Program or Lesson 9:30 - 10:30 AM
One on One Help 10:30-?
In the Library
SPECIAL INTEREST GROUPS:
If you would like to meet in a small group to discuss special computer related subjects or form a Special Interest Group lets discuss it.
Our bulletin is also available on line by visiting tecc.apcug.org and clicking on bulletin.
|Our weekly program or
lesson is intended
to be of interest to all computer users.
Following the program an allotment of time will
be available for one on one help to those
who want a better understanding of something done during the presentation.
Upcoming EventsWednesday MARCH 18, 2015 Meeting
9:15 AM Set up your computer
9:30 AM Lesson
10:30 AM One on One help
Windows 8/8.1 Corner
Advanced Functions – Power Menu
By Rosita Herrick, Yahoo Forum Moderator, Sarasota Technology User Group, FL
Rosita (at) thestug.org
This article is for users that are by now familiar with Windows 8/8.1 and are trying to use more advanced functions.
One of the options to manage your computer is the capability to right click on the start icon in the lower left corner of the screen, and display the power menu.
As you can see, from here you can navigate to quite a few pages that used to take 3 or more clicks (if you remembered how).
Here are details about some of the option to use to manage your system.
Click on this link to find out details about your system like amount of RAM, Windows edition, 32 or 64 bit based processor. Among others, you also have a link on this page to the Device Manager.
This link loads the configuration of all the disks accessed by your computer, how they are partitioned, capacity, etc. Here is an example:
Disk 1 is a Toshiba USB 3 external hard drive.
You can still access the Task Manager by pressing Ctrl+Alt+Delete. But clicking on the Power Menu link is easier and it starts the Task Manager immediately. The initial display is of the programs and/or apps running. To see more details, click on the More details link. To cancel any item that possibly has stopped working and does not respond, click on the End task box.
As you scan the Power menu you will see the quick option to shut down or sign out.
The Search link gets you to the Search. You also have a fast link to the following:
Device Manager, etc.
In conclusion, the Power Menu makes navigation to Windows internals faster and easier to the user.
Try it sometime, I am sure you will like it.
Are You Safe from a Cyber Attack?
By Lou Torraca, President, The TUG-MOAA User Group, Hawaii
Around Hawaii - Oceanic Time Warner Cable's Community Website http://www.aroundhawaii.com/lifestyle/computers/
I always enjoy reading the “what happened in history” emails I get about once a month, so I was reminded that September had a profound effect on the way we treat our personal technology.
HackerOn September 18, 2001, a new virus attacked United States operating systems. The worm was given the name Nimda, and it was an advanced version of Code Red II. Some might say that the Code Red viruses were created in preparation for the much larger Nimda attack, which was executed the week following the attacks on the World Trade Center and Pentagon. Due to the release date of the virus, members of the American government speculated on a link between the cyber-attacks and Al Qaeda, but this theory ended up proving unfounded. The American media did not report much on the virus because of the terrorist attacks.
Multiple propagation vectors allowed Nimda to become the Internet’s most widespread and dangerous virus. It took only 22 minutes for the worm to rip through the American financial sector, causing over $3 billion in damage. The Nimda virus was so effective because it used five different infection vectors. People could, and still can, get the virus via e-mail, open network shares, infected websites, exploitation, or via back doors left behind by the Code Red II virus. The group of people behind the Nimda virus and the theft of billions of dollars are unknown. The event greatly damaged the world’s financial sector and economy.
There are numerous places you can review various ways to protect yourself, e.g. my last column listed free programs you can download to block viruses and malware. One government agency that has excellent advice is Homeland Security. Here is the page on their website that offers suggestions on how to protect yourself from Cyber Attacks:
What You Need To Know
The Department of Homeland Security plays an important role in countering threats to our cyber network. We aim to secure the federal civilian networks, cyberspace and critical infrastructure that are essential to our lives and work.
DHS’s National Cybersecurity and Communications Integration Center (NCCIC) is a 24x7 center responsible for the production of a common operating picture for cyber and communications across the federal, state, and local government, intelligence and law enforcement communities and the private sector.
The following preventative strategies are intended to help our public and private partners proactively look for emails attempting to deceive users into "clicking the link" or opening attachments to seemingly real websites:
Other practical tips to protect yourself from cyber-attacks:
Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or "crack" them.
Although intentionally misspelling a word ("daytt" instead of "date") may offer some protection against dictionary attacks, an even better method is to rely on a series of words and use memory techniques, or mnemonics, to help you remember how to decode it.
For example, instead of the password "hoops," use "IlTpbb" for "[I] [l]ike [T]o [p]lay [b]asket[b]all." Using both lowercase and capital letters adds another layer of obscurity. Your best defense, though, is to use a combination of numbers, special characters, and both lowercase and capital letters. Change the same example we used above to "Il!2pBb." and see how much more complicated it has become just by adding numbers and special characters.
The website (http://www.dhs.gov) also has links to other pages that have good advice regarding security, as well as other pertinent issues; I suggest you take a look.
That’s it for now, be safe out there. Follow the above advice, but save time to have some fun too.
Your article; deadline for next bulletin is Tuesday
noon each week. Only what you write may be published. We cannot
without written permission. Simply
click here EDITOR AT TECC
and paste your write-up to submit it.
Share your computer experiences with other members. We need articles to publish in the TECC Bulletin each week.
YOUR MEMBERSHIP INFORMATION Change
unsubscribe to this bulletin, etc. Use link below.
UPDATE YOUR MEMBERSHIP