 (20:46)", "body": "Discover A Site's Details With WHOIS By using the WHOIS command, you can find out the registered name, server addresses, and e-mail of the registrar of a specific domain. Most UNIX users can generally access this command by simply prefacing a domain name with the WHOIS command. Other users can access the HREF=\"http://www.networksolutions.com/cgi-bin/whois/whois\"> WHOIS service online. Keep in mind, however, that oftentimes this information can be outdated. Also, it is considered bad etiquette to overuse or abuse information obtained by this service. - Internet Tip Provided by CNET Help.com"}, {"response": 79, "author": "MarciaH", "date": "Mon, Jul 17, 2000 (20:47)", "body": "Change Your Language Settings Make Windows speak your language by customizing your settings to a tongue other than English. To do so, click the Start button and select Control Panel from the Settings submenu. Double-click the Keyboard icon and click the Language tab from the Keyboard Properties window. Next, click on the Add button and choose the language you want to use from the pull-down menu. Click the \"Set as Default\" button to make the highlighted language your default language. You can switch languages easily with the keyboard by selecting one of the hotkey options listed under the \"Switch Languages\" heading. Select the radio button of the hotkey you wish to add and press that key sequence anywhere in Windows 98 to switch languages. By checking the box labeled \"Enable indicator on the taskbar,\" you can access a system tray icon that will switch your language for you. Once all settings are to your liking, click the Apply button to effect changes. Click the OK button to close the Keyboard Properties window. Tip provided by CNET Help.com"}, {"response": 80, "author": "MarciaH", "date": "Tue, Jul 18, 2000 (18:57)", "body": "Customize Your Telnet Colors Turn your Telnet terminal technicolor by customizing your hues. Select Preferences from the Telnet Terminal menu. From the pop-up dialog box, click the Background Color button. Click the background color you want in the pop-up palette and click the OK button. Once you return to the Terminal Preferences dialog box, click the Fonts button. From the Font dialog box, select the font color you want from the Color pull-down menu under the Effects heading. Click OK twice to save your settings. Tip provided by CNET Help.com"}, {"response": 81, "author": "sprin5", "date": "Wed, Jul 19, 2000 (13:08)", "body": "CRT has this and a lot more."}, {"response": 82, "author": "MarciaH", "date": "Wed, Jul 19, 2000 (14:56)", "body": "Yeah, I know!!! Silence Line Noise Sometimes, when accessing the Internet, you might encounter trouble logging on, surfing, or the appearance of extra characters as you attempt to use UNIX-based features. This is caused by \"line noise,\" or interference in your phone line, caused by faulty wiring, moisture, or other factors. You can test for line noise by picking up the telephone receiver (when you are not connected to the Internet), and listening for line static, or crackling noises. You can cut down on line noise by using shorter phone cords to connect your computer to the telephone jack. If all else fails, you can always contact your local telephone provider, and ask that a technician be sent out to analyze your line quality. - Internet Tip Provided by CNET Help.com"}, {"response": 83, "author": "MarciaH", "date": "Wed, Jul 19, 2000 (14:57)", "body": "Create a Printer Shortcut Print anything you want in a snap by creating a printer shortcut. Select Settings/Control Panel from the Start menu. Double-click the Printers icon. Once you're in the Printers folder, drag your printer icon onto the desktop. A prompt window will appear confirming that you want to create this shortcut. Click the Yes button. You can now drag any file onto your new printer shortcut, and the print job will begin immediately. Tip provided by CNET Help.com"}, {"response": 84, "author": "MarciaH", "date": "Tue, Aug 22, 2000 (01:29)", "body": "Today's Windows 98 Tip: Fun With Folder Content Columns When examining a folder's contents in the Details view, all you see is columns! Mix it up a little by dragging column dividers to adjust column widths. If you're feeling really crazy, you can drag a column header (title) to another horizontal location to switch the order that the columns display. If you've got Windows 98 tips of your own that you'd like to share, submit them here. Get more Windows 98 how-tos and tips here. Get answers to your Windows 98 questions here. Looking for more help with Windows 98? Try our Windows 98 Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 85, "author": "MarciaH", "date": "Wed, Aug 23, 2000 (00:20)", "body": "Today's Windows 95 Tip: Get Fast Access to Your Screensaver To have instant access to your screensaver, simply create a desktop shortcut pointing to the desired SCR file (usually located in Windows\\System). This tip was submitted by Barry Kortekaas. If you've got Windows 95 tips of your own that you'd like to share, submit them here. Get more Windows 95 how-tos and tips here. Get answers to your Windows 95 questions here. Looking for more help with Windows 95? Try our Windows 95 Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 86, "author": "MarciaH", "date": "Wed, Aug 23, 2000 (17:31)", "body": "There must be a LINUX topic but I could not find it so... let me know and Iwill eamil it to you. There are too many greater than signs in it to allow posting. Today's Linux Tip: How Do I Update (For Example) the System's Perl Documentation? Because program source and documentation files accumulate on machines that have been in operation for a long time (like McGee's closet), it's a good idea to get acquainted with the *nix way of doing things (really, no sarcasm intended), to make sure that you know what's on your system. In short, let the computer do it for you in the background. The following BASH shell script uses the programs find, egrep, and sed to search directory hierarchies for the text string \"=head1\" that signals the start of a Perl POD (plain old documentation) module. It then constructs and executes a shell script to generate the formatted documentation from those files. The programs that do the actual formatting are pod2man and pod2text. They are Perl scripts that call Perl library modules. The programs pod2latex and pod2html can also be added to the script, if they're present on the system. Place the shell script below in a file called makepods, then make the file executable with the shell command: chmod +x makepods Remember to run chmod +x to make this shell script executable as well. This is an example only; it is not the only way that cron jobs can be configured. Please consult your local documentation. YMMV (your mileage may vary). The author assumes no responsibility for its use, misuse, or abuse, and so on. This tip was submitted by Linux FAQ. If you've got Linux tips of your own that you'd like to share, submit them here. Get more Linux how-tos and tips here. Get answers to your Linux questions here. Looking for more help with Linux? Try our Linux Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 87, "author": "MarciaH", "date": "Wed, Aug 23, 2000 (22:51)", "body": "Today's Printers Tip: What's the Bottom Line? The price tag shouldn't be the only cost you consider when shopping for a printer. You should also factor in the costs of special paper needs, special input trays, ink cartridges or toner, printer drums, and how often you will need to replace these items during the life of the printer. If you've got Printers tips of your own that you'd like to share, submit them here. Get more Printers how-tos and tips here. Get answers to your Printers questions here. Looking for more help with Printers? Try our Printers Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 88, "author": "MarciaH", "date": "Wed, Aug 23, 2000 (23:29)", "body": "This Week's Shareware Dispatch 1. PC File of the Week CHOICECASTER Nothing beats streaming videos over a fast Internet connection, but launching multiple video players for different file formats can be a real chore. Fortunately, ChoiceCaster can help. This all-in-one, customizable media player supports QuickTime, RealPlayer, and Windows Media Player formats, provided you have the proper plug-ins installed on your system. You can launch the supported audio and video files from a single control panel, search online using its integrated Web browser, and find content online using a media guide that lists live events, Webcasts, and more. The guide even includes a library feature that scans your disks for supported files. FACT FILE: Version: 1.0 Size: 2,040K Developed by: eSynch Corp. License: Freeware Requirements: Windows 95/98/NT/2000 Mediate your multimedia: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0D84k ______________________________________________________ 2. Recent Additions to the Shareware.com PC Library ADVANCED DISK CATALOG Version: 1.31 Size: 1,730K Developed by: Elcom Ltd. License: Shareware ($20) Requirements: Windows 95/98/NT/2000 Build a searchable catalog of hard disk and CD-ROM files: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0D85l CHRIS UNINSTALL MANAGER Version: 1.0 Size: 340K Developed by: Christophe Bertrand License: Freeware Requirements: Windows 95/98/NT/2000 Replace the Windows Add/Remove Programs utility: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0D86m CUTERIP Version: 1.20 Size: 1,240K Developed by: YuanSoft Corp. License: Shareware ($20) Requirements: Windows 95/98/NT/2000 Create your own MP3 files from audio CD tracks: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0D87n INSTACROPPER Version: 2.0 Size: 840K Developed by: UtahSoft License: Freeware Requirements: Windows 95/98/NT Crop scanned images and automatically eliminate white space: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0D88o INTER FAX Version: 7.0 Size: 1,320K Developed by: UK Software License: Freeware Requirements: Windows 95/98/NT/2000 Send faxes anywhere using your PC and an Internet connection: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EAA8 ______________________________________________________ 3. Mac File of the Week PEPPER There are many development-oriented text editors available for the Mac, but Pepper offers a few powerful benefits over its competition. First, it has a clean editing interface, with no obnoxious pop-ups or complicated toolbars. It also incorporates full support for Perl syntax searches, includes useful coding templates, and can store commonly-used code snippets in its Accelerator Editor. Pepper even features low memory requirements, despite having multiple levels of undo/redo capabilities. In addition to Perl, it supports C/C++, HTML, Java, Oberon-2, Pascal, Python, Rez, Shell, and TeX. This version adds a strong online Help system. FACT FILE: Version: 3.0.1 Size: 1.3M Developed by: Hekkelman Programmatuur License: Shareware ($45, site license available) Requirements: PowerPC processor, System 8.6 or better, 2.5M free disk space Pepper up your text: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EABA ______________________________________________________ 4. Recent Additions to the Shareware.com Mac Library PRESIDENTS3000 Version: 1.01 Size: 908K Developed by: Ken Winograd/Space-Time Associates License: Shareware ($20, site license available) Requirements: PowerPC processor Know your presidents in this basic hangman puzzler: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EACB DATEPASTER Version: 1.01 Size: 391K Developed by: Satinder S. Sidhu License: Freeware Requirements: Should work on any Mac Copy and paste long-form dates without consulting your calendar: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EADC MORTGAGE MAKER Version: 2.2 Size: 297K Developed by: Nick Parlante License: Freeware ($10 for professionals, site licenses available) Requirements: Should work on any Mac Check out your mortgage and loan options: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EAED SLIDER Version: 1.0.4 Size: 206K Developed by: RavenWare License: Freeware Requirements: PowerPC processor Have slippery fun with a multi-level geometric game: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EAFE WORLDS APART Version: 2.1 Size: 1.6M Developed by: Suzanne Britton License: Freeware Requirements: System 7 or later, QuickTime 3.0 or later, 2.5M free RAM Play along with this \"interactive fugue\" for the Mac: http://1.digital.cnet.com/cgi-bin1/flo?y=evM0BxpGx0p0EAGF"}, {"response": 89, "author": "MarciaH", "date": "Thu, Aug 24, 2000 (01:34)", "body": "Tweak Freak Dispatch A newsletter from CNET Help.com http://www.help.com/ August 23, 2000 ----------------------------------------------- This Week on Tweak Freak: Find and Fix Finicky System Files ----------------------------------------------- Never run into a corrupted file or a system conflict in Windows 98? Lucky you. Fortunately, there's a tool for those of us (or the majority of us, to be more precise) who are all-too-familiar with the dreaded Blue Screen of Death. The Windows 98 System Information utility lets you diagnose conflicts and repair corrupted files through a variety of individual tools for Internet Explorer, DirectX, and other Windows components. You can open System Information by clicking the Start menu, then selecting Programs/Accessories/System Tools/System Information. Here's how to operate some of the more useful tools to keep your system running smoothly and swiftly. Note: It's a good idea to shut down other programs while using the System Information tools to avoid conflicts. ** KEEP YOUR SYSTEM FILES IN ORDER Use the ever-handy System File Checker to verify the integrity of the files in the Windows\\System folder (among others) and replace corrupted system files. To open the System File Checker, select it from the Tools menu in the System Information window. To begin, make sure the radio button in front of \"Scan for altered files\" is checked and then click the Start button. If nothing's wrong, you'll see a dialog box that says the System File Checker has finished. Click the Details button if you'd like to see how many files the Checker scanned and any changes it noted; otherwise, click OK. If you'd like System File Checker to notify you if any system files have been changed or deleted, click the Settings button in the main window and then in the Settings tab, check the boxes in front of \"Check for changed files\" and \"Check for deleted files.\" The next time you run System File Checker, it will notify you of results in either category. ** DIAGNOSE DIRECTX PROBLEMS DirectX, the application program interface that enables your system for audio and 3D video, can often get a little gimpy over time. The tests in the DirectX Diagnostic Tool allow you to find out if everything's running smoothly. Select DirectX Diagnostic Tool from the Tools menu in the System Information window to open it. Click any of the tabs at the top, from DirectX Files to Display to Network, and check the Notes section at the bottom. This area will let you know if there are any problems found in this segment of DirectX. The Display, Sound, Music, and Network tabs allow you to run tests on different aspects of DirectX to ensure that each one is working properly. For example, click the Display tab and then click the Test Direct3D button to examine your system's 3D graphics handling ability. The Diagnostic Tool will render a spinning cube in both software and hardware and ask you if it displayed on your screen. If you run into any problems during your tests of DirectX (they'll be marked in the Notes section), click the More Help tab at the right. If the Restore button is visible, you can click it to have DirectX reinstalled. If this doesn't work, try solving your problem with the Windows DirectX Troubleshooter. Just click the Troubleshoot button. Still having problems? You can always download the latest version of DirectX from CNET Download.com. ** REPAIR, AUGMENT, OR ROLL BACK INTERNET EXPLORER The Internet Explorer Repair Tool can be used to add components to an existing installation of Explorer, repair Internet Explorer, or return to a previously installed version of IE. Select Internet Explorer Repair Tool from the Tools menu in the System Information window to open it. Check the radio button in front of \"Add a component\" and click OK to expand IE's features. The IE setup program will run, and you'll be able to select the component(s) that you'd like to add from a list. To fix current problems with IE, check the radio button in front of \"Repair Internet Explorer\" and click OK. The Tool will fix any problems it finds with Explorer and then require you to reboot your system. To return to a previous version of IE that you had installed on your system, check the box in front of \"Restore the previous Windows configuration.\" Click the Advanced button to see what versions you will be able to return to or click the OK button to automatically restore the previous version of Internet Explorer."}, {"response": 90, "author": "MarciaH", "date": "Thu, Aug 24, 2000 (20:18)", "body": "Get the Scoop on Web Services: We are constantly updating our site to make it a better place to find the right ISPs, Web Hosts, and Developers for your Web Services needs. Do you have suggestions for development? Are we missing features that would be helpful? If you have suggestions for our listings please send suggestions, comments and feedback our way at: http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0DMKz This Week: Safe surfing: How to protect your child online Kids are logging on to the Internet more than ever before, playing games, chatting with friends, and getting help with schoolwork. But the Web can be a perilous place, and no one is more at risk than children are. From being stalked in chat rooms to stumbling across porn and hate sites, your kids may run into someone or something that's more than you bargained for. http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0C5rF News of the Week in Web Services: Excite@Home, the nation's largest high-speed Internet service, said Wednesday that it has topped 2 million subscribers, a number that is closing fast on the largest dial-up ISPs. http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0EA6T Seeking to respond to a growing market segment, Sprint PCS has unveiled new products and services for business customers that include faster connectivity and the ability to link with a corporate intranet. http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0EA7U Want faster Net access at a cheaper price? Some new kids on the telecommunications block are taking on the Baby Bells by offering businesses Net connections that are both faster and cheaper than services from old-line telecom providers. http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0EA8V A significant \"digital divide\" still separates America's technological haves and have-nots, but the have-nots are catching up fast, according to a new survey. http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0EBAf Web Services Tip of the Week: 10 Questions on E-Commerce Interested in buying or selling online? Get answers to ten key e-commerce questions. http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0EBBg *************************************** advertisement ****** The Complete Internet. Entirely Wireless. OmniSky introduces the infinite possibilities of wireless web access. Send email, shop online, view robust content- it's the entire Internet for your Palm V. OmniSky-Think it. Do It. http://ph-ad19.focalink.com/SmartBanner/page?85.383 ************************************************************ Writing On the Wall, Latest User Reviews See who is receiving all the ratings in the Web Service's categories this week. 1. Internet Access Big Planet in Dialup Access Average User Rating Value - 5 Quality - 5 Features - 5 For More Information: http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0CHnU 2. Web Hosting HiSpeed in Dedicated Servers Average User Rating Value - 4 Quality - 3 Features - 3 For More Information: http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0DqUl 3. Web Developers BestAuthor Web Site Design Studio in Web Developers Average User Rating Value - 5 Quality - 5 Features - 5 For More Information: http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0C8sJ *************************************** advertisement ****** mySimon.com - Compare Products and Prices on Lots of Stuff mySimon compares products and prices on a vast number of things you may be interested in buying online, including books, music CD\ufffds, VHS and DVD movies, appliances, toys, health and beauty items, jewelry, clothing, gifts and MORE! http://1.digital.cnet.com/cgi-bin1/flo?y=evg0BxpGy0t0CTI4"}, {"response": 91, "author": "MarciaH", "date": "Thu, Aug 24, 2000 (20:51)", "body": "CorelDraw Tips Newsletter A newsletter from CNET Help.com http://www.help.com/ August 24, 2000 *************************************************************** Today's CorelDraw Tip: Try the Page Curl Effect The Page Curl effect gives the impression that a corner of an image has rolled in upon itself. You can select which corner of the image, the orientation and size of the curl, and its transparency level. You can also select colors for the curl and for the background that becomes visible when the image curls away. To apply the Page Curl effect, first select the image, then choose 3D Effects/Page Curl from the Bitmaps menu. Select a Page Corner button, then customize your curl by selecting Vertical (to begin the curl at the top or bottom edge of the image) or Horizontal (to begin the curl at the left or right edge of the image). Move the Width and Height sliders to set the curl size--higher values result in a larger, wider curl; lower values result in a smaller, tighter curl. Adjust the color from the Color drop-down color picker menu. If you've got CorelDraw tips of your own that you'd like to share, submit them here. Get more CorelDraw how-tos and tips here. Get answers to your CorelDraw questions here. Looking for more help with CorelDraw? Try our CorelDraw Help Directory, a complete listing of books, tutorials, online courses, and more. *************************ADVERTISEMENT********************** Today IT service providers will bid against each other online to solve your problems. Today you will find solutions you never knew existed. Today ePeople opens the doors to an incredible new online marketplace. www.ePeople.com *************************************************************** ALSO IN CNET Quicken 2001 Deluxe Beta v. Money 2001 Deluxe Microsoft and Intuit are just about ready to release the latest versions of their veteran money management apps. You may be surprised to find out which app you should use. Curious? Get the full scoop in CNET Software's reviews."}, {"response": 92, "author": "MarciaH", "date": "Fri, Aug 25, 2000 (18:27)", "body": "Paint Shop Pro Tips Newsletter A newsletter from CNET Help.com http://www.help.com/ August 25, 2000 *************************************************************** Today's Paint Shop Pro Tip: Paste to Size When you have a large image to paste into part of another image, you can reduce the size of the portion you're pasting as you do it. Select the area in the target image into which you want to paste the clipboard contents and paste them by selecting, Edit/Paste/Into Selection. You can also paste into an irregularly shaped selection if you choose it using the Freehand tool first."}, {"response": 93, "author": "MarciaH", "date": "Tue, Aug 29, 2000 (00:03)", "body": "Today's Windows 98 Tip: Can the Animation If you're bothered by Windows 98's animation, which you see when selecting menus, moving files or folders around, or selecting items from drop-down list boxes, you can turn it off. Right-click the desktop, select Properties from the pop-up menu, and click the Effects tab. Under Visual Effects, click to remove the check marks next to Use Menu Animations and Show Window Contents While Dragging. (While you're there, select Smooth Edges of Screen Fonts; this process, called antialiasing, makes small text easier to read.) Then click OK. If you've got Windows 98 tips of your own that you'd like to share, submit them here. Get more Windows 98 how-tos and tips here. Get answers to your Windows 98 questions here. Looking for more help with Windows 98? Try our Windows 98 Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 94, "author": "MarciaH", "date": "Tue, Aug 29, 2000 (00:04)", "body": "Today's Scanners Tip: Handheld Headaches A handheld scanner may seem like the ultimate mobile tool for business travelers: it can scan quick bytes of information as needed, and it fits in a bag. But the reality is often a bit messier. In addition to being monochrome only, handheld scanners can scan a mere few lines at a time. Though high-end models have special software functions for straightening and stitching together scanned blocks, fixing scanned documents line by line is still a hassle. What's more, a handheld scanner worth owning will cost you at least $500. Unless mobility is a must, it's better to buy a nonportable scanner and wait until you get home. If you've got Scanners tips of your own that you'd like to share, submit them here. Get more Scanners how-tos and tips here. Get answers to your Scanners questions here. Looking for more help with Scanners? Try our Scanners Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 95, "author": "MarciaH", "date": "Tue, Aug 29, 2000 (00:06)", "body": "Today's Norton AntiVirus Tip: Did System Colors Change After Installing Norton AntiVirus 2000? (Norton AntiVirus 2000) Check the Windows Display properties to see if system display settings or color schemes have changed. 1. Right-click the Windows desktop, then click Properties. 2. Check the settings on the Background, Appearance and Settings tabs to make sure your colors and settings are set up properly. This tip was submitted by Symantec. If you've got Norton AntiVirus tips of your own that you'd like to share, submit them here. Get more Norton AntiVirus how-tos and tips here. Get answers to your Norton AntiVirus questions here. Looking for more help with Norton AntiVirus? Try our Norton AntiVirus Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 96, "author": "MarciaH", "date": "Tue, Aug 29, 2000 (00:09)", "body": "WinFiles.com WinFile Update (1) Will Windows Me pricing confuse consumers? Windows 95 users will have to pay $30 more than their Windows 98 counterparts to upgrade to Microsoft's new consumer operating system, in a promotional strategy that could end up confusing customers instead of simply rewarding them. Microsoft announced earlier this month that it will sell its new operating system for home PC users for $59 through January. This promotional pricing represents a new strategy for the software maker, which typically sells upgrades to its operating systems for $89. In a break with its own tradition, Microsoft has confirmed, it will sell the upgrade under the name Windows Me Promotional Step-Up for $59 to people who have Windows 98 or Windows 98 Second Edition. Windows 95 users will have to pay the full $89 for their upgrade to Windows Me, or Millennium Edition. After January, everyone will pay the full price. But the company's decision to sell the promotional upgrade under a separate name could cause confusion among consumers over possible differences--if any--between the $59 and $89 upgrades, according to Paul Thurrott, editor of the WinInfo newsletter, which tracks Microsoft software news. \"When a customer walks into a store, they will see three different boxes for Windows Me,\" Wooster said. Microsoft insists that the versions of the upgrades are exactly the same, except for a \"compliance checking mechanism\" in the promotional OS that locks out Windows 95 users. Microsoft spokeswoman Laura Wooster confirmed that the Step-Up edition will work only with Windows 98 and Windows 98 SE systems. \"It's a way to thank our customers who have upgraded to Windows 98,\" Wooster said, noting that the upgrade from Windows 95 to Windows Me is more complicated than the upgrade from one of the Windows 98 products. The number of people who will miss out on the promotion is unknown, but it may not be too many. http://update.winfiles.com/cgi-bin2/flo?y=e2h0BBFIH0Bo0DPLa (2) Tech giants slam Napster injunction A broad coalition of technology and Internet companies are filing legal briefs Friday that are bitterly critical of last month's court decision against Napster, saying it could threaten the future of much of the technology industry. The parties involved, including the Consumer Electronics Association (CEA), the Digital Media Association (DiMA) and NetCoalition, are careful to say that they are not explicitly supporting either side in the high-stakes lawsuit. But each group's separate arguments go a long way to support Napster in its battle against the Recording Industry Association of America. The CEA includes giants such as Sony Electronics, Apple Computer, Cisco Systems and hundreds of others across the industry. DiMA is composed of many of the leading online music companies, such as Listen.com and EMusic. NetCoalition is a Washington, D.C.-based lobbying group that includes Yahoo, America Online, Amazon.com and Excite@Home, among others. Several of the trade associations contend that federal Judge Marilyn Hall Patel misapplied copyright law that protects technologies with \"substantial non-infringing uses.\" If her decision is used as precedent for other cases, it could threaten development across the consumer technology sector, they say. Patel's decision late last month sided with the record industry and said it is likely Napster was at least partly liable for massive copyright infringement on the part of its members. She ordered that the music-swapping site prevent copyrighted material from being traded via its technology. http://update.winfiles.com/cgi-bin2/flo?y=e2h0BBFIH0Bo0DQ6F (3) AOL previews shortcut to sign-in online America Online is quietly testing a new software feature that allows its customers to use their AOL screen names and passwords as sign- ins for other affiliated Web services. Dubbed \"Screen Name,\" the feature provides a shortcut for Net surfers who register for online services by, for example, storing personal information commonly requested by Web sites, such as names, ZIP codes and email addresses. The feature lets AOL members enter their screen names and passwords to complete the registration process, according to an AOL preview site describing the service. An AOL representative declined comment on Screen Name and said the company plans to take down the preview site. A source close to AOL said the company is testing the service but has no definite time frame for launch. The source added that AOL will eventually increase features to make it easier to purchase products online and is negotiating partnerships with third- party online merchants. Most Web sites require customers to fill out registration forms indicating name, age and other personal information to qualify for premium services. The arrangement lets sites gather demographic information from consumers to better target advertisements or pitch products relevant to their interests. In return, the companies offer people more control over what"}, {"response": 97, "author": "MarciaH", "date": "Wed, Aug 30, 2000 (20:06)", "body": "Windows 95 Tips Newsletter A newsletter from CNET Help.com http://www.help.com/ August 29, 2000 *************************************************************** Today's Windows 95 Tip: Easy Icons You can easily create your own icons in Windows 95. Simply select a BMP file that you find suitable, and change the extension from .bmp to .ico. That's all there is to it. This tip was submitted by Johannes Hansen. If you've got Windows 95 tips of your own that you'd like to share, submit them here. Get more Windows 95 how-tos and tips here. Get answers to your Windows 95 questions here. Looking for more help with Windows 95? Try our Windows 95 Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 98, "author": "MarciaH", "date": "Wed, Aug 30, 2000 (20:13)", "body": "http://www.help.com/cat/1/21/602/hc/?tag=dd.hp.cdrcdrw-text-5775.txt.hc Today's CD-R/CD-RW Drives Tip: Burn MP3s as Data (CD-R/CD-RW) If your hard drive is getting too full for all your MP3s and you want to back them up without having to convert them, be sure to choose data CD, not audio CD, as the style of burning. Remember, you're creating a CD of MP3s to play on your computer, rather than an audio CD."}, {"response": 99, "author": "MarciaH", "date": "Wed, Aug 30, 2000 (23:03)", "body": "Printers Tips Newsletter A newsletter from CNET Help.com http://www.help.com/ August 30, 2000 *************************************************************** Today's Printers Tip: Little Printer, Big Footprint Carefully inspect an ink jet's dimensions and design before you buy. Most of the smaller ones use L-shaped paper paths, where the paper is loaded vertically and ejected horizontally. Such designs demand as much as half a foot of airspace above the printer, and up to a foot of space in front--not very feasible if you want to put the printer on a shelf, or you have a cluttered desk. Some larger printers actually use less space, depending on the input and output designs."}, {"response": 100, "author": "MarciaH", "date": "Wed, Aug 30, 2000 (23:04)", "body": "CNET | CatchUp.com Dispatch What's New And What's Hot August 30, 2000 Vol. 1, No. 8 Another day, another update...CatchUp constantly strives to provide you with all the latest updates, upgrade, fixes, and patches. Our goal is to find you a new update every time you use our suite of CatchUp services. If you haven't had time to come back to the site, try it out now and see what's new. Enjoy! Nate Saal (nates@cnet.com) Director, CNET CatchUp Click here to run CatchUp: http://2.digital.cnet.com/cgi-bin2/flo?y=e270BBFIG0Eq0CIuO"}, {"response": 101, "author": "MarciaH", "date": "Wed, Aug 30, 2000 (23:05)", "body": "1. PC File of the Week MYEXPLORERBAR In a perfect world, Windows Explorer would be able to learn your file management routine and make interface changes on- the- fly to better accommodate your needs. In reality, however, your best bet for a better Windows Explorer is to download an interface enhancement such as MyExplorerBar. This useful download integrates nicely with Windows Explorer, adding a nested toolbar with file selection filters and shortcuts to programs and folders. The program makes it very easy for you to add or customize existing functions, and it can turn mundane chores into simple procedures. Other MyExplorerBar features include the ability to track your most often accessed folders and launch your favorite Web sites. FACT FILE: Version: 1.02 Size: 760K Developed by: Pitrinec Software License: Shareware ($7) Requirements: Windows 95/98/NT/2000, Internet Explorer 4.0 Save time on your file management tasks: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHJP ______________________________________________________ 2. Recent Additions to the Shareware.com PC Library ACTVSURF Version: 1.0 Size: 430K Developed by: Neil Rosenbaum License: Shareware ($10) Requirements: Windows 95/98 Teach your PC to surf the Web unattended: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHKQ ICON3D Version: 2.10b Size: 1,400K Developed by: Pentad Resources License: Shareware ($15) Requirements: Windows 95/98/NT/2000 Launch your favorite programs from a 3D desktop shape: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHLR MAIL PREVIEW Version: 1.80 Size: 850K Developed by: Top Software License: Shareware ($15) Requirements: Windows 95/98/NT/2000 View email messages before downloading them to your PC: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHMS MORPHMAN 2000 Version: 1.0 Size: 3,140K Developed by: Stoik Software License: Shareware ($49) Requirements: Windows 95/98/NT/2000, Microsoft DirectX drivers Seamlessly transform one image into another: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHNT SMART WINDOWS Version: 1.0 Size: 340K Developed by: Skylex Software License: Shareware ($15) Requirements: Windows 95/98 Control multiple open windows with greater precision: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHOU ______________________________________________________ 3. Mac File of the Week PLUNK! This simple-to-play, highly addictive game is a great stress reliever for anyone looking for a mindless desktop distraction. The object of Plunk! is to remove as many tiles from the board as possible, as long as you remove two or more at time. Sure, it sounds simple in theory, but once you try it, you'll immediately get hooked on its simplicity. Plunk! even has different themes, including offbeat interfaces that resemble everything from slot machines to hamburgers. FACT FILE: Version: 1.0 Size: 3M Developed by: Black Magick Software License: Shareware ($19.95) Requirements: Should work on any color Mac Things that go Plunk! on your Mac: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHPV ______________________________________________________ 4. Recent Additions to the Shareware.com Mac Library MAIL FORWARD Version: 1.1 Size: 571.6K Developed by: System Support Products License: Shareware ($12) Requirements: PowerPC processor, System 7.6.1 Forward your mail with this email utility: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHQW QUOEDIT Version: 0.7 Size: 941K Developed by: Lyomei Sakai License: Freeware Requirements: System 7.0 Jot it down or code software with this basic text editor: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHRX THE ERASER PRO Version: 2.7.0 Size: 380K Developed by: Yellowsoft License: Shareware ($10) Requirements: System 8.0 Securely erase your sensitive files: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHSY TYPE SAVER Version: 1.0 Size: 361K Developed by: John V. Holder License: Shareware ($10) Requirements: 68020 processor, System 7.0 Record your keystrokes with this simple utility: http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0EHTZ **************************************** advertisement ************ Whether you want the newest speed demon system to hit the market or an economic second to add to the home network, CNET Shopper can help you find the right deal. Stop by today and shop from over a hundred different online stores at once. http://1.digital.cnet.com/cgi-bin1/flo?y=ewL0BxpGx0p0CEEF *******************************************************************"}, {"response": 102, "author": "MarciaH", "date": "Thu, Aug 31, 2000 (00:37)", "body": "Tweak Freak Dispatch A newsletter from CNET Help.com http://www.help.com/ August 30, 2000 This Week on Tweak Freak: Hack Into Your Start Menu ----------------------------------------------- Tired of being a slave to your Start menu? We don't blame you. For some reason, Windows 98 is incredibly picky about the tweaks you can make to the Start menu. Sure, you can pick off items in your Documents menu one-by-one, and you can remove icons from the Programs menu. If you're looking for wholesale changes, however, you're out of luck. Nonetheless, we've got a collection of hacks that'll let you (to a small extent, mind you) shake off the Windows Start menu hammerlock. ** PUT YOUR CONTROL PANEL INTO THE START MENU Want to access the Control Panel quickly by integrating it into your Start menu? No problem--just follow these steps: 1. Right-click the Start button and select Explore from the pop-up menu. 2. Click the right pane of the Exploring window and select New/Folder from the File pull-down menu. 3. Enter \"Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}\" as the folders name (without the quotes). 4. Press the Enter key after naming the folder; it should appear simply as \"Control Panel.\" Now you can access your Control Panel settings from the Start menu shortcut. ** CHECK YOUR BROWSER HISTORY FROM THE START MENU If you liked adding your Control Panel to the Start menu, get a load of this. You can also access your Web page History in a flash from your Start menu. Here's how to do it: 1. Right-click the Start button and select Explore from the pop-up menu. 2. Click the right pane of the Exploring window and select New/Folder from the File pull-down menu. 3. Type \"Web History.{ff393560-C2A7-11CF-BFF4-444553540000}\" as the folder's name (again, without the quotes). 4. Press the Enter key and a folder called Web History should appear. You can then access your browsing history from the Start menu shortcut, categorized by date. ** EDIT THE DOCUMENTS MENU There's a danger in assuming you can completely delete your old documents. (Just ask Ollie North.) But to throw people off the tracks, it's nice to remove lines from the Start menu's Documents listing. The simplest way is to right-click a Documents item and select Delete. But to disable the feature so that no recent documents ever show up in the Start menu, you need to hack around the Registry like this: 1. Back up the Registry. (Click here to find out how.) 2. Launch RegEdit. (Select Start/Run, type in regedit, then hit Enter.) 3. Under HKEY_CURRENT_USER, select Software/Microsoft/Windows/CurrentVersion/Policies/Explorer. 4. In the right hand pane, double-click NoRecentDocsHistory. If there is no such value, create a new binary value with that name (select Edit/New/Binary Value). 5. Edit 00,00,00,00 to read 01,00,00,00. 6. Locate or create the NoRecentDocsMenu value. 7. Edit 00,00,00,00 to read 01,00,00,00 there, too. 8. Save your changes as you quit RegEdit and restart Windows. Warning: Tweaking the Registry is risky; you're taking your system into your own hands. To be safe, manually back up the Registry before you make any changes. If you mess with the Registry before backing it up and run into problems, don't say we didn't warn you! *************************************************** Looking for more speed tweaks? Click here to indulge your need for speed. ***************************************************"}, {"response": 103, "author": "MarciaH", "date": "Thu, Aug 31, 2000 (23:18)", "body": "This week's Browser tip: Stop Jerky Browsing (Internet Explorer 5) Smooth out long pages that scroll slowly or jerkily. To iron out your browsing, simply select Internet Options from the Tools menu. From the \"Advanced\" tab listed under Browsing options, select the box labeled \"Use Smooth Scrolling.\" Click OK to save changes. However, if you happen to encounter layout problems with Smooth Scrolling, you might want to uncheck this option. Get more Internet Explorer 5 how-tos and tips: http://2.digital.cnet.com/cgi-bin2/flo?y=e3N0BBFIE0Qo0DUBI Get Netscape Communicator how-tos and tips: http://2.digital.cnet.com/cgi-bin2/flo?y=e3N0BBFIE0Qo0B8Cm"}, {"response": 104, "author": "MarciaH", "date": "Thu, Aug 31, 2000 (23:19)", "body": "Get the Scoop on Web Services: We are constantly updating our site to make it a better place to find the right ISPs, Web Hosts, and Developers for your Web Services needs. Do you have suggestions for development? Are we missing features that would be helpful? If you have suggestions for our listings please send suggestions, comments and feedback our way at: http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0DMKh This Week: What do you think about Web Services offering listing services for the \"small to medium office\" and if so, what would those be? ATM, Frame Relay, T1, Managed Hosting and Fixed Wireless are just some of the options we're considering. Please send your comments to \"comments@webservices.cnet.com\" Thanks! News of the Week: In the wake of AltaVista's well-publicized failure to deliver its promised flat-fee Internet access in Britain, managing director Andy Mitchell is out. http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0EHi8 AT&T dials up free service for cable phone customers. The telecommunications giant reportedly plans to offer free local and long-distance service to those who subscribe to its cable telephony service. http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0EHjA IBM, Microsoft and Ariba plan to be the first to propose a Web standard and a new initiative next week that will serve as a giant online Yellow Pages for companies looking to conduct business online, sources said. http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0EHkB Web Services Tip of the Week: You may want to become a Web host, but you don't want to invest the money in hardware and a dedicated Internet connection. Look at the resell hosting plans offered here: http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0CMWs Writing On the Wall, Latest User Reviews See who is receiving all the ratings in the Web Service's categories this week. 1. Internet Access NorthPoint Communications in DSL Average User Rating Value - 4 Quality - 4 Features - 4 For More Information: http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0EHlC 2. Web Hosting Dialtone Internet in Dedicated Servers Average User Rating Value - 4 Quality - 4 Features - 4 For More Information: http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0Ddrj 3. Web Developers BizWebPro in Web Developers Average User Rating Value - 4 Quality - 5 Features - 5 For More Information: http://1.digital.cnet.com/cgi-bin1/flo?y=ewT0BxpGy0t0EHmD"}, {"response": 105, "author": "MarciaH", "date": "Thu, Aug 31, 2000 (23:19)", "body": "Today's CorelDraw Tip: Change the Resolution of a Special Fill CorelDraw's special fills are beautiful, but they are actually bitmap fills and are therefore resolution dependent. To change the resolution of a special fill to 72 dpi for the screen, for example, or 300 dpi for printing, open the Special Fill docker, click the Edit button, and click the Options button. You can also set the tile size in this dialog box."}, {"response": 106, "author": "MarciaH", "date": "Thu, Aug 31, 2000 (23:20)", "body": "Today's MP3 Tip: Read It and Weep File this one under inessential-yet-pretty-darn-cool MP3 tricks. Afficionados of books-on-tape will tell you all about how relaxing it is to listen to a novel while looking out the window of a train, rather than trying to read as the thing bounces around. And there are lots of reasons why it might be cool to turn text into an MP3, from putting the news on your player to making a spoken word track for your Shoutcast to radio show. TextAloud is a shareware program that can--you guessed it--turn any text file into an MP3 by using Microsoft's Text-to-Speech engine. There are a few reverb effects, like Hall or Space, and additional voices can be downloaded."}, {"response": 107, "author": "sprin5", "date": "Fri, Sep  1, 2000 (10:32)", "body": "Now there's a cool idea with a lot more applications, you could turn news and websites into mp3's. There's a lot of potential here."}, {"response": 108, "author": "MarciaH", "date": "Fri, Sep  1, 2000 (18:50)", "body": "Today's Paint Shop Pro Tip: Burn the Edges of Your Images Create a burned edge effect with Paint Shop Pro. To do this, create a new layer consisting of the background color you want to use. Cut and paste the image onto the background layer using the Paste/As New Layer command from the Edit menu. Use the Freehand tool located on the left toolbar and draw a jagged edge (including the area of the image you want to delete). Press the delete key when you've made your freehand selection so that the background color shows through. From the Image menu, select Effects/Drop Shadow. In the pop-up window that follows, set your Color to black and adjust your Opacity slider to 100 percent. Also, make sure your Blur slider is adjusted to a value of about ten and your Horizontal and Vertical offset values are a low positive number. Click the OK button to complete the effect."}, {"response": 109, "author": "MarciaH", "date": "Mon, Sep  4, 2000 (14:54)", "body": "Today's Windows 98 Tip: Access Taskbar Shortcuts With One Click If you want to quickly access an item but don't want to wade through your Start menu categories, make a super-shortcut from your taskbar. Simply right-click the taskbar located at the bottom of your screen. From the pop-up menu, select Toolbars/New Toolbar. From the New Toolbar dialog box, open the Start Menu folder from the Windows directory. You'll find that all items listed on your Start menu are in the Programs subdirectory of this folder. Choose the program or file you want to easily access and Press the OK button. A single-click shortcut should appear on your taskbar bar."}, {"response": 110, "author": "MarciaH", "date": "Mon, Sep  4, 2000 (21:14)", "body": "Today's Scanners Tip: Scan Straight Often your photo or document will slip and skew when you close the lid of a flatbed scanner. For this reason, keep a Post-it note handy. Use it like tape to hold the item flush against the edge of the scanning area. Unlike tape, it won't leave any adhesive behind to soil the surface of the glass."}, {"response": 111, "author": "MarciaH", "date": "Mon, Sep  4, 2000 (21:17)", "body": "*************************************************************** Today's QuickTime Tip: Reorganize, Delete, or Rename Your Favorites Don't like the order of your Favorites in the sliding tray? You can reorganize them by selecting Favorites/Organize Favorites. Just click and drag a channel to change its order in your Favorites tray. If you want to delete a Favorite, just select it and click Delete. To rename a Favorite, select it and click Rename."}, {"response": 112, "author": "MarciaH", "date": "Mon, Sep  4, 2000 (21:17)", "body": "Today's Norton AntiVirus Tip: Initiate a Higher Degree of Virus Protection If you want absolute maximum protection against viruses, start Norton AntiVirus, click Scan For Viruses, select Options in the main toolbar, and click Norton AntiVirus. Scroll through the options to set the level of protection that you feel is right for you. Under File Types To Scan, be sure to click \"All files\" and \"Scan within compressed files.\""}, {"response": 113, "author": "MarciaH", "date": "Tue, Sep  5, 2000 (19:07)", "body": "Is anbody reading these things I post? It would be a shame for me to continue to incur charges from Terry's servers and Yapp suppliers just to post things which are not being read... Speaking of which, there is a whole lot of really stupid stuff being posted in Drool, and if they do not support Spring commensurate with their usage, I am gonna be all over them like white on rice!!!"}, {"response": 114, "author": "MarciaH", "date": "Thu, Sep  7, 2000 (14:33)", "body": "Today's Printers Tip: Balance Your Colors (Photo Printers) Some ink jet photo printers won\ufffdt let you replace a single-color ink cartridge. If you run out of green, you also have to replace the blue and red. With these printers, it\ufffds important not to use too much of any one color in your printouts, especially if you\ufffdll be printing a long run of a single graphic. Too many blue skies or the same color text can quickly deplete your ink reserves. To save on ink costs, try to break up a solid color background or print several different colored versions of the same long run printout. computer conference Main Menu"}]}, {"num": 17, "subject": "Palm and all t", "response_count": 26, "posts": [{"response": 1, "author": "sprin5", "date": "Sun, Jul  2, 2000 (09:39)", "body": "My Qualcomm pDQ 1900 Palm Phone uses a rechargeable stand that also has a serial port for hotsynch. But the pinouts are totally different than a regular Palm. I have yet to find a program that will convert the contents of my phone directory in to a regular tab text file. It is a .pdble, anyone know of a utility that will convert that to regular text, I've tried text editing programs like textpad to no avail."}, {"response": 2, "author": "Fran", "date": "Sun, Jul  2, 2000 (13:41)", "body": "Testing"}, {"response": 3, "author": "MarciaH", "date": "Sun, Jul  2, 2000 (16:26)", "body": "Shall I continue the Palm tips where they are now or post them here?"}, {"response": 4, "author": "sprin5", "date": "Mon, Jul  3, 2000 (09:08)", "body": "Sure, both!"}, {"response": 5, "author": "MarciaH", "date": "Fri, Jul  7, 2000 (17:21)", "body": "Use Duplicate Email Accounts For Your Palm And PC If you use one of the direct-dial-to-Internet email programs, consider establishing a separate email account just for your PalmPilot. Otherwise, you may get into the nightmare of having duplicate messages on your PalmPilot and PC, and you may never be quite clear on which ones you've answered or where you read something. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 6, "author": "MarciaH", "date": "Fri, Jul  7, 2000 (17:25)", "body": "Scroll With Your Stylus While Web surfing with ProxiWeb, get into the habit of dragging your stylus up and down the screen. This method of scrolling is smoother and more controlled than whacking the plastic scroll buttons. This tip was submitted by Handango.com. Click here to download ProxiWeb http://download.cnet.com/downloads/0-10126-108-41607.html - Tip provided by CNET Help.com"}, {"response": 7, "author": "MarciaH", "date": "Mon, Jul 10, 2000 (13:20)", "body": "Stop The Auto-Shutdown If you don't want your PalmPilot to shut off automatically to save battery power, use one of the secret Dot Commands: Draw the ShortCut symbol (a lowercase cursive L), a period, and then the number three. Now the Palmtop will only turn off when you actually do it yourself. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 8, "author": "MarciaH", "date": "Tue, Jul 11, 2000 (14:47)", "body": "Trigger Menu Commands With The Command Stroke Menu commands can be easily triggered without tapping them. Learn to use the faster Graffiti menu shortcuts: Draw a slash (bottom to top) and write the initial of the command you want. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 9, "author": "MarciaH", "date": "Wed, Jul 12, 2000 (14:11)", "body": "Search Quickly With The File Command If text is highlighted at the moment you tap the Find icon, that text is automatically copied into the Find blank. This tip was submitted by Handango.com. - Tip provided by CNET Help.com Help.com | Answers for Tech Questions http://www.help.com?tag=ex.em.tip_palm.txt.hp Top Tech News from CNET's NEWS.COM Software company sues Oracle in patent dispute http://news.cnet.com/news/0-1003-200-2241023.html?tag=st.ne.1003.thed.ni"}, {"response": 10, "author": "MarciaH", "date": "Thu, Jul 13, 2000 (19:27)", "body": "View Photos With Your Palm Unbeknownst to almost everyone, the PalmPilot is not, technically speaking, a black-and-white computer. Its screen is actually capable of displaying four shades of gray. Programs like ImageViewer can, therefore, bring halfway decent photos on your palmtop. This tip was submitted by Handango.com. - Tip provided by CNET Help.com"}, {"response": 11, "author": "MarciaH", "date": "Fri, Jul 14, 2000 (13:19)", "body": "Fast Datebook Entry When entering a timed event, go to the right side of the Palm graffiti area and enter a time and the datebook will open to the \"set time\" page and highlight the time. Sometimes you may have to enter an \"A\" or a \"P\" if the event is AM or PM. If your Palm's internal clock is in the PM and the event is in the PM, you just have to enter the time. This tip was submitted by Palm Gear H.Q.. - Tip provided by CNET Help.com"}, {"response": 12, "author": "sprin5", "date": "Sun, Jul 16, 2000 (09:25)", "body": "I just got \"PortaMonkey\", it's a little Palm pet that you clean up after and feed and give electric shocks, etc."}, {"response": 13, "author": "MarciaH", "date": "Sun, Jul 16, 2000 (15:07)", "body": "Oh my.......over the edge for Terry."}, {"response": 14, "author": "sprin5", "date": "Mon, Jul 17, 2000 (19:38)", "body": "I had to have one fun thing on my Palm phone."}, {"response": 15, "author": "MarciaH", "date": "Mon, Jul 17, 2000 (20:49)", "body": "Paste Large Blocks Of Text Into Desktop Memos Try pasting (using Ctrl-V, not Paste, from the mouse's contextual menu) a big block of text into a new memo in Desktop 3.0 and it will split the text across multiple memos, thus getting around the 4K per memo limit. This tip was submitted by Palm Gear H.Q.. - Tip provided by CNET Help.com"}, {"response": 16, "author": "sprin5", "date": "Tue, Jul 18, 2000 (18:17)", "body": "Cool tip."}, {"response": 17, "author": "MarciaH", "date": "Tue, Jul 18, 2000 (20:00)", "body": "Email Distribution Lists In Address Book, set up a category called Email lists (this step is not actually necessary--just more neat). Create a new entry with the Last Name field called, for example, \"Email Friends.\" Enter (or copy in) your distribution list (a series of email addresses separated by a comma and then a space) in the Email field. Do the same for other distribution lists you want to create (e.g. \"Email Office,\" \"Email Clients,\" and so on) all prefixed with \"Email\" so they will be grouped together. Then, when you are creating a new message in Mail, just enter \"email\" (or part thereof) in the \"To\" field, do a Lookup, and all the distribution lists are there to choose from. This tip was submitted by Palm Gear H.Q.. - Tip provided by CNET Help.com"}, {"response": 18, "author": "MarciaH", "date": "Tue, Jul 18, 2000 (20:01)", "body": "Happy to hear they are useful"}, {"response": 19, "author": "sprin5", "date": "Wed, Jul 19, 2000 (13:10)", "body": "I'm using something called UnDupe from stevenscreek.com, it goes through and elminates all duplicate records on my Palm. It's really handy. There were 384 dupes just in my address book when I first ran it."}, {"response": 20, "author": "MarciaH", "date": "Wed, Jul 19, 2000 (15:49)", "body": "More Readable Launcher Tabs Do you use Launcher III, Launch 'Em, or any other Palm launching app? If so, you have probably noticed that the tab names tend to run together, making them unsightly and hard to read. The simple solution is to add a space before and after each tab name. This causes your tabs to take up a bit more space, so maybe you won't be able to squeeze as many on a screen, but they will be much more readable. This tip was submitted by Palm Gear H.Q.."}, {"response": 21, "author": "MarciaH", "date": "Mon, Aug 28, 2000 (18:29)", "body": "Palm Tips Newsletter A newsletter from CNET Help.com http://www.help.com/ August 28, 2000 *************************************************************** Today's Palm Tip: Scroll Quickly Through the Applications Screen You can scroll the Applications screen by writing the first letter of the program you want on the Graffiti writing area. This tip was submitted by Handango.com. If you've got Palm tips of your own that you'd like to share, submit them here. Get more Palm how-tos and tips here. Get answers to your Palm questions here. Looking for more help with Palm? Try our Palm Help Directory, a complete listing of books, tutorials, online courses, and more."}, {"response": 22, "author": "MarciaH", "date": "Mon, Sep  4, 2000 (14:53)", "body": "Palm Tips Newsletter A newsletter from CNET Help.com http://www.help.com/ September 4, 2000 *************************************************************** Today's Palm Tip: Delete Apps That Don't Properly Install If you tried to install an app that wouldn't fit and find that HotSync fails every time, you'll need to go to the X:\\PILOTDIR\\YOURUSER\\INSTALL directory and delete the offending application. (Where \"X\" is, type the drive you installed the PalmPilot software on; \"PILOTDIR\" is the directory you installed it in; and \"YOURUSER\" is the username that's attempting to install the application.) Applications will only be deleted from this directory after they have been installed successfully. Normally, PILOTDIR is \"Palm\" for OS3 and higher and \"PILOT\" for OS2 and lower. Also, the YOURUSER normally looks similar to your HotSync ID (go into the HotSync application on Palm; you'll see it listed there)."}, {"response": 23, "author": "MarciaH", "date": "Tue, Sep  5, 2000 (23:09)", "body": "CNET | DOWNLOAD DISPATCH (Handhelds Edition) September 5, 2000 Vol. 1, No. 6 Greetings from CNET Download.com! Now that Labor Day has come and gone, it's time to get down to business. Vacation season is over, the school year is starting up again, and many of us need to get back to work--to what end, you might ask? In order to finance your next holiday, of course! In this utilitarian vein, we've decided to highlight a pack of handy utilities from respected Palm software maker TealPoint. Check it out here: http://1.digital.cnet.com/cgi-bin1/flo?y=exK0BxpGz0Lq0EQX6 And for both Windows CE and Pocket PC users, it's time to organize all those summer pictures with this digital image management system for your handheld: http://1.digital.cnet.com/cgi-bin1/flo?y=exK0BxpGz0Lq0EQY7 Happy Downloading!"}, {"response": 24, "author": "terry", "date": "Mon, Jul  8, 2002 (10:49)", "body": "Friday July 5, 5:11 am Eastern Time Reuters Company News India rolls out cheap, handheld computer this month By Anshuman Daga BANGALORE, July 5 (Reuters) - India is ready this month to roll out its $200 \"Simputer\", a handheld computer aimed at wooing the poor across the digital divide. \"The waiting period is almost over. We are near the take-off stage,\" Vinay Deshpande, chairman of Encore Software Ltd (Bombay:ENCO.BO - News), one of two firms with licences to make the device, told Reuters late on Thursday. ADVERTISEMENT The Simputer -- short for simple, inexpensive and multilingual computer -- was launched in April 2001 by the non-profit Simputer Trust, formed by officials at Encore and professors from Bangalore's prestigious Indian Institute of Science to license designs of the device. The Simputer, which has been delayed by funding problems and marketing concerns, aims to help India's poor and rural folk who cannot read or write, but high-end users and overseas buyers have also been wowed by its features. Resembling trendy handhelds such as those built by Palm Inc (NasdaqNM:PALM - News), the Simputer has easy-to-use applications including voicemail, text-to-speech capabilities and Internet access. Powered by an Intel (NasdaqNM:INTC - News) StrongARM processor, the Simputer runs off two 'AA'-size pencil batteries and comes equipped with 32 megabytes (MB) or 64 MB of random-access memory. \"In our trials, we found that 'one size fits all' doesn't work because it also means one price and one particular configuration,\" said Deshpande, an engineer educated at Stanford University in the U.S., who is a pivotal figure in the trust. \"We are now making a range of Simputers with different configurations and prices ranging from 10,500 to 23,000 rupees,\" he said. Equivalent to roughly $214 to $469, this figure compares to average annual Indian per capita income of about $450. Trial orders have come from state governments, consumer goods companies and co-operative banks, all of whom are pushing into rural areas, where two-thirds of India's population of one billion live. ADDRESSES CRITICS The Simputer, which answers critics who say India's software revolution has bypassed its poor, is expected to help spread their use in a country whose installed base of computers is barely six million. India's desktop personal computer sales fell 11 percent to 1.67 million in the year to March. PCs are relatively costly in India. At about $200, the Simputer would be three times cheaper than a PC, and cost nearly the same as a cheap colour television set. \"We are in the process of making about 200 Simputers this month and about 1,300 to 1,400 by September based on potential and existing orders,\" Deshpande said. Using free-to-use Linux software, the device allows personal data to be stored through a smart card, so enabling many users to share it. Sales of the Simputer are likely to rise to 50,000 by late 2003, Deshpande said. \"The profit is not in delivering hardware but solutions (for end use),\" Deshpande said. \"We are tying up with software developers who'll make applications and we'll deliver that box with the solutions.\" Trial sales have already been made to a number of countries including Sweden, Australia, France, United States, he said. Encore plans to cater to overseas sales of the Simputer through a separate company based in Singapore. It expects to conclude a tie-up within a month with a few large Indian information technology companies, who will in turn sell the Simputer to the lucrative mass retail market. \"We are too small to take the Simputer to the retail level ourselves,\" Deshpande said. \"These firms will buy the Simputer in bulk from us and distribute and support the product.\""}, {"response": 25, "author": "terry", "date": "Mon, Jul  8, 2002 (10:52)", "body": "The Simputer for India"}, {"response": 26, "author": "terry", "date": "Mon, Jul  8, 2002 (11:02)", "body": "DHVANI: The Simputer Text-to-Speech Software DHVANI is the Text-to-Speech effort of the Simputer Trust. The aim of this effort is to ensure that literacy and knowledge of English are not essential for using the Simputer. Using images in conjunction with voice output in local languages makes the Simputer accessible to a larger fraction of the Indian population. Currently, Dhvani has a Phonetics-to-Speech engine which is capable of generating intelligible speech from a suitable phonetic description in any Indian Language . In addition, it is capable of converting UTF-8 text in Hindi or Kannada to this phonetic description, and then speaking it out using the Phonetics-to-Speech engine. Technical Description Problems, Future Work, and How you can Help Download (source and binaries for Linux) People involved: Ramesh Hariharan, Coordinator (ramesh@csa.iisc.ernet.in) Ravi Masalthi (masalthi@green.csa.iisc.ernet.in) Rileen Sinha (rileen@green.csa.iisc.ernet.in) For further information, contact Ramesh Hariharan (ramesh@csa.iisc.ernet.in) http://www.simputer.org/simputer/downloads/software/dhvani/ computer conference Main Menu"}]}, {"num": 18, "subject": "Digital Photography", "response_count": 7, "posts": [{"response": 1, "author": "MarciaH", "date": "Fri, Aug 25, 2000 (13:10)", "body": "With my bargain-basement quality Kodak Digital camera I took off for California and took 164 images without a single reload. I used a 64 MB flashcard and have been thoroughly spoiled by the ease of operation and download. CNET | Digital Photography Center Everything related to photography without film photo.cnet.com August 25, 2000 Vol. 1, No. 3 Convergence is a popular word lately in the digital photo world. Even though digital cameras are still just beginning to catch on, new ways to take, send, and print pictures are cropping up all the time. First came the announcement that Olympus and Panasonic were working on a digital camera that would print pictures instantly. We've also recently reviewed an MP3 player that has a digital camera attachment, allowing you to listen to tunes and take pictures with one device. Olympus C-211 Zoom Announced http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DPoO Shriek 64 GBS-2000 MP3 Player with Camera Attachment http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DHBV Erica Smith Executive Editor CNET Consumer Electronics digitalphoto@cnet.com IN THIS ISSUE: 1. Shriek 64 GBS-2000 with Camera Attachment 2. Canon PowerShot S100 Digital Camera 3. Ofoto 4. HP PhotoSmart C500 Digital Camera 5. Expand Your Camera's Memory: Blast from the Past 6. Most Popular Products: Camcorders 7. Photo Question of the Week *************************************** advertisement ********** Get 50 FREE prints from Ofoto. Ofoto is the easiest way to get high quality prints of your digital images on Kodak Professional paper. Our state-of-the-art photolab and advanced digital processing make all your photos look great! Try Ofoto today! Click here: http://www.ofoto.com/email93.cfm **************************************************************** 1. Shriek 64 GBS-2000 with Camera Attachment This 64MB MP3 player is solid enough in its own right, but when used in conjunction with the optional clip-on digital camera, it really turns heads. http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DHBV __________________________________________________________________ 2. Canon PowerShot S100 Digital Camera Canon's miniature Elph line of cameras makes the move to digital with the PowerShot S100, the smallest megapixel camera we've ever tested. It's small enough to slip easily into a shirt pocket, but what kind of image quality can you expect from a camera this small? Click below to find out: http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DPpP __________________________________________________________________ 3. Ofoto If you enjoy posting your pics on the Web to share with friends, you should take a look at Ofoto. This online photo album even comes with free upload software. Get the full scoop in our review. http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DPqQ __________________________________________________________________ 4. HP PhotoSmart C500 Digital Camera We take a look at a camera with some good ideas and some weighty issues to match. But is it the right camera for you? We put HP's IR-sharing digital camera to the test to find out. http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DPrR __________________________________________________________________ 5. Expand Your Camera's Memory: Blast from the Past If you own a digital camera and haven't taken a look at this feature story yet, you won't want to miss it. Don't miss another shot because that little memory card that came with your digital camera is full--add an extra card to your camera kit to fit all the shots. We'll show you the three types of memory cards you're likely to find in digicams as well as some other storage options, such as IBM's Microdrive. Check out the details here: http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DPsS __________________________________________________________________ 6. Most Popular Products What makes a product popular? You do! Products rise to the top of our Most Popular list only when our users show an interest in them. This week, we profile the five most sought-after camcorders: Most Popular Digital Cameras 1. Nikon Coolpix 990 http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0Cwlx 2. Olympus C-3030 Zoom http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0Cwmy 3. Olympus D-460 Zoom http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DPtT 4. Kodak DC280 Zoom http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0Cwnz 5. Sony Cyber Shot DSC-S70 http://2.digital.cnet.com/cgi-bin2/flo?y=e2S0BBFII0KK0DHHb ___________________________________________________________________"}, {"response": 2, "author": "sociolingo", "date": "Tue, Aug 29, 2000 (04:53)", "body": "So where's the pix Marcia??? Working out how to download stills from my Sony Digicam to Sony Vaio computer. We have the technology - just gotta work out how to use it!!! Hadrian's Wall will appear somewhere on Spring once I figure it out!"}, {"response": 3, "author": "MarciaH", "date": "Fri, Sep  1, 2000 (20:07)", "body": "Mine is easy - I just have to DO it. You rich people with the Sony's make me ill - and very jealous! Mine is a modest Kodak and does a fantastic job on macro but strictly ordinary on standard and zoom lenses."}, {"response": 4, "author": "sociolingo", "date": "Sat, Sep  2, 2000 (03:58)", "body": "I haven't quite figured out how to get the stills off my video camera onto the computer. I need to set up the i-link. Since when have I been rich???? The video camera is sponsored for my work....I don't possess a digital camera, can't afford one.... My digital photography is taking pix with my compact camera (OK, It is a Pentax, but I WORKED to get the money for that!)and scanning it in. I use Microsoft Photo Editor to work on my pictures. I find that much better than IXLA which I used to use."}, {"response": 5, "author": "sprin5", "date": "Sat, Sep  2, 2000 (19:23)", "body": "I don't know if this will help, but I just discovered this fine, fine site using a websearch: http://www.well.com/user/richardl/theSilverList.html"}, {"response": 6, "author": "MarciaH", "date": "Sat, Sep  2, 2000 (22:33)", "body": "There is just about everything you ever needed to know about computer applications at that url. Thanks for adding it to this topic! It probably should be added to apps, as well!"}, {"response": 7, "author": "MarciaH", "date": "Sat, Sep  2, 2000 (22:35)", "body": "Maggie - that works probably better than digital for some applications. You can scan in grey scale for compressed information. If I ever get mine out of the box I will do the same. computer conference Main Menu"}]}, {"num": 19, "subject": "DVD Players", "response_count": 5, "posts": [{"response": 1, "author": "terry", "date": "Mon, Aug  6, 2001 (12:00)", "body": "Linked to this conference from computer and music conferences."}, {"response": 2, "author": "wolf", "date": "Sun, Nov  4, 2001 (20:40)", "body": "we picked up a samsung DVD/VHS player. it's pretty neat!"}, {"response": 3, "author": "terry", "date": "Sun, Nov  4, 2001 (21:03)", "body": "Cool. A two in one unit!"}, {"response": 4, "author": "wolf", "date": "Mon, Nov  5, 2001 (20:28)", "body": "i know! that's what we liked about it. of course, there are a lot of those out there but this one had the best price for us (under $250)."}, {"response": 5, "author": "autumn", "date": "Tue, Nov  6, 2001 (14:22)", "body": "Wow, that's just slightly more than I paid for our VHS VCR a few years ago. computer conference Main Menu"}]}, {"num": 2, "subject": "Think you're computer-illiterate?", "response_count": 126, "posts": [{"response": 1, "author": "Donna", "date": "Sat, Dec 28, 1996 (12:07)", "body": "Compaq is considering changing the command :\"Press Any Key\" to \"Press Return Key\" because of the flood of calls asking where the \"Any\" key is. AST technical support had a caller caomplaining that her mouse was hard to control with the dust cover on. The cover turned out to be the plastic bag the mouse was packaged in. Another Compaq technician received a call from a man complaining that the system wouldn't read word processing files from his old diskettes. After trouble-shooting for magnets and heat failed to diagose the problem, it was found that the customer labeled the diskettes then rolled them into the typewritter to type the labels. This pharse was suppose to be under the topic header ,I'll add it here. Just a few cornball jokes thanks to a friend of a friend, Professor M.D.Elias Penn State University"}, {"response": 2, "author": "Donna", "date": "Sat, Dec 28, 1996 (12:12)", "body": "I do have about 10 more but as I am typing them. I know there is an easier way to do this it will take a while as I am one of these computer-illiterate,later Donna"}, {"response": 3, "author": "Kaffeine", "date": "Sat, Dec 28, 1996 (12:16)", "body": "Here's a few more (Some of which have now achieved the status of urban legend): Another Dell customer called to say he couldn't get his computer to fax anything. After 40 minutes of trouble-shooting, the technician discovered the man was trying to fax a piece of paper by holding it in front of the monitor screen and hitting the \"send\" key. Another Dell customer needed help setting up a new program, so a Dell tech suggested he go to the local Egghead. \"Yeah, I got me a couple of friends, \"the customer replied. When told Egghead was a software store, the man said, \"Oh, I thought you meant for me to find a couple of geeks.\" Yet another Dell customer called to complain that his keyboard no longer worked. He had cleaned it by filling up his tub with soap and water and soaking the keyboard for a day, then removing all the keys and washing them individually. Another customer called Compaq tech support to say her brand-new computer wouldn't work. She said she unpacked the unit, plugged it in, and sat there for 20 minutes waiting for something to happen. When asked what happened when she pressed the power switch, she asked \"What power switch?\" True story from a Novell NetWire SysOp: Caller: \"Hello, is this Tech Support?\" Tech: \"Yes, it is. How may I help you?\" Caller: \"The cup holder on my PC is broken and I am within my warranty period. How do I go about getting that fixed?\" Tech: \"I'm sorry, but did you say a cup holder?\" Caller: \"Yes, it's attached to the front of my computer.\" Tech: \"Please excuse me if I seem a bit stumped, It's because I am. Did you receive this as part of a promotional, at a trade show? How did you get this cup holder? Does it have any trademark on it?\" Caller: \"It came with my computer, I don't know anything about a promotional. It just has '4X' on it.\" At this point the Tech Rep had to mute the caller, because he couldn't stand it. The caller had been using the load drawer of the CD-ROM drive as a cup holder, and snapped it off the drive!"}, {"response": 4, "author": "Donna", "date": "Sat, Dec 28, 1996 (12:38)", "body": "Another AST customer was asked to send a copy of her defective diskettes . A few days later a letter arrived from the customer along with Xeroxed copies of the floppies. A Dell technician advised his customer to put his troubled floppy back in the drive and close the door. The customer asked the tech to hold on, and was heard putting the phone down, getting up and crosing the room to close the door to his room. A Dell technician received a call from a customer who was enraged because his computer had told him he was \"bad and an invalid\". The computer's \"bad comman\" and invalid\" response shouldn't be taken personally. An exasperated caller to Dell Computer Tech Support couldn't get her new Dell Computer to turn on. After ensuring the computer was plugged in,the computer technician asked her what happened when she pushed the power button. Her response, \"I pushed and pushed on this foot pedal and nothing happens.\"The \" foot pedal\" turned out to be the computer's mouse. That is all of them. Kaff posted the rest of them. Thanks Kaff."}, {"response": 5, "author": "Kaffeine", "date": "Sat, Dec 28, 1996 (13:11)", "body": "Just add one from personal experience: I used to be a tech support person for WordPerfect. I got a call from a woman who couldn't figure out why her paper kept getting caught in the printer. It turned out she was trying to put post-it notes through the printer!!"}, {"response": 6, "author": "Cheryl", "date": "Sat, Dec 28, 1996 (14:20)", "body": "Well, I am feeling much better about my limited computer skills! At least I can can bold and itialics!"}, {"response": 7, "author": "Adi", "date": "Sat, Dec 28, 1996 (16:16)", "body": "Kaffeine, the story about the cd-rom is so hilarious! whenever I think about it I start to laugh again... are you sure this is a true story?, I wonder how dumb people can be?..."}, {"response": 8, "author": "Ann", "date": "Sat, Dec 28, 1996 (18:19)", "body": "If you want to learn italics or bolds or several of the other HTML tags we use around here, check out my tutorial: http://www.spring.com/~anneh/tagsaaaa.html I tried to keep it simple."}, {"response": 9, "author": "terry", "date": "Sat, Dec 28, 1996 (18:22)", "body": "Great"}, {"response": 10, "author": "drymartini", "date": "Sat, Dec 28, 1996 (21:24)", "body": "A student called me, as she was working her way through her manual. She couldn't find the backsplash on her computer. Another asked whether the antistat spray she used on her monitor would kill viruses. Still another thought if she left the dustcover on moset of the time it would help keep viruses out. One was worried about the Leonardo theme that comes with the Win95 Plus! Pak. He thought the graphics were related to the Michelangelo virus he had heard about. I tried to tell him that was Leonardo, you know, Mona Lisa, Last Supper, inventions-- but he was not comforted. \"I didn't know there was a Leonardo virus,\" he said."}, {"response": 11, "author": "jwinsor", "date": "Sat, Dec 28, 1996 (22:45)", "body": "Here are some humorous lines collected from \".sig\" files. (These are the \"signature\" files that people often include at the end of their e-mail messages; they usually include contact information and often a quotation that the writer considers clever or profound.) Some of these I do not understand well enough to \"get\" but others are hysterically funny even to me. ;-) SUBJECT: Programmer's .sig files MESSAGE from =larry.reed@3do.com 10-JUL-96 0:48 From: \"Larry Reed\" [larry.reed@3do.com] Date: 9 Jul 1996 10:14:22 U Mail*Link( SMTP Programmer's .sig files More interesting thoughts applicable to introducing technology into schools. This is a collection of items from email signature files. -- Larry * Daddy, why doesn't this magnet pick up this floppy disk? * Pentiums melt in your PC, not in your hand. * Error, no keyboard - press F1 to continue. * Artificial Intelligence usually beats real stupidity. * Ever notice how fast Windows runs? Neither did I. * Double your drive space - delete Windows! * Who is General Failure and why is he reading my disk? * Multitasking: Screwing up several things at once... * Stack Error: Lost on a cluttered desk... * Stack Overflow: Too many pancakes... * Life would be much easier if I had the source code. * ASCII to ASCII, DOS to DOS. * How do I set my laser printer on stun? * 'Calm down -- it's only ones and zeros.' * Computer analyst to programmer: \"You start coding. I'll go find out what they want.\" * I just found the last bug. * The programmer's national anthem is 'AAAAAAAAHHHHHHHH'. -Weinberg, p.152 * If debugging is the process of removing bugs, then programming must be the process of putting them in. -Dykstra * \"#define QUESTION ((bb) || !(bb)) - Shakespeare.\" * \"Real programmers use: COPY CON PROGRAM.EXE\" * To iterate is human; to recurse, divine. * If at first you don't succeed, call it version 1.0 * God is REAL, unless explicitly declared INTEGER. * Asking if computers can think is like asking if submarines can swim. * From C:\\*.* to shining C:\\*.* * Programming is an art form that fights back. * \"Daddy, what does FORMATTING DRIVE C mean?\" * All wiyht. Rho sritched mg kegtops awound? * To define recursion, we must first define recursion. * Good programming is 99% sweat and 1% coffee. * C program run. C program crash. C programmer quit."}, {"response": 12, "author": "jwinsor", "date": "Sat, Dec 28, 1996 (23:03)", "body": "*** BASIC COMPUTER VIRUSES*** FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which do practically nothing, but all of which claim to be the most important part of the computer. GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time (plus or minus a 3.5 margin of error). PAUL REVERE VIRUS: This revolutionary virus doesn't horse around. It warns you of impending hard disk attack -- once if by LAN, twice if by C:. POLITICALLY CORRECT VIRUS: Never calls itself a \"virus,\" but instead refers to itself as an \"electronic microorganism.\" AT&T VIRUS: Every three minutes it tells you what great service you're getting. MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus. GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine. CONGRESSIONAL VIRUS: Computer locks up, screen splits vertically with a message appearing on each half blaming the other side for the problem. STAR TREK VIRUS: Invades your system in places where no virus has gone before. QUANTUM LEAP VIRUS: One day your PC is a laptop, the next day it is a Macintosh, then it's a Nintendo. Thanks to Mary Chaitt, University of California, Los Angeles ."}, {"response": 13, "author": "Carolineevans", "date": "Sat, Dec 28, 1996 (23:04)", "body": "You guys are priceless! Thankyou,thankyou, thankyou. I feel so much better now. p.s. Ann, the link is asclear as a crystal ball....."}, {"response": 14, "author": "Inko", "date": "Sat, Dec 28, 1996 (23:45)", "body": "I loved all your entries. Somewhere I have an even longer list of the viruses, but they're over a year old and can't find them right now. Ann, thanks for your HTML page - I've added it to my bookmarks and will study it at leisure when I ave more time."}, {"response": 15, "author": "Ann2", "date": "Sun, Dec 29, 1996 (12:12)", "body": "Re112:8 Why Ann, I thank you so much! Though I have been testing some of these tricks before, the easy way of big and small and blink and colour was great to learn! Excellently presented too.I advice everybody who is not familiar with this html writing to visit Anns school. (This is a test as well.)"}, {"response": 16, "author": "Ann2", "date": "Sun, Dec 29, 1996 (12:15)", "body": "Re112:8 Why Ann, I thank you so much! Though I have been testing some of these tricks before, the easy way of big and small and blink and colour was great to learn! Excellently presented too.I advice everybody who is not familiar with this html writing to visit Anns school. (This is a test as well.)"}, {"response": 17, "author": "Ann2", "date": "Sun, Dec 29, 1996 (12:20)", "body": "Sorry lost post and was adviced(?)to reload but that produced a Dacapo of my partly failure to html. No colour appeared. Bear with me for one more try, will you? Zalakadola,mechicabola Colour appear!"}, {"response": 18, "author": "Ann2", "date": "Sun, Dec 29, 1996 (12:21)", "body": "Nope, I'll have to return to school for further lessons..."}, {"response": 19, "author": "elder", "date": "Sun, Dec 29, 1996 (16:37)", "body": "Ann2, you have restored my faith -- it is all magic, is it not? (Let us know as soon as you remember the correct incantation!)"}, {"response": 20, "author": "churchh", "date": "Sun, Dec 29, 1996 (21:25)", "body": "Ann2, I think your problem is British spelling: [FONT SIZE=\"+1\" COLOR=\"#ff00c0\"]COLOR[/FONT]"}, {"response": 21, "author": "Ann", "date": "Sun, Dec 29, 1996 (23:29)", "body": "Henry, are the quotation marks on the font size necessary? Do they work if you use them. I've never put them on."}, {"response": 22, "author": "Ann2", "date": "Mon, Dec 30, 1996 (15:54)", "body": "If this will solve my problem I am so grateful HC. I can tell you that I had written color on my paper but thought it looked odd.And so altered it to that akward nonAusten spelling. I did not use big letters for font either.Do you think that matters? Correction! My husband(who is an English teacher)happened to come in and read over my shoulder and he explained that the word colour is differently spelled in UK and US.So it's really color that is nonAusten... I dare hardly try this time..."}, {"response": 23, "author": "Ann2", "date": "Mon, Dec 30, 1996 (16:05)", "body": "Oh Henry! I am indebted to you! The happiness which this reply produced was such as I have probably never felt before A sligth exaggeration but the feeling when the result comes out rigth is of a peculiar kind;)"}, {"response": 24, "author": "Ann2", "date": "Mon, Dec 30, 1996 (16:11)", "body": "Forgot to tell you Kathleen, some witchcraft *was* involved, as I kept my fingers crossed while I submitted the message! Will have to learn some other colors now..."}, {"response": 25, "author": "churchh", "date": "Mon, Dec 30, 1996 (17:02)", "body": "Ann -- according to the rules of proper SGML, quotes are required whenever a character ofther than a-z, A-Z, 0-9, \".\" (period), or \"-\" (hyphen) is used in an attribute value. So [FONT SIZE=-1] doesn't require quotes, but [FONT SIZE=\"+1\"] does (though many browsers will display it properly even if quotes aren't used)..."}, {"response": 26, "author": "Kaffeine", "date": "Mon, Dec 30, 1996 (19:03)", "body": "Ann - Here's a chart of the colors for you:"}, {"response": 27, "author": "churchh", "date": "Mon, Dec 30, 1996 (19:20)", "body": "Kaffeine -- Your chart shows a 6x6x6 color cube PLUS a grey ramp PLUS red, blue, and green ramps... Colors in the 6x6x6 color cube are OFTEN not displayed as dithered, but there's no iron-clad guarantee... Macintosh windows has the grey ramp in its default system palette, but Windows does NOT... Neither system has all the red, blue, and green ramp colors in the basic non-dithering 8-bit pallete..."}, {"response": 28, "author": "Ann", "date": "Mon, Dec 30, 1996 (20:13)", "body": "So Henry, is the chart good for our purposes. Should I put it in the tags tutorial???"}, {"response": 29, "author": "jwinsor", "date": "Tue, Dec 31, 1996 (01:24)", "body": "And Henry, is there a way to tell which of the colors on that chart are on everyone's palettes, and therefore safest to use? And what is a \"ramp\" and how does one tell one \"ramp\" from another. (Well, I think I can tell the grey one OK. )"}, {"response": 30, "author": "kendall", "date": "Tue, Dec 31, 1996 (07:03)", "body": "I believe if you keep your \"RGB\" numbers divisible by 3 you will be fairly safe."}, {"response": 31, "author": "churchh", "date": "Tue, Dec 31, 1996 (15:44)", "body": "Ann, the chart is fine to use as a list of sample colors and their corresponding Hexadecimal RGB codes, but it seems to be implied that these colors are all \"safe\" non-dithering colors, which is not actually the case... Katy, 6x6x6 cube colors have the value of each of the three components divisible by 51, which is \"33\" in hexadecimal. [[Insert audio of Tom Lehrer's \"New Math\" song here...]]"}, {"response": 32, "author": "Dina", "date": "Tue, Dec 31, 1996 (16:37)", "body": "Kaffeine were you in Orem? My brother was a sales rep, pre-1994 layoffs. True story told to me by my cousin Noel: He was teaching his new assistant how to use the computer at her desk (this was about 8 years ago). She listened and nodded. When he asked her if she had any questions she stated she thought it was amazing how close they could get the paper to the glass (referring to the typing going on at the monitor). He said nothing, turned and walked straight to personnel and had her replaced. Ann thanks for the tutorial! I will be spending some time there now. Dina"}, {"response": 33, "author": "jwinsor", "date": "Tue, Dec 31, 1996 (21:45)", "body": "6x6x6 cube colors have the value of each of the three components divisible by 51, which is \"33\" in hexadecimal. (((could someone say this in English? I don't speak math!)))"}, {"response": 34, "author": "Kaffeine", "date": "Tue, Dec 31, 1996 (23:51)", "body": "\"Kaffeine were you in Orem?\" No, I worked at one of the outsourcing companies - National TechTeam - until 12/31/94, when they downsized us from about 60 people to about 10 (the project is gone altogether since Corel). I just heard that NTT got a contract for tech support on a web browser - I'm wondering if its one of the big 2, or a smaller company."}, {"response": 35, "author": "kendall", "date": "Wed, Jan  1, 1997 (00:00)", "body": "\"6x6x6 cube colors have the value of each of the three components divisible by 51, which is \"33\" in hexadecimal.' thanks Henry - I knew there was an explanation for the '33' syndrom that I was only half remembering. Joan: \"RGB\" numbers are values between 0 and 256 (decimal) 0-FF (Hexadecimal) for the three colors used by computers - red, green, and blue. When you use the \"color=\" parameter in HTML, you give it a six character number (ie: 0000FF is no red, no green, full blue. 000000 is black {no color} FFFFFF is white {all colors at full value}). There are 256x256x256 possible combos here but your terminal will display fewer than that. Most of the values on the chart Henry sent are have 00, 33, 66, 99, CC, or F as the value. If you try using other numbers, you will find that your screen displays them sort of to the nearest '33'. IE: 00AB00m and 008A00 and 009900 will probably all appear as the same shade of green on your screen. goota go - the ball is falling!!! Happy new year!!!"}, {"response": 36, "author": "jwinsor", "date": "Wed, Jan  1, 1997 (06:04)", "body": "Thanks Katy, but this is still not English. Perhaps I can figure out increments of 3, but I still do not understand what HC meant about dividing anything with letters in it by 51."}, {"response": 37, "author": "churchh", "date": "Wed, Jan  1, 1997 (08:44)", "body": "Joan, \"hexadecimal\" is base 16, so 33 (16) is (3x16)+(3x1) = 48+3 =51 in decimal. I think you're dating yourself -- you came a little before the \"new math\", where they taught all about bases in elementary grades. My father owned all three of the Tom Lehrer albums when I was a child, so you'll allow me to indulge in a little nostalgia, and include the following song lyric, which explains it all very clearly http://www.local.com/~tnewsom/tom.lehrer/ New Math Some of you who have small children may have perhaps been put in the embarrassing position of being unable to do your child's arithmetic homework because of the current revolution in mathematics teaching known as the New Math. So as a public service here tonight I thought I would offer a brief lesson in the New Math. Tonight we're going to cover subtraction. This is the first room I've worked for a while that didn't have a blackboard so we will have to make due with more primitive visual aids, as they ay in the \"ad biz.\" Consider the following subtraction problem, which I will put up here: 342 - 173. Now remember how we used to do that. 3 from 2 is 9 carried to 1 and if you're under 35 or went to a private school you say 7 from 3 is 6, but if you're over 35 and went to a public school you say 8 from 4 is 6, carried to 1 so we have 169, but in the new approach, as you know, the important thing is to understand what you're doing rather than to get the right answer. Here's how they do it now. You can't take three from two, Two is less than three, So you look at the four in the tens place. Now that's really four tens, So you make it three tens, Regroup, and you change a ten to ten ones, And you add them to the two and get twelve, And you take away three, that's nine. Is that clear? Now instead of four in the tens place You've got three, 'Cause you added one, That is to say, ten, to the two, But you can't take seven from three, So you look in the hundreds place. From the three you then use one To make ten ones... (And you know why four plus minus one Plus ten is fourteen minus one? 'Cause addition is commutative, right?) And so you've got thirteen tens, And you take away seven, And that leaves five... Well, six actually. But the idea is the important thing. Now go back to the hundreds place, And you're left with two. And you take away one from two, And that leaves...? Everybody get one? Not bad for the first day! Hooray for new math, New-hoo-hoo-math, It won't do you a bit of good to review math. It's so simple, So very simple, That only a child can do it! Now actually, that is not the answer that I had in mind, because the book that I got this problem out of wants you to do it in base eight. But don't panic. Base eight is just like base ten really -- if you're missing two fingers. Shall we have a go at it? Hang on. You can't take three from two, Two is less than three, So you look at the four in the eights place. Now that's really four eights, So you make it three eights, Regroup, and you change an eight to eight ones, And you add them to the two, and you get one-two base eight, Which is ten base ten, And you take away three, that's seven. Now instead of four in the eights place You've got three, 'Cause you added one, That is to say, eight, to the two, But you can't take seven from three, So you look at the sixty-fours. \"Sixty-four? How did sixty-four get into it?\" I hear you cry. Well, sixty-four is eight squared, don't you see? (Well, you ask a silly question, and you get a silly answer.) From the three you then use one To make three eights. And you add those eights to the three, And you get one-three base eight, Or, in other words, In base ten you have eleven, And you take away seven, And seven from eleven is four. Now go back to the sixty-fours, And you're left with two, And you take away one from two, And that leaves...? Now, let's not always see the same hands. One, that's right! Whoever got that one can stay after class and clean the erasers. Hooray for new math, New-hoo-hoo-math, It won't do you a bit of good to review math. It's so simple, So very simple, That only a child can do it! http://www.local.com/~tnewsom/tom.lehrer/"}, {"response": 38, "author": "Inko", "date": "Wed, Jan  1, 1997 (13:55)", "body": "Joan, I'm with you - I don't speak math, or anything later than ordinary arithmetic! I loved the Tom Lehrer page, though, H.C. We have a collection of his records (old LPs) and last year finally found them on CD, so reaquainted myself with them. They're great fun.:-)"}, {"response": 39, "author": "Ann2", "date": "Wed, Jan  1, 1997 (14:25)", "body": "Grateful for Hex Triplet Color Chart kindly provided (must tell Kathleen Elder that the Swedish word witch is=h\ufffdxa(compare hex!). Also thanks to Katy for RGB-explanation (it spread some light into a confused mind). The color chart somehow reminded me of another Tom Lehrer text: There's a green one, and a blue one, a red one and a yellow one.... Little boxes and they're all made out of ticky tacky and they all look just the same ..."}, {"response": 40, "author": "kendall", "date": "Wed, Jan  1, 1997 (16:40)", "body": "\"Thanks Katy, but this is still not English.\" Sorry, Joan. I date myself by thinking thinking hexadecimal numbering is second nature to everyone at all involved with computers. The Hexadecimal system, base 16, uses the digits 0-9 plus the letters A, B, C, D, E, & F. \"A\" is 10, base 15, \"B\" is 11, \"C\" is 12, ....\"F\" is 15. It evolved as a short hand for the binary system which is easy to understand but impossible to read in long strings. Each character in hex represents four bits in binary. \"F\" is \"1111\", \"C\" is \"1100\", etc. The color values 'CC99AA' in hex would look like \"110011001001100110101010\" in binary. If you are still reading with me, you can see why we computer pe ple learned to love the shorter hex system to represent machine language. In the RGB codes, each of the three colors is has 2 characters. Hence \"3300CC\" means a value of 33 (base 16) for red (which is 51, base 10), 00 for green, and CC for blue, (204, base 10). In English, that is a fairly bright blue with a little red mixed in - a rather purplish blue (lilac - maybe?). Tha amaturish rule of '33' is that as long as you use values of '00', '33', '66', '99', 'CC', and 'FF' for each of the three color values, you will get fairly consistent results on most 256-color monitors. This actually limits you to 196 colors(6x6x6), but that is more than enough for most graphics. There - more about the color chart than you care to know. BUT IN ENGLISH!!!."}, {"response": 41, "author": "jwinsor", "date": "Wed, Jan  1, 1997 (17:28)", "body": "\"more about the color chart than you care to know. BUT IN ENGLISH!!!.\" Well, probably as close to English as it is posssible to get, but for the mathematically challenged probably no amount of translation is enough. \"Tha amaturish rule of '33' This is closer to my speed! :-) HC, they did try to teach us bases other than 10 - but they could never explain it in English. :-( (Reminds me of the statistics prof who, when a student who could have been I said that she did not understand his explanation replied that he did not know any other way to explain it. At that moment we all knew that we were doomed; we learned almost nothing in class and spent long hours on the telephone teaching ourselves from the textbook.) and they're all made out of ticky tacky and they all look just the same ..."}, {"response": 42, "author": "Ann", "date": "Wed, Jan  1, 1997 (17:56)", "body": "I've uptated the tutorial again to add the color chart, images, and emoticons: http://www.spring.com/~anneh/tagsaaaa.html Enjoy!"}, {"response": 43, "author": "churchh", "date": "Wed, Jan  1, 1997 (19:10)", "body": "Katy -- an entirely admirable explanation, except that 6x6x6=216"}, {"response": 44, "author": "kendall", "date": "Wed, Jan  1, 1997 (19:49)", "body": "\"Katy -- an entirely admirable explanation, except that 6x6x6=216 \" A nice person would not have mentioned that - esp on New Year's day!"}, {"response": 45, "author": "Anna", "date": "Thu, Jan  2, 1997 (20:38)", "body": "thanks to all one question; if I do 2 things to the font, such as colour and size, do I have to close it {/font} once or twice? testing"}, {"response": 46, "author": "Anna", "date": "Thu, Jan  2, 1997 (20:39)", "body": "images don't work so well; I have trouble ascertaining where/when to insert a space..."}, {"response": 47, "author": "Anna", "date": "Thu, Jan  2, 1997 (20:41)", "body": "I copied the green smiley address from the tute (maybe the frowney?)"}, {"response": 48, "author": "jwinsor", "date": "Thu, Jan  2, 1997 (20:53)", "body": "Anna, you only need this part: htpp://www.spring.com/~amy/gfrown.gif or with the IP address: http://208.199.212.10/~amy/gfrown.gif"}, {"response": 49, "author": "jwinsor", "date": "Thu, Jan  2, 1997 (20:55)", "body": "(Interesting that it turned the one with an IP address into a link, but not the one with the domain name!) The whole command looks like this - substituting [ ] fir the pointy brackets: [IMG SRC=\" http://208.199.212.10/~amy/gfrown.gif\" ]"}, {"response": 50, "author": "Kaffeine", "date": "Thu, Jan  2, 1997 (21:00)", "body": "\"(Interesting that it turned the one with an IP address into a link, but not the one with the domain name!)\" Joan a typo is the culprit (htpp instead of http) :)"}, {"response": 51, "author": "Anna", "date": "Thu, Jan  2, 1997 (21:07)", "body": "I was using [IMG SRC=\"htpp://www.spring.com/~amy/gsmile.gif\"], except with greater and lesser than signs instead of the square brackets. Can anyone tell me what I'm doing wrong? My browser just shows image icons rather than the image; HC's pics work OK"}, {"response": 52, "author": "Anna", "date": "Thu, Jan  2, 1997 (21:09)", "body": "too slow me - but thanks! I'd never make a proff reader..."}, {"response": 53, "author": "Anna", "date": "Thu, Jan  2, 1997 (21:13)", "body": "for anyone like myself , lazy &/or efficient; beware. Most of the links in the tute also appear as htpp, unless they mutated in copying."}, {"response": 54, "author": "jwinsor", "date": "Thu, Jan  2, 1997 (21:26)", "body": "I'd never make a proff reader... Nor I! Amazing that with those 2 lines sitting within an inch of each other I should not have noticed the difference between htpp and http. Actually, I did not type either of them myself - copied one from Anna's link and the other from my own crib sheet of graphics URLs. I never type when I can cut and paste. My cutting and pasting skills are so much better than my typing skills! ;-)"}, {"response": 55, "author": "Anna", "date": "Thu, Jan  2, 1997 (22:29)", "body": "] My cutting and pasting skills are so much better than my typing skills! a sister of the scissors! Hurrah!"}, {"response": 56, "author": "Ann", "date": "Thu, Jan  2, 1997 (23:11)", "body": "So, is there a typo in the tutorial???? If there is, let me know so I can fix it."}, {"response": 57, "author": "Ann", "date": "Thu, Jan  2, 1997 (23:22)", "body": "Ladies and Gentlemen, My most profound apologies. There was indeed an error in the tutorial. I'm sorry for any inconvenience this might have caused you. I assure you, the error has been corrected. Sincerely Yours, Ann p.s. Please E-mail me if you find any other errors. I will correct them as soon as possible."}, {"response": 58, "author": "Anna", "date": "Thu, Jan  2, 1997 (23:25)", "body": "Ann, I think there may be; I copied the info on gifs and pasted it into a text file, and all the addresses I copied had htpp instead of http. I don't think I can have done it with a straight copy and paste, but my skills are very basic and I wouldn't swear to anything. Great Tutorial !!!"}, {"response": 59, "author": "kendall", "date": "Thu, Jan  2, 1997 (23:53)", "body": ""}, {"response": 60, "author": "kendall", "date": "Thu, Jan  2, 1997 (23:54)", "body": ""}, {"response": 61, "author": "churchh", "date": "Sat, Jan  4, 1997 (10:52)", "body": "Anna -- each [FONT] tag should be closed, but if you want to change two things at once, you can do it in a single font tag: [FONT SIZE=\"+2\" COLOR=\"#33cc99\"] Size and color changed! [/FONT]"}, {"response": 62, "author": "JohanneD", "date": "Sat, Jan  4, 1997 (11:06)", "body": "Yes lets not forget to close like I did..."}, {"response": 63, "author": "Anna", "date": "Sat, Jan  4, 1997 (17:00)", "body": "thanks HC"}, {"response": 64, "author": "Ann", "date": "Sun, Jan 12, 1997 (20:36)", "body": "I have updated the tutorial (again). It now contains all seventy of the graphic smiley faces which Amy had HC scan, such as: To get directly to the graphical-smileys page: http://www.spring.com/~anneh/emotica.html"}, {"response": 65, "author": "Amy", "date": "Sun, Jan 12, 1997 (22:31)", "body": "Nice job, Ann. I'd still like to do something a little different with them, but you got them up a lot faster than I ever would have gotten around to it. Now for some sound..."}, {"response": 66, "author": "Ann", "date": "Sun, Jan 12, 1997 (23:13)", "body": "Amy, what would you like to do with them??"}, {"response": 67, "author": "Ann", "date": "Sun, Jan 12, 1997 (23:13)", "body": ""}, {"response": 68, "author": "Amy", "date": "Sun, Jan 12, 1997 (23:22)", "body": "Not quite sure yet, Ann. Maybe nothing is needed. Everybody seems to love them. But the neat thing about the web is, everything's a draft."}, {"response": 69, "author": "Ann", "date": "Mon, Jan 13, 1997 (20:27)", "body": "Some of the pictures would work well with different names. I was thinking that maybe some should be offered without the names attached to them, so people could decide for themselves."}, {"response": 70, "author": "churchh", "date": "Mon, Jan 13, 1997 (20:33)", "body": "Yes, Amy was saying the same thing, and I agreed with her that this expression, for example, could go with other feelings:"}, {"response": 71, "author": "Ann", "date": "Mon, Jan 13, 1997 (20:36)", "body": "And certainly this one:"}, {"response": 72, "author": "mrobens", "date": "Mon, Jan 13, 1997 (21:50)", "body": "Yes, Amy was saying the same thing, and I agreed with her that this expression, for example, could go with other feelings: Ah, yes. The Yiddish expression."}, {"response": 73, "author": "MaryC", "date": "Tue, Jan 14, 1997 (23:34)", "body": "LOL! The wit of the contributors here in unparalleled."}, {"response": 74, "author": "Ann", "date": "Mon, Jan 27, 1997 (20:54)", "body": "I have loaded up the graphical smileys without the names on them. So if you like this picture: , but you do not want the name \"loaded attached to it: , you can use it. The addresses are basically the same as given in the tutorial: http://www.spring.com/~anneh/tagsaaaa.html but with the suffix \"2\", such as loaded2.gif or happy2.gif"}, {"response": 75, "author": "Amy", "date": "Mon, Jan 27, 1997 (20:58)", "body": "Thanks, Ann."}, {"response": 76, "author": "Ann", "date": "Mon, Jan 27, 1997 (21:01)", "body": "Sure, Babe."}, {"response": 77, "author": "Anna", "date": "Tue, Jan 28, 1997 (00:39)", "body": "]graphical smileys without the names on them. imagination runs riot! thanks muchly"}, {"response": 78, "author": "krisg", "date": "Wed, Jan 29, 1997 (20:14)", "body": "The Tutorial was very very good and easy to understand. I want to thank you for your effor. This is my visit here. I very much enjoyed the visit. Thank you very much Gopal."}, {"response": 79, "author": "Cheryl", "date": "Thu, Jan 30, 1997 (01:26)", "body": "LOL Gopal! What a quick study! ;-)"}, {"response": 80, "author": "terry", "date": "Thu, Jan 30, 1997 (09:03)", "body": "No kidding. Good going Gopal. We're looking forward to your future visits here."}, {"response": 81, "author": "Ann2", "date": "Sun, Feb  2, 1997 (17:03)", "body": "Maybe I ought to put this question in the Topic \"incredibly dumb...\" but this Topic-name also has an indulgent ring to it so... Does this mean that you can change the colour and/or size of a smiley or one of Ann's emoticons ? Using the formula above I mean... I suppose not...how could that be done?"}, {"response": 82, "author": "jwinsor", "date": "Sun, Feb  2, 1997 (20:33)", "body": "Where is the formula above to which you are referring? There is no formula in the immediately preceding posting (#80)."}, {"response": 83, "author": "churchh", "date": "Sun, Feb  2, 1997 (21:43)", "body": "Ann2 -- no, you can't change an image with HTML tags; you need an image editing program for that... I have an image of the raw large emoticon sheet in its original black and white form (before I changed black to #1F81A6 in Adobe Photoshop), but I've only cut off two or three individual emoticons from it... No-one has broken it up into 70 individual emoticons as Ann has done with the #1F81A6 version..."}, {"response": 84, "author": "JohanneD", "date": "Mon, Feb  3, 1997 (00:48)", "body": "That one is a real beginner's : If I have a picture/image as a file in my computer can I post it on the internet and how should I proceed. I can change the size of an image/picture taken on the internet by saving in on my computer and resizing it with Corel Photo-paint (since on Windoze), how to put it back on line, how to post it on our BB ?"}, {"response": 85, "author": "terry", "date": "Mon, Feb  3, 1997 (00:55)", "body": "I highly recommend Lview (read about it in our apps conference). It makes resizing a snap."}, {"response": 86, "author": "JohanneD", "date": "Mon, Feb  3, 1997 (01:07)", "body": "Thanks a million Terry, BTW I just started conquering NetMeeting and NetTerm for your conference"}, {"response": 87, "author": "jwinsor", "date": "Mon, Feb  3, 1997 (02:01)", "body": "Johanne: If I have a picture/image as a file in my computer can I post it on the internet and how should I proceed. You can, especially here, because Terry will give those who want one a shell account which gives you a directory to put them into. Or else, you can e-mail it to someone who already has one and have them upload it to their directory from which anyone can access it. Many graphics applications will allow you to re-size a graphic, but before uploading they should also be compressed into either a .gif or .jpeg (.jpg) format. This will make them take up less space on the server and load more quickly when being displayed. The .gif and .jpg formats can also be viewed by any machine type - which is why .gif - Graphic Interchange Format - was first created (by CompuServe) - so that images could be shared among different kinds of computers."}, {"response": 88, "author": "terry", "date": "Mon, Feb  3, 1997 (22:28)", "body": "Would you like your own shell account Joan. Email Amy or myself and we'll be glad to set it up for you and you can be on the way to your own little corner of the web. Your own web page. Any contributor on the Spring is welcome to a web page."}, {"response": 89, "author": "terry", "date": "Mon, Feb  3, 1997 (22:34)", "body": "I meant Johanne. Joan too, though."}, {"response": 90, "author": "jwinsor", "date": "Tue, Feb  4, 1997 (00:25)", "body": "Joan already has one."}, {"response": 91, "author": "terry", "date": "Tue, Feb  4, 1997 (09:23)", "body": "Is anyone with a web not listed in our user listing? http://www.spring.com/users.html Of course if you want to be unlisted, we can do that too."}, {"response": 92, "author": "JohanneD", "date": "Tue, Feb  4, 1997 (20:33)", "body": "Terry, I'm definitely will be asking for a little space of my own (with pretty pleezes) and Amy already made me the gift of a shell account. Let me just finish reading Internet for dummies, More internet for dummies and HTML for dummies first, dear. I got NetTerm and NetMeeting, think I know how to use them (?) but having figured why yet.... this only goes to show where I come from"}, {"response": 93, "author": "churchh", "date": "Tue, Feb  4, 1997 (23:01)", "body": "Confident with Unix, Joan?? My what a change this is ;-)"}, {"response": 94, "author": "jwinsor", "date": "Tue, Feb  4, 1997 (23:18)", "body": "HC: Confident with Unix, Joan?? My what a change this is ;-) Who said anything about confident??? Certainly not I! Most of the tiny speck of UNIX that actually I know anything about has been forced down my throat past my tightly clenched teeth!"}, {"response": 95, "author": "Kaffeine", "date": "Wed, Feb  5, 1997 (18:39)", "body": "Linda - I really hesitate to say this when you are so happy... Explorer isn't going to help. The problem is with Prodigy's firewall, and using IE won't help with that. I'm so sorry!! We WILL find a solution to this - I promise!!"}, {"response": 96, "author": "churchh", "date": "Wed, Feb  5, 1997 (19:49)", "body": "\"Proxy cache server\", not \"firewall\", right?"}, {"response": 97, "author": "Amy", "date": "Wed, Feb  5, 1997 (20:54)", "body": "Kaf, if I make a \"Yeah, yeah, whatever\" graphic, I will share it with you."}, {"response": 98, "author": "bernhard", "date": "Sat, Feb 22, 1997 (23:29)", "body": "I'm sure this doesn't belong here, but I don't want to look around forever. Why do the messages post with a time stamp that is 26 minutes later than the actual time?"}, {"response": 99, "author": "terry", "date": "Sun, Feb 23, 1997 (00:50)", "body": "Actually, the was nearly a day ahead. Next time you see this anyone, please mailto://terry@spring.com or mailto://amy@spring.com and one of of can reset the system clock with the date command."}, {"response": 100, "author": "terry", "date": "Sun, Feb 23, 1997 (00:51)", "body": "date [-nu] [-d dst] [-r seconds] [-t minutes_west] [+format] [[yy[mm[dd[hh]]]]mm[.ss]]"}, {"response": 101, "author": "jwinsor", "date": "Sun, Feb 23, 1997 (03:39)", "body": "date [-nu] [-d dst] [-r seconds] [-t minutes_west] [+format] [[yy[mm[dd[hh]]]]mm[.ss]] (((Now I know I'm computer illiterate!"}, {"response": 102, "author": "terry", "date": "Sun, Feb 23, 1997 (08:54)", "body": "Joan, in UNIX, when you type man date you get a manual on how to use the date command. The date command also sets the time. So to set the date *and* time at a shell prompt (similar to a dos prompt) you type something like this: bash$ date 970223075205 Which will set the date to the year 97, the month Feb, the date the 23rd and the time the 07th hour and 52nd minute and 05th second. Does that help?"}, {"response": 103, "author": "mrobens", "date": "Sun, Feb 23, 1997 (10:17)", "body": "bash$ date 970223075205 Terry, Don't try to explain Unix to Joan. It just makes her cranky. You can also email me at mailto://mrobens@spring.com"}, {"response": 104, "author": "terry", "date": "Sun, Feb 23, 1997 (14:59)", "body": "OK. Our date and time are back on track now. but it might cause today s response to look like the day before's."}, {"response": 105, "author": "Cheryl", "date": "Mon, Feb 24, 1997 (01:27)", "body": "Thought you might all enjoy this... Top 10 reasons computers must be male: 10. They have a lot of data but are still clueless. 9. A better model is always just around the corner. 8. They look nice and shiny until you bring them home. 7. It is always necessary to have a back-up. 6. They'll do whatever you say if you push the right buttons. 5. The best part of having either one is the games you can play. 4. In order to get their attention, you have to turn them on. 3. The lights are on but nobody's home. 2. Big power surges knock them out for the night. 1. Size does matter."}, {"response": 106, "author": "jwinsor", "date": "Mon, Feb 24, 1997 (03:26)", "body": "Myretta: Terry, Don't try to explain Unix to Joan. It just makes her cranky. She's got that one right!"}, {"response": 107, "author": "churchh", "date": "Mon, Feb 24, 1997 (03:31)", "body": "Cheryl, you left off the second half of the joke (this is slightly more geeky, and is about compilers for computer languages such as \"C\" or \"BASIC\"): Top 10 reasons compilers must be female: ======================================== 10. Picky, picky, picky. 9. They hear what you say, but not what you mean. 8. Beauty is only shell deep. 7. When you ask what's wrong, they say \"nothing\". 6. Can produce incorrect results with alarming speed. 5. Always turning simple statements into big productions. 4. Smalltalk is important. 3. You do the same thing for years, and suddenly it's wrong. 2. They make you take the garbage out. 1. Miss a period and they go wild"}, {"response": 108, "author": "Cheryl", "date": "Mon, Feb 24, 1997 (03:58)", "body": "LOL HC! :-)"}, {"response": 109, "author": "Carolyn", "date": "Mon, Feb 24, 1997 (08:04)", "body": "Cheryl and HC, now I can start the morning with a smile on my face :-)"}, {"response": 110, "author": "Inko", "date": "Mon, Feb 24, 1997 (17:12)", "body": "Cheryl and HC: ROTFLOL. Showed my husband the first, his comment \"Evil!\", then found the second and he was much happier!! I love them both!;-)"}, {"response": 111, "author": "kate", "date": "Wed, Feb 26, 1997 (18:10)", "body": "hate to say this.... but my posts are all dated an hour behind. Is this my problem, or the systems?"}, {"response": 112, "author": "mrobens", "date": "Wed, Feb 26, 1997 (18:15)", "body": "hate to say this.... but my posts are all dated an hour behind. Is this my problem, or the systems? Neither, Kate. The server this system is on is in Austin, Texas"}, {"response": 113, "author": "terry", "date": "Sat, Mar  1, 1997 (13:47)", "body": "We're on CST."}, {"response": 114, "author": "Ann2", "date": "Sat, Mar  1, 1997 (19:08)", "body": "Thanks for helping one tiny bit on this long and intricate journey to divine computor control, HC, Terry and Joan, too. Some day I would like a place to put my stuff, Terry but I am a slow learner. Two big LOL:s are always a help to relax, am grateful for that too HC and Cherzo."}, {"response": 115, "author": "Ann2", "date": "Sat, Mar  1, 1997 (19:15)", "body": "Now I just tried to understand what went wrong with emoticon. For that purpose I clicked view document source: But got some scary message on missing post and then some nasty advice to reload. Is that not what causes All new desease? Is there a way to view my own last message after it is posted? To see what was wrong?"}, {"response": 116, "author": "Amy", "date": "Sat, Mar  1, 1997 (19:46)", "body": "Was it really scary, Ann2. Was it fwightening? No, no known cause, no known cure for Oldiznew. No such number, no such zone. When you get that HTML checker message? I usually copy my message right then, but not try to correct it in the window that points out the error. Instead, go back to the previous page and paste it in again, then correcting it of course, and resubmit. To check your error yourself, just view source. You know how to do that."}, {"response": 117, "author": "Ann2", "date": "Sat, Mar  1, 1997 (19:57)", "body": "No Amy I got no HTML error message...Just that annoying cracked picture And Zat meiks me furiush!! I was not enlightened by viewing source in that prevoius case re:114 No risk to reload then? Can you pwomiz me? Have you tidied up after me on pond site???And do cake tare!"}, {"response": 118, "author": "Amy", "date": "Sat, Mar  1, 1997 (21:53)", "body": "Reloading is a danger here. Be very afraid."}, {"response": 119, "author": "churchh", "date": "Sun, Mar  2, 1997 (00:29)", "body": "Ann2, in message 114 you had a URL error, not an HTML error; instead of having \"/~anneh/\" in the URL, the \"~\" and the \"a\" somehow got combined together, and you had \"/\u00e3nneh/\"..."}, {"response": 120, "author": "Ann2", "date": "Sun, Mar  2, 1997 (09:18)", "body": "Why thanks Hc I am grateful to know but would also like to know just how you can tell . Thanks to some Unix and zfinx and oinx and I know not whatsx, that are all in your command ?? When I click view source it is all gone from what I gather."}, {"response": 121, "author": "churchh", "date": "Sun, Mar  2, 1997 (11:15)", "body": "Well, a lot of the time I'm using \"Lynx\", which doesn't pay any attention to the no-cache HTTP headers. But you can view source even in an inferior browser like Netscape ;-) if you use the \"redisplay\" button at the bottom, and then run \"View Source\" on THAT page..."}, {"response": 122, "author": "Hilary", "date": "Sun, Mar  2, 1997 (19:31)", "body": "Maybe someone here can help us. Last week we had to re-install Win 3. Since then we have had a problem with colours in Netscape (2.01 whatever). Photos appear blotchy grey/black/white, with odd garish patches of red, yellow or blue. However other graphics, like Henry's Coat of Arms, for example, are fine. The chat room, usually pink, is white. Any suggestions that might help?"}, {"response": 123, "author": "Susan", "date": "Sun, Mar  2, 1997 (20:09)", "body": "Have you tried minimizing, then restoring, a few times? I had this same problem with Netscape when I first downloaded it."}, {"response": 124, "author": "churchh", "date": "Sun, Mar  2, 1997 (21:42)", "body": "Hey that coat of arms is for Amy -- my initials aren't \"AB\". It may have something to do with the handling of image colors; in some sub-menu somewhere, you can check off options for \"Always dither\", \"Always Substitute Colors\", or \"Automatically choose between Dither and Substitute\". It sounds like you may have \"Always Substitute\" selected, which is porbably not what you want... Also, make sure your video driver is at least 256 colors..."}, {"response": 125, "author": "Hilary", "date": "Mon, Mar  3, 1997 (15:44)", "body": "Susan, thanks but that doesn't fix it. Thanks Henry. We have it on 'auto choose' already, so I think it is a problem to do with the 256 colours. We tried choosing one of the 256 palette options (VGA, I think), but that choice then crashed us again. We will keep trying, however. But the coat of arms was of your making......"}, {"response": 126, "author": "sprin5", "date": "Tue, Oct 24, 2000 (09:00)", "body": "Whatever became of Austinite Henry Churchill? computer conference Main Menu"}]}, {"num": 20, "subject": "cpu cards - bringing life to old 8088 computers", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Aug 29, 2001 (22:57)", "body": "http://www.acqu.com/usa/intr-cpu.htm#3486 computer conference Main Menu"}]}, {"num": 21, "subject": "computer terrorism in the post 9/11 world", "response_count": 10, "posts": [{"response": 1, "author": "terry", "date": "Fri, Oct 26, 2001 (09:10)", "body": "The World's No.1 Science & Technology News Service\ufffd \ufffd Devastating attacks on the net \"imminent\", says report \ufffd 14:27\ufffd\ufffd 25\ufffd October \ufffd01 Duncan Graham-Rowe \ufffd A new wave of devastating internet attacks is just waiting to happen, says a report by a US internet watchdog. What is more, there is there is currently little chance of preventing it. The threat is a variation of the \"denial of service\" (DoS) attack, commonly used by malicious hackers to block a website by bombarding it with spurious requests. However, the new threat would target routers, key hubs of the internet's infrastructure, instead of individual websites. \"We believe this to be an imminent and real threat with a potentially high impact,\" says the new report, Trends in Denial of Service Attack Technology, published by the Computer Emergency Response Team, at Carnegie Mellon University in Pittsburgh."}, {"response": 2, "author": "terry", "date": "Fri, Oct 26, 2001 (09:11)", "body": "http://www.nanog.org/mtg-0110/cert.html Kevin Houle's talk at NANOG on Monday."}, {"response": 3, "author": "terry", "date": "Fri, Nov  9, 2001 (10:47)", "body": "Thursday November 8 8:02 AM ET U.S. Prepares for Cyberwar -- the War Next Time By Jim Wolf WASHINGTON (Reuters) - Even as it fights in Afghanistan (news - web sites) with bombs and guns and allies on horseback, the U.S. military is gearing up to use computers and code as potentially decisive weapons in the next phases of its campaign. The goal would be to disable air defense systems, scramble enemy logistics and perhaps infect software through tactics being honed by a joint task force set up in 1999 under the Colorado Springs, Colorado-based U.S. Space Command. The U.S. military has been working on tools that could wreak electronic havoc on countries accused of harboring terrorists as well as on ways of defending global networks against cyberattack. More details: http://dailynews.yahoo.com/h/nm/20011108/wr/tech_cybersecurity_infowar_dc_1.html"}, {"response": 4, "author": "terry", "date": "Sat, Nov 24, 2001 (21:39)", "body": "November 23, 2001 Cyberspace Seen as Potential Battleground By JOHN SCHWARTZ [G] overnment officials are warning that cyberattacks are likely as retribution for the United States campaign in Afghanistan, and at the same time, computer security experts are seeing increasingly numerous and more powerful attacks from traditional hackers. So far, most technologically proficient attackers are hackers or insiders with no terrorist intent, while the terrorists are not yet very proficient, Frank J. Cilluffo, an expert on terrorism at the Center for Strategic and International Studies in Washington, said during Congressional testimony in October. But, calling cybersecurity the \"gaping hole\" in the nation's infrastructure defense plans, he said, \"It is only a matter of time before the convergence of bad guys and good stuff occurs.\" \"While bin Laden may have his finger on the trigger,\" he added, \"his grandson might have his finger on the mouse.\" More at: http://www.nytimes.com/2001/11/23/technology/23CYBE.html"}, {"response": 5, "author": "terry", "date": "Sat, Nov 24, 2001 (21:40)", "body": "\"US shuts down Somalia internet\" \"Somalia's only internet company and a key telecoms business have been forced to close because the United States suspects them of terrorist links.\" ... \"Both companies have stated categorically they they are not linked to terrorists.\" Along with denying all internet access to Somalis, the closures have severely restricted international telephone lines and shut down vitally needed money transfer facilities. Correspondents say the closure of the companies will have a devastating effect on the country, which desperately needs the services they provide.\" \"The BBC's Hassan Barise in Mogadishu said more than 80% of Somalis depend on money they receive from relatives outside the country. \"He said all internet cafes have now shut down and international phone lines run by two other companies are failing to cope with the extra pressure of calls. He also pointed out that the United Nations, local and international aid agencies, as well as the government itself all relied heavily on internet access, now denied.\" \"I would say it is very depressing and if I could find any stronger word than that I would say it,\" he said.\" ... \"Reports say the Somali Internet Company was forced to close when it realised that its international gateway had been cut off.\""}, {"response": 6, "author": "terry", "date": "Sat, Nov 24, 2001 (22:37)", "body": "http://www.washingtonpost.com/wp-dyn/articles/A1436-2001Nov22.html \" At least one antivirus software company, McAfee Corp., contacted the FBI on Wednesday to ensure its software wouldn't inadvertently detect the bureau's snooping software and alert a criminal suspect. \""}, {"response": 7, "author": "terry", "date": "Fri, Jan 18, 2002 (14:52)", "body": "SENATE CONSIDERS A COMPUTER ARMY FOR CRISES By JOSEPH GALLIVAN September 28, 2001 -- Techies to the rescue! Local computer buffs are saying the Sept. 11 World Trade Center attacks showed how desperately unprepared the city was from an information technology standpoint - and Washington is set to do something about it. \"This country needs the equivalent of a National Guard for IT professionals,\" said Silicon Alley honcho Andrew Rasiej, founder of the charity MOUSE, which helps wire public schools. While land and cell phones were overloaded, New Yorkers wandered the city with pictures of missing relatives \"like Kosovans,\" said Rasiej, who found there was no easy way to use his tech skills when disaster struck. .... Rasiej's idea has raised the interest of Ron Wyden, the Oregonian who chairs the Senate Commerce Subcommittee on Science, Technology and Space. He has written to tech leaders such as Bill Gates, Steve Ballmer, Carly Fiorina, Lou Gerstner, Andy Grove and Steve Case, inviting them to Washington next week for hearings on what could turn into the National Emergency Technology Guard. \" continued at http://www.nypost.com/business/33118.htm"}, {"response": 8, "author": "terry", "date": "Fri, Jan 18, 2002 (14:52)", "body": "http://www.hackbusters.net/LaBrea.html http://www.hackbusters.net/LaBrea/LaBrea.txt \"LaBrea is a small Linux-based application that puts unused IP addresses on your network to use, creating a \"tarpit\" which can stop or slow down scans of your address space. This paper details the technical aspects of how LaBrea works as well as the tactical advantages of deploying LaBrea on your network.\""}, {"response": 9, "author": "terry", "date": "Fri, Jan 18, 2002 (14:54)", "body": "Sudan Bank Hacked, Bin Laden Info Found By Ned Stafford, Newsbytes MUNICH, GERMANY, 27 Sep 2001, 2:46 PM CST A group of U.K.-based hackers has cracked computers at the AlShamal Islamic Bank in Sudan and collected data on the accounts of the Al Qaeda terrorist organization and its leader Osama bin Laden, Kim Schmitz, a flamboyant German hacker/businessman, has claimed. Schmitz, who has offered a $10 million reward for the capture of bin Laden, told Newsbytes that the information has been turned over to the FBI. Bin Laden, a millionaire Saudi exile whose base is now Afghanistan, is suspected of being the driving force behind the deadly Sept. 11 attacks on the World Trade Center and the Pentagon with hijacked planes. .... The bank Schmitz claimed was hacked was mentioned Wednesday by Sen. Carl Levin, D-Mich. during a Senate Banking Committee hearing. According to CNN, Levin referred to a 1996 State Department report that said bin Laden had provided the AlShamal Islamic Bank with $50 million in start-up capital. .... Last week, Schmitz, who lives in Munich, posted letters on his Web site rallying politicians to the cause of fighting terrorism and offering his hacking expertise. \"I received plenty of e-mails from hackers around the world offering their services,\" he said. Schmitz founded a group that numbers around 23 hackers called \"Young Intelligent Hackers Against Terror.\" He calls the group YIHAT, which is similar to the word Jihad, which is Arabic for Holy War. Schmitz said that last Friday, a Sudanese banker sent the group an e-mail after reading about the $10 million reward, informing the group that Al Qaeda and bin Laden have accounts at AlShamal Islamic Bank. \" continued http://www.newsbytes.com/news/01/170588.html"}, {"response": 10, "author": "wolf", "date": "Sun, Jan 20, 2002 (23:31)", "body": "yeah, the cybernerds are being called to action (no offense, i consider myself a nerd) computer conference Main Menu"}]}, {"num": 22, "subject": "Apple and Macintosh", "response_count": 3, "posts": [{"response": 1, "author": "terry", "date": "Mon, Jan  7, 2002 (15:41)", "body": "Seen the new Mac?"}, {"response": 2, "author": "terry", "date": "Tue, Jan  8, 2002 (05:18)", "body": "Ain't it cool?"}, {"response": 3, "author": "terry", "date": "Thu, Jan 27, 2005 (03:56)", "body": "When Steve Jobs unveiled the Mac mini at Macworld Expo in January, the reaction was a mix of amazement (how did they get that Mac so small? http://www.macworld.com/2005/01/reviews/macminireview/index.php computer conference Main Menu"}]}, {"num": 23, "subject": "Servers", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Fri, Jun 28, 2002 (09:18)", "body": "http://www.supermicro.com/PRODUCT/MotherBoards/GC_HE/P4QH6.htm QUAD P4-Xeon, six PCI-X slots, SIXTEEN DDR memory slots on a daughter board, ultra-160 SCSI, ethernet, video. Schlust, drool. SuperMicro sells the board plus case/power supplies/fans in two configurations: - SuperServer 8042, 4U rackmount $4200 - SuperServer 8052, full tower $4500 Add to that: - P4 Xeon mPGA603 CPU, 2GHz 512K cache, 4 @ $356 each $1424 - PC1600 (DDR200) memory, 256MB ECC registered, 8 @ $73 each $584 Totals are $6200 for the rackmount and $6500 for the tower. computer conference Main Menu"}]}, {"num": 24, "subject": "video capture", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Fri, Jun 28, 2002 (09:22)", "body": "http://vcdhelp.com This site will help you to make your own VideoCDs, SVCDs or DVDs that can be played on your standalone DVD Player from video sources like DVD, Video, TV, Cam or downloaded movie clips like DivX, MOV, RM, WMV and ASF. We also have an extensive list of standalone DVD Players with compatibility information such as CD-R(W), DVD-R(W), VCD, SVCD, MP3 and more."}, {"response": 2, "author": "terry", "date": "Fri, Jun 28, 2002 (09:27)", "body": "Requirements: A Digital Camcorder, a firewire card and Adobe Premiere. Capture with Adobe Premier without a device control. 1. Make sure the deck or camcorder is properly connected to your computer and that the dv switch is on Microsoft. 2. Choose File > Capture > Movie Capture. 3. Use the controls on the deck or camcorder to move the videotape to a point several seconds before the point where you want to begin capturing. Be sure to leave enough time for the deck to reach the proper speed. 4. Press the Play button on the deck or camcorder, and then click Record in the Movie Capture window. 5. When you see the point where you want to stop recording, wait a few seconds to provide room for editing, and then click the mouse to stop recording. The captured clip appears in a Clip window, and exists as an unsaved temporary file in the capture disk you specified. 6. Make sure the Clip window with the captured clip is active. Choose File > Save As, specify a location and filename, and click Save. Now can you edit the \"captured\" video or just directly convert the video to VCD/SVCD/DVD/DivX. Thnx to Helmut for this Guide computer conference Main Menu"}]}, {"num": 25, "subject": "cool new computer toys and goodies", "response_count": 3, "posts": [{"response": 1, "author": "terry", "date": "Sun, Oct  5, 2003 (10:48)", "body": "http://www.eluminx.com/product.asp?pid=1 \"Auravision\ufffd introduces the illuminated keyboard using EluminX\ufffd technology\" www.auravision.com The Auravision\ufffd Illuminated Keyboard... a computer keyboard with internal luminescence using EluminX\ufffd technology. The first commercially available computer keyboard that remains totally visible - in the dark or low-lit workspaces. Keyboards with EluminX\ufffd are designed for both consumers and business professionals. The perfect solution for late night web surfers, gamers, and all computer users. EluminX\ufffd, ElectroLuminescent technology: \ufffd Eliminates the glare from task lighting \ufffd Eases eyestrain \ufffd Makes the keys easy to see From their website."}, {"response": 2, "author": "terry", "date": "Sun, Oct 30, 2005 (12:11)", "body": "There are two solutions available that we are aware of at Supermicro. Creative Labs has a low profile sound card which is compatible with the PCI-X bus, the part number is Creative SB 0410LP. The second solution is to use a USB sound card. (I'm trying to find a low profile card for my Supermicro server)"}, {"response": 3, "author": "terry", "date": "Fri, Dec  9, 2005 (21:28)", "body": "http://www.daskeyboard.com/ a keyboard with no key inscriptions. it's completely blank. and all black. Very cool design too. It's supposed to increase your typing speed by keeping your from looking at the keys. computer conference Main Menu"}]}, {"num": 26, "subject": "pricewatch", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Wed, Dec  7, 2005 (23:35)", "body": "http://www.pricewatch.com/ greatest pricing site on the net. I've been using this for years. computer conference Main Menu"}]}, {"num": 27, "subject": "Apple Mac", "response_count": 1, "posts": [{"response": 1, "author": "terry", "date": "Sat, Jan 14, 2006 (13:51)", "body": "The most exciting new development is the MacBook Pro which runs faster than any previous Mac Notebook and presumably will run Windows. I gotta say, this looks pretty good. It even has Firewire which Apple said it was going to phase out. USB is slightly slower but has more apps than Firewire. This has a Firewire 400 port which is slightly faster than USB 2.0. You might wanna wait though as this is Apple's first Intel machine. And you know what it's like to get a \"first\". You can technically dual boot a Windows and Mac OS. You still have to have the Mac OS running. Windows OS may not be compliant with this though. computer conference Main Menu"}]}, {"num": 28, "subject": "msconfig.exe", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Mon, Mar 27, 2006 (18:16)", "body": "What a great tool! It's been saving me lately from sluggish computer performance. Why have a bunch of apps and system tray programs running that you're not using. You can always check the box for them in msconfig and get them back. Here's a good tutorial: http://netsquirrel.com/msconfig/"}, {"response": 2, "author": "terry", "date": "Mon, Mar 27, 2006 (19:34)", "body": "And you don't have to download it, it comes with Windows. computer conference Main Menu"}]}, {"num": 29, "subject": "Web Design & Search Engine Optimization", "response_count": 1, "posts": [{"response": 1, "author": "cfadm", "date": "Wed, Feb  3, 2010 (07:11)", "body": "OK it looks like borderline spam but I'll let it go. Now you have to work for your plug. Pay for plug. So give us some seo tips. computer conference Main Menu"}]}, {"num": 3, "subject": "Data Networking Industry", "response_count": 5, "posts": [{"response": 1, "author": "stewartjones", "date": "Sun, Feb  1, 1998 (06:16)", "body": "I'm employed (currently) as a Senior Account Manager within a UK based Network Services Company with focus in three major areas: 1)Systems Integration Cisco, 3Com, HP, Compaq, Novell etc 2)Cabling Division ITT Cannon & Lucent 3)Services Division Consultancy, Support Services, FM etc I'm 32 yrs old and work 60-70 hrs per week and need to know alot and cover alot of areas!!"}, {"response": 2, "author": "terry", "date": "Sun, Feb  1, 1998 (08:55)", "body": "Sounds great, are you going to promote this topic amound your co-horts?"}, {"response": 3, "author": "stewartjones", "date": "Sun, Feb  1, 1998 (17:19)", "body": "Yes, that will be a good idea. Is there a simple URL i can mail to people who can then get here easily?"}, {"response": 4, "author": "terry", "date": "Sun, Feb  1, 1998 (19:31)", "body": "Well, the main one is http://www.spring.com But you can also give them urls to specific topics. Go to the main page and pick 'browse' then go to the topic or conference and copy the url. This way they can get directly to the topic and have the option of signing up without going through the main page. For example, I click on poetry and it gets me to the list of topics at this url: http://www.spring.com/yapp-bin/public/browse/poetry/all Then I choose one of those topics, \"How's your poetry writing day going\" and it takes me to http://www.spring.com/yapp-bin/public/read/poetry/5 At the top of the page are buttons to sign up. log in, or move to the next or previous topic."}, {"response": 5, "author": "terry", "date": "Thu, Aug 20, 1998 (17:13)", "body": "Here's one way to make a crossed UTP patch cable: pin pin 1 white/orange 3 2 orange/white 6 3 white/green 1 4 blue/white 4 5 white/blue 5 6 green/white 2 7 white/brown 7 8 brown/white 8 computer conference Main Menu"}]}, {"num": 4, "subject": "pdas", "response_count": 3, "posts": [{"response": 1, "author": "terry", "date": "Sat, Feb 28, 1998 (13:46)", "body": "Apple Discontinues Development of Newton OS CUPERTINO, California--Feb. 27, 1998--Apple Computer, Inc. today announced it will discontinue further development of the Newton operating system and Newton OS-based products, including the MessagePad 2100 and eMate 300. \"This decision is consistent with our strategy to focus all of our software development resources on extending the Macintosh operating system,\" said Steve Jobs, Apple's interim CEO. \"To realize our ambitious plans we must focus all of our efforts in one direction.\" Apple is committed to affordable mobile computing, pioneered by the eMate, and will be serving this market with Mac OS-based products beginning in 1999. Apple will continue to market and sell its current inventory of MessagePad 2100 and eMate 300 computers, as well as to provide support for their installed base of users. The Company is committed to working with its customers and developers to ensure a smooth transition to Mac OS-based products. Apple Computer, Inc. ignited the personal computer revolution in the 1970s with the Apple II, and reinvented the personal computer in the 1980s with the Macintosh. Apple is now recommitted to its original mission - to bring the best personal computing products and support to students, educators, designers, scientists, engineers, businesspersons and consumers in over 140 countries around the world. The statements in this document regarding future products and strategy are forward looking and subject to risk and uncertainty. Potential risks and uncertainties include, without limitation, the demand from consumers and businesses and competitive factors. For a detailed discussion of factors that may affect the Company's operating results, interested parties should review the Company's SEC reports, including Apple's Annual Report on Form 10-K for the year ended September 26, 1997, as well as the Form 10-Q for the quarter ended December 26, 1997. Press Contacts Tami Begasse Apple Computer, Inc. (408) 974-3156 email: begasse@apple.com Katie Cotton Apple Computer, Inc. (408) 974-7269 email: katiec@apple.com"}, {"response": 2, "author": "sprin5", "date": "Tue, Feb 27, 2001 (10:07)", "body": "I'm pretty happy with my Sprint PDQ 1900 Palm Phone, but there's a slimmer, better model coming out with a built in speaker phone. \\ That's the old one above. And this is the new one: \\ From the release: \"The Smartphone allows three modes of Web surfing: The phone supports HTML (Hypertext Markup Language) browsers with Secure Socket Layer encryption, Wireless Application Protocol (WAP), and Palm's Web Clipping applications and WAP browsers. The Smartphone, which has a built-in version of Eudora for email, can also act as a wireless modem for a laptop PC through its charging cradle or an optional serial cable. Kyocera's product has 8MB of memory and uses the latest version of the Palm operating system, version 3.5. A jog dial on the left side of the phone allows owners to shift between the contact list, call history, phone settings and messages."}, {"response": 3, "author": "sprin5", "date": "Tue, Feb 27, 2001 (10:14)", "body": "http://www.kyocera.com/News/displaypress.cfm?PressID=95 is the official press release computer conference Main Menu"}]}, {"num": 5, "subject": "Amiga - dead or alive?", "response_count": 13, "posts": [{"response": 1, "author": "terry", "date": "Sat, Mar 14, 1998 (09:28)", "body": "Some sources: http://www.cucug.org/amicommercial.html"}, {"response": 2, "author": "TIM", "date": "Mon, Nov 23, 1998 (04:23)", "body": "I was really sorry to see the amiga go. I liked it."}, {"response": 3, "author": "terry", "date": "Mon, Nov 23, 1998 (07:17)", "body": "It's making a comeback of sorts now, via Gateway Computer."}, {"response": 4, "author": "ratthing", "date": "Mon, Nov 23, 1998 (10:58)", "body": "the amiga RULED! and i am happy that gateway is looking into reviving it. i still have two amigas from way back when in perfect working condition."}, {"response": 5, "author": "terry", "date": "Mon, Nov 23, 1998 (11:08)", "body": "Amiga 1000s?"}, {"response": 6, "author": "ratthing", "date": "Mon, Nov 23, 1998 (11:31)", "body": "yup."}, {"response": 7, "author": "terry", "date": "Tue, Jan 26, 1999 (12:02)", "body": "Subject: The future's bright, the future's Havemose!!! (AF interview) From: Lion Date: 1999/01/22 Newsgroups: comp.sys.amiga.misc For anybody who hasn't read the interview in AF then I'm providing a summary of what I feel are the most important points raised in the article. Please note that I take no responsibility for anything! If I've misread stuff and passed it on to you then tough! ;) Point Number 1 - Amiga Inc are not deserting the home computer market. When asked about the new Amiga's, Dr Havemose said that it is likely that there will be an A1200 style-computer. Point Number 2 - He also expects A4000-style workstations. He also said that \"Our technology is also well suited to the next-generation of games machines and set-top-box's\". Which leads me to believe that one of the nest-generation consoles will be running AmigaOS-5. Weather that be PLaystationII, Nintendo's next machine, or something else remains to be seen. Point Number 3 - QNX's kernel isn't the only part of QNX to be used by AmigaOS-5. As well as the kernel, device drivers, virtual memory, TCP/IP stack etc will all be taken from QNX. \"Amiga Inc will concentrate on multimedia, 3D graphics,.mpg, gaming interfaces, digital convergence API's, preferences and user interfaces. Amiga Inc will develop everything that a typical user will come into contact with, while QNX provide much of the underlying operating system technology\" Point Number 4 - The developers machines will be Intel boxs running OS-5 and it's development tools. Windows will *NOT* be required. The whole development will be possible under Amiga OS-5 and no other operating system will be required on the development machine. Point Number 5 - Classic Amiga software should be easy to port and the developers tools will be aware that many applications will be ports \"Most well-written [Classic Amiga] applications should port easily, but to get all the benefits of the new architecture [developers] will want to take advantage of the new API's. We'll offer significantly better development tools than are currently available for the Classic Amiga, which should aid transition\" Point Number 6 - The New Amiga will have some form of backward compatibility with OS 3.5. This is mainly guess-work on my part. Dr Havemose said \"For the development system, we're investigating either a 'Classic Amiga PCI card' or a 'Classic Amiga Emulator'. It is my guess that an emulator will be used, and this will also come as part of the AmigaNG's software package. Although this will possibly be omitted from certain machines running Amiga OS5 (such as the games-console, should it be developed by Sony, Nintendo etc). If you haven't already got AF and read the interview I urge you too. It's the most solid info on the New Amiga's yet and shows a lot of promise. It's certainly brought a smile to my face! :) -- Lion Enter the Lion's den!!! - This months rant: Being Broke!!!!!! http://www.fluidcontrol.demon.co.uk/lion Send any mails with attatchments (over 200k) to dead_burt@yahoo.com, Send mails without attachments to \"Lion@fluidcontrol.demon.co.uk\" for a much quicker reply."}, {"response": 8, "author": "aschuth", "date": "Tue, Apr 27, 1999 (11:12)", "body": "I got a A500 (stored away in the garage), probably all corroded by now. When I got all my IT projects done (=never), I want to take it and the A1200 (with 60 MB HD!!!) and see if they still run. I wonder if - while at it - I should get myself one of the bread boxes (C64) from the fleamarkets... The games were fun... Anybody had a ViC 20 ?"}, {"response": 9, "author": "terry", "date": "Tue, Apr 27, 1999 (17:24)", "body": "That was a long time ago. Amiga's can be had now at the Good Will for $5 or less. Even the A500s."}, {"response": 10, "author": "aschuth", "date": "Wed, Apr 28, 1999 (17:27)", "body": "Not exactly a seller's market, huh?"}, {"response": 11, "author": "aschuth", "date": "Tue, Jun  8, 1999 (12:07)", "body": "Dropped by at Abacomp, Frankfurt's oldest computer shop (since early eigthies) on my way to visit G\ufffdnter Gretz from the very interesting label \"popular african music\". Abacomp still sells any spare pieces for the VC-20, C64 and all Amigas, also for the Ataris and other computer myths. The sales guy even remembered Radio Shack's RS-80... Lots of ancient and awe-inspiring hardware on display (like harddisk drives < 100 MB big like car radios, etc.). You'll know the stuff."}, {"response": 12, "author": "terry", "date": "Sat, Nov  2, 2002 (09:34)", "body": "According to this press release http://www.eyetech.co.uk/amigaone/oct252002a.php Eyetech will begin taking orders tomorrow (Nov 2nd) \"for delivery before Christmas\" for three new PPC-based motherboards built to the AmigaOne spec. (two G3s and one G4), with the most expensive of them costing 800 Euros. These boards will run either LinuxPPC or the (still incomplete) Amiga OS4. http://www.osnews.com/story.php?news_id=1356"}, {"response": 13, "author": "terry", "date": "Mon, Nov  4, 2002 (09:53)", "body": "AmigaOneG3-SE and AmigaOne-XE Earlybird Systems now on sale! November 2, 2002 - Eyetech We're there at last. Since the last update to the AmigaOne section of the Eyetech website last March we have had AmigaOne boards out with developers, and as a result of their feedback, the original firmware which we were to have shipped with the board (by Softex) has been replaced by specially adopted PPCBoot code. That, and identifying and fixing a minor problem with the Articia southbridge chip have resulted in us holding back shipments of the consumer version of the AmigaOneG3-SE until now. Meanwhile work has continued on the AmigaOne-XE - with the replaceable cpu modules - and the price of G4 cpu's has fallen a bit, as we had all hoped. That means the we are now able to take orders for both the 600MHz G3-based AmigaOneG3-SE, and the 800MHz G4-based AmigaOne-XE, starting now, and for delivery before Christmas. A 700MHz G3 (750FX cpu) version of the AmigaOne-XE will be made available - at reduced cost - early in 2003. But what about OS4 I hear you say - is that now ready? OS4 is now highly advanced, but no, is not currently ready for shipping, largely because Hyperion have had to divert a considerable amount of their time and effort in sorting out the AmigaOne's PPCBoot firmware. In my view, OS4 for the AmigaOne will ship early in 2003. So - and in response to much user and dealer demand - we are going to ship the AmigaOneG3-SE and -XL (both boards and pre-built systems) with a LinuxPPC and UAE installation. And - the best of all - those of you ordering an AmigaOne up to December 31st will be sent a free copy of OS4 as soon as it becomes available. That alone represents a saving of around 10% on an AmigaOneG3-SE system Continued at ... http://os.amiga.com/corporate/110202-eyetech.shtml computer conference Main Menu"}]}, {"num": 6, "subject": "Help needed", "response_count": 38, "posts": [{"response": 2, "author": "terry", "date": "Sat, Apr 18, 1998 (23:44)", "body": "Show up at Luby's on a Tuesday night and you'll find about 100 folks who can do this at the ham radio club meeting. See http://www.repeater.org for meeting times, days."}, {"response": 4, "author": "terry", "date": "Sun, Apr 19, 1998 (10:10)", "body": "Maybe they can switch the meeting to Little Italy?"}, {"response": 5, "author": "aschuth", "date": "Sun, Jun 13, 1999 (05:28)", "body": "HELP! I've formatted the wrong harddisk. How can I restore the data? I've switched the PC off after this, and immediately took the HD out, so nothing accessed it or overwrote sectors after the mishap."}, {"response": 6, "author": "KitchenManager", "date": "Sun, Jun 13, 1999 (10:14)", "body": "My only guesses are: do you have a recovery program, like one of the Norton's? take it to a shop that does data recovery."}, {"response": 7, "author": "aschuth", "date": "Sun, Jun 13, 1999 (17:30)", "body": "Huh, ever done the shop thing? Place where I worked had the same prob once, and shipped the drive to London to pay heavy, I remember something like 7.000 british pounds. Oh, and they did get results for it, too... But I'm still no-budget, can't do that... Does anybody you know tried doing this with the Norton tools?"}, {"response": 8, "author": "KitchenManager", "date": "Sun, Jun 13, 1999 (18:15)", "body": "nope..."}, {"response": 9, "author": "aschuth", "date": "Mon, Jun 14, 1999 (11:21)", "body": "Terry? Ray? Anybody else here who knows about this stuff?"}, {"response": 10, "author": "terry", "date": "Tue, Jun 15, 1999 (13:35)", "body": "Try Nortons."}, {"response": 11, "author": "aschuth", "date": "Tue, Jun 15, 1999 (13:49)", "body": "Norton's Utilities, right? Been to Symantec's website; they offer so much... And if it is \"Utilities\", which of the zillion tools would do this? There's Unformat, Unerase, Disk Doctor, Crash Guard..."}, {"response": 12, "author": "KitchenManager", "date": "Tue, Jun 15, 1999 (23:32)", "body": "not sure...I was just guessing...let me ask someone tomorrow and see if they know...until then see if you can find out more about Unformat and Disk Doctor..."}, {"response": 13, "author": "aschuth", "date": "Wed, Jun 16, 1999 (03:38)", "body": "From http://www.symantec.com/nu/fs_nu4-9x.html#features , this is not helping me a lot. Gonna call their tech support... They tell us about fixing Windows registry proplems, catching aborted tasks and the like, but nuthin' about the down and dirty and dumb like restoring one's hd. Norton Utilities 4.0 for Windows 95/98 Powerful Solutions to Fix and Prevent Computer Problems Overview Norton Utilities\ufffd gives you more effective problem solving than any other product. NORTON UTILITIES 4.0 makes using your computer safer, easier and faster. It detects, prevents and repairs more hardware and software problems than ever. It gives you more control over how to solve Windows 95 and Windows 98 software and hardware conflicts. It troubleshoots modem problems that prevent you from logging onto the Internet. It protects against system crashes and data loss. It optimizes performance, speeding up your computer. It updates itself and other applications. It provides the most advanced disaster recovery available. Why trust your computer, your data, to anything less than the most complete and powerful utilities available? Key Features Solves PC problems quickly. Norton System Check\ufffd gives you all the power of Norton Utilities\ufffd at the click of a single button. It not only finds problems, it also suggests how to fix them. You can run Norton System Check manually, or, in Windows 98, schedule it to perform periodic maintenance on your PC. The new Registry Doctor scan provides extra protection by fixing unsuspected corruption in the Windows registry. Saves your work from crashes. Norton Utilities comes with Norton CrashGuard\ufffd, a $29.95 value. CrashGuard automatically protects against application crashes and screen freezes. It stops crashes from becoming major disasters by helping you save your open documents and letting you get back to work quickly. Rescues your PC from emergencies. Available only in Norton Utilities, the improved Norton Zip Rescue\ufffd feature allows you to save rescue information to an Iomega Zip or Jaz drive. It also lets you easily restore missing or corrupt Windows files. The Rescue Recovery Wizard guides you through the process of restarting and fixing a system that won't boot. Together, these two features let you boot to a full working copy of Windows, and save your work and critical system files. Fixes Internet connection problems. Don't let modem problems keep you off the Internet. Norton Utilities now includes Symantec's unique Connection Doctor\ufffd, which tests your modem to ensure that it's working properly and has no hardware or software conflicts with your PC. Then Connection Doctor uses a troubleshooting wizard to help you quickly solve any problems it finds. Maximizes your PC's performance. Norton System Doctor\ufffd continuously monitors your PC to keep it free of problems and running at peak efficiency. System Doctor can fix many problems automatically-without interrupting your work. Speed Disk\ufffd improves system performance by minimizing file fragmentation on the hard drive so that files can be read and written faster. System Requirements IBM PC or 100% compatible computer 80486 or higher processor Windows 95 or Windows 98 (this product will not run under DOS, Windows 3.x, or Windows NT) 8 MB RAM (16 MB or greater recommended) 70 MB free hard disk space for typical installation; 47 MB for compact installation CD-ROM drive (double-speed or higher) 256-color VGA or better video Optional: Sound card Optional: Iomega\ufffd Zip\ufffd or Jaz\ufffd drive"}, {"response": 14, "author": "aschuth", "date": "Tue, Jun 22, 1999 (13:22)", "body": "Got it all back, courtesy of Norton Utilities 4.0's tool Unformat. Feels good to have the E-Mails back... Why I'm not hopping up and down, mad with joy? Mad as hell, that's why! And joyful and happy that for ONCE I've preceded a disaster by smart side-step. After recovering my data, I put yet another harddisk into my crate, an old 540 MB one, to use exclusively for business files i had up till then stored EXCLUSIVELY on a ZIP cartridge (so I could juggle between the PC and the Mac)... Need I say more? DISASTER 2.0 Two days later, Click Of Death(TM). My, the very luck to have copied the whole ZIP cartridge's content onto the new disk... I of course immediately made another backup of that on another harddisk. I mailed Iomega to ask for advice, gotta wait and see what comes of this... Meanwhile, I've searched the web (using the Go! thing here on the Spring - another 2 c from the heart!) for the story on this. The best informed and flame-low is probably http://grc.com/clickdeath.htm , but there are zillions of people out there that are quite upset... Like certain grapgic designers I know who recently lost a drive, too - plus data on the media... The mentioned site tells what to do, what to use and what chances are to recover data and get an replacement of the faulty drive."}, {"response": 15, "author": "aschuth", "date": "Tue, Jun 22, 1999 (13:26)", "body": "Oh, by the way - Symantec's tech support was really friendly and competent and advising me how to use their product and gave me even a customer number for 60 days of free phone support BEFORE I even bought the Utilities! I had just called to inquire would they think their product could help me... (The german phone support accidentally has a 069 area code, which is Frankfurt, but the call gets routed to a call center in the Netherlands... Modern times, I guess.)"}, {"response": 16, "author": "aschuth", "date": "Mon, Jun 28, 1999 (10:49)", "body": "Didn't get the replacement Zip drive yet. But the saga continues. Remember the harddisks I mentioned (\"an old 540 MB one, to use exclusively for business files\", \"another backup of that on another harddisk\")? Looks like both are history, too..."}, {"response": 17, "author": "aschuth", "date": "Mon, Jun 28, 1999 (13:36)", "body": "OK. everybody, if you can tell me anything about any of these products, feel free to do so. I've surveyed the market, and these tools seem to relate to my current set of disasters: Gibson Research Corp. ( http://grc.com/default.htm ) SpinRite Symantec ( http://www.symantec.com ) Norton Works Norton Utilities (don't do the job - can't find the drive...) PowerQuest ( http://www.powerquest.com ) PartitionMagic Lost & Found Search & Rescue Especially the last two products look like they might be worth the try... And something else - folks, please *DO* backup. And backup the backups. (You've heard that, Wolf and Wer? It's eaten MY website, MY everything... Three times in ten days! You don't want to live through that, trust me.)"}, {"response": 18, "author": "stacey", "date": "Mon, Jun 28, 1999 (17:20)", "body": "Yesterday, All those backups seemed a waste of pay. Now my database has gone away. Oh, I believe in yesterday. Suddenly, There's not half the files there used to be, And there's a milestone hanging over me The system crashed so suddenly. I pushed something wrong What it was I could not say. Now all my data's gone and I long for yesterday-ay-ay. Yesterday, The need for backups seemed so far away. I knew my data was all here to stay, Now I believe in yesterday. (Just a reminder...)"}, {"response": 19, "author": "aschuth", "date": "Tue, Jun 29, 1999 (06:51)", "body": "Yes, and I've seen that posted in enough offices in my lifetime. Thanks for your sympathy, it makes me feel SO much better, ha! Backups: I had trippple copppies of evvverythinggg - one on a Zip cartridge, which passed away Sunday last week, and one on each of the drives! I mean, after restoring the harddisk mentioned above (response 5), I learned something. I put in a old spare disk, put all crucial data from the Zip on it, and from the restored drive also all really important stuff. Then first the cartridge goes, as my Zip drive died (acute \"Click of Death\"-syndrome), and six days later BOTH harddisks (due to physical impact)... I'm looking into obtaing PowerQuest's \"Lost & Found\" and a new disk. Anybody around with experience with Lost & Found?"}, {"response": 20, "author": "KitchenManager", "date": "Tue, Jun 29, 1999 (12:37)", "body": "not I..."}, {"response": 21, "author": "aschuth", "date": "Tue, Jun 29, 1999 (12:51)", "body": "On the other hand, Ontrack is back in the game. Their product Tiramisu (!) sounds at least as promising as Lost & Found, plus you can download a trial version that will diagnose the drive and tell you which files can be restored. Only then you have to buy the software, which is approx. USD 20 more that PowerQuest's offer, and can restore the data to a new drive. What's special about Lost & Found and Tiramisu is, they don't write to the damaged disk. They both just read off it to a new drive or Zip or Floppy. The nice thing about this is, no sectors get overwritten, and unless the read/write heads physically damage the disk, you still have all other options left (including sending the drive to Ontrack's or PowerQuest's labs...)."}, {"response": 22, "author": "terry", "date": "Tue, Jun 29, 1999 (15:07)", "body": "So did you recover your stuff?"}, {"response": 23, "author": "aschuth", "date": "Thu, Feb  7, 2036 (13:16)", "body": "Not yet... But I'll diagnose the drive with the test version of Tiramisu later... Also, I still wait for the replacement Zip drive. I want to restore that damaged cartridge first, because nearly everything important is on there - the harddisk was the backup for that, and vice versa..."}, {"response": 24, "author": "terry", "date": "Wed, Jun 30, 1999 (11:44)", "body": "What are you going to do after you get everything restored to prevent this from happening again? Have you thought of running a drive array, as in RAID?"}, {"response": 25, "author": "aschuth", "date": "Thu, Jul  1, 1999 (13:46)", "body": "Terry, this is an excellent question! And I have tried to ignore it as good as I only could, at least until I got something back. But since you aked... What am I going to do? Getting some serious RAID amounts to having funds for a RAID controller plus a bunch of disks, e.g. 5 x 4 GB. What's that, RAID 5 or something, right? RAID 2 - that was disk mirroring, I think. Either a controller again, or software mirroring. What I've seen in this area didn't convince me - took the folks a hard time to just to get it into operation mode without any error messages. After a crash, the mirrored disk that was still ok wouldn't act ok. Or do you know of any cheaper way - reliable software mirroring or the like? Perhaps some freeware miracle-working stuff I could rig something up with - I got some spare parts floating around here... My best guess: separate PC with large disk and a cheapo hub. Use that box as fileserver - no more data on work desk machines - and put a weekly backup on Zip cartridges (four to six of them, rotate 'em, gives six weeks security). Not much that I would have to buy - costs: under USD 400. Would give me basic networking, too. What do you say? Any better idea? Any comment welcome!"}, {"response": 26, "author": "KitchenManager", "date": "Sat, Jul  3, 1999 (23:26)", "body": "that's what I'd do if I had the cash..."}, {"response": 27, "author": "aschuth", "date": "Mon, Jul  5, 1999 (05:49)", "body": "Raid 5 in decent config starting approx USD 8.000 (you DO want some reliability here...). Terry, what do you say?"}, {"response": 28, "author": "terry", "date": "Tue, Jul  6, 1999 (08:34)", "body": "I'd say make sure and have a bunch of redundant hard drives, even if you have to do it manually."}, {"response": 29, "author": "aschuth", "date": "Tue, Jul  6, 1999 (12:41)", "body": "OK, how do you like this for starters: (1) Weekly backup on a set of Zips, rotating them. Do one, store offsite. (2) Three HDs, on which crucial data is manually duplicated in like cycles (\"sweat equity mirroring\"); perhaps even daily during \"hot\" production phase. (Remember, I DID do weekly backups - just I lost both HDs and the Zip I put them on...)"}, {"response": 30, "author": "MarciaH", "date": "Thu, Aug 26, 1999 (18:04)", "body": "My zips are still in the package, as is the drive. Full of good intentions but I keep forgetting about doing it until I am too tired to think straight. Any suggestions ???"}, {"response": 31, "author": "aschuth", "date": "Tue, Aug 31, 1999 (14:24)", "body": "DO IT NOW!"}, {"response": 32, "author": "MarciaH", "date": "Tue, Aug 31, 1999 (15:22)", "body": "Yes Sir!!! (rummaging in my drawer hunting for the package I know is hiding in there...) You will save me a lot of grief in the long run. Thanks!"}, {"response": 33, "author": "aschuth", "date": "Sat, Sep 18, 1999 (16:45)", "body": "It's never too early to back-up stuff... Nor too late... (at least until something happens). My disk has been inaccessible again a couple days ago. \ufffd$%&!!! Thanks, Norton Utilities! Works again now."}, {"response": 34, "author": "MarciaH", "date": "Sat, Sep 18, 1999 (19:30)", "body": "Norton has saved my backside more times than I care to remember. Bless the genius who created it and made it available to us mortal souls."}, {"response": 35, "author": "aschuth", "date": "Mon, Sep 20, 1999 (14:21)", "body": "Indeed, to us, and to our mortal souls!"}, {"response": 36, "author": "sociolingo", "date": "Tue, Nov 23, 1999 (14:04)", "body": "Followed the above discussion with interest having had wierd episodes recently - like a large number of essential exe files disappeared after I'd used add/remove programmes to remove a programme. Ended up reinstalling win98. I'm sold on norton uninstall deluxe and will never use the win98 add/remove programmes. Anyone tried McAfee Nuts and Bolts? I have a HELP query. I've tried both Norton antivirus and the McAfee virusscan, and I'm having trouble getting any downloaded virus updates to unpack and get used. The latest problem was with McAfee virusscan where the virus update downloaded fine but refused to unpack saying there's not enough disk space to expand the file. I have 1.5. Gb of hard disk free. I think there may be a temp file problem , but i can't find where andnhow to clear it. Any ideas anyone?"}, {"response": 37, "author": "aschuth", "date": "Fri, Dec 10, 1999 (05:13)", "body": "No. I use F-Prot."}, {"response": 38, "author": "MarciaH", "date": "Fri, Dec 10, 1999 (13:26)", "body": "Maggie, I have a $70 investment in McAfee software which was once downloaded ont my hard drive but made everything run so slowly then freeze up that I deleted it. Gonna have to have a talk to their tech staff. This is not uncommon, I hear. I have also gotten that insufficient space information and I have 6.4 Gig of hard drive space."}, {"response": 39, "author": "MarciaH", "date": "Tue, Dec 14, 1999 (23:15)", "body": "Computer Acronyms (Blame John!) PCMCIA - People Can't Memorize Computer Industry Acronyms PENTIUM - Produces Erroneous Numbers Through Incorrect Understanding of Mathematics WWW - World Wide Wait COBOL - Completely Obsolete Business Oriented Language CD-ROM - Consumer Device - Rendered Obsolete in Months OS/2 - Obsolete Soon, Too. MIPS - Meaningless Indication of Processor Speed WINDOWS - Will Install Needless Data On Whole System MICROSOFT - Most Intelligent Customers Realize Our Software Only Fools Teenagers LISP - Lots of Infuriating & Silly Parenthesis RISC - Reduced Into Silly Code SCSI - System Can't See It DOS - Defective Operating System BASIC - Bill's Attempt to Seize Industry Control IBM - I Blame Microsoft DEC - Do Expect Cuts"}, {"response": 40, "author": "MarciaH", "date": "Thu, May 11, 2000 (15:18)", "body": "Operating Systems You probably know that Windows, MacOS, and Linux are popular \"operating systems\" for a computer, but do you know what an OS actually does? It is much more than just the pretty face that manages all of your windows and lets you browse your files. On the most fundamental level, operating systems are about managing system resources, including memory, processing time, disk space, network connections, graphics and screen real estate, printers, and all of the other peripherals that you can attach to your computer. For example, even when you are only running one application program, there are generally many more programs running in the background, and the OS is responsible for scheduling them so they each get a fair chance to run on the CPU. And it prevents them from writing over the memory that the other is using. computer conference Main Menu"}]}, {"num": 7, "subject": "Y2K or Year 2000 problem", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Sat, May  2, 1998 (10:22)", "body": "Some of the best observations I have heard are from cybrcync@well.com Any company with, say, one or more mainframes or 50+ PCs hooked up to some servers had better be hustling by now. We're down to 20 months. 600 days plus change. Any way you look at it, the schedule is starting to look tight. Here are some typical steps in a Y2K project, all of which must be done within 20 months. Complete Inventory of Hardware/Software. Replacement of machines that may cause problems. Replacement of potentially troublesome operating-system software. Replacement of potentially troublesome standard office software. Use available software to fix existing databases. Use available software to fix ~80% of custom applications. Hire programmers to fix remaining ~20%. Test. Need to check how prepared customers and vendors will be. I think you are going to need a lot of coffee...."}, {"response": 2, "author": "terry", "date": "Sun, Oct 11, 1998 (11:31)", "body": "computer conference Main Menu"}]}, {"num": 8, "subject": "cases and cooling", "response_count": 2, "posts": [{"response": 1, "author": "terry", "date": "Thu, Aug 20, 1998 (08:29)", "body": "Check out these people: http://www.pcpowercooling.com/ Also a list of competing vendors here: http://www.tdl.com/~netex/cases/cases.html"}, {"response": 2, "author": "MarciaH", "date": "Thu, May 25, 2000 (03:02)", "body": "Yeah - so that. I got a second hand winbook w95 laptop which ran so hot that it finally depolymerized the case and it shattered around the frame holding the LCD screen. I have it still unfixed because they wanted about $900 to do all that needed to be done - and I had spent $500 to buy it in the first place. It is unusable as it is now, and it was a wonderful laptop. It was my only means of communication when we came back to a house burgled of all electronic equipment! computer conference Main Menu"}]}, {"num": 9, "subject": "Java & Javascript", "response_count": 8, "posts": [{"response": 1, "author": "terry", "date": "Tue, Oct  6, 1998 (09:48)", "body": "IBM's last desktop stand: Netscape yes, Windows no, OS/2 on it's own By Sm@rt Reseller October 5, 1998 4:28 AM PT It's a software initiative that could decide who owns corporate desktops for the next 10 years. More vaporware from Microsoft Corp.? Hardly. This time, it's IBM Corp. taking the offensive. Indeed, IBM (NYSE:IBM) has drawn up a strategic blueprint to transform its enterprise business into an electronic-commerce powerhouse that spans millions of corporate desktops. In addition to betting the bank on Java, the blueprint calls for IBM to pump up Netscape's desktop business, head off Microsoft's Web browser and aggressively push OS/2 Warp customers onto other platforms. That strategy, outlined in a 12-page internal document from IBM's Network Computing Software Division and viewed by Sm@rt Reseller, banks heavily on buy-in from IBM's resellers and technology partners. The IBM document, dated July 30, was posted briefly on an independent OS/2 Web site last week. IBM was none too pleased about the leak. Jeff Smith, director of OS/2 Business Line Management and Network Computing Software, successfully petitioned the Web site's manager to remove the document but was unavailable for comment. While Smith wasn't talking, the document spoke volumes about IBM's most pressing business concerns. In a worst-case scenario, Microsoft (Nasdaq:MSFT) could cripple IBM if Bill Gates & Co. succeeds in making Windows an e-commerce standard containing proprietary application programming interfaces. The document says that Microsoft's Internet, Zero Administration Windows, Windows CE and Windows-based terminal efforts are designed to prevent the widespread adoption of Java \"by extending Windows with the key features required to support network computing.\" What does all that mean? In a nutshell, the paper says IBM is striving to keep corporate desktops open by teaming with Netscape Communications Corp. (Nasdaq:NSCP) to position Java applications against Microsoft's COM/DCOM object model, \"which locks customers into Windows on both the client and the server.\" Java majority by 2003 IBM hopes to ensure that 50 percent of PCs in 2003 are capable of running 100% Pure Java applications. \"We will accomplish this by helping Netscape remain a major player on the desktop and ensuring the 100% Pure Java applications will run in Microsoft's Internet Explorer,\" the document says. But Microsoft isn't the only company keeping IBM up at night. IBM's software strategy also identifies two surprising names that could undermine Big Blue's massive e-business offensive: Cisco Systems Inc. (Nasdaq:CSCO) and Network Associates (Nasdaq:NETA). IBM fears that Cisco may succeed in transforming its Internetworking Operating System and Microsoft's Active Directory into a networking platform \"for building and deploying value-added services.\" That's precisely Cisco's plan. \"We respect IBM and its e-business efforts, but it missed the boat on networking and desktop OSes,\" says a Cisco exec who requested anonymity. \"Cisco and Microsoft are a natural combination for e-commerce.\" Network Associates challenges Network Associates, meanwhile, is rapidly emerging as a premier supplier of enterprise security and management software-a market reality that threatens the viability of IBM's Tivoli subsidiary. To combat those threats, the paper says IBM needs to establish Java as the de facto industry standard for building, deploying and managing e-business applications. The company also must build a high-growth business helping customers extend their networking infrastructure to support e-business across heterogeneous systems. Along the way, IBM hopes to provide best-of-breed networking infrastructure technology. IBM's strategy banks heavily on support from resellers, ISVs and key vendor allies, such as Netscape, Novell Inc. (Nasdaq:NOVL) and Sun Microsystems Inc. (Nasdaq:SUNW). On the reseller front, IBM says that 75 percent of fulfillment for eNetwork PC and Unix products is through the channel, but only 10 percent of the company's resellers are actively selling those products. It also identifies specific target resellers for certification and active selling as IBM systems and network integrators, Novell Platinum resellers, and Microsoft SNA Server Solution Providers. Backed by its partners, IBM hopes to have 50 percent of new apps built on Java by 2003, and it wants to make Java a standard on 50 percent of new client devices (smart phones, etc.) by 2001. IBM's plan without its challenges. For starters, IBM says Netscape must maintain at least 30 percent of the browser market. Otherwise, \"ISVs will drop support, customers will start moving to IE and the battle for the client will be lost,\" the document says. IBM already is formulating a backup plan to \"protect its server business,\" just in case IE tramples Netscape on the desktop. OS/2 biggest loser The biggest loser in IBM's Java initiative is OS/2. The document confirms that IBM will continue cutting OS/2 R&D. \"Eve"}, {"response": 2, "author": "terry", "date": "Tue, Oct  6, 1998 (09:48)", "body": "IBM's plan for domination By The staff, Sm@rt Reseller October 5, 1998 5:07 AM PT IBM lays out its five-step Java plan...: 1. Promote Netscape: Help Navigator maintain at least a 30-percent share of the browser market. 2. Partner With HP: Both will promote embedded Java. 3. Keep PCs Open: Ensure that at least 50 percent of PCs in 2003 can run 100% Pure Java applications. 4. Target Internet Explorer: Help Sun enhance Activator, which supports 100% Pure Java apps on Microsoft's Web browser. 5. Think Thin: Make at least 50 percent of new client types (set-top boxes, etc.) support 100% Pure Java apps by 2001. ...But Big Blue has six potential problems: 1. Java Isn't Proven: Network Computing Software Division Strategy \"is based on several unproven emerging markets.\" 2. Strategic Partners: \"The entire industry must behave like a single, focused competitor to Microsoft. It is difficult and time-consuming to keep the coalition together.\" 3. ISVs: \"IBM does not have a good track record with independent software vendors.\" 4. Internet Explorer: \"If Microsoft dominates the browser, it will make it difficult for us to succeed.\" 5. Java Funding: \"Netscape and Sun are faced with their own financial challenges and are not able to fund their 'fair share.' \" 6. Cost/Complexity Of Heterogeneity: \"Our costs will be higher and our margins lower than Microsoft.\" ...And undermines OS/2 1. Slash R&D: IBM has \"significantly reduced investments\" in OS/2, and predicts that there will be a \"continuing competitive erosion of OS/2 as both a server and a client.\" 2. Reduce Partnerships: There is \"a continued decline in OS/2 support by our solution partners and other IBM divisions.\" 3. Move OS/2 Customers To Java: \"Eventually, customers will have to move to another platform or accept a lower level of function\" from OS/2. Source: IBM Network Computer Software Division Strategy document."}, {"response": 3, "author": "ratthing", "date": "Tue, Oct  6, 1998 (10:14)", "body": "terry, just out of curiosity, how does this news affect what you do for a living?"}, {"response": 4, "author": "terry", "date": "Tue, Oct  6, 1998 (21:52)", "body": "It's the project I'm working on."}, {"response": 5, "author": "KitchenManager", "date": "Fri, Oct  9, 1998 (00:47)", "body": "Thomas is going to school on Java for an IBM affiliate right now..."}, {"response": 6, "author": "wolf", "date": "Sat, Oct 10, 1998 (21:25)", "body": "ok, i finally mosey'd on over here and i still don't know what java is about *grin*"}, {"response": 7, "author": "CotC", "date": "Mon, Nov  2, 1998 (12:50)", "body": "Howdy, Check out http://www.alphaWorks.ibm.com/Home There's some kinda nifty Java hoohah a'goin' on over there."}, {"response": 8, "author": "terry", "date": "Mon, Nov  2, 1998 (14:21)", "body": "That's a good site along with http://www.gamelan.com computer conference Main Menu"}]}]}