This is an important meeting, so don`t miss it!!

Transcription

This is an important meeting, so don`t miss it!!
FPCUG
Page 1
Electronically
Speaking
The newsletter
of the Fredericksburg, Va. Personal Computer Users Group
Volume 19 Issue 8
August 2006
General Meeting August 10, 7:00 PM
Is Your Computer Secure??
Viruses, worms, spyware can affect all of us.
But there are ways to prevent these pesky things.
Mr. Robert Buongiorne, the President of Businets Inc., has
arranged for one of his technicians to present a program on making and
keeping your computer secure.
Page 2
Tips and Hints
We have all been aware of many tales of computers that suddenly
just quit or start acting strange. In many cases the cause is rooted
in some program or URL that you or someone in your household
accessed either unwittingly or accidentally.
There are many ways of preventing this type of mischief but some
are better than others and the experts at Businets, Inc., who have
had vast experience at solving these types of problems, will be with
us to help use, understand and suggest programs that will keep your
computer free of outside influence.
Page 3
What’s Happening
in FPCUG
Helpline
Businets new location at 3701
Latimers Knoll Ct.
(off Lansdowne Road)
This is an important meeting, so don’t miss it!!
You Missed It
Wallace McMillan of Gateway Computers presented all the aspects
of the new MS Windows Vista at the General Meeting on July 13.
We have all been wondering what the new
windows program would look like and Wallace
answered with authority and knowledge.
In addition he contributed 2 geat door prizes, a
1 gb flash thumb drive won by Josh Cockey
and a Z22 Palm won by Ed Alexander
Help is badly needed!!
Everyone in FPCUG knows that Bingo supports the charitable efforts of our club. But
maybe you didn’t know that workers are needed to run this game. Now is the time to
come to the aid of FPCUG. Please volunteer only one night every other month to help
our efforts to help the community. Just send a note to Bill Williams at:
[email protected]
and you will be helping FPCUG with attaining our goals.
The Sunset background of the Banner Line this month was contributed by Cliff Dalseide. If you
would like to submit a photo just send it to [email protected] for consideration.
Page 4
Managing Device
Drivers
Page 5
Legal BytesDo Shield
Laws Extend
to Bloggers?
Comng Attractions
Page 6
SIG Information
Page 7
Tweaking Windows
Taskbar
Page 8
Calendar
Come early to our
meeting and
socialize.
Electronically Speaking
Page 2
FPCUG
Meetings in 2006
Tips and Hints
by Dick Carricato
Let me begin by thanking Tony Zanini and Bryan Longworth for pinch-hitting
while I was away. Nice job guys, and thanks again.
Networking – Problems at home after using WiFi (Part 1 of 3)
Using WiFi at the library the first time was a smashing success. I just
turned on my laptop computer; it found and connected to the library’s
wireless network, and I was on the Internet without any cost.
Everything looked fine when I returned home and re-connected my laptop to
my home network. The Internet came up as soon as I tried it. However,
when I tried to access any one of my other computers from the laptop, I
found that I couldn’t see any of them. Further, when I tried to access the
laptop from any of my other computers, I found that they could not see the
laptop either.
In about thirty minutes I expended all of my knowledge on networks in an
attempt to fix the problem. I even re-established the network on the laptop.
The problem remained. Luckily I found a recent Restore Point that I could
try to see if that would repair the problem. Whoopee! That fixed it. From
then on, and until I could find and fix the source of the problem, I would set
a Restore Point prior to using the WiFi connection and Restore the system
after using WiFi.
If you have a home network and you plan to use a public WiFi network, for
the present, I recommend setting a Restore Point before and then restore
to that Point after. (Find System Restore in Start, Programs, Accessories,
System Tools, System Restore.)
Next time I will discuss the problem and the Registry modifications needed
to fix it. And for those who might shy away from mucking with the registry,
I’ll present a small batch file I wrote to do the job automatically.
Forwarding e-mail MESS-ages
Do you ever get a message with an Attachment and the Subject “Fw:
message subject?” (This sometimes shows as “Fw: Fw; Fw: etc. message
subject.”) When you open this message all you find is a blank text area, or
maybe a line of text and the sender’s name, and another attachment with
the same Subject. This continues on-and-on until you finally reach the
original message with the Subject “message subject.”
Why does that happen? Because all of those folks are forwarding the
messages as attachments. That is, the first person who received the
message wanted to forward it to a friend. So, instead of just hitting the
Forward button, he pressed the Forward as Attachment button. Now each
person down the line did the same thing with the message that he received. Any one of the recipients could have broken this chain by simply
forwarding the original message.
In order to read the original message, each person has to follow the
attachments back to the beginning. The time to think about forwarding is
while you are reading the original message. Don’t forward the message you
received, forward the original message. Do it from within the original
message and your recipient won’t have to go through the mess that you
had to go through in order to read the message. The only reason that I can
(Continued on next page)
January 12
February 9
March 9
April 13
May 11
June 8
July 13
August 10
September 14
October 12
November 10
December 14
Fredericksburg
PC Users Group
Electronically Speaking is published
monthly for the information and pleasure of
the members of the Fredericksburg PC
Users Group. Any FPCUG member or visitor
is invited to submit articles for the newsletter.
Officers
Gil Schor- President
[email protected]
John Kruelle
1st Vice-President
[email protected]
George Bell
2nd Vice President
[email protected]
Pete Shatswell- Secretary
[email protected]
Chuck Hart- Treasurer
[email protected]
Board of Directors
Jim Jordan
Cliff Dalseide
Josh Cockey
Trustees
Bill Williams-Agent of Record
Gene Brower
Rick Neil
Newsletter Editor
Jim Jordan
[email protected]
Webmaster
Josh Cockey
[email protected]
Page 3
Electronically Speaking
think of to ever use “forward as attachment” is when the
attached message is only information that might help the
understanding of the main message that is being sent. This
type of message probably won’t get further forwards.
What’s Happening in FPCUG
In the case of multiple plain forwards, the only problem is
the header information that is included for each forward. It
is sometimes difficult to find the message because of all
the clutter on the page. Before sending a forwarded message, the concerned sender should delete all of the extraneous header material. Perhaps he could leave the one
header from the original message.
One of the first things is the acquisition of a new projector for
the Fire Hall. Anyone who was at the meeting of July 13 may
not have realized it but we didn’t have to turn down the lights
to get a good picture on the screen.
As always there are things going on that many members may
not know about.
Below is the factory description and photograph of this
projector.
Old programs stop running after SP-2 Update (Part 1
of 2)
Several people recently reported that some older DOS
programs no longer run. The programs fail with the error
message that the Autoexec.nt file “is not suitable.”
Investigation showed that in all cases this happened after
the SP-2 Upgrade. Further, a look in the C:\Windows
\System32 folder revealed that the Autoexec.nt file was
missing. (I guess that makes it very unsuitable.) Fortunately, Autoexec.nt is one of the files stored in the
C:\Windows\Repair folder.
To fix the problem copy C:\Windows \Repair\ Autoexec.nt
to the C:\Windows \System32 folder. The easiest way to
do that is to use Windows Explorer and navigate to the
C:\Windows \Repair folder, Right click on Autoexec.nt and
click Copy. Then navigate to the C:\Windows \System32
folder. Now highlight the folder icon, Right click and Paste.
(Or click in the right hand pane of the System32 folder,
Right Click and Paste.)
There have been reports that some computers are deleting
the Autoexec.nt file on every startup. Next time we will
write a one-line batch file to solve this problem.
73 Dick Carricato 772-546-7790
[email protected]
Helpline
In order to serve you better we have instituted a helpline. Email
your questions or problems to the sites indicated.
Digital Photography-Pete Shatswell- [email protected]
Genealogy-Anne Zink - [email protected]
Graphics & Desktop Publishing-Jim Jordan jimjgraphics@adelphia,net
Photograph Editing- Anne [email protected]
Spreadsheet-(Excel) Chuck Hart- [email protected]
Network and Wireless Connections and General PC Problems
-Josh [email protected]
Word Processing-Rick Neil- [email protected]
Dept. of Stupid Questions-There is no such thing as a stupid
question. It’s simply a question you have-Try sending it to Jim
Jordan [email protected] and he may be able to
answer it or refer to someone who can.
Remember-Only questions submitted via email will be
answered and don’t expect an answer in less than 7
days.
Brilliant multimedia presentations
ViewSonic’s PJ766D is the class-leading multimedia DLP™
projector that delivers brilliant color, sharp graphics and
outstanding video. The DIGITAL CLARITY OF DLP TECHNOLOGY GUARANTEES STUNNING LIFELIKE video and
crisp data presentations. The native 1024x768 XGA resolution
and an extremely high 2,500 lumens of brightness make it
ideal for installations in conference rooms, religious sanctuaries, lecture halls and home theaters. The PJ766D offers
multiple inputs including RGB, DVI-I, component, composite
and S-video that ALLOW YOU TO CUSTOMIZE MULTIMEDIA PRESENTATIONS. Impress your audience with the power
and performance of the PJ766D.
Another project that is nearing completion is a computer
laboratory at the Boys & Girls Club on Gunnery Road.
FPCUG has contributed 6 new AOpen computers, a Lexmark
printer and a ViewSonic projector. This laboratory, when
completed may also be used by FPCUG to arrange classes
or SIGs that we can present during the daylight hours. If you
have any ideas for a SIG or class that is needed during the
day contact any Board member and it will be taken under
consideration.
We need members! In the first week in September, when you
get the Consumer’s Eye advertising catalog you will find an ad
for FPCUG. If you don’t find the ad this month, you may find it
next month. This month is distributed to Fredericksburg South
and next month, depending on the results of this effort, it may
be distributed to Fredericksburg North.
The FPCUG Board of Directors is always looking for new
ideas, so don’t be afraid to mention them to any BOD member.
Don’t forget the APCUG Photo COntest
See apcug.org for details
Electronically Speaking
Page 4
Managing Device Drivers
By Vinny La Bash,
Member of the Sarasota PCUG, Florida
labash(at)spcug.org
www.spcug.org
Windows is the most widely used operating system (OS) in
the personal computer world.
For each piece of hardware that’s connected to a Windows
based computer, somebody somewhere has written a piece of
software to make the device work with a computer. This piece
of software is called a “Device Driver.” One of the most useful
features of a well-written device drive is making itself all but
invisible to whoever is using the computer. You create a
document, send it to your printer, and somehow the document
prints. Your device driver takes care of all the little details
necessary for the printing operation to occur.
Drivers are one of the three most important broad categories of
software in computers. The first is the operating system, the
second is whatever applications are installed, including
communications, and the third is device drivers. Drivers are
important for two reasons. First, your peripherals won’t work
without them, and second, corrupted or out-of-date device
drivers are responsible for most system crashes.
There are other reasons why it’s important to keep your device
drivers up-to-date. Sometimes a manufacturer will become
aware of some kind of defect or glitch in the driver software and
issue a fix. You will need it. A different manufacturer may have
a driver for its own device that will cause a conflict with an outof-date driver on your device. Over time, updates for Windows
may eventually cause problems with an out-of-date driver.
Proper device driver management is essential to keeping your
computer crash proof. If device driver management is unfamiliar
territory, please pay attention. You’ll be glad you did. Microsoft
introduced the concept of Signed Drivers with Windows 2000
and continued with Windows XP. If a device driver is “signed”
by Microsoft, it means that the driver has been subjected to
meticulous, painstaking, extensive testing to ensure compatibility with your Windows operating system.
Anytime you install a signed driver, Windows checks it by
default and also guarantees it has not been altered or changed
in any way. If the driver is not signed, Windows alerts you with
a strong message that the driver has not passed Microsoft’s
rigorous certification tests.
Windows will also ask if you want to install the driver anyway,
and will do so if you give it permission. Keeping your computer
safe from unstable software is always a good idea. Fortunately,
changing the Windows default is relatively easy, but you need
Administrator privileges.
Right-click the My Computer icon on the desktop, then select
Properties. Click the Hardware tab and then the Driver Signing
button. Choose Block to let this be the new default, and you’re
done. Windows will now block any device drivers that it does
not recognize as signed.
Not all manufacturers send their drivers to Microsoft for
testing. For small firms this can be an expensive proposition. Does this mean you should never install an unsigned
driver? No, but you should do some checking of your own
to ensure that the company has a good reputation in the
industry. Sometimes a new device driver will prove unstable
for various reasons. Windows XP has the ability to delete
the driver and install a previous version. Open the Device
Manager, and double click the drive that’s causing problems. Switch to the Driver tab and Roll Back the driver to
the previous version.
What we’ve discussed so far is fine if you’re using relatively
new equipment, but suppose you’re having trouble with
something that’s old and the manufacturer has gone out of
business. Chances are good that the original installation
disk is lost or deteriorated to a point where it is no longer
useful. There are many other reasons why you could have
difficulty finding a device driver, but these are the most
common.
In the past, finding the right device driver or firmware was
often a tedious, time consuming, and frequently impossible
task. Nowadays, we have web sites such as
www.driverguide.com to help us. The site has been around
since 1997, and has seen many improvements. It has a
unique membership base of thousands who collectively
compiled a massive database of drivers, firmware, and
support documents that is the largest and most comprehensive on the Web.
Recognizing that most people who use computers are not
experts, they have devised an easy step-by-step process
that will help you find and install drivers. There is an archive
of hundreds of thousands of files containing not only
drivers, but voluminous information on manufacturers
including links to other sites with driver information. Also
useful are the discussion boards where you can chat with
others who have the same hardware, and learn from their
experience.
After you search for a driver and find it, help doesn’t stop.
The Driver Summary provides you with a rundown of all the
information you’re likely to need to make the decision
about whether or not to download and install the driver. This
information is put together from the original manufacturer,
plus ratings and comments from those who have previously
downloaded and installed the file. It’s nice to have everything in one place.
There are many web sites where you can find information
about device drivers, but this is one of the best places to
use as your starting point. Managing device drivers does
not have to be a search in the dark. Use the tools available
to you, and your system will be stable and a lot less prone
to crash.
The Editorial Committee of the Association of Personal Computer
User Groups (APCUG), an international organization of which this
group is a member, brings this article to you.
Electronically Speaking
Legal Bytes: Do Shield Laws Extend to Bloggers?
By John Brewer, member of the Computer Club of Oklahoma City
johnb(at)jnbrewer.com
http://www.ccokc.org/
The first amendment to the US Constitution contains a number of
important personal rights. It reads as follows: “Congress shall
make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech,
or of the press; or the right of the people peaceably to assemble,
and to petition the Government for a redress of grievances.”
Analysis of the amendment confirms why the courts have been
given the task of interpreting the language through the years.
One of the important parts of the amendment is freedom of the
press. In order to protect the press, approximately 31 States have
enacted “shield laws.” Journalists are protected by a qualified
(limited) First Amendment right protect their confidential sources.
Many of the federal circuits have held that a qualified privilege
exists. However, journalists are frequently challenged to reveal
their confidential sources. This privilege has received attention
recently in the New York Times Co. v. Gonzales case that involves
the phone records of Judith Miller. An interesting variation to this
issue is whether Internet journalists have the same protection as
print journalists. A recent case in California has examined this
issue. The case involved some Internet web site and Apple
Computer.
Apple brought an action in California alleging that persons
unknown caused the wrongful publication of secret plans on the
World Wide Web to release a device that would facilitate the
creation of digital live sound recordings on Apple computers. In an
effort to identify the source of the disclosures, Apple sought and
obtained authority to issue civil subpoenas to the publishers of the
Web sites where the information appeared and to the email
service provider for one of the publishers. The publishers moved
for a protective order to prevent any such discovery. The trial court
denied the motion on the ground that the publishers had involved
themselves in the unlawful misappropriation of a trade secret. A
California Court of Appeals held that his was error because (1) the
subpoena to the email service provider could be enforced consistent with the plain terms of the federal Stored Communications Act
(18 U.S.C. §§ 2701-2712); (2) any subpoenas seeking unpublished information from petitioners would be unenforceable
through contempt proceedings in light of the California reporter’s
shield [note: California has a shield provision in the State Constitution] and (3) discovery of petitioners’ sources is also barred on
this record by the conditional constitutional privilege against
compulsory disclosure of confidential sources. The Court of
Appeals issued a protective order.
The Electronic Frontier Foundation is directly involved in the
litigation. The following is extracted from the EFF web site. “The
whole mess began in December 2004, when Apple filed suit
against 20 unnamed and presumably unknown individuals,
referred to in the court filing as “Does,” for leaking confidential
materials on an Apple product under development to several Web
publications. As part of its investigation, Apple subpoenaed Nfox
— for communications and unpublished materials obtained by
PowerPage publisher Jason O’Grady. A Santa Clara trial court
FPCUG Needs your
hSeptember 14 - Robotics Team
Dave Shotwell
Page 5
upheld the subpoena in March of 2005 and the EFF appealed.
“In a 69-page ruling, the 6th District Court of Appeal ruled that
bloggers and webmasters are no different in their protections than
a reporter and editor for a newspaper. “We can think of no workable test or principle that would distinguish ‘legitimate’ from
‘illegitimate’ news,” the judges wrote.
“Any attempt by courts to draw such a distinction would imperil a
fundamental purpose of the First Amendment, which is to identify
the best, most important, and most valuable ideas not by any
sociological or economic formula, rule of law, or process of
government, but through the rough and tumble competition of the
marketplace,” they wrote.
“Today’s decision is a victory for the rights of journalists, whether
online or offline, and for the public at large,” said EFF Staff Attorney
Kurt Opsahl in a statement. Opsahl argued the case before the
appeals court last month. “The court has upheld the strong
protections for the free flow of information to the press, and from
the press to the public.”
“Apple argued its right to trade secrets trumped Constitutional
rights, and it had exhausted other sources to determine the source
of the information, even though Apple had not deposed employees
who were in a position to know, Kevin Bankston, a staff attorney for
the EFF told internetnews.com. The lower court decision agreed,
and said Apple’s trade secrets rights would trump any journalist’s
rights to source confidentiality.
“Bankston said the ruling is a win for anyone who uses email. “A
lot of people will hear about this decision and think it doesn’t affect
them since they are not journalists, but it has a broader impact
because of the number of email providers, particularly the number
based in this district,” he said.
“The court read Federal privacy law to forbid civil litigants like Apple
from subpoenaing an individual’s e-mail from e-mail providers.
Instead, the court said civil litigants must subpoena you directly,
and if you are a journalist, you can assert your rights of confidential
sources.
“So they have to subpoena you rather than doing an end run
around your rights and going straight to your e-mail provider,” said
Bankston.
If Apple chooses to appeal, the case goes to the state Supreme
Court. Thus far, the sources for the original story have not been
revealed, “and hopefully based on this decision they never will,”
said Bankston.
This is an interesting issue. The California case is far from over
and this issue will continue to be litigated across the country.
John Brewer practices law in Oklahoma City, is a member of the
Governor’s and Legislative Task Force for E-Commerce, and
enjoys issues relating to eBusiness and cyberspace. Comments
and questions are welcome and can be emailed to
johnb(at)jnbrewer.com.
In accordance with Title 17 U.S.C. Section 107, this material is
distributed without profit to those who have expressed a prior
interest in receiving the included information for research and
educational purposes. The article may contain sources for content
as attributed within the article.
The Editorial Committee of the Association of Personal Computer User
Groups (APCUG), an international organization of which this group is a
member, brings this article to you.
Electronically Speaking
Page 6
Windows Secrets
Down at the bottom of the left hand column of fpcug.org there
is a little window about Microsoft Windows Update Tips.
Click on this panel and you get the latest information on Windows
updates, secrets and all kinds of good information.
CHECK THE WEBPAGE!!!!
Community Service
Special Interest Groups (SIGs) meet at 7:00 PM at the Falmouth Fire House on Butler Road. SIGs are lead by members who have learned
through hands-on experience. All SIG leaders serve on a voluntary basis and, frequently, are participants in other SIGs lead by other members. So,
whether you want to lead or learn, we welcome you as a participant in FPCUG SIGs. FPCUG members and their family can join in as many SIGs as
they like at no cost.
Scheduled SIG Meetings
SIGs marked with an * will be available only if requested. Email the SIG Leader if interested.
SIG
Beginner
Digital Photography
SIG Leader
Jim Jordan
Pete Shatswell
Meets
4th Thursday
3rd Thursday
Genealogy
Anne Zink
Graphics
Anne McGrath
3rd Tuesday
Kay Pollock
4th Thursday
Neurofeedback
Web Site Developmen t*
Internet
Investing *
Technology
Video Production*
Word Processing Spreadsheets*
Windows 9x/XP
Chuck Hart
??????
1st Tuesday
4th Thursday
Email Address
[email protected]
[email protected]
[email protected]
[email protected]
Josh Cockey
Linda Mayhew
New to computers-this is for you
Make your camera work better
Look up your ancestors
Photo Editing & Image creation
neurofeedback_ sig [email protected]
[email protected]
1st Thursday
Chuck Hart
About what?
Brain Training
Web Site problems
Where and what on the internet
3rd Thursday
[email protected]
1st Tuesday
When available
[email protected]
[email protected]
Investing ideas and research
Exploring what’s available
Using video
?????
4th Tuesday
[email protected]
All about Word-Excel & others
James Hopkins
4th Tuesday
[email protected]
Learn about operating systems
Please note! All SIG Leaders may be contacted at: “Name of SIG”[email protected].
Substitute the actual name of the SIG and remove the quotes.
What is FPCUG
All About?
Fredericksburg Personal Computer
Users Group
* Problem Solving and Information Sharing
* Community Involvement and Public Service
* Special Interest Group Meetings Every Week
* Christmas Party (Member Families)
* Friendly People That Want to Help You
* Learning About Your Computer and Software
Phone FPCUG at
540 373-7929 (Voice Mail)
Next General Meeting
September 14, 2006. 7:00 PM
Come On Out!
Electronically Speaking
Tweaking Windows’ Taskbar
By Gabe Goldberg,
APCUG Advisor; Columnist, AARP Computer &
Technology Website, www.aarp.org
It’s easy to use a key part of Windows’ screen real estate,
the taskbar, without really noticing it. Like a car’s dashboard, taskbar components summarize what’s happening
on your computer and access running software. But unlike
your car’s dashboard, the taskbar can be customized for
individual needs and preferences.
www.aarp.org/learntech/computers/howto/
tweaking_windows_taskbar.html
Fun with Windows’ Taskbar
I’ve read reports that most people can’t accurately draw
their car’s dashboard, no matter how many hours or years
they’ve stared at it. Similarly, many of us look at and use a
key part of Windows’ screen real estate — the taskbar —
without paying much attention to it.
Like a car’s dashboard, taskbar components — Start button
at one end, notification area icons at the other, and application buttons in between — summarize what’s happening on
your PC and give quick access to running software. But the
taskbar is more interesting than a car dashboard: you can
customize it for your individual needs and preferences.
This article describes Windows XP’s taskbar; other Windows versions have mostly similar facilities. People sometimes worry when their taskbar disappears or suddenly
looks odd — or moves to an unfamiliar place on the screen.
We’ll see how such glitches are easily fixed.
Right-clicking a blank taskbar area displays Windows’
familiar context menu, showing available options. Clicking
Toolbars lets you display or hide built-in toolbars (groups of
icons representing programs, folders, or files) or create your
own. My favorite toolbars are Desktop (a handy pop-up list
which duplicates desktop icons) and Quick Launch (which
holds the few key icons I always want immediately available). Other standard toolbars are Address and Links.
Cascade and Tile options specify arrangement of open
application windows: fanned like playing cards or arranged
in a grid.
A key option — Lock the Taskbar — controls whether you
can change the taskbar. When the taskbar is unlocked, you
can change its size by dragging its edge away from or
towards the screen’s edge. You can move individual
toolbars by grabbing their handles (perforated line near each
one) and move the taskbar by grabbing a blank area.
Clicking Properties brings up a detailed options dialogue
box. It’s safe to experiment but only change one thing at a
time until you learn your way through all the choices.
The Taskbar tab customizes the taskbar itself and its
notification area. You can auto-hide the taskbar — handy on
small monitors to reclaim space for application windows.
When it hides, moving the mouse near it makes it visible.
Page 7
You can always keep the taskbar on top of other applications,
or allow it to be covered. If it’s hidden, pressing ctrl-esc
displays it.
Similar task bar buttons — for example, representing multiple
Word documents — can be grouped to save taskbar space, or
spread out. If they’re grouped, left-clicking the group displays
all open files, and right-clicking lets you manipulate the files
simultaneously.
You can add and delete Quick Launch toolbar icons by
dragging them on or off the toolbar. I trimmed mine to two
icons: Show Desktop and Windows Explorer. From a Windows
keyboard, these are available by pressing Win-D and Win-E,
respectively.
The notification area (called the “tray” in earlier Windows
versions) shows icons for small applications or utilities that are
running, plus your clock. Mousing over an icon pops up its
name. You can control which icons are displayed and whether
inactive icons (representing programs you haven’t used for a
while) are hidden. Each program running consumes PC
resources so it’s worth monitoring these icons and pruning any
which aren’t necessary. Right-click an icon to display options.
Closing some applications prevents them from automatically
starting at system boot, while others offer an explicit option.
Continuing our tour through taskbar properties, the Start Menu
tab lets you specify Start Menu appearance and operation. You
can pick large or small icons and determine how many shortcuts are saved in it for recently used programs. Key programs
can be “pinned” to the Start menu by right-clicking a desktop
icon or dragging an icon to the Start button and placing it in
the permanent top area. The Advanced tab determines Start
menu behavior and lets you select modern or “classic” Start
menu format.
Finally, when the Taskbar is unlocked, three extra toolbar rightclick options are available: View, Show text, and Show title, for
fine tuning your PC’s “dashboard”.
While Windows operates just fine as it’s installed, tweaking
taskbar settings and other options can make it faster and
more pleasant to use. And since there are usually multiple
ways to accomplish tasks in Windows, it’s worth exploring —
for example, right-clicking to explore context menus and
clicking various options/customize/advanced buttons to see
what’s available. Don’t be afraid to tinker, but remember what
you change so you can undo it!
This article originated on AARP’s Computers and Technology
Web site, www.aarp.org/computers, and is copyrighted by
AARP. All rights are reserved; it may be reproduced, downloaded, disseminated, or transferred, for single use, or by
nonprofit organizations for educational purposes, with attribution to AARP. It should be unchanged and this paragraph
included. Please e-mail Gabe Goldberg at
gabe(at)gabegold.com when you use it, or for permission to
excerpt or condense.
The Editorial Committee of the Association of Personal Computer User
Groups (APCUG), an international organization of which this group is a
member, brings this article to you.
Electronically Speaking
Page 8
August 2006
S UN
MON
TUESDAY
WED
THURSDAY
1
2
Directors Meeting-Firehall 7:00 PM 8
9
Technology
Internet
FRIDAY
3
6
7
13
14
Graphics
15
16
Digital Photography
17
20
21
Windows 9x-ME-XP
22
23
Neurofeedback
24
27
28
29
General Meeting
Beginners-Intermediate
30
10
FPCUG Team 2
UUFF Team 3
UUFF Team 4
SAT
4
5
11
12
18
19
FPCUG Team 3 25
26
31
Indicates the deadline for submission for the next issue of Electronically Speaking.
September 2006
S UN
MON
TUESDAY
WED
THURSDAY
FRIDAY
SAT
FPCUG Team 4
3
4
10
11
17
18
24
25
5
Technology
12
13
19
20
26
27
Directors Meeting-Firehall 7:00 PM
Graphics
Windows 9x-ME-XP
The Newsletter of theFredericksburg, Va.
Personal Computer Users Group
P.O. Box 276
Fredericksburg, VA 22404
To:
6
Internet
General Meeting
Digital Photography
Neurofeedback
Beginners-Intermediate
7
14
21
UUFF Team 1
UUFF Team 2
FPCUG Team 1
28
1
2
8
9
15
16
22
23
29
30
FPCUG Team 2
Stamp