Feb 2009 - WINdows usERS Computer user group

Transcription

Feb 2009 - WINdows usERS Computer user group
February 2009
Inside
CES Security Overview ................2
CES Gaming Overview ................6
Crabby Demystifies Word Terms .12
Smart Computing Tips ................16
When To Turn Off Computers.....18
Your Next PC Will Be Green........18
Security and Deleting Files .........20
Rootkits Security Problems .........22
Hauppauge HD PVR ....................24
Leave Windows
Behind - but bring your
apps with you
Fountain Valley Branch Library
17635 Los Alamos,
Fountain Valley
meetings on 3rd Saturday
10:00 am to 12:30 pm
organizations, but
everybody has a
few key Windows
applications they can’t
do without. Wine
can be a useful tool
for running legacy
applications without
having to purchase
Windows for every
computer. His talk
helped show how you
can leave Windows
behind -- and still
use key windows
applications.
Using Ubuntu as his
Future Meeting Dates
March 21
April 21
May 16
Membership
Annual membership is $20 for
indivduals: $5 for each additional
family members.
February meeting had Dan Kegel
talking about Wine.
Powerful trends today are making
non-Windows operating systems
attractive to many people and
operating system he showed how
he had many applications already
installed. Using Wine Linux can
now add many Windows apps. He
showed this by installing and using
Photoshop.
Board of Directors
President
Steve Dela
stevede(at)aol.com
Vice-President
Terry Currier
winnersug(at)aol.com
Secretary
Gerry Bretts
gbretts(at)juno.com
Treasurer
Max Lockie
mlockie(at)pobox.com
Board Members
Ethel Kamber
ethel(at)kamber.fastmail.fm
Ken Kamber
kenkamber(at)mail.com
Louise McCain
LMcEnterprises(at)ol.com
Ed Koran
edk246(at)aol.com
Charles Schreiber
cschreib(at)csulb.edu
Robin Theron
rtheron(at)gmail.com
Editor
editor(at)windowsusers.org
WINNERS, contributors and
editors of Notepad do not assume
liability for dameages arising from
the publication or non-publication
of any advertisement, article, editorial, or other item in this newsletter.
All opionions express are those of
the individual authors only and do
not necessarily represent the opionions of the WINNERS, its Board of
Directors, the WINNERS Notepad,
or its editors.
WINNERS a computer association,
is a volunteer organization providing a forum for sharing information and experiences related to
Windows-based software, and
hardware, encouraging ethical use
of computers and software, offering
service to our communities.
CES 2009 Security
By Terry Currier
CyberPatrol
www.cyberpatrol.com
Announced Threat Detector, a new,
free online assessment tool that will
help parents review their children’s
online surfing habits. While most
parents believe their kids are
behaving
appropriately
online and
are safe,
71% of teens
admit they
do not tell
their parents
what they
do online.
Threat
Detector can help parents find out
where their kids have been online.
CyberPatrol’s IM ChatGard
feature within its Parental Controls
7.7 product has been enhanced
to increase the protection it
offers against cyberbullying.
A comprehensive list of key
cyberbullying terms have been
added to existing inappropriate
terms. ChatGard blocks
objectionable words in instant
messaging (IM), whether they
are sent or received. ChatGard
can also be set to block the user’s
home address, phone number, and
other information that would be
inappropriate for children to share
via IM.
D-Link www.dlink.com
With support for 802.3af Power
over Ethernet (PoE) and a slim-line
housing, the DCS-1110 is D-Link’s
most versatile camera yet. PoE
support, when used with a
compatible PoE power injector or
PoE switch, eliminates the need for
mounting the camera near a
power supply. With 0.5 Lux light
sensitivity, this camera is capable
of capturing video in rooms with
minimal lighting, making it ideal
for use at night. When enclosed in
an optional outdoor housing, the
DCS-1110 makes an excellent
home security camera.
You can access and control your
camera using Internet Explorer. As
you watch and listen remotely to
video and sound obtained, you can
record directly from the web
browser to a local hard drive,
making. By signing up with one of
the many free Dynamic DNS
services available on the web, you
can assign an easy-to-remember
web address to the camera.
Comes with D-ViewCam 2.0
surveillance software to enhance
the monitoring and management.
Manage and monitor up to four
compatible cameras simultaneously
with this program. You can also
use IP View SE to archive video
straight to the hard drive, playback
video, set up motion detection
to trigger video/audio recording
and send e-mail alerts. The DCS1110 is configurable to record to a
network-attached storage (NAS)
device, eliminating the need to set
up a dedicated computer for storing
recorded video.
FLIR www.flir.com
The VSR-6 is a low-cost, high
performance home security thermal
camera, and the D-19, an indoor
thermal dome camera. When many
people think of security cameras
they can use around the house,
they think of cheap, lowlight
cameras that produce grainy,
pixilated images during the day
and shapeless, indistinct blobs at
night.
Thermal security cameras are
different. With FLIR Systems,
homeowners can have crystal clear imagery that
lets them know if someone is on their property.
Thermal security cameras let you see what your eyes
can’t: invisible heat radiation emitted by all objects
regardless of lighting conditions. They can easily
detect intruders and other potential hazards to the
security of your home and family day and night, in
good weather and bad. Available for under $3,000.
content so kids can easily find the best resources on
the web.
KidZui is free but also offers a membership for just
$4.95/month or $49.95/year that includes enhanced
online reporting for parents, Homework Helper, and
fun extras for kids.
InternetSafety.com www.InternetSafety.com
The first Internet filtering software for the Apple
iPhone has arrived with InternetSafety.com’s new Safe
Eyes® Mobile, giving parents a tool to prevent their
children from retrieving
Web content that should be
off-limits to younger users.
This new browser for the
iPhone, iPhone 3G and
KidZui www.kidzui.com
iPod Touch blocks millions
The Internet for Kids KidZui, announced a major
of pages of inappropriate
expansion incorporating new kid-safe social
online content while giving
networking features, a Homework Helper, and teacherusers full access to the rest
approved websites, games, pictures and videos.
of the Web, eliminating the
Designed specifically for kids age 3-12, include a
need to turn off the iPhone’s
live mini-feed that allows kids to connect and stay
highly acclaimed mobile
in touch with their
browsing feature to avoid
friends, express
exposing children to the
their feelings and
unsavory side of the Internet. A demo is available at
opinions, and share
www.safeeyes.com/iphonedemo.
cool content that
It works by checking requested websites against a
they discover online. massive blacklist of potentially objectionable Web
All friend requests
addresses that is updated on a daily basis. It prevents
are subject to mutual access to pages in the pornography, nudity, sex and
parent approval.
tasteless/gross categories by default. Parents can
When kids download KidZui, they start by creating
also configure the software to filter sites in 31 other
their own Zui (online avatar) which they can
categories as well as by URL. In contrast, the iPhone
customize by changing its skin color, hair color and
itself can control Internet browsing only by blocking
style, eye color and shape, clothing and accessories.
Web access entirely.
Kids then will have a profile page where they can
Safe Eyes Mobile has no noticeable effect on iPhone
see their events, tags and visitors. On the new profile
performance. In addition, the solution cannot be
page, kids can pick their status and mood from a drop
overridden by children because it is controlled from
down menu that spans a wide range of emotions and
the Safe Eyes website with password-protected setup.
activities from “energetic” to “moody” or “by the
Per-phone pricing will include automatic daily updates
pool” to “doing homework.”
of the product’s website blacklist. See video of CES
Homework Helper is a teacher-designed system
booth.
that gives kids access to thousands of Web pages,
pictures and videos matched by subject to every
Lok8u www.lok8u.com
grade level from Kindergarten through eighth grade.
Nu.M8 is a GPS locator device specifically designed
Kids choose their grade level from the menu bar and
to be worn by children. Launched by UK location
then click on the subject category they are studying
services company, the locator is concealed within a
(Native American history, solar system, fractions,
child’s digital watch. It does not rely upon the child to
homophones). Each subject brings related topics and
be responsible enough to keep their locator with them
in a bag
or pocket.
Instead,
when it is
securely
fastened to
a child’s
wrist it stays
there unless
deactivated
by a parent.
If, in the
worst case
scenario if
the Nu.M8 is forcibly removed from the child’s wrist
an alert is sent immediately to a designated mobile
phone and/or email address with the child’s location to
give parents an early warning of potential danger.
In the United Kingdom 140,000 children are reported
missing to the authorities every year. In the USA
800,000 children were similarly reported missing in
2006 alone .
As far as the child is concerned Nu.M8 is a digital
watch. For parents it has been designed with
simplicity and ease of use in mind. It is accessible
at home, abroad or on holiday from a computer or
mobile phone.
To locate your child, simply text “wru” from your
mobile phone to Nu.M8 or click “where r you” on the
Lok8u
secure
portal.
Your
child’s
location
is then
presented
as an
icon on
Google
maps
and/or
the street address and postcode is displayed.
In addition, parents can set unique “safe zones“ in
which their child can safely play. This function is
activated simply by texting “safe…” followed by a
number, which represents the meter radius for your
child’s safe area. As long as your child remains
in this area no alerts will be sent and you can still
communicate with the device using the “wru”
function. However, if they stray a priority alert will be
sent to the parent’s mobile phone and computer. Other
features include:
• Water resistant
• Battery sufficient for 7 days in standby
• Dermatologic ally tested to ensure safe
wearing
• Accurate to within 10 feet
Available in USA in late spring 2009 US retail price to
be determined, plus a monthly subscription charge.
Symantec – Norton products www.symantec.com
Their latest all in one Norton 360 version 2.0 Premier
Edition protects your computer against online threats,
and keep it working at peak
performance. Features:
• Enhanced performance Provides virus, spyware
and firewall protection
without sacrificing
performance with fast
scan and browse speeds.
• Identity Safe Protects your personal
information and your identity when you
buy, bank, and browse online by blocking
fraudulent Web sites and verifying trusted
ones. Securely manages user names and
passwords for you.
• Backup and restore - Automatically detects and
backs up your critical files. It also backs up
photos, music, and documents with automated
backup. Includes 10 GB of secured online
storage.
• Network monitoring - Lets you view your
wireless network and each device connected to
it.
• Support - Provides one-click access to expert
support right from your Norton product or use
email, live chat, or phone.
• Optional antispam and parental controls via the
Norton™ Add-on Pack
Norton Online Help www.norton.com/online
If you’re not sure how to protect your children
online, help is here. Everything you need to protect
your family from Internet dangers and inappropriate
content. They even help you save your kids from
passing along confidential information online. See
video of CES booth.
Schlage www.schlage.com
With interface software compatible with every
major cell phone software platform on the market
today, Schlage LiNK is
an intelligent residential
security platform utilizing
wireless communication
protocols. Schlage LiNK
deadbolts and locks provide
keyless entry through 4-digit
access codes that can be
entered, activated, deleted
or disabled on the lock’s
11-digit push button keypad,
or via the Schlage LiNK web
portal or mobile application.
This gives homeowners the freedom of never having
to carry or circulate multiple sets of keys. This is
the first Z-Wave-enabled locks and work seamlessly
with more than 300 other Z-Wave-enabled home
automation devices including products ranging from
lighting and temperature to pool and spa controls.
By fusing the use of the new IP Cameras with their
Schlage LiNK door locks, homeowners will have
the ability to visually confirm their children, family
members, friends, houseguests and even service
providers before granting them entry.
Sunbelt Software www.sunbeltsoftware.com
Their latest new security solution is VIPRE™
Antivirus + Antispyware. VIPRE is a completely new
product that combines antivirus, antispyware, anti-
rootkit and other technologies into a seamless, tightlyintegrated product. At it’s core is an antivirus and
antispyware engine that merges the detection of all
types of malware into a single, efficient, and powerful
system.
User surveys show the biggest frustration with
existing anti-malware solutions is bloat and high
resource usage. Designed with the latest programming
and architectural methodologies, it runs seamlessly
without significantly impairing system performance.
VIPRE’s all-new anti-rootkit technology finds and
disables malicious hidden processes, threats, modules,
services, files, Alternate Data Streams (ADS), or
registry keys on a user’s system. Removing rootkits
is supplemented by VIPRE’s FirstScan™, which runs
at the system’s boot time. FirstScan bypasses the
Windows operating system, to directly scan certain
locations of the hard drive for malware, removing
infections where found.
It’s Active Protection works inside the Windows
kernel (the core of the operating
system), watching for malware and stopping it before
it has a chance to execute on a user’s system. Active
Protection incorporates three methods to protect the
user: signature matching, comparing a file for an exact
match against VIPRE’s definition database; heuristic
analysis, which looks at the internal characteristics of
a file to determine the likelihood that it is malware;
and behavioral analysis, observing the actual actions
of a program to determine if it is possibly malware.
There is direct support for Outlook, Outlook Express
and Windows Mail; and support for any email
program that uses POP3 and SMTP (such as
Thunderbird, IncrediMail, and Eudora) against
viruses.
A 15-day fully functioning trial version is available on
Sunbelt Software’s website. A single user annual
subscription is $29.95, and 3-user subscription is
$39.95. All PCs in a single household can be protected
with a single site license for a subscription price of
$49.95.
TRENDnet www.trendnet.com
First-to-Market Product Demonstration:
7” Wireless Internet Camera and Photo Monitor (TVM7) The TV-M7 allows you to view real-time wireless
streaming Internet camera video without a computer.
Monitor up to 4 cameras
at once or scan between
10 cameras manually.
First-to-Market Product
Launch:
7” Wireless Internet
Camera Monitor Kit (TVM7110WK)
Monitor your home or business with TRENDnet’s
7” Wireless Internet Camera Monitor Kit. The TVM7110WK is a complete kit which provides you with
all the tools to start your IP Camera security network.
Zoombak www.zoombak.com
Zoombak GPS Recovery™, is an car aftermarket
solution that pinpoints the exact location of stolen
vehicles and gives that information directly to the
police, significantly increasing the chances of quick
and intact recovery. Activated when a vehicle is
reported stolen. The Zoombak team works directly
with the nearest police department, providing realtime location information about the vehicle’s location
down to the specific street address
or intersection.
No monthly fee is required to
maintain the program. Cover
is provided in all 50 states and
100 of the top U.S. metropolitan
markets, and is backed by a
$2,500 total loss benefit.
Zoombak added state-of-theart online mapping technology
to its interactive Web site through the integration of
Microsoft Virtual Earth. With it users can visualize the
location of their Zoombak A-GPS locator with streetlevel and aerial views.
Small and portable it can be used to keep track of
many things including bicycles, and even pets. Users
can setup custom safety zones around virtually any
location including homes, parks, malls and schools.
When the device crosses one of the virtual boundaries,
a text message or email alert promptly notifies users
of the location of the device. Starting at an affordable
price of $199 plus a low cost monthly service plan.
CES 2009 Gaming
By Terry Currier
Boomchair www.boomchair.com
They have many game chairs
one of them is the Recon.
This chair features a builtin 5.1 surround sound
system. The inspiration
came from gamers at E for
All who described wanting
a true surround sound chair.
The Recon will definitely
satisfy this market demand;
it has 3 sets of independent
speakers that blast the user
from all directions, not to mention a huge subwoofer
and vibration motors. This chair is packed with top
of the line features like vibration, optional wireless
connectivity, and ergonomic design for all day
gaming.
Creative www.creative.com
The Creative Tournament Gaming Headset HS1100 with proprietary noise cancellation technology
is the first product to incorporate Silencer. It is a
breakthrough in voice technology that allows the
user’s voice to be clearly heard by other gamers they
are communicating with by eliminating ambient
background noise to provide improved voice fidelity.
Their HS-1100 includes 40mm neodymium plus
proprietary X-Fi audio technology, for improved audio
playback. X-Fi CMSS®-3D technology creates virtual
surround sound in games so you hear your opponents
in their precise location even when you can’t see them.
See video of their CES booth. Priced at US$130, the
HS-1100 also features:
• VoiceFX which offers up to 18 selectable
voice-morph personas that range from Aliens
to Orc, for more engaging in-game voice
communication
• Ultra-comfortable ear pads for extended
gaming sessions
• An in-line volume adjustment with microphone
mute control
• A detachable microphone boom allowing the
headset to be used as regular headphones in
non-gaming scenarios
• Foldable ear cups offer convenient storage
Elf Island www.elfisland.com
The first tween virtual world specifically created to
instill positive social
and environmental
values into the
world’s future
stewards. Elf Island
turns online gaming
efforts into tangible
offline results
through nonprofit
partnerships and
Mirrored Gaming.
Past and present
partners include Plant-It 2020, WildAid and Polar
Bears International.
Through its “Mirrored Gaming,” kids play an online
GoodQuest™ game, and in the process learn about a
related non-profit’s project, which is then reflected in
real world support for the nonprofit. Kids can see the
effect they are making by helping others in need and
understand why it is important to get involved. Habitat
for Humanity International is the first nonprofit to
benefit from Elf Island’s Mirrored Gaming model.
Other GoodQuests will include:
• WildAid: Protecting virtual sharks helps
protect real sharks in the Galapagos Islands.
• Polar Bears International: Tracking virtual
polar bears and polar ice caps helps protect
real polar bears and their environments in the
Arctic.
• Plant-It 2020: Planting virtual trees helps plant
real trees in Niger.
HP www.hp.com
Shipping its first-generation Gaming Keyboard with
voodooDNA this spring. The ideal companion to
HP’s Gaming Mouse with voodooDNA, the new
keyboard is designed for increased speed, accuracy
and flexibility. The keyboard has backlit illumination
with WASD cluster lighting and anti-ghosting. It has
fully programmable keys with macro capability and
three unique profiles. The top of the keyboard also is
coated with non-slip rubber finish and media keys are
touch access. The keyboard is expected to be available
in February for $80.
iZ3D www.iz3d.com
They developed this unique technology to create
an adjustable viewing environment that delivers
3D without the
eyestrain, spatial
disorientation,
or headaches
commonly
associated
with other 3D
approaches. Most
PC games released in the
last five years, including
many of the most popular
multiplayer online, first
person shooter, and roleplaying games, have already
been designed for 3D
displays. iZ3D’s optimized
driver unlocks the third (depth) dimension of these
3D-ready games to allow gamers to finally play them
as they were written – in 3D. Featured a hands on
demonstration of three
of it’s upcoming product
prototypes for 2009. The
new prototypes include:
• New iZ3D
Immersion Series
that gives users
an incredible
total 3D effect.
It is a Triple
iZ3D monitor setup with a flight or racing
game simulator that really puts players in the
experience.
• 26” iZ3D Prototype
• 22” Widescreen Console Game Compatible
Prototype - Now play many popular Xbox® or
PS3® games in 3D on the new iZ3D 22-inch
game compatible monitor. The 22-inch monitor
price will be $399 and will feature:
o 22-inch widescreen switchable 3D/2D
monitor
o iZ3D output and anaglyph output
drivers
o 3 pairs of passive linear polarized
glasses
o All power and video cables
o Quick start guide
o 1 Year warranty
o Technical Support
o Free membership in iZ3D’s upcoming
3D gaming league
o Available in six special edition custompainted models created by Smooth
Creations. The custom painted monitor
price has also been reduced to $549.
o 1680 x 1050 resolution
o Up to 170-degree 3D viewing angle
o 5ms response time
o 700:1 contrast ratio
o 16.7-million colors
o 300 nits
JAKKS www.jakks.com
Their lineup offers low price points with all ’09
products priced at under $50.
TV Games Motion
• With the reactive motion controller, the
gamers’ moves control the action on screen as
characters replicate their movements on the
TV screen when they jump, wave, and move
around. The
controller
plugs into
the A/V
jacks of any
standard TV
and contains
multiple
games
in each
controller,
and no
additional
consoles or
cartridges are needed. TV Games Motion titles
will include Star Wars, Toy Story, SpongeBob
SquarePants, Spider-Man, Disney Fairies,
Power Rangers and more. Ages 5+, Suggested
Retail Price: $30.
TV Games Sing Scene
• Sing to the hottest licensed Pop, Rock and
Country hits built right inside the microphone
– and with the voice tracking feature, players
can compete to hit the right notes to rock out
and win. No additional consoles or cartridges
are needed. Ages 8+, Suggested Retail Price:
$30.
Jump Camp Fitness Video Game
• Includes over 15 sports activities, fitness and
casual games. Families can work up a sweat as
they jump, run, lunge and move on the fitness
mat with their actions replicated right on the
TV screen. The game tracks calories burned
and rewards the hardest workouts. Ages 8+,
Suggested Retail Price: $40.
Big Buck Hunter Pro TV Games
• In addition to its authentic arcade action and
pump action gun styling, it’s the only shooting
game in the toy aisle to work on all standard
and flat screen televisions. Ages 8+, Suggested
Retail Price: $40.
Other New Plug It In & Play TV Games
• New titles for 2009 include Retro Arcade
featuring Pac-Man, Star Wars, Spider-Man,
Power Rangers and The Price Is Right. Ages
5+, Suggested Retail Price: $20. For more
information on current TV Games products,
visit www.tvgames.com.
JumpStart www.jumpstart.com
From a old
company with
roots in educating
kids (Knowledge
Adventure)
JumpStart is an
adventure-based 3D virtual world that is superpersonalized, wildly imaginative and really fun, but
don’t let that fool you - it also teaches math, reading,
and critical thinking skills so kids get a real jump start
in life. Monthly cost is $8, while full year is $75. See
video of their CES booth. Some of the things they are
planning include:
• GhostTown - Grab where the kids will collect
gold and silver in a western style race
• StoryLand - an adventure based game for 3-5
year olds complete with five virtual worlds.
• Arcade - boardwalk style games
• Tiki Falls - climb around ancient ruins and
hunt for rainbows and treasure
• Movie Theater - pick from over 30 movies to
watch
KidsCom.com www.kidscom.com
On the site,
kids explore in
the Idea Seeker
Universe – where
virtual worlds are
challenged by issues similar to those we face on Earth.
• Kids battle the Darkness of Dumbness and
his evil Clouds of Chaos – characters such as
Angry Cloud, Gluttony Cloud and Jealousy
Cloud that confuse people and alter their
behavior.
• Kids are guided in their adventures by their
Plant Baby virtual pets – each representing
a positive character trait such as Patient,
Persistence and Gratitude that help them
overcome the Clouds and be successful.
• Kids learn, interact play and problem solve
online – which prepares them to face offline
challenges in the real world.
• The site currently incorporates learning
episodes which revolve around global climate
change.
Logitech www.logitech.com
The G-series line of gaming peripherals from
Logitech® gives gamers what they want: complete
control.
Logitech G19 Keyboard for Gaming
• The first Logitech keyboard to feature a color
GamePanel LCD. The tiltable, 320-by-240pixel display provides valuable in-game
information for over sixty games, including
World of Warcraft®. In addition to in game
information, the screen can show VoIP
communication data, clock, CPU load, or other
non-gaming specific items such as pictures
or videos. And you can easily switch among
types of information – without ever leaving
your game. It offers 12 fully programmable
G-keys with three macros per key, giving you
36 time-saving commands per game. It can
disable the Windows® key so you don’t get
accidentally locked out of your game. The
keyboard features two high-speed USB 2.0
ports. Suggested retail price is $200.
The Logitech G35 Surround Sound Headset
• The first Logitech headset to offer 7.1 surround
sound. Powered by second-generation Dolby®
Headphone technology, the G35 headset
simulates the complex acoustics of a listening
room, creating a detailed, outside-the-head
sound field. Plus, with its proprietary earenclosing design, the G35 headset greatly
reduces ambient noise, while an adjustable,
noise-canceling microphone focuses on
your voice and reduces background noise.
Additional on-ear audio controls provide
quick access to volume, microphone mute
and surround sound adjustments. Comes with
three swappable headbands – thin, thick and
contoured designs – so you can select the style
that fits you best. Suggested retail price is
$130.
The Logitech G9x LaserMouse
• Providing precision at any hand speed (up to
150 inches
per second).
Featuring
on-the-fly
adjustable
dpi from 200
to 5000 dpi
making it
easy to go
from pixelprecise
targeting to
lightningfast maneuvers without pausing the action. It
includes two interchangeable, snap-on grips
that let you choose a fit for your playing style.
Also features onboard memory – program up
to five ready-to-play profiles. Suggested retail
price is $100.
The Logitech G13 advanced gameboard
• The G13 gameboard offers a contoured design
that complements the natural shape of your
hand and fingers. So you don’t have to take
your eyes off the screen, the concave keys
along the home row make it easy to locate
buttons by touch. And for a tactical advantage,
the G13 gameboard includes 87 buttons, so
you can set up custom button-profiles for each
one of your favorite games, and a 160-by-43pixel GamePanel™ LCD that shows live game
stats. Available now for a suggested retail price
of $80 (U.S.).
Logitech Wireless Guitar, Premiere Edition
• Features
authentic
materials –
including a
wood neck,
rosewood
fingerboard,
metal frets,
even a locking
whammy
bar – and is
for gamers who want to flex their star power.
Virtually silent button noise through the use
of rubber dome technology, 2.4 GHz wireless
technology gives you control up to 30 feet
from the console. Price: $250
Mattel www.mattel.com
Transforming the company’s online strategy from
brand Web site platform to interactive programming
and content provider. The aggressive initiative is
called the Mattel Digital Network. It will be user and
requires an ongoing commitment to keeping both the
content and each target audience - from kids to tweens
and teens to adults and collectors – in mind when
building their online experience (Network).
• Barbie® Digital Nail Printer – As the first
product unveiled under the Barbie® brand’s
new “Beautronics”
line – allows you to
print custom designs
directly onto your
nails; it takes only a
few seconds and the
designs last for days!
You can select from
1000s of intricate
designs, and even
upload your own
photos to create a
custom manicure
perfect for any occasion. The Digital Nail
Printer uses thermal inkjet technology and
specially-formulated cosmetic grade ink to
print directly on the nail surface in full color. A
built-in color video camera lets you model nail
designs before printing.
• Mindflex™ - Have you ever dreamed of
moving an object with the power of your
mind? The new mental acuity game makes
that dream a reality. A lightweight headset
containing sensors for the forehead and
earlobes measures your brainwave activity.
When you focus your concentration, a small
foam ball will rise on a gentle stream of air.
Relax your thoughts and the ball will descend.
By using a combination of physical and mental
coordination, you must then guide the ball
through a customizable obstacle course – the
various obstacles can be repositioned into
many different configurations.
• UCreate Games - puts mash-up creativity and
game creation into the hands of kids. Using
your computer screen and the Ucreate Games
tablet, kids can build and customize unique
games using hand drawn lines and a library
of fun, interactive game elements, including:
drawing templates, photos, sound effects,
and recognizable game components. Ucreate
Games uses a unique, photographic interface
that automatically recognizes game activities
and captures the user’s creations. Games
includes: drawing table, folding camera,
USB connection, software, dry erase drawing
supplies, and game template booklet.
• UCreate Music - an easy-to-use digital music
making system that allows kids to become
the ultimate DJ. Kids and tweens can express
themselves through creating their own songs
and re-mixes with a fun and innovative
interface. They can record samples, mix and
match loops and create their own music tracks
using an assortment of rifts, instruments,
runs and backbeats. Plus, kids can share their
creations with friends and update and explore
new content on the Ucreate Music website. For
added entertainment, kids can add in their own
voice and sound effects or distortions to their
track.
• Xtractaurs™ - provides kids with the tools to
build the ultimate dinosaur online. Begins with
the Starter Kit, which comes complete with
a Trex action figure, software and Extraction
Gun. Connect the Extraction Gun to your Mac
or PC and then insert into the dinosaur figure
to “extract DNA.” Once extracted, the DNA
will unlock an action-packed online gaming
experience. As kids collect new dinosaur
figures, they will continue to extract dinosaur
DNA, unlocking new games and special
attacks. A player can boost the power of his
figure in five arcade-style games, collect new
DNA in dino action games, and ultimately take
on the mighty Megavores™ in battle.
• U.B. Funkeys™ Game Factory Tool - A
PC-based interactive game where vinyl toy
collecting meets casual gaming. The virtual
world continues to expand as players collect
figures and interact through in-game activities
and challenges.
• FAMPS™ (Feelings, Attitudes, Moods and
Personalities) - Feelings, Attitudes, Moods
and Personalities - allow girls to reflect
their various emotions through their virtual
space. Each figure creates a unique emotional
makeover so girls can express themselves in
all kinds of fun new ways via their desktop,
e-mail, widgets and IM.
PBS www.pbskids.org
You can go to the pbs.org website and it has games
and other things to help keep your kids entertained.
They also have another section - PBS KIDS PLAY!
It is setup to help teach essential preschool and
kindergarten skills and to report to parents on each
child’s progress in those skills. The curriculum is
divided into seven core areas:
1. Creativity
2. Healthy Development
3. Language Development
4. Literacy
5. Mathematics
6. Science
7. Social Studies
Interactive projects encourage creative play. These
projects allow children to exercise their imagination
and engage in experimental use of objects. Projects
in PLAY! can cover anything from art, music, and
drama to engineering and physics. Kids can save their
projects to a personal bulletin board and work on them
over the course of many days - even weeks or months.
See video of their CES booth.
Pogo.com www.pogo.com
Go to here to play
over 100 free
games. Puzzle
Games
• Word
Games
• Card Games
• Board Games
• Freebie Casino
• Arcade & Sports
• Club Pogo Games
Re-Mission www.re-mission.net
Developed by HopeLab it is
a game which helps kids with
cancer understand what they
are up against. It gives them
a sense of power and control.
In the game a nanobot named
Roxxi travels through the
bodies of fictional cancer and
cancer treatments. The game
is free to young people with
cancer. See video of their CES booth. They say that
those given Re-Mission:
• Adhered to their prescribed treatments more
consistently
• Showed faster acquisition of cancer knowledge
• Showed faster increase in self-efficacy
Sakar International www.sakar.com
• Ergonomically designed PS3 controller has
illuminated buttons and no wires. Never get
•
•
•
•
tangled up again. 2.4GHz
Wireless Controller: PS3180
The 3 In 1 Kit for Wii
comes with a bat, racket,
and putter that connect to
your Wii-mote to enhance
the realism of playing Wii
sports. 3 In 1 Kit - Wii
Video Game Accessories: WII-400
Play real life high stakes black jack in the
palm of your hand. High Stakes Las Vegas
Blackjack: MAX13721
Texas Hold EM LCD Game: MAX10721-6
Portable Sudoku device let’s you play
anywhere. Choose from over 16,500 puzzles
and four levels of difficulty with this
handy electronic Sudoku game. Test your
performance with the built-in-timer. Sudoku
for Dummies: DUM-120
The Crabby Office Lady
Get the Crabby Office Lady’s book
Read all the Crabby Office Lady columns
Get Crabby’s columns via RSS
Crabby demystifies Word terms The Crabby Office Lady
Welcome to Crabby’s summer “demystifying”
series, where I’ll define some of the most common
terms that are apparently vexing you, like pebbles
in your summer sandals.
Applies to
Microsoft Office Word 2007
Toshiba www.toshiba.com
With the X20 Gaming Mouse the goal is total game
domination. It has a Rapid Fire switching button,
from which gamers are able to shoot one to four
bullets at a time. An Avago laser engine also delivers
extreme accuracy,
lightning-fast response
and mirror-smooth
tracking, and the
advanced ergonomic
design offers comfort
during extreme
competition. Available
now $60 MSRP.
The new Gaming
Backpack fits any laptop
with up to an 18-inch display, including the 17-inch
Toshiba Qosmio X305—as well as add-on accessories
and games with plenty of room to spare. Available
now for $100 MSRP.
Prices state are rounded up (I hate the 99 cent trick).
When a younger, less harried version of me started
writing this column a little more than five years ago,
I did a few columns about “demystifying” certain
terms — computer terms, e-mail terms, e-mail
protocols, and a couple of others. These were —
and still are — very popular and well-received
columns, because I think that they fill a need that isn’t
necessarily filled anywhere else on the Office Online
site: They define some of the more basic terms that
all of us writers, template creators, editors, and copy
editors assume you already know. (And we all know
what happens when we “assume” anything — I won’t
get into that here.)
Sure, we often define the more complicated words and
terms for you, but I do know — from the feedback
you give me, often a tad crabby yourselves — that you
sometimes get stuck on a word and can’t really go any
further with the help you were trying get. That’s when
tempers flare, keyboards get broken, and innocent
mice are treated like pesky rodents.
So for the next few weeks — throughout the summer,
really — I’m going to try to soothe everyone (and save
some hardware and a few relatively harmless rodents
at the same time). I plan to write 10 columns, all about
demystifying some of the more general terms and
words that put people in a pickle. Of course, some of
you may find these columns way too basic. If so, read
another column, take a training course, catch a demo,
or just get back to what you were doing. But for the
rest of you dear readers, I’m hoping that this series
will serve as a sort of touchstone for you. (I’m sure
you’ll let me know …)
Ready, set … define those terms!
This week, Word is up to bat. Here are 10 of the
most requested terms calling for attention from your
feedback. Some of them are pure definitions, while
others explain the difference between two or more
related things (you’ll see what I mean).
Again, some of you know these like the back of your
hand (although why you spend so long staring at the
back of your hand, I have no idea), while others are
gently relieved to now know that those brown spots
are of course not age spots; they’re sun kisses.
Headers versus titles
• A header is a little identifier that runs across
the top part of your document. In a book, it
may be the name of the chapter. A header
provides quick information about a document
in a predictable format. Headers are flexible,
too: You can have different ones on odd and
even pages; have a different one on just the
first page of the document; and even use
section breaks (which I’ll get to in a minute) to
create distinct document sections with different
headers.
• Now a title is the actual title of your document
— what you’re calling it, and what you’re
typing up there in great big letters for all to
see. Normally it isn’t something that appears
on every page (unless it’s one of those books
that uses a header to give the title and then
the chapter name, too … but I’m just trying to
confuse you).
Footers versus footnotes
• A footer is like the header except that it runs
across the bottom part of your document.
(Head … foot … get it?) As with the header,
it is flexible in the same ways. You can use
footers for page numbering, date and time, just
about anything you want to appear on every
page (or just the first page, or on every other
page, or whatever). How you apply headers
and footers depends on which version of
Microsoft Office Word you’re using. Check
Office Online and locate your version’s Help
site.
• A footnote is also some text at the bottom of
the page, but it’s not something that you can
program to happen automatically, like a footer.
A footnote refers to something that you’ve
written within the body of the text on that
same page. Maybe it adds a little bit more of
an explanation, or names the author of a quote
you used. Again, it’s more than just a footer,
which adds very little space at the bottom of
your page.
The Chicago Manual of Style (a bible of sorts
for many writers and editors, including me) says
something with which I wholeheartedly agree: “A
page of type containing more footnote material
than text not only is unpleasant to the eye but may
discourage all but the most determined reader.” (And
if I were using footnotes in this column, I’d use one
here, to cite what page I got this from and from what
edition of the CMS.) It’s a little explanation of sorts
or perhaps a reference to a quotation. And of course,
a footnote should not be confused with an endnote,
which appears at the end of the entire document and
is usually very wordy and something no one reads
anyway.
NOTE My copy editor took great offense when she
read this and wants to say a little something here.
Copy editor, take it away:
NOTE Thanks, C.O.L. (First, strike through “took
great offense” and replace with “raised an eyebrow.”)
Actually, I’m interested in what Crabby might hear
from you folks who use footnotes and/or endnotes in
your work. People do read footnotes and endnotes,
especially if they’re reading a book or article about
a subject they’re passionately interested in and they
want to make sure the author isn’t making stuff up.
When reading a nonfiction book, I keep a bookmark
in the endnotes so I can flip back quickly to see the
endnotes for the page I’m on … Now Crabby, back to
you …
Formatting marks
• I’m covering this one because my Uncle Phil
called up one day with the strangest problem
(or so it seemed). “Honey, there are these little
marks running all around my sentences, and I
never put them there. They’re like two straight
lines with a ‘what’re you think you’re doing?’
hand on the hip.” Hmm. Gremlins? Improbable
(but not impossible, as anyone who’s had
a computer knows). After a few minutes of
thinking, I finally figured out that Uncle Phil
had hit the Show formatting marks button
somehow. I told him about that button, but
he didn’t know what formatting marks were
(nor did he really care, but he was quite polite
about it). And why should he know? He isn’t a
writer or an editor, and most people probably
wouldn’t know a formatting mark from a
grammar font kit (which, as it turns out, is an
anagram for “formatting mark”). Anyway, we
got it turned off and he went back to whatever
it was he was doing (which is usually sending
out e-mail messages without a Subject line.
Uncle Phil … if I’ve told you once about using
the Subject line, I’ve told you a hundred times
… ).
•
•
A formatting mark can be a paragraph mark (it appears
at the end of a paragraph)
A nonbreaking space (a raised circle between
words)
A text-wrapping
break (a symbol that indicates that text is wrapping
below an object, such as a picture)
•
•
A manual line break (appears at the end of a line
when you press SHIFT+ENTER)
There are many, many more. If you want to see
what they look like, in any version of Word you can
choose to show or hide your formatting marks. Just
check Office Online for each version’s explanation.
Views
There are a few different ways to look at (in other
words, view) the document you’re working on in
Word. Some views are available only in Word 2007,
some came along only in Word 2003, and some are
as old as dirt. Get on the View menu (or the Ribbon,
which is part of the Microsoft Office Fluent user
interface in Word 2007) in your version of Word to see
what’s available to you. I’ll bet you have a favorite.
• Normal view Normal view shows text formatting
•
but simplifies the layout of the page so that you
can type and edit quickly.
Print Layout view You can see how your
document will look once it’s printed. You can see
it in a variety of sizes — 100%, 50%, 25%, and so
on.
Reading Layout view This view is designed
to make reading documents on the screen more
comfortable. It removes many of the distracting
elements in a Word document such as toolbars and
rulers. This helps you concentrate on the content
only. However, note that Reading Layout doesn’t
necessarily show you how the document will look
once it’s printed. Text may appear larger and page
breaks may be off, too. It’s just a good view for
easy reading. It’s like the Barcalounger of views.
Full Screen Reading view (new for Word
2007) This was previously called Reading Layout
view (in Word 2003). It’s similar to this view
except that it gives you the added bonus of being
able to see the document as it would appear on the
printed page. So it’s really a Reading/Print Layout
view. (And if I ruled the world, I’d call it just that.)
Document Map This is a pane that runs vertically
down the left edge of a document and displays an
outline of the document’s headings. It’s a great
way to move quickly through a document while
keeping track of where you are. You can use the
Document Map when you’re in Reading Layout
view to jump to different sections of the document.
Outline view This view shows the headings of a
document indented to represent their level in the
document’s structure. You can also use Outline
view to work with master documents. When you
want to look at the structure of a document and
to move, copy, and reorganize text by dragging
headings, this is the view to use. (And I know you
learned, way back in English class, what an outline
is and why we use one. See, Mr. Fine? Even
cheerleaders concentrate on other things besides
new cheers.)
Web Layout view When you’re creating a Web
page in Word or a document that will be viewed on
the screen, work in this view.
Page breaks and section breaks
A page break is where, well, one page ends and
another begins. If you need a page to end artificially,
that is, before the text has reached the bottom margin,
you can insert a page break and start a new page. (This
is great for you students who want your term papers to
appear longer but you never heard that from me.)
Now section breaks are a bit different. They can
divide your document into sections and then format
each section the way you want. For example, with a
Continuous type of section break, the top section of a
page in your document can be a big block of text with
a few different headings, while the bottom half of the
page can be two columns of information. Stay with
me now. You can even do a Next page section break,
which adds a section break and starts the new section
on a new page; you can use an Odd page or Even
page break, which starts a new section on the next
odd-numbered or even-numbered page.
Themes
People seem to get very confused about themes. A
theme is simply a set of unified design elements and
color schemes. It makes designing anything very
easy. When you apply a theme to a document (or to
a presentation or a Web page, for that matter), the
following elements are customized with that particular
theme’s design: fonts, font colors, background colors,
body text and heading sizes (I know you know what
a heading is), horizontal lines, links (not-yet-clicked
links, already-clicked links, in-the-process-of-beingclicked links), table border colors, and all level of lists
(bulleted, numbered, and so on). Why go through and
make all those design decisions yourself when we’ve
given you a theme park of themes? Why indeed …
Bookmarks
No, it’s not a little piece of leather or laminated paper
that you stick inside your book to know at what page
you left off. (Well, actually it is that, but not in this
case.) In Word, it is sort of like a regular bookmark in
the way that it identifies a place in your document that
you mark for future use. I like to use bookmarks when
creating a big term paper. For each chapter I write,
I assign a bookmark to it: Unbelievable Chapter 1,
Remarkable Chapter 2, Invigorating Chapter 3, and so
on. Then, when I’m somewhere in the document and
I want to be invigorated all over again, I can go to the
Bookmark dialog box, pick the bookmark for Chapter
3 that I created, and hop to it. (Of course, this is a
completely fictitious account of how I use bookmarks
because I finished my term paper writing long ago
and never plan to return … But weird — I now sort of
write term papers for a living. How did that happen?)
Default
No, this is not a tennis term. (And no, I don’t know
that because I’m a tennis player. I am not a tennis
player. When I was 12, I traded baby-sitting a tennis
instructor’s kid for tennis lessons. One day the little
brat I was baby-sitting ran into the house with the
garden hose on full blast. I chased him out and into the
cul-de-sac … where he was promptly hit by a car and
set in a body cast for five months. Needless to say, I
never learned to play tennis. It has, shall we say, bad
connotations for me.)
But I digress …
Default simply means what’s already been set up.
When you open a Word document the first time after
you’ve installed Word, the font that shows up is the
default font. The margins are set by default, certain
toolbars are on by default. The great thing about
default is that you do not have to accept it. Go ahead!
Customize away! Bring the hose into the house! Say
goodbye to default! Say goodbye to tennis lessons!
Join the swim team instead!
File extension
A file extension is simply the little letters, preceded by
a period (or “dot”), that are at the end of a file name.
These seemingly insignificant parts of your document
are actually quite important (and significant) — they
tell us what sort of document it is — namely its
format — and if we have access to it. (And as anyone
knows who accidentally renamed a file extension,
changing these few little letters can have dreadful
results.)
For example, a Word 2007 document has the extension
.docx, which tells us that only Word 2007 programs
can open it. The extension .doc means that this
document was created and saved so that Word 97-2007
can open it (.doc tries to be everyone’s friend and grew
up to be a politician). The extension .dotx is a Word
2007 template, while .dot (also known as dot-dot) is
a Word 97-2003 template. Now, .dotm is a macroenabled template, and you’d better be careful who
you got it from. Other examples of file extensions (not
Word-related but just thrown in here as a bonus: .jpeg,
.gif, and .png (image file extensions); .mp3, .wav, and
.wmp (music file extensions); and finally, .416 (you’d
better have filed for a tax extension).
Add-in
We like add-ins — they make life more interesting,
they add new functionality. They’re downloads that
you can choose to add (or not) after you’ve already
installed your program. Sometimes they’ve been
created by the people who already created the original
programs but who wanted to have even more fun
with you. I like to think of add-ins as accessories;
you know, things you can’t live without: a Birkin bag
(right — as if I’d know a Birkin bag if it emptied its
contents onto my head); a stint at Lindsay Lohan’s
rehab center (you know, just for the 4-star food); a pair
of elastic pants at Thanksgiving (now that I know).
An example of an add-in for Word is the
International Character toolbar, which lets you
insert international characters (you know, like umlauts
and funky Vietnamese accents) in 26 languages! Who
doesn’t need that, I ask you? Another example is the
Stock Actions for the Research Task Pane add-in,
which allows you to insert stock quote information
from the MSN Money Stock Quotes service into
Microsoft Office documents and spreadsheets. Who
needs a Birkin bag when you can have that?
And there you have it: 10 terms that may (or may
not) have been vexing you. Now I hope you can go
about your day and not get caught like a deer in the
headlights when you’re trying to maneuver your way
across that highway of knowledge.
“In the end, we will remember not the words of
our enemies, but the silence of our friends. “ — Dr.
Martin Luther King, Jr.
About the author
Annik Stahl, the Crabby Office Lady columnist, takes
all of your complaints, compliments, and knee-jerk
reactions to heart.
Tips from Smart Computing
Blocky Text On LCD – LCDs (liquid-crystal displays) are great alternatives to CRT (cathode-ray tube)
monitors in many ways, but they do make text look
“computerized.” To make the on-screen text easier to
read, enable Microsoft’s ClearType, a feature that’s
bundled with WinXP. If you want to use the basic version, which works fine in most cases, right-click the
Desktop, click Properties, choose the Appearance tab,
and click Effects. Select the checkbox next to Use The
Following Method To Smooth Edges Of Screen Fonts
and then select ClearType from the drop-down menu.
If you want total control, use the online configuration
utility at www.microsoft.com/typography/cleartype.
Get Around A Blocked Back Button – Sometimes you
may click the Back button only to find yourself staring at the same site you were trying to leave behind.
The problem isn’t the browser’s Back button but the
site’s coding. A Web developer may have coded a page
either to open in its own separate window or to reload
each time a visitor clicks the Back button. You can
work around these coding tactics by closing the new
window and returning to the original browser window
or by right-clicking the Back button and selecting the
page you want to access from the pop-up list.
What is Phishing – Phishing (short for password harvesting fishing) is an online scam that attempts to trick
or threaten unsuspecting users into sharing private
information that miscreants later use for identity theft.
The scam often starts with a mass email to millions of
random email addresses, often in the guise of a major
service or banking company. The message then tells
readers to visit a Web site and complete a form or face
some consequence (such as account cancellation). The
Web site itself is usually a very good replica of the
site that the major service or banking company actually uses. Phishing emails differ in their specifics, but
they all share a few common traits. First, they appear
to come from a legitimate company, using the same
graphics you’d expect to see at that company’s site.
Second, they try to create a sense of urgency, telling
recipients that their accounts are about to be suspended or are otherwise experiencing major problems.
Third, these emails contain forms or links to forms
where users are supposed to enter personal information, such as an account password or a credit card
number. Once you enter the data in the form and click
Submit, it is sent to the scammer’s computer and he
can use it to steal from you.
What To Do If Your Monitor Won’t Turn On – If your
monitor doesn't turn on, check the power first. Assuming the CPU itself is working (can you hear the computer running or see lights on the PC’s face?), a totally
dead screen usually indicates a power problem related
to the monitor. The power issue may lie within the
computer or monitor, but before looking for a complicated fix, consider all the external cables and switches.
It’s quite possible that you or someone else accidentally bumped a cable loose.
Should You Reinstall Windows?– Reinstalling Windows isn’t necessarily a cure-all for problems caused
by flaky software, malfunctioning hardware, or malware infections. In fact, the repair method could even
introduce more problems, and the clean method won’t
fix problems specific to a particular application or
hardware device. However, if thorough troubleshooting reveals that problems cannot be fixed without reinstalling Windows, it’s usually worth the time, effort,
and risk to repair or reinstall Windows.
Recycle Bin: It's easy to delete files by dragging them
into the Recycle Bin. At least it's easy if you can see
the Recycle Bin. But if the Recycle Bin is hidden
beneath one or more open windows, there's actually an
easy way to deal with this situation. Drag the files you
want to delete over a blank section of the Taskbar and
wait for a moment. Windows automatically minimizes
all of the open windows for you, which makes it easy
to finish dragging the files to the suddenly visible
Recycle Bin.
Create A Toolbar For My Computer: If you frequently
access your drives or DUN (dial-up networking)
connections through the My Computer icon on your
Desktop (Windows 98/Me/2000/XP), you can simplify things and create a My Computer toolbar. Click
the My Computer icon and drag it to the top or either
side of your Desktop. Release the mouse button, and
Windows creates a toolbar that displays the contents
of My Computer. You can drag the edges of the toolbar to resize it. You can also edit toolbar options by
right-clicking the toolbar and selecting an option from
the context menu that appears. This tip works for any
folder on your Desktop, and you can combine toolbars
by dragging one on top of another.
Tables In Word: Tools such as Microsoft Word 2003
offer a variety of standard formats that can be applied
to tables. Just click anywhere in your table and then
click Table and Table AutoFormat. A formatting dialog box will appear, so you can select from a variety
of established format styles. Examples are shown
for each format, so you can experiment with different looks until you find the one that suits the situation
best. When you decide on a format, click Apply to
reformat you table. If you make a mistake or change
your mind, click Undo and repeat this process to apply
another table format.
Garbage In, Garbage Out: It’s great to take pictures
at low resolution because you can cram more photos
in your camera’s memory. But with all things PC, the
GIGO (garbage in, garbage out) rule applies. Lowresolution photos are ideal for posting to Web sites or
emailing, but not for printing, unless you’re willing to
keep the size down to roughly passport-photo size or
smaller. Let’s say your printer works best at 200 pixels per inch. For a good 4- x 6-inch photo you need
800 x 1200 pixels; double that for an 8- x 10-inch.
Low resolution for today’s cameras usually means 640
x 480 pixels, not nearly enough for anything about a
3- x 5-inch picture. Shoot at higher resolutions for
larger photos.
Slow Computer?: If your computer is running slowly,
you don’t necessarily need to reinstall your operating
system, make sure that you don’t have unwanted programs hogging your memory. Do thorough spyware
and antivirus scans, and then uninstall any unnecessary programs. Check your system tray. Are there a
lot of programs running? Disable anything that you
don’t actually need, then see if you system performance improves. If all these fixes don’t help, and it’s
been at least a year since you got your computer or
you reinstalled the OS, then your PC might be a good
candidate for reinstalling the OS.
When to Turn Off Personal
Computers
U.S. Department of Energy - Energy Efficiency and
Renewable Energy. A Consumer’s Guide to Energy
Efficiency and Renewable Energy
www.energy.gov/forconsumers.htm
If you’re wondering when you should turn off your
personal computer for energy savings, here are some
general guidelines to help you make that decision.
Though there is a small surge in energy when a
computer starts up, this small amount of energy is still
less than the energy used when a computer is running
for long periods of time. For energy savings and
convenience, consider turning off
• the monitor if you aren’t going to use your PC for
more than 20 minutes
• both the CPU and monitor if you’re not going to
use your PC for more than 2 hours.
Make sure your monitors, printers, and other
accessories are on a power strip/surge protector. When
this equipment is not in use for extended periods, turn
off the switch on the power strip to prevent them from
drawing power even when shut off. If you don’t use a
power strip, unplug extra equipment when it’s not in
use.
Most PCs reach the end of their “useful” life due
to advances in technology long before the effects
of being switched on and off multiple times have a
negative impact on their
service life. The less time a PC is on, the longer it
will “last.” PCs also produce heat, so turning them off
reduces building cooling loads. For cost effectiveness,
you also need to
consider how much your time is worth. If it takes a
long time to shut down the computer and then restart
it later, the value of your time will probably be much
greater than the value of the amount of electricity you
will save by turning off the computer.
Power-Down or Sleep Mode Features
Many PCs available today come with a power-down
or sleep mode feature for the CPU and monitor.
ENERGY STAR® computers power down to a sleep
mode that consume 15 Watts or less power, which is
around 70% less electricity than a computer without
power management features. ENERGY STAR
monitors have the capability to power
down into two successive “sleep” modes. In the first,
the monitor energy consumption is less than or equal
to 15 Watts, and in the second, power consumption
reduces to 8
Watts, which is less than 10% of its operating power
consumption.
Make sure you have the power-down feature set up
on your PC through your operating system software.
This has to be done by you, otherwise the PC will
not power down. If your PC and monitor do not have
power-down features, and even if they do, follow the
guidelines below about when to turn the CPU and
monitor off.
Note: Screen savers are not energy savers. Using a
screen saver may in fact use more energy than not
using one and the power-down feature may not work
if you have a screen saver activated. In fact, modern
LCD color monitors do not need screen savers at all.
End of Article - End of Article - End of Article - End of Article
End of Article - End of Article
Your Next Computer Will Be Green
By Marjie Tucker, Editor, Mountain Computer User
Group, GA
www.mcug.org
mcug(at)dnet.net
Obtained from APCUG with the author’s permission
for publication by APCUG member groups.
With Europe leading the way, the computer industry
is decidedly becoming “green.” The Waste Electrical
and Electronic Equipment (WEEE) and the Restriction
of Hazardous Substances (ROHS) directives went into
effect earlier this year. These two directives state that
certain electrical and electronic equipment must cut
down on hazardous
materials such as lead, mercury, and cadmium. They
also give customers the right to return their equipment
free of charge. Companies have several years to fully
implement these directives, but the leaders have
already started to make changes.
Dell, for example, is advertising Energy Smart
workstations and notebooks that can reduce power
consumption by as much as 78%. The Energy Smart
configuration uses a default power setting that is
designed to reduce consumption and energy costs right
out of the box. In addition, the power supply, fan, and
motherboard use significantly less energy to maintain
cool internal temperatures.
HP is using 80 Plus power supplies to lower energy
bills and AMD technology that reduces heat output
and PC power consumption. In addition, they have
already introduced an HP recycling program where
you can trade-in or donate the products.
Government Initiatives Many U.S. government
agencies have implemented standards and regulations
to encourage green computing. The Environmental
Protection Agency
launched an Energy Star program in 1992 and
strengthened its requirements in 2006. In 2003 the
California State Senate enacted the Electronic Waste
Recycling Act and in 2007 President Bush issued
Executive Order 13423 requiring all federal agencies
to use the Electronic Products Environmental
Assessment Tool when purchasing computer systems.
In addition, a global consortium called The Green Grid
was founded in 2007 by AMD, APC, Dell, HP, IBM,
Intel, Microsoft, Rackable Systems, SprayCool, Sun
and VMware.
Another initiative formed by a group of Globalminded IT executives, the Green Computing Impact
Organization (GCIO), was created to be an active
participant in transforming the IT community from an
environmental liability to an Earth conscious example
of responsibility. GCIO is a nonprofit organization
that is based on environmental audit programs for
consumers and small business homes with respect
to general energy-efficiency programs (including
lighting, heating, insulation, etc.). GCIO’s mission is
to educate and assist enterprise technology users in
the design of environmentally aware and responsible
information system operations. They help consumers
become more environmentally responsible by reducing
energy consumption and electronic waste in an effort
to protect the Earth.
GCIO is sponsoring educational programs across
the country and participating in a Green Computing
Summit that will be held in Washington, DC on May
20th. The summit will address how public sector
IT managers, procurement officials, and program
managers public sector professionals can transform
their IT and data center operations into more
environmentally conscious yet efficient solutions.
This conference will attract senior government IT
professionals and their industry partners tasked with
helping agencies become greener in the coming
years. Attendees will represent federal, state and
local governments, public policy organizations and
suppliers to government. You can read more about this
event at
www.e-gov.com/EventOverview.aspx?Event=SGCS08
.
Features of Green Computing
Power management is the most popular method. The
operating system of the computer can be set to directly
control the power saving aspects of the hardware. It
can automatically turn off the monitor or hard drive
after a period of inactivity. Or, the entire system
may hibernate, turning off most of the components
such as even allow the user to manually adjust the
voltages supplied to the CPU to reduce the electricity
consumption and the amount of heat that is produced.
As of July of 2007, all new Energy Star certified
desktops must have a power supply that is at least 80%
efficient.
Other features include using motherboard video output
instead of a video card, hard disks that consume
less power, flash based solid state drives that require
fewer write cycles, and lower energy monitors.
And, manufacturers of networking equipment are
developing switches and routers that reduce energy
costs.
Recycling Materials
Obsolete computers can be reused for charities, nonprofit organizations, and developing countries. Parts
from really old systems can be recycled through some
recycling centers. Some recycling charges can be
passed back to the manufacturers.
Recycling this equipment keeps the lead, mercury, and
chromium out of our landfills. In addition, computer
supplies such as cartridges, paper, and batteries can be
easily
recycled.
How Can We Work Greener?
Visit the website for Climate Savers Smart Computing
at sww.climatesaverscomputing.org to view a three
step program to go green. Here are the basic steps that
they suggest:
Step One - Turn on Power Management. Since the
average desktop PC wastes nearly 50% of the energy
it consumes as heat, it makes sense to use the power
management features that are built into Windows
XP and Vista. The benefits? You will reduce your
electricity bills and your energy footprint will be
lowered as you reduce your greenhouse gas emissions.
The Climate Savers organization predicts that the
power management features on your computer can
save nearly have a ton of CO2 and more than $60 a
year in energy costs.
Step Two - Buy an energy efficient computer. Energy
Star, the program designed by the U.S. Environmental
Protection Agency, specifies the standards that
equipment and appliances must meet to wear the
Energy Star badge. You can visit their website at www.
energystar.org for specifics. Basically an Energy Star
compliant PC uses 15
to 25 percent less energy. This program is expected to
save U.S. consumers and
businesses more than $1.8 billion in energy costs over
the next five years and prevent
greenhouse gas emission equal to 2.7 million vehicles.
Step Three – Unplug from phantom power. As long as
your computer is plugged in
it still uses electricity, even while it is turned off or in
standby mode. A computer that is
turned off, but still plugged in, can use up to 10 watts.
The Climate Savers estimate that
you can reduce your electricity bills by as much as
10% by unplugging your appliances
and electronics when they’re not being used.
This article has been provided to APCUG by the
author solely for publication by APCUG member
groups. All other uses require the permission of the
author (see e-mail address above).
End of Article - End of Article - End of Article - End of Article
End of Article - End of Article
Security and Deleting Files: A
Common Misconception
by Bob Schwartz, Member of HAL-PC, Texas
www.hal-pc.org
bobx(at)hal-pc.org.
Obtained from APCUG with the author’s permission
for publication by APCUG member groups.
You have just deleted a file from your hard drive. It’s
gone, isn’t it? Sorry! It is still there.
You want to clean up your hard drive, so you format it.
It is now clean. Nothing is on it anymore, right? Nope!
Everything is still there, except for the file directory.
How can this be? Doesn’t Delete mean remove?
Doesn’t Format clean the disk?
Each file system - has a file directory which records
the file name and it’s location.
To delete a file, the disk system only alters the file’s
name in the file directory, usually by changing the first
letter of the name. Formatting goes one step further, it
just empties the file directory. Neither does anything to
the files on the disk! They remain.
To clean a drive, either overwrite the whole drive or
the unused space. The most common way to clean
drives, especially older drives, is to write fixed or
random data obliterate the old files.
Fortunately, all ATA drives over 15-20 GB produced
since 2001 have an internal drive command that will
clean the drive sufficiently that it will meet DOD
requirements. At the University of California at San
Diego’s Center for Magnetic Recording Research
(CMRR) you can download their free program for
Secure Erase, entitled “HDDerase.exe”. Its use meets
U.S. Government requirements for disk erasure.
Secure Erase should provide the greatest peace of
mind. Internet Commentary suggests it is even better
than mechanically shredding the disks.
If you have a good machine with good software that
you would like to pass on to some else, and you
don’t have all the original disks - remove personal
information. I suggest this approach:
1. “Delete” the contents of: all the “My” folders
2.
3.
4.
5.
- My Documents, My Pictures, My Music;
Recent; Temp or Temporary folders; Recycle
Bin; Cookies; Downloads; and the entire
folders for Quicken and Tax preparation
software.
Clean your Registry of all personal data. For
XP, go to Start/Run, type regedit and press
Enter. Go to edit and click on find. Enter your
last name, click on find next. When the first
entry is found, go to edit and select modify.
Delete your name (it should be in color).
Depressing the space bar may clear it. Go back
to edit and click on find next, etc. Keep on
until you get a message that you have reached
the end. Then repeat the above with your first
name, then your street, your phone number,
bank name, broker name, and anything else of
a personal nature that you used.
Find and download a registry cleaner. Use it to
remove unnecessary items from the registry.
Ccleaner is an example.
Defragment the drive. This condenses the files
and moves them toward the beginning of the
drive.
Locate and download a wipe application
such as bcwipe. Use it to wipe (overwrite) all
unused space.
IMPORTANT NOTE: Before editing your “registry”,
back it up first, please.
This should effectively sanitize your disk, leaving it
clean, safe and usable.
Loss of personal information and the risk of identity
theft is a risk for you. For a business, the loss of
personal, financial, or medical data may subject it to
risk from recent laws, both federal and state.
I have been repairing or rehabilitating older machines
as a hobby to give them a second life. There are many
good machines and plenty of worthy recipients. If
there is good software worth keeping, remove all
personal data. If the software is not worth keeping,
then wipe the disk clean to install an operating system
and applications.
Removing the hard drive before you dispose of an old
machine is not a solution, unless you plan to use it in
your new machine, or store it permanently - you still
ultimately have to sanitize it.
Programs available, free or fee, include: Secure
Erase (mentioned above), Secure Delete, Wipe Drive,
Acronis Privacy Expert, East-Tec Eraser, East-Tec
Dispose Secure, Eraser, SysInternals SDelete, Darik’s
Boot and Nuke (dban), OverWrite, Wipe, Kill Disk,
BCWipe, and Autoclave. This list is NOT exhaustive.
And, you have to determine which is suitable to (1)
wipe the entire drive or (2) wipe only the unused
space.
Bottom line is, when you give away or dispose of a
used computer, either clean the hard drive yourself or
give the machine to someone you can trust who will
do it for you. The comments and opinions here are
wholly mine. I welcome alternative perspectives.
Bob Schwartz is a HAL-PC member, retired EE,
14 patents, technical writer, active in civic affairs:
President, Brays Bayou Association; Vice President,
Marilyn Estates Civic Association; Correspondence
Secretary with the Willow Waterhole Greenspace
Conservancy.
This article has been provided to APCUG by the
author solely for publication by APCUG member
groups. All other uses require the permission of the
author (see e-mail address above).
End of Article - End of Article - End of Article - End of Article
End of Article - End of Article
Three friends from the local congregation were asked,
‘When you’re in your casket, and friends and congregation members are mourning over you, what would
you like them to say?’
Artie said: ‘ I would like them to say I was a
wonderful husband, a fine spiritual leader, and a great
family man.’
Eugene commented: ‘I would like them to say I was
a wonderful teacher and servant of God who made a
huge difference in people’s lives.’
Carl said: ‘I’d like them to say, ‘Look, he’s moving!’
The reason congressmen try so hard to get re-elected
is that they would hate to have to make a living under
the laws they’ve passed.
Rootkits - A continuing Security
Problem
by Brian K. Lewis, Ph.D., Member of the Sarasota
Personal Computer Users Group, Inc., Florida
www.spcug.org
bwsail at yahoo.com
Obtained from APCUG with the author’s permission
for publication by APCUG member groups.
By now I suspect everyone reading this article is
familiar with most malware: viruses, botnets, Trojans,
etc. These are becoming less of a problem because
of the efforts of the security companies to provide
software solutions. More and more users are also
becoming aware of the need to have some means of
protecting their computer. As a result, hackers are
turning to a more effective method of controlling your
computer – rootkits. Although these have been around
more than ten years, like other malware, their numbers
seem to be increasing.
Probably the most dangerous form of the rootkit is
the “kernel mode Trojan”. This is a program that
inserts itself into the “kernel” of the operating system.
The kernel is the central component of the operating
system – its heart or brain to put it in more common
terms. It manages the communication between the
operating system, the hardware and the software
applications.
Most viruses operate as applications and can be
readily found in memory or in the file system.
Rootkits, however, can hide themselves in such a
way that it is very difficult to find them. In order
for a rootkit to alter the normal execution path of
the operating system, one of the techniques it may
employ is “hooking”. In modern operating systems,
there are many places to hook because the system was
designed to be flexible, extendable, and backward
compatible. For example, a rootkit can “hook” itself
into the Application Programming Interface (API)
which allows it to intercept the system calls that
other programs use to perform basic functions, like
accessing files on the computer’s hard drive. If an
application tries to list the contents of a directory
containing one of the root kit’s files, the rootkit will
censor its filename from the list. It’ll do the same
thing with the system registry and the list of running
processes.
A rootkit is a collection of tools an intruder brings
along to a victim computer after gaining initial access.
A rootkit may contain network sniffers, log-cleaning
scripts, key-loggers and trojaned replacements of
core system utilities. Although the intruders still need
to break into a victim system before they can install
their rootkits, the ease-of-use and the amount of
destruction they cause make rootkits a considerable
threat. One main purpose of a rootkit is to allow the
intruder to come back to the compromised system
later and access it without being detected. A rootkit
makes this very easy by installing a remote-access
backdoor. A rootkit can also allow the intruder to use
the compromised computer as part of a botnet (see
Botnets, SPCUG Monitor, January, 2008).
Another mechanism for hiding a rootkit is to add it
to a system driver file. Windows XP and Vista store
driver files in the System32/drivers folder. Many of
these system files load early in the boot process. These
files have boot or system flags in the registry and load
before any of the malware-prevention software. That
means they are very difficult to find. Although the
file size for the driver will be increased, the rootkit
may report the original file size to any query, not the
infected file size. All of this means that once a rootkit
has been installed and activated on your computer,
it is difficult to find by any of the usual malware
prevention software.
Rootkits do not require large software applications
to carry out their function. We are accustomed to
commercial applications that are many megabytes
in size. Even the anti-virus software may be 40-50
megabytes in size. In 2003 a rootkit was identified that
required only 7 kilobytes for its cloaking routine and
27 kilobytes for maintaining the open backdoor.
Anti-malware programs depend on two main means
of identifying malware. One is the signature method
and the other is heuristics. The signature method
requires that the malware be identified and reverse
engineered to determine a code sequence which can
be used to identify the application in the wild. This
code sequence is referred to as the signature and is
used by the anti-virus database. This signature is
then compared to code sequences in applications to
determine if they are malware. This method is of no
value when dealing with new or unreported malware.
So the next option is heuristic signatures. Their
primary advantage lies in their ability to identify
new, previously unidentified malware. The heuristics
technique assumes that malware will display certain
characteristics or attributes. They also attempt to
recognize deviations in “normal” system patterns
or behaviors. Using these predicted patterns, the
anti-malware application will attempt to determine
if the target application is malware. This has been a
successful approach for identifying viruses, but it is
less successful for active rootkits.
The April 2008 Virus Bulletin (www.virusbtn.com)
reported the results of testing a number of popular
commercial A-V programs, Internet security suites,
web-based scanners and specialized anti-rootkit tools.
The testing involved 30 known rootkits. The testing
categories were detection of: (1) inactive rootkits; (2)
active rootkits; and (3) malware hidden by rootkits.
Then they tested removal of (1) inactive rootkits; (2)
malware hidden by rootkits; and (3) active rootkits.
The results were not encouraging.
The seven Internet Security Suites used in the test
were able to detect 95% of the inactive rootkits.
(Remember, these were known samples that
had already been identified and their signatures
incorporated into the anti-malware applications.)
These suites were also able to remove 95% of the
inactive rootkits. However, when it came to active
rootkits the story was very different. The Internet
Security Suites detected only 65% of the active
rootkits and were able to remove only 48%. They also
were able to remove only 48% of the hidden malware.
All of the versions of the Internet Security Suites were
the latest available at the time of the test.
There were fourteen specialized anti-rootkit tools
tested using the same thirty rootkits. They were not
tested against the inactive rootkits, only the active
rootkits and the hidden malware. Again, the results
were anything but satisfying. These tools detected
83% of the active rootkits and 80% of the hidden
malware. The anti-rootkit tools removed only 60% of
the active rootkits and 67% of the hidden malware.
The web-based scanners did a far poorer job of
identification of the rootkits. They also were uniformly
unsuccessful in removing rootkits. The detection rate
was 53% and the removal was around 32%.
In reviewing these tests it is obvious that successful
detection and removal of rootkits depends on their
being inactivated. This can be done by running the
computer in “SAFE” mode which does not allow
the rootkit to load from the hard drive. However, it
would be expected that if detection/removal tools
were developed for this specific purpose, then rootkits
would appear that would load in “SAFE” mode.
Another alternative would be to develop rootkit
scanning software that would run from a CD. The
computer would boot from the CD and the operating
system for the scan would load from the CD. This
should improve the detection and removal rates
considerably. However, it then depends on the user
running the CD application periodically to scan the
entire computer. Considering how few users backup
their hard drives on a regular basis, this CD system
might be less than universally successful.
Given the current difficulty of detecting and removing
rootkits from your computer, what is a user to do for
protection? The only answer to this is to prevent the
rootkit from getting access to your computer. That
means using every tool you have available to prevent
the malware from gaining access to your system. Your
firewall is the first line of defense, followed by your
anti-virus, then your anti-spyware. Also, when you are
surfing the web, make sure you aren’t your own worst
enemy. Be careful and check out links before you
click on them. It just like getting spam in your e-mail.
Check where the link will take you before you click
on it. Social engineering techniques are also used to
propagate everything from viruses to rootkits. These
are techniques that encourage the user to take some
action which allows the malware to be downloaded
and installed on the users computer. A very interesting
analysis on these techniques is contained in this article
from the University of Cambridge (U.K.); http://
www.cl.cam.ac.uk/techreports/UCAM-CL-TR-666.
pdf. Although this is written specifically about virus
propagation, similar techniques are used to gain entry
for rootkits. This paper illustrates many of the “carrot
& stick” methods used by malware to gain access to
computer systems. Microsoft has also published a
paper detailing many of the common methods used
to trick users into installing malware. These can be
found in the paper “Behavioral Modeling of Social
Engineering-Based Malicious Software” on the
Microsoft web site.
So to all of you reading this paper, I would suggest
that “caution is the watchword” when it comes to
using your computer. I’m afraid that the situation
will only get worse when it comes to new forms of
malware.
Update Note: In my article on iFrame attacks (SPCUG
Monitor, May 2008), I listed a number of portals that
had been affected by iFrame attacks. One of these was
the eHawaii.gov portal. I have received information
from the site manager that the problem has been
corrected (removal of the iFrame) and actually only
affected one page on their site. Thanks to Russell
Castagnaro for correcting this problem and notifying
me.
Dr. Lewis is a former university and medical school
professor of physiology. He has been working with
personal computers for over thirty years, developing
software and assembling systems.
This article has been provided to APCUG by the
author solely for publication by APCUG member
groups. All other uses require the permission of the
author (see e-mail address above).
End of Article - End of Article - End of Article - End of Article
End of Article - End of Article
Signs in Great Britian
SPOTTED IN A SAFARI PARK: Elephants Please
Stay In Your Car
SEEN DURING A CONFERENCE: For anyone who
has children and doesn’t know it, there is a day care on
the first floor.
NOTICE IN A FIELD: The farmer allows walkers to
cross the field for free, but the bull charges.
MESSAGE ON A LEAFLET: If you cannot read, this
leaflet will tell you how to get lessons.
SPOTTED IN A TOILET IN A LONDON OFFICE
BLOCK: Toilet out of order. Please use floor below.
OFFICE: After the tea break, staff should empty the
teapot and stand upside down on the draining board.
Hauppauge HD PVR
Model 1212
By Terry Currier
I hate Thursdays. Even with two VCRs there are too
many good shows to watch, or record everything I
would like. I just brought a HDTV, and with the cable
cost being so high we decided to forgo the extra $10 a
month for the HD recorder and just use the HD box.
Then I saw the Hauppauge HD PVR at CES. It
connects directly out of the cable HD box so it can
record any of the TV shows in high quality H.264. The
cool thing is it will even record the premium channels.
It also works with satellite set top boxes as well.
The HD PVR will record real-time H.264 at
resolutions up to 1080i. It connects by using
component video (YCrCb) from cable TV or satellite
set top boxes. I’ve never used component video
(YCrCb) cables before. It took a couple of tries,
but I got it working perfectly. You can also hook
up the video through S-Video ports they have. If
the component video cables are your only means of
getting the signal to the TV there are Audio / Video
component pass through jacks to allow HD recording
and viewing at the same time. From the PVR box you
connect to the computer with a USB cable.
You connect the Hauppauge HD PVR to your
computer to record the shows. Since my desktop
computer is in the other side of the house I setup my
laptop to record to. At first I thought of it as a pain to
use the laptop, the reality was it was convenient since
I could take the laptop (and recording) anywhere to
watch it. Installing the software was not a problem. It
comes with:
• Arcsoft “TotalMediaExtreme” for video
capture, preview, playback, and authoring and
burning your TV recordings onto a Blu-ray
DVD compatible disc
• Arcsoft “TotalMedia Theater”, a video player
so you can play back your TV recordings
to your PC screen. There is a fast forward
feature so you don’t have to suffer through
commercials.
• Arcsoft “MediaConverter” , to convert your
H.264 HD recordings onto other formats
• Hauppauge’s WinTV scheduler for scheduled
TV recordings
After that you setup the built-in IR blaster to
automatically change TV channels for scheduled
recordings.
Even though it is burned onto a DVD it won’t play on
a DVD player. The Arcsoft program creates a BDMV
disk with .m2ts files for Blu-ray or Sony PS3 players.
Two hours of HD recordings, recorded at 5 Mbits/sec,
can be burnt onto a standard 4.7 GB DVD-R or DVDRW disk for playback on a Blu-ray DVD player. The
Arcsoft MediaConverter can be used to convert the
recordings onto other formats:
• Apple – iPod
• SanDisk – Sansa
• Microsoft – Zune
• Phillips – PMC7230
• Sony – PS3
You can not use the PVR to record one station while
you watch another. It records whatever the set top box
presents to the TV. In fact when I brought up the TV
guide to see what was coming on the premium
channels I notice the guide was in the recording. If
you have a HD recorder already can you use it to
record other channels? No, I took it over to my
daughters house to try that, and it only records the
channel the set top box is set at. Unless the box has
two tuners, which some do. But, I was able to record
HBO which I don’t have .
The Arcsoft “TotalMediaExtreme” for editing the
recordings (such as taking out commercials) is pretty
limited. Other video editing programs will also take
in the recordings. I took the .TS file into CyberLink’s
PowerDirector, edited and burned it to a DVD which
could be read by and DVD player. CyberLink’s
PowerDVD will also play the recordings.
Specifications:
• Hardware encoder
• H.264 AVCHD video encoder
• AC-3 audio encoding
• Recording data rate: from 1 to 13.5 Mbits/sec
(user selectable)
• Recording format: up to 1080i from
component video (YCrCb)
Note: the video input format determines the
recorded format. For example, 1080i input
records at 1080i, 720P records at 720P, etc..
Any other format conversions needs to be done
with the MediaConvert program (supplied).
• Size: 8” wide x 7” deep x 2.5” high
• Weight: 1 lb, 3 oz
System Requirements
• Processor Requirements (minimum):
• Dual core CPU
• Graphics with 256MB memory (or greater)
• Note: the playback of high definition H.264
requires a fast CPU and at least 256MB of
graphics memory
• Sound card
• Microsoft Windows Vista or Windows XP
with Service Pack 2 or later. According to their
website - HD PVR captures video streams in
a compressed H.264 format. Current versions
of Media Center do not support this video
compression format so currently, the HD PVR
will not function within the Media Center
application.
Included with the HD PVR
• HD PVR high definition personal video
recorder, USB
• Remote Control Including batteries
• IR Blaster transmitter cable
• Component video cable set
• Audio cable set
• USB cable
Computer used for review
• Toshiba Satellite A215
• Vista Home Premium
• 2 GB Memory
• 32-bit operating system
• AMD Athlon Dual Core Processor TK-55
$210 at newegg.com
Below is the Arcsoft “TotalMediaExtreme” while I
recording a show from Showtime Channel.
This is what the player looks like
For creating the AVCHD disc
Here is the editing screen
The MediaConverter
Setting up for scheduled recording
In the schedule
Membership application or renewal Form
Annual membership is only $20.00. Each additional
family member is $5.00.
________________________________________
Print Name:
________________________________________
Address:
________________________________________
City, Zip:
________________________________________
Phone:
________________________________________
Business Phone:
________________________________________
Email address
Mail to
WINNERS - WINdows usERS
PO Box 9804
Newport Beach, CA 92658-9804
meets at
The Fountain Valley Branch Library
17635 Los Alamos
Fountain Valley
meetings on 3rd Saturday
10:00 a.m. to 12:30 p.m.
WINNERS - WINdows usERS
PO Box 9804
Newport Beach, CA 92658-9804