Wednesday, September 08, 2004
XP SP-2 Update
As an update to my 8/23 blog, I recommended this strategy to minimize the destruction caused by the Microsoft update.
1. Turn off "automatic update" to prevent Microsoft from updating your computer to SP-2. Right click on My Computer, choose Properties, and review the options under the automatic updates tab.
2. Run software to remove spyware to clean existing problems. Many of the security improvements in SP-2 are intended to block spyware, but can't protect you from malicious programs that are already running on your computer. AdAware and SpyBot are most recommended. You can get them free at cnet.com/downloads or download.com. It's very important that you keep spyware off your computer.
3. Do full backups. Don't wait to be surprised by problems that occur with your data files.
4. Back up your Windows Registry, by clicking Start / Run and typing regedit and then choose File / Export and name the file regbkup so you can restore it if needed.
5. Make frequent use of Windows System Restore to set restore points. You'll find this under Start / Programs / Accessories / System Tools
6. Download patches from vendors whose products won't work right after the Microsoft update. Among the known problems are conflicts with Norton products, some AOL features, FTP, and SBC Global DSL. Learn more at http://support.microsoft.com/default.aspx?kbid=842242.
PC Magazine (www.pcmag.com) reports the focus of SP2's increased security, as well as the cause of most problems is the new Windows Firewall, which replaced Windows XP's Internet Connection Firewall (ICF).
When you run firewall software, you have to be prepared to learn how to approve or block incoming and outgoing activity over the Internet and manage the process to allow exceptions for the programs you want to access the web, such as IM or FTP. Keep in mind, though, that making a broad exception to allow programs to run on your computer and online will defeat the purpose of the security. When in doubt, I recommend you do not allow a program to access the web, and see if you can still function well online. If your access to something vital is blocked, then change the rule to allow access. Learn more about firewalls at www.cnet.com.
Stay safe online,
Helen Gallagher
1. Turn off "automatic update" to prevent Microsoft from updating your computer to SP-2. Right click on My Computer, choose Properties, and review the options under the automatic updates tab.
2. Run software to remove spyware to clean existing problems. Many of the security improvements in SP-2 are intended to block spyware, but can't protect you from malicious programs that are already running on your computer. AdAware and SpyBot are most recommended. You can get them free at cnet.com/downloads or download.com. It's very important that you keep spyware off your computer.
3. Do full backups. Don't wait to be surprised by problems that occur with your data files.
4. Back up your Windows Registry, by clicking Start / Run and typing regedit and then choose File / Export and name the file regbkup so you can restore it if needed.
5. Make frequent use of Windows System Restore to set restore points. You'll find this under Start / Programs / Accessories / System Tools
6. Download patches from vendors whose products won't work right after the Microsoft update. Among the known problems are conflicts with Norton products, some AOL features, FTP, and SBC Global DSL. Learn more at http://support.microsoft.com/default.aspx?kbid=842242.
PC Magazine (www.pcmag.com) reports the focus of SP2's increased security, as well as the cause of most problems is the new Windows Firewall, which replaced Windows XP's Internet Connection Firewall (ICF).
When you run firewall software, you have to be prepared to learn how to approve or block incoming and outgoing activity over the Internet and manage the process to allow exceptions for the programs you want to access the web, such as IM or FTP. Keep in mind, though, that making a broad exception to allow programs to run on your computer and online will defeat the purpose of the security. When in doubt, I recommend you do not allow a program to access the web, and see if you can still function well online. If your access to something vital is blocked, then change the rule to allow access. Learn more about firewalls at www.cnet.com.
Stay safe online,
Helen Gallagher
Monday, August 23, 2004
Windows XP SP-2 update risks
Since Microsoft has announced the major patch, Service Pack 2, for Windows XP, users are scrambling to understand whether the security improvements are worth the trouble to obtain.
Users of Windows 98 and Windows ME are happily unaffected by this change.
SP-2 is a 'fix' for flaws in Windows XP. It is so major, it's almost like getting a new copy of Windows. But it requires disk space and memory to run. It requires a huge amount of disk space, and a long time to download. For people using dial-up, it might be more effective to order the CD from Microsoft.
Microsoft recommends turning on Windows Update and letting it download a little bit of the program every day. That eases the burden on their download servers more than it helps us, but it is probably a good idea. Also, remember to use System Restore frequently to set a restore point so you at least have a chance of undoing the changes if you run into trouble.
Disk space
You'd think Microsoft was profiting from the sale of hard drives, with their expansive need for disk space to download the patch. Their web site suggests you need almost one gigabyte (1 GB) of disk space free on Windows XP Home and 1.5 GB on XP Professional. This is for the service pack itself, working space, space for files it will delete and room to keep track of what it's doing.
The rewards
The patch is intended to fix the security flaws in the Microsoft operating system and in Internet Explorer. These products are vulnerable to hackers and have cost corporations millions of dollars to set defenses, buy redundant protection, and clean up from hacker attacks. Companies have put significant pressure on Microsoft to do something about the weaknesses in its program, and this is their solution.
Oddly, as users we won't see much of the benefit of this increased security, but we will be frustrated by it when it hinders something we used to do just fine before this alledgely helpful 'fix.'
The risks
Some vendors, such as SBC Global, are already aware of conflicts caused by the Microsoft patch and have a work-around. So now this necessitates visiting their web site and downloading the patch that will keep your DSL connection working. Many other vendors will be tagging along, cleaning up the mess left behind by the Microsoft upgrade.
Because of the firewall feature, users of Internet games, Instant Messaging and even ETrust and Norton Anti-Virus may run into trouble. It's interesting that Microsoft has added it's own anti-virus program in the service pack, thereby effectively disabling the anti-virus software we bought from other vendors. In most cases the solution just requires telling the new Microsoft firewall to open a port allowing these programs to send data out from your computer, but it sure is annoying to have this forced on us by Microsoft.
Just as when we first moved to Windows XP, there are some programs and devices that won't work with the upgrade. And, with the unfriendly firewall, you'll be surprised by the intrusion of it's messages every time you want to access the Internet. Like a new puppy, the program can be trained to know what "out" means, so you just need to exercise patience along with your mouse finger when the messages appear. Bear in mind, for a firewall to be effective, you can't ruthlessly say "yes" to everything, or you'll be defeating the purpose of the protection.
Well, there will be more news on this as pioneers report all the problems they discover with the patch. Stay current by reading CNet at www.cnet.com or PC Magazine at pcmag.com, and check back here for more articles soon.
Users of Windows 98 and Windows ME are happily unaffected by this change.
SP-2 is a 'fix' for flaws in Windows XP. It is so major, it's almost like getting a new copy of Windows. But it requires disk space and memory to run. It requires a huge amount of disk space, and a long time to download. For people using dial-up, it might be more effective to order the CD from Microsoft.
Microsoft recommends turning on Windows Update and letting it download a little bit of the program every day. That eases the burden on their download servers more than it helps us, but it is probably a good idea. Also, remember to use System Restore frequently to set a restore point so you at least have a chance of undoing the changes if you run into trouble.
Disk space
You'd think Microsoft was profiting from the sale of hard drives, with their expansive need for disk space to download the patch. Their web site suggests you need almost one gigabyte (1 GB) of disk space free on Windows XP Home and 1.5 GB on XP Professional. This is for the service pack itself, working space, space for files it will delete and room to keep track of what it's doing.
The rewards
The patch is intended to fix the security flaws in the Microsoft operating system and in Internet Explorer. These products are vulnerable to hackers and have cost corporations millions of dollars to set defenses, buy redundant protection, and clean up from hacker attacks. Companies have put significant pressure on Microsoft to do something about the weaknesses in its program, and this is their solution.
Oddly, as users we won't see much of the benefit of this increased security, but we will be frustrated by it when it hinders something we used to do just fine before this alledgely helpful 'fix.'
The risks
Some vendors, such as SBC Global, are already aware of conflicts caused by the Microsoft patch and have a work-around. So now this necessitates visiting their web site and downloading the patch that will keep your DSL connection working. Many other vendors will be tagging along, cleaning up the mess left behind by the Microsoft upgrade.
Because of the firewall feature, users of Internet games, Instant Messaging and even ETrust and Norton Anti-Virus may run into trouble. It's interesting that Microsoft has added it's own anti-virus program in the service pack, thereby effectively disabling the anti-virus software we bought from other vendors. In most cases the solution just requires telling the new Microsoft firewall to open a port allowing these programs to send data out from your computer, but it sure is annoying to have this forced on us by Microsoft.
Just as when we first moved to Windows XP, there are some programs and devices that won't work with the upgrade. And, with the unfriendly firewall, you'll be surprised by the intrusion of it's messages every time you want to access the Internet. Like a new puppy, the program can be trained to know what "out" means, so you just need to exercise patience along with your mouse finger when the messages appear. Bear in mind, for a firewall to be effective, you can't ruthlessly say "yes" to everything, or you'll be defeating the purpose of the protection.
Well, there will be more news on this as pioneers report all the problems they discover with the patch. Stay current by reading CNet at www.cnet.com or PC Magazine at pcmag.com, and check back here for more articles soon.
Thursday, August 05, 2004
Laptop or desktop?
One advantage to this blog is the ability for me to address questions I'm frequently asked. At least once a week, I advise clients and colleagues on the merits of choosing a laptop over a desktop computer.
A laptop, now often called a "notebook" offers the obvious advantage of small size and portability. But it's never easy to have data in two places instead of one, so adding a laptop to a desktop environment requires some discipline to copy or synchronize files across both computers.
A fully loaded laptop, often called a desktop replacement, has either a docking station, or an array of ports on the sides and back. This allows you to keep peripheral devices plugged in and always available, such as a full size monitor, printer, and network connection.
Of course, portability becomes a drag if you do that, since you have to unplug everything to head out the door. So ultra-portable notebooks become a highly coveted choice and often a more cost effective purchase in the long run. After all, we're measuring productivity when we invest in office equipment.
The lightest computers, from Sony, Sharp, Dell and IBM weigh under three pounds, but do so by skipping the essential places to plug in various devices, usually lack a floppy disk, and often have an external CD or DVD . Now you know why they are so light!
Evaluate the purchase of a new computer by comparing these components:
processor
screen size
hard disk capacity
memory
battery life
weight
available options to support:
floppy drive, CD, printer port, network, wireless, USB devices
sound quality if that's important in your work
warranty
cost of extended warranty
Every new computer has a warranty and most system failures happen early on. Yet laptops are delicate, have specialized parts and are harder to repair. The extended warranty almost always pays for itself, so consider it, even if it adds 10% to the original cost of the computer.
Don't' spend $3,000 on a new computer, though, thinking it's your dream machine. Buy the best computer that's in your price range, and don't expect it to still operate at peak performance in three years It will be obsolete, but you'll still love it.
A laptop, now often called a "notebook" offers the obvious advantage of small size and portability. But it's never easy to have data in two places instead of one, so adding a laptop to a desktop environment requires some discipline to copy or synchronize files across both computers.
A fully loaded laptop, often called a desktop replacement, has either a docking station, or an array of ports on the sides and back. This allows you to keep peripheral devices plugged in and always available, such as a full size monitor, printer, and network connection.
Of course, portability becomes a drag if you do that, since you have to unplug everything to head out the door. So ultra-portable notebooks become a highly coveted choice and often a more cost effective purchase in the long run. After all, we're measuring productivity when we invest in office equipment.
The lightest computers, from Sony, Sharp, Dell and IBM weigh under three pounds, but do so by skipping the essential places to plug in various devices, usually lack a floppy disk, and often have an external CD or DVD . Now you know why they are so light!
Evaluate the purchase of a new computer by comparing these components:
processor
screen size
hard disk capacity
memory
battery life
weight
available options to support:
floppy drive, CD, printer port, network, wireless, USB devices
sound quality if that's important in your work
warranty
cost of extended warranty
Every new computer has a warranty and most system failures happen early on. Yet laptops are delicate, have specialized parts and are harder to repair. The extended warranty almost always pays for itself, so consider it, even if it adds 10% to the original cost of the computer.
Don't' spend $3,000 on a new computer, though, thinking it's your dream machine. Buy the best computer that's in your price range, and don't expect it to still operate at peak performance in three years It will be obsolete, but you'll still love it.
Friday, July 30, 2004
Adding comments here?
Several people have asked about posting comments after viewing my web log. If you don't wish to register at blogspot.com with a user name and password, in order to post a comment for all to see, you are welcome to e-mail me, any time, at Helen@cclarity.com
Thanks.
If you want to try the blog experience yourself, to share your thoughts with colleagues and family, just sign up at blogspot.com and give it a try. The steps are easy to follow, and it's a good learning experience.
Sincerely,
Helen Gallagher
Thanks.
If you want to try the blog experience yourself, to share your thoughts with colleagues and family, just sign up at blogspot.com and give it a try. The steps are easy to follow, and it's a good learning experience.
Sincerely,
Helen Gallagher
Organize Bookmarks & Favorites
Here's a little tutorial, by popular request, to organize and track web sites you visit, so you can view them again. The topic arises every time I see a client write down a web address on a Post-it note and struggle to keep track of that sticky little note.
Wouldn't it be better to let the computer keep track of web sites you visit, in one well organized file?
Here's how...
In Netscape, you create a "bookmark." In Internet Explorer it's called a "favorite."
1. Depending on your browser, click Bookmarks or Favorites to add a site so you can access it again without typing in the address each time. You now have the web address listed in a file instead of on a scrap of paper, so we're off to a good start.
2. Take a moment to look through the Bookmark or Favorites folder and you'll see you can manage or organize them into folders. Instead of a long string of web addresses, you can create categories that make sense to you, such as: Reference, Travel, Investments, Sports, etc.
3. When you do back-ups of your data, you can also back up this file, as it grows in importance to you, just like you back up your e-mail address book. (You do, don't you???) In fact, by saving your bookmark file, you create a live file of hyperlinks you can use as a directory of your most-used web pages.
Wouldn't it be better to let the computer keep track of web sites you visit, in one well organized file?
Here's how...
In Netscape, you create a "bookmark." In Internet Explorer it's called a "favorite."
1. Depending on your browser, click Bookmarks or Favorites to add a site so you can access it again without typing in the address each time. You now have the web address listed in a file instead of on a scrap of paper, so we're off to a good start.
2. Take a moment to look through the Bookmark or Favorites folder and you'll see you can manage or organize them into folders. Instead of a long string of web addresses, you can create categories that make sense to you, such as: Reference, Travel, Investments, Sports, etc.
3. When you do back-ups of your data, you can also back up this file, as it grows in importance to you, just like you back up your e-mail address book. (You do, don't you???) In fact, by saving your bookmark file, you create a live file of hyperlinks you can use as a directory of your most-used web pages.
- In the Netscape's Bookmark folder, click Tools / Export and save the file in your desired folder.
- In Internet Explorer, click File / Import & Export and choose the Favorites folder. Save the resulting file as .html (hypertext markup language) and you'll be able to open it as a file from your backups or on your computer, and click the live links to go to desired web pages.
Monday, July 26, 2004
Top Tech Secrets
The question I'm asked most often is "How do you keep your computer safe? What's your secret?"
Well, it's not a secret any more. Here's what I do to keep Computer Clarity systems running well and the steps I recommend for clients:
Well, it's not a secret any more. Here's what I do to keep Computer Clarity systems running well and the steps I recommend for clients:
- Backup the registry and use Registry Mechanic to fix problems early
- Run System Restore to create a safe backup point every week
- Run nightly backups, stored away from the computer
- Run msconfig to eliminate unwanted programs residing in memory
- Search the Microsoft Knowledge Base for specific problems
- Know how to load drivers
- Keep vigilant with anti-virus software, firewall and spyware prevention.
Wednesday, July 21, 2004
The dark side of 'personal' computing
As more people gravitate to computers and the web, I'm pleased to see how hard people work at learning how to treat the computer right and take good care of it. But, I'm spending most of my Summer helping people get rid of viruses, Trojan horses and spyware.
In fact, news.com states that almost one-third of computer users in the U.S. have been hit by a virus or hacker in the past two years. When I clean up malicious programs, clients are often surprised to learn they have inadvertently given permission to outsiders to use their computer, slowing it to a crawl, exhausting memory, and risking safety of your data.
Read more at www.news.com or search some of the Internet news sites like Cnet's excellent industry news at www.news.com, www.pcmag.com or www.eweek.com. Those most affected by this are using music download software and/or instant messaging services, which leave a back door open for people to tap into your computer.
Spyware is capable of tracking your Web browsing and reporting information to third-party companies who sell the information to others. Removing it can also be destructive to some components of Windows.
... From News.com: "Virginia Watson unwittingly authorized a company she'd never heard of to install software that would help turn her computer into part of a brand-new network.
In fact, news.com states that almost one-third of computer users in the U.S. have been hit by a virus or hacker in the past two years. When I clean up malicious programs, clients are often surprised to learn they have inadvertently given permission to outsiders to use their computer, slowing it to a crawl, exhausting memory, and risking safety of your data.
Read more at www.news.com or search some of the Internet news sites like Cnet's excellent industry news at www.news.com, www.pcmag.com or www.eweek.com. Those most affected by this are using music download software and/or instant messaging services, which leave a back door open for people to tap into your computer.
Spyware is capable of tracking your Web browsing and reporting information to third-party companies who sell the information to others. Removing it can also be destructive to some components of Windows.
... From News.com: "Virginia Watson unwittingly authorized a company she'd never heard of to install software that would help turn her computer into part of a brand-new network.
The software, from Brilliant Digital Entertainment, came with the popular Kazaa file-swapping program. But the 65-year-old Massachusetts resident--who has a law degree--didn't read Kazaa's 2,644-word "terms of service" contract, which stated that Brilliant might tap the "unused computing power and storage space" of Watson's computer."
The man who owns Brilliant is quite clever. In fact the sentence structure in his license agreement has been analyzed for complexity, and found to be more complex than the U.S. tax code. And keep in mind the "free" software is targeted mostly to teenagers.
Prevention methods include vigorous use of anti-virus, firewall, AdAware and Spybot programs.
Tuesday, July 20, 2004
Technology throws a fit
Yesterday, the venerable Chicago Tribune was unable to print thousands of newspapers due to a 'glitch.' The computer upgrade they ran over the weekend performed well in testing, but not in production. So newspaper delivery fellows all over Chicago were delivering a partial edition Monday and replacing it with a fuller Tuesday paper.
But, people tolerate it. It's just a computer crash, a glitch, nothing serious. Not a city-wide power failure, which would have been much worse, in July's heat.
Also yesterday, I was half naked on the doctor's examination table, hooked up to the EKG probes, when the EKG machine ran out of paper. The nurse added more, and the machine made up for it by eating too much paper, creating a paper jam during my routine physical. Good thing they had already taken my blood pressure.
Later I sauntered into the pharmacy asking for the prescription my doctor faxed over from her computer during my exam. No order from the doctor. Shopped around, read some magazines, asked again. "No. Nothing from your doctor. We have no faxes."
Uh! Wait! It's .... a paper jam!
Think about all the ways technology has become commonplace, and be glad for the days when technology does it's job well. Remember, it's not the end of the world when you can't print an envelope, your Internet connection goes down, or your computer freezes. Just roll with it and be glad for all the stuff in the world that does work! And be glad you're not naked on an examination table hooked up to nine electrodes when the paper jam occurs.
But, people tolerate it. It's just a computer crash, a glitch, nothing serious. Not a city-wide power failure, which would have been much worse, in July's heat.
Also yesterday, I was half naked on the doctor's examination table, hooked up to the EKG probes, when the EKG machine ran out of paper. The nurse added more, and the machine made up for it by eating too much paper, creating a paper jam during my routine physical. Good thing they had already taken my blood pressure.
Later I sauntered into the pharmacy asking for the prescription my doctor faxed over from her computer during my exam. No order from the doctor. Shopped around, read some magazines, asked again. "No. Nothing from your doctor. We have no faxes."
Uh! Wait! It's .... a paper jam!
Think about all the ways technology has become commonplace, and be glad for the days when technology does it's job well. Remember, it's not the end of the world when you can't print an envelope, your Internet connection goes down, or your computer freezes. Just roll with it and be glad for all the stuff in the world that does work! And be glad you're not naked on an examination table hooked up to nine electrodes when the paper jam occurs.
Tuesday, July 06, 2004
Can you manage your e-mail?
Why do we read e-mail all day long? Because we can.
It doesn’t mean it is efficient or a good use of your time. Would you run to the mailbox every five minutes to see if the mail carrier has added anything? Would you stop everything and read each piece of mail? Well, maybe I’d better say “Should you?”
When e-mail was a novelty and a secret pleasure of the techno-savvy we all used to check it a couple times a day, via dial-up and stare in amazement that someone sent us something. Now, with always-on, high-speed Internet connections, we’ve grown into a habit of checking e-mail too often. The instant connectivity may be more an interruption and drain on our concentration than a necessity.
Depending on the nature of your communications, try to check e-mail just at specific times of day, or limit yourself to three sessions. See if that is more efficient for you: To spend 15 minutes reading and replying, instead of 15 different interruptions throughout the day. Think about whether you really need to have your e-mail follow you around via radio frequencies to arrive at your PDA or cell phone.
Etiquette
One outgrowth of the overly informal, instant nature of e-mail has been poor writing style. Bad grammar, lack of punctuation, and overly casual comments are not good communication. My rule: If you wouldn’t sign your name to it as a memo, don’t send it as an e-mail.
Handling is the problem
By definition, shouldn’t the Inbox be only for new messages you haven’t read or responded to? Does the Inbox tray on your desk hold the hundreds of messages and files you’ve already read and dealt with?
If something takes less than two minutes, do it right away. Then move the message from the Inbox – either delete or drag to a folder if you need to keep it.
Make folders that parallel the organization of your paper files - by person, by project, by topic. If you conduct a fair number of online transactions it is helpful to create a folder for registrations, receipts, etc. and purge that once the transactions are completed. Okay, that’s one time when you might want to actually print something – to have a receipt.
File and retrieve
Use e-mail folders in your e-mail program, not paper. Printing e-mails just means you have two places to look when you want them and two things to throw away later. The odds are much better that you’ll find them in the computer because of built-in search capabilities.
Sorting options
1. Sort messages in your existing folders by date, sender, subject and can usually find what you need.
2. Your e-mail program has an edit /find or tools / search function, allowing you to search for a word, a date, sender
3. The ultimate solution is a program like Enfish that indexes your documents, including e-mail messages, so you can quickly search by keyword. You can find anything with Enfish (http://www.enfish.com/).
Backing up
If your e-mail is important, and you have folders with needed historical project or reference information, be sure you are backing up your e-mail when you back up your other data. You do back up your data, don’t you? If you don’t know where your e-mail resides, look in the Preference settings and see the folder location for the mail storage.
Trash
When you delete messages from your inbox, remember they just go to the trash folder – which is garbage. Depending on the critical nature of your messages, you can set the trash folder to empty on exiting from the program, or you can empty it weekly.
Adopt even two or three of these suggestions to keep from drowning in e-mail, and add more productive minutes to your days.
It doesn’t mean it is efficient or a good use of your time. Would you run to the mailbox every five minutes to see if the mail carrier has added anything? Would you stop everything and read each piece of mail? Well, maybe I’d better say “Should you?”
When e-mail was a novelty and a secret pleasure of the techno-savvy we all used to check it a couple times a day, via dial-up and stare in amazement that someone sent us something. Now, with always-on, high-speed Internet connections, we’ve grown into a habit of checking e-mail too often. The instant connectivity may be more an interruption and drain on our concentration than a necessity.
Depending on the nature of your communications, try to check e-mail just at specific times of day, or limit yourself to three sessions. See if that is more efficient for you: To spend 15 minutes reading and replying, instead of 15 different interruptions throughout the day. Think about whether you really need to have your e-mail follow you around via radio frequencies to arrive at your PDA or cell phone.
Etiquette
One outgrowth of the overly informal, instant nature of e-mail has been poor writing style. Bad grammar, lack of punctuation, and overly casual comments are not good communication. My rule: If you wouldn’t sign your name to it as a memo, don’t send it as an e-mail.
Handling is the problem
By definition, shouldn’t the Inbox be only for new messages you haven’t read or responded to? Does the Inbox tray on your desk hold the hundreds of messages and files you’ve already read and dealt with?
If something takes less than two minutes, do it right away. Then move the message from the Inbox – either delete or drag to a folder if you need to keep it.
Make folders that parallel the organization of your paper files - by person, by project, by topic. If you conduct a fair number of online transactions it is helpful to create a folder for registrations, receipts, etc. and purge that once the transactions are completed. Okay, that’s one time when you might want to actually print something – to have a receipt.
File and retrieve
Use e-mail folders in your e-mail program, not paper. Printing e-mails just means you have two places to look when you want them and two things to throw away later. The odds are much better that you’ll find them in the computer because of built-in search capabilities.
Sorting options
1. Sort messages in your existing folders by date, sender, subject and can usually find what you need.
2. Your e-mail program has an edit /find or tools / search function, allowing you to search for a word, a date, sender
3. The ultimate solution is a program like Enfish that indexes your documents, including e-mail messages, so you can quickly search by keyword. You can find anything with Enfish (http://www.enfish.com/).
Backing up
If your e-mail is important, and you have folders with needed historical project or reference information, be sure you are backing up your e-mail when you back up your other data. You do back up your data, don’t you? If you don’t know where your e-mail resides, look in the Preference settings and see the folder location for the mail storage.
Trash
When you delete messages from your inbox, remember they just go to the trash folder – which is garbage. Depending on the critical nature of your messages, you can set the trash folder to empty on exiting from the program, or you can empty it weekly.
Adopt even two or three of these suggestions to keep from drowning in e-mail, and add more productive minutes to your days.
Friday, June 04, 2004
Protect any port in a storm
Surge Protectors …
Protecting any port in a storm
April showers bring May flowers, but summer storms just bring brown-outs and power failures.
Be sure you have a working surge protector for your computer and peripherals.
Plugging your computer, printer, fax and radio into that multi-outlet strip at your desk is not just for convenience. That “power strip” might seem like a handy giant extension cord, but if it’s a good one, it’s also a true surge protector, protecting your investment in computer equipment.
Surge protectors prevent your equipment from getting fried, either from a lightning hit to your building, or a surge of power through the lines when there is a problem elsewhere on the electrical grid.
A good surge protector will have an indicator light to show that it is turned on. The best have two lights (usually green and orange) to indicate that the unit is in good working order.
Good working order? What does that mean? How do surge protectors go “bad”?
If a surge protector does its job and stops a large surge, it could get fried when it protects the equipment you have connected to it. (Sort of like a bike helmet – when it protects you once in a crash, it is vulnerable, and should be replaced.)
The next time a surge hits, it cannot provide protection, and your computer could get fried instead of the surge protector. Surge protectors are built to work this way.
When the light no longer is on, it is time to buy a new surge protector. The amount of surge that a protector can absorb is rated in units called "joules" (a unit of electrical measure). A bigger number is better. A safe minimum would be a unit rated at 300 joules.
So, protect your large investment in computer equipment with a small investment of $15 to $50 on a good surge protector.
Lastly, don’t confuse a surge protector with an uninterruptible power supply (UPS) or battery backup device. Those products are intended to support your computer system on battery for a very limited time, just long enough for you to save your work and shut down the computer. They are priced from hundreds to thousands of dollars, depending on the amount of time they keep your computer on “life support.”
E-mail me with any questions at Helen@cclarity.com or visit www.cclarity.com for more articles.
More power to you!
Protecting any port in a storm
April showers bring May flowers, but summer storms just bring brown-outs and power failures.
Be sure you have a working surge protector for your computer and peripherals.
Plugging your computer, printer, fax and radio into that multi-outlet strip at your desk is not just for convenience. That “power strip” might seem like a handy giant extension cord, but if it’s a good one, it’s also a true surge protector, protecting your investment in computer equipment.
Surge protectors prevent your equipment from getting fried, either from a lightning hit to your building, or a surge of power through the lines when there is a problem elsewhere on the electrical grid.
A good surge protector will have an indicator light to show that it is turned on. The best have two lights (usually green and orange) to indicate that the unit is in good working order.
Good working order? What does that mean? How do surge protectors go “bad”?
If a surge protector does its job and stops a large surge, it could get fried when it protects the equipment you have connected to it. (Sort of like a bike helmet – when it protects you once in a crash, it is vulnerable, and should be replaced.)
The next time a surge hits, it cannot provide protection, and your computer could get fried instead of the surge protector. Surge protectors are built to work this way.
When the light no longer is on, it is time to buy a new surge protector. The amount of surge that a protector can absorb is rated in units called "joules" (a unit of electrical measure). A bigger number is better. A safe minimum would be a unit rated at 300 joules.
So, protect your large investment in computer equipment with a small investment of $15 to $50 on a good surge protector.
Lastly, don’t confuse a surge protector with an uninterruptible power supply (UPS) or battery backup device. Those products are intended to support your computer system on battery for a very limited time, just long enough for you to save your work and shut down the computer. They are priced from hundreds to thousands of dollars, depending on the amount of time they keep your computer on “life support.”
E-mail me with any questions at Helen@cclarity.com or visit www.cclarity.com for more articles.
More power to you!
Does your web site work?
How to judge your site for success:
Visibility
Can your site be found? Keep visible with search engine listings and catalog listings such as Open Directory Project or Galaxy and Yahoo.
Hits
Know where your hits are coming from and whether they are brining you business. Any good web host offers free statistics on visits to your site. If your host does not, consider Bizland.com.
Freshness
Nobody reads the same old magazine issue month after month. If you expect frequent visitors to your site, you have to update the content regularly. Be sure you offer valued information such as resources and tips, and don’t inadvertently invite people to click away.
Meaningful
Be honest. Is your site worth reading? Should someone invest ten or fifteen minutes in what you have posted? Your site should be well organized and match the needs of your desired audience. If marketing is your goal, have a way of gathering information about users – offer a survey, invite them to join a mailing list for newsletters or tell you what their needs are.
Design
Pay attention to appropriate use of graphics, colors, and images but remember the needs of a wide audience. Keep text in a legible font and color. Use mouseover tags on graphics for those who choose to view your site as text, and for people with special visual needs. Visit the site of Dr. Jakob Nielsen, web guru for more web design and usability resources, at www.useit.com.
Visibility
Can your site be found? Keep visible with search engine listings and catalog listings such as Open Directory Project or Galaxy and Yahoo.
Hits
Know where your hits are coming from and whether they are brining you business. Any good web host offers free statistics on visits to your site. If your host does not, consider Bizland.com.
Freshness
Nobody reads the same old magazine issue month after month. If you expect frequent visitors to your site, you have to update the content regularly. Be sure you offer valued information such as resources and tips, and don’t inadvertently invite people to click away.
Meaningful
Be honest. Is your site worth reading? Should someone invest ten or fifteen minutes in what you have posted? Your site should be well organized and match the needs of your desired audience. If marketing is your goal, have a way of gathering information about users – offer a survey, invite them to join a mailing list for newsletters or tell you what their needs are.
Design
Pay attention to appropriate use of graphics, colors, and images but remember the needs of a wide audience. Keep text in a legible font and color. Use mouseover tags on graphics for those who choose to view your site as text, and for people with special visual needs. Visit the site of Dr. Jakob Nielsen, web guru for more web design and usability resources, at www.useit.com.
Healthy mouse habits
One of my favorite computer writers, Jim Coates of The Chicago Tribune, recently curtailed his career as a journalist and computer expert after being diagnosed with Carpal Tunnel Syndrome (CTS). While he’s on the mend, he’s changed his working habits to prevent further aggravation of the delicate hand and wrist nerves. His illness serves as a warning to all about proper posture while using the computer.
Carpal Tunnel Syndrome is a repetitive motion injury, not limited to computer users. In many industries, assembly line workers, machine operators and parts handlers have been susceptible to this problem for many years. With the prevalence of the computer and the mouse as a pointing device, the numbers of incidence of CTS injury has skyrocketed.
According to the medical abstract at personalmd.com, pressure on the median nerve in the wrist can cause pain, numbness and tingling in the hand, wrist or fingers. Check the related links at the end of this article for more, including stress solutions and ergonomic alternative to the traditional mouse and keyboard devices.
As one who uses the computer all day every day, one tip I can offer is to alter your mouse usage. I joke that I’ve become “ambi-moustrous” because I use the mouse with either hand. I’ve trained myself to use the left hand and arm for the mouse at one computer, and use a touchpad mouse on another. The touchpad mouse looks remarkably like a miniature Etch-a-Sketch toy. It stays in one place, does not need a mousepad underneath, and responds to a touch or sweep of the fingertip for quick movement.
If you experiment and add variety to your mousing habits, you’ll save wear and tear on your irreplaceable muscles and nerves.
Carpal Tunnel Syndrome is a repetitive motion injury, not limited to computer users. In many industries, assembly line workers, machine operators and parts handlers have been susceptible to this problem for many years. With the prevalence of the computer and the mouse as a pointing device, the numbers of incidence of CTS injury has skyrocketed.
According to the medical abstract at personalmd.com, pressure on the median nerve in the wrist can cause pain, numbness and tingling in the hand, wrist or fingers. Check the related links at the end of this article for more, including stress solutions and ergonomic alternative to the traditional mouse and keyboard devices.
As one who uses the computer all day every day, one tip I can offer is to alter your mouse usage. I joke that I’ve become “ambi-moustrous” because I use the mouse with either hand. I’ve trained myself to use the left hand and arm for the mouse at one computer, and use a touchpad mouse on another. The touchpad mouse looks remarkably like a miniature Etch-a-Sketch toy. It stays in one place, does not need a mousepad underneath, and responds to a touch or sweep of the fingertip for quick movement.
If you experiment and add variety to your mousing habits, you’ll save wear and tear on your irreplaceable muscles and nerves.
Seven steps to conquer e-mail
1. Control the interruptions
Real mail once arrives once a day, so resist the urge, with an always-on connection to check mail every two minutes. It’s an interruption you should avoid, unless your business requires it.
2. Handle mail once
Like real clutter-buster's advise us, handle each piece of mail only once. That means: act on it, delete it, or put it away. Newer mail programs allow you to label message by status and priority.
3. Use folders
Save time by using folders to keep the items you need, without stuffing the inbox with hundreds of messages. Use Edit / Find to search the folders.
4. Set up filters
Use filters to weed out the trash. Read the Help file in your mail program to learn more.
5. Create templates
If your e-mail program allows you to create templates, use them.
They’ll save time for those responses that require the same or similar information on a regular basis.
6. Cut, Copy, Paste
One of the most powerful features of today’s operating systems
is the ability to cut and paste information to transfer from one document to another. Save the typing time. Copy from other documents and paste into e-mail.
7. Make use of the Delete key
Nothing can free up your inbox more than deleting email
you don’t want. Hitting the delete key or delete button is the
best way to dump data.
Real mail once arrives once a day, so resist the urge, with an always-on connection to check mail every two minutes. It’s an interruption you should avoid, unless your business requires it.
2. Handle mail once
Like real clutter-buster's advise us, handle each piece of mail only once. That means: act on it, delete it, or put it away. Newer mail programs allow you to label message by status and priority.
3. Use folders
Save time by using folders to keep the items you need, without stuffing the inbox with hundreds of messages. Use Edit / Find to search the folders.
4. Set up filters
Use filters to weed out the trash. Read the Help file in your mail program to learn more.
5. Create templates
If your e-mail program allows you to create templates, use them.
They’ll save time for those responses that require the same or similar information on a regular basis.
6. Cut, Copy, Paste
One of the most powerful features of today’s operating systems
is the ability to cut and paste information to transfer from one document to another. Save the typing time. Copy from other documents and paste into e-mail.
7. Make use of the Delete key
Nothing can free up your inbox more than deleting email
you don’t want. Hitting the delete key or delete button is the
best way to dump data.
USB Jump Drives
Backing up your data on floppy disks? Move ahead to the 21st century by purchasing a USB Jump Drive, also called a Flash drive.
These keychain-sized drives have a capacity of 64 MB, 128 MB, 256 MB or even 512 MB, which is half a gigabyte (GB) of removable storage.
Where to buy: Common brands, such as Lexar and Belkin are available at major retailers like Circuit City, Best Buy, and my personal favorite: Office Max. They are often half-price after rebates, so watch the ads in the Sunday paper and get one for yourself soon.
How to use:
In a Windows XP computer, just plug the device into the USB drive. It will be instantly recognized and will have the next available drive letter. If your hard drive is C:, and your CD or DVD is D:, it will likely be the E: drive. Drag any files to the USB for safe backup or to use anywhere else.
These keychain-sized drives have a capacity of 64 MB, 128 MB, 256 MB or even 512 MB, which is half a gigabyte (GB) of removable storage.
Where to buy: Common brands, such as Lexar and Belkin are available at major retailers like Circuit City, Best Buy, and my personal favorite: Office Max. They are often half-price after rebates, so watch the ads in the Sunday paper and get one for yourself soon.
How to use:
In a Windows XP computer, just plug the device into the USB drive. It will be instantly recognized and will have the next available drive letter. If your hard drive is C:, and your CD or DVD is D:, it will likely be the E: drive. Drag any files to the USB for safe backup or to use anywhere else.
What's a Blog?
From the town crier, to the wanted posters nailed to a saloon wall in the Old West, we've come a long way. Newspapers and magazines are supplanted by online communication. E-mail, web sites, instant messaging, and now blogs, all provide a way to communicate with people in a virtual space.
A blog, or web log, is a chronological database of entries made by a host, that's me. The audience, that's you... is invited to read the material and post questions and comments.
Give it a try and see if you like it.
Helen Gallagher
Computer Clarity
Bridging the great divide between people and technology
All contents copyright by Helen Gallagher, Computer Clarity
A blog, or web log, is a chronological database of entries made by a host, that's me. The audience, that's you... is invited to read the material and post questions and comments.
Give it a try and see if you like it.
Helen Gallagher
Computer Clarity
Bridging the great divide between people and technology
All contents copyright by Helen Gallagher, Computer Clarity
Subscribe to:
Comments (Atom)