This is an important meeting, so don`t miss it!!
Transcription
This is an important meeting, so don`t miss it!!
FPCUG Page 1 Electronically Speaking The newsletter of the Fredericksburg, Va. Personal Computer Users Group Volume 19 Issue 8 August 2006 General Meeting August 10, 7:00 PM Is Your Computer Secure?? Viruses, worms, spyware can affect all of us. But there are ways to prevent these pesky things. Mr. Robert Buongiorne, the President of Businets Inc., has arranged for one of his technicians to present a program on making and keeping your computer secure. Page 2 Tips and Hints We have all been aware of many tales of computers that suddenly just quit or start acting strange. In many cases the cause is rooted in some program or URL that you or someone in your household accessed either unwittingly or accidentally. There are many ways of preventing this type of mischief but some are better than others and the experts at Businets, Inc., who have had vast experience at solving these types of problems, will be with us to help use, understand and suggest programs that will keep your computer free of outside influence. Page 3 What’s Happening in FPCUG Helpline Businets new location at 3701 Latimers Knoll Ct. (off Lansdowne Road) This is an important meeting, so don’t miss it!! You Missed It Wallace McMillan of Gateway Computers presented all the aspects of the new MS Windows Vista at the General Meeting on July 13. We have all been wondering what the new windows program would look like and Wallace answered with authority and knowledge. In addition he contributed 2 geat door prizes, a 1 gb flash thumb drive won by Josh Cockey and a Z22 Palm won by Ed Alexander Help is badly needed!! Everyone in FPCUG knows that Bingo supports the charitable efforts of our club. But maybe you didn’t know that workers are needed to run this game. Now is the time to come to the aid of FPCUG. Please volunteer only one night every other month to help our efforts to help the community. Just send a note to Bill Williams at: [email protected] and you will be helping FPCUG with attaining our goals. The Sunset background of the Banner Line this month was contributed by Cliff Dalseide. If you would like to submit a photo just send it to [email protected] for consideration. Page 4 Managing Device Drivers Page 5 Legal BytesDo Shield Laws Extend to Bloggers? Comng Attractions Page 6 SIG Information Page 7 Tweaking Windows Taskbar Page 8 Calendar Come early to our meeting and socialize. Electronically Speaking Page 2 FPCUG Meetings in 2006 Tips and Hints by Dick Carricato Let me begin by thanking Tony Zanini and Bryan Longworth for pinch-hitting while I was away. Nice job guys, and thanks again. Networking – Problems at home after using WiFi (Part 1 of 3) Using WiFi at the library the first time was a smashing success. I just turned on my laptop computer; it found and connected to the library’s wireless network, and I was on the Internet without any cost. Everything looked fine when I returned home and re-connected my laptop to my home network. The Internet came up as soon as I tried it. However, when I tried to access any one of my other computers from the laptop, I found that I couldn’t see any of them. Further, when I tried to access the laptop from any of my other computers, I found that they could not see the laptop either. In about thirty minutes I expended all of my knowledge on networks in an attempt to fix the problem. I even re-established the network on the laptop. The problem remained. Luckily I found a recent Restore Point that I could try to see if that would repair the problem. Whoopee! That fixed it. From then on, and until I could find and fix the source of the problem, I would set a Restore Point prior to using the WiFi connection and Restore the system after using WiFi. If you have a home network and you plan to use a public WiFi network, for the present, I recommend setting a Restore Point before and then restore to that Point after. (Find System Restore in Start, Programs, Accessories, System Tools, System Restore.) Next time I will discuss the problem and the Registry modifications needed to fix it. And for those who might shy away from mucking with the registry, I’ll present a small batch file I wrote to do the job automatically. Forwarding e-mail MESS-ages Do you ever get a message with an Attachment and the Subject “Fw: message subject?” (This sometimes shows as “Fw: Fw; Fw: etc. message subject.”) When you open this message all you find is a blank text area, or maybe a line of text and the sender’s name, and another attachment with the same Subject. This continues on-and-on until you finally reach the original message with the Subject “message subject.” Why does that happen? Because all of those folks are forwarding the messages as attachments. That is, the first person who received the message wanted to forward it to a friend. So, instead of just hitting the Forward button, he pressed the Forward as Attachment button. Now each person down the line did the same thing with the message that he received. Any one of the recipients could have broken this chain by simply forwarding the original message. In order to read the original message, each person has to follow the attachments back to the beginning. The time to think about forwarding is while you are reading the original message. Don’t forward the message you received, forward the original message. Do it from within the original message and your recipient won’t have to go through the mess that you had to go through in order to read the message. The only reason that I can (Continued on next page) January 12 February 9 March 9 April 13 May 11 June 8 July 13 August 10 September 14 October 12 November 10 December 14 Fredericksburg PC Users Group Electronically Speaking is published monthly for the information and pleasure of the members of the Fredericksburg PC Users Group. Any FPCUG member or visitor is invited to submit articles for the newsletter. Officers Gil Schor- President [email protected] John Kruelle 1st Vice-President [email protected] George Bell 2nd Vice President [email protected] Pete Shatswell- Secretary [email protected] Chuck Hart- Treasurer [email protected] Board of Directors Jim Jordan Cliff Dalseide Josh Cockey Trustees Bill Williams-Agent of Record Gene Brower Rick Neil Newsletter Editor Jim Jordan [email protected] Webmaster Josh Cockey [email protected] Page 3 Electronically Speaking think of to ever use “forward as attachment” is when the attached message is only information that might help the understanding of the main message that is being sent. This type of message probably won’t get further forwards. What’s Happening in FPCUG In the case of multiple plain forwards, the only problem is the header information that is included for each forward. It is sometimes difficult to find the message because of all the clutter on the page. Before sending a forwarded message, the concerned sender should delete all of the extraneous header material. Perhaps he could leave the one header from the original message. One of the first things is the acquisition of a new projector for the Fire Hall. Anyone who was at the meeting of July 13 may not have realized it but we didn’t have to turn down the lights to get a good picture on the screen. As always there are things going on that many members may not know about. Below is the factory description and photograph of this projector. Old programs stop running after SP-2 Update (Part 1 of 2) Several people recently reported that some older DOS programs no longer run. The programs fail with the error message that the Autoexec.nt file “is not suitable.” Investigation showed that in all cases this happened after the SP-2 Upgrade. Further, a look in the C:\Windows \System32 folder revealed that the Autoexec.nt file was missing. (I guess that makes it very unsuitable.) Fortunately, Autoexec.nt is one of the files stored in the C:\Windows\Repair folder. To fix the problem copy C:\Windows \Repair\ Autoexec.nt to the C:\Windows \System32 folder. The easiest way to do that is to use Windows Explorer and navigate to the C:\Windows \Repair folder, Right click on Autoexec.nt and click Copy. Then navigate to the C:\Windows \System32 folder. Now highlight the folder icon, Right click and Paste. (Or click in the right hand pane of the System32 folder, Right Click and Paste.) There have been reports that some computers are deleting the Autoexec.nt file on every startup. Next time we will write a one-line batch file to solve this problem. 73 Dick Carricato 772-546-7790 [email protected] Helpline In order to serve you better we have instituted a helpline. Email your questions or problems to the sites indicated. Digital Photography-Pete Shatswell- [email protected] Genealogy-Anne Zink - [email protected] Graphics & Desktop Publishing-Jim Jordan jimjgraphics@adelphia,net Photograph Editing- Anne [email protected] Spreadsheet-(Excel) Chuck Hart- [email protected] Network and Wireless Connections and General PC Problems -Josh [email protected] Word Processing-Rick Neil- [email protected] Dept. of Stupid Questions-There is no such thing as a stupid question. It’s simply a question you have-Try sending it to Jim Jordan [email protected] and he may be able to answer it or refer to someone who can. Remember-Only questions submitted via email will be answered and don’t expect an answer in less than 7 days. Brilliant multimedia presentations ViewSonic’s PJ766D is the class-leading multimedia DLP™ projector that delivers brilliant color, sharp graphics and outstanding video. The DIGITAL CLARITY OF DLP TECHNOLOGY GUARANTEES STUNNING LIFELIKE video and crisp data presentations. The native 1024x768 XGA resolution and an extremely high 2,500 lumens of brightness make it ideal for installations in conference rooms, religious sanctuaries, lecture halls and home theaters. The PJ766D offers multiple inputs including RGB, DVI-I, component, composite and S-video that ALLOW YOU TO CUSTOMIZE MULTIMEDIA PRESENTATIONS. Impress your audience with the power and performance of the PJ766D. Another project that is nearing completion is a computer laboratory at the Boys & Girls Club on Gunnery Road. FPCUG has contributed 6 new AOpen computers, a Lexmark printer and a ViewSonic projector. This laboratory, when completed may also be used by FPCUG to arrange classes or SIGs that we can present during the daylight hours. If you have any ideas for a SIG or class that is needed during the day contact any Board member and it will be taken under consideration. We need members! In the first week in September, when you get the Consumer’s Eye advertising catalog you will find an ad for FPCUG. If you don’t find the ad this month, you may find it next month. This month is distributed to Fredericksburg South and next month, depending on the results of this effort, it may be distributed to Fredericksburg North. The FPCUG Board of Directors is always looking for new ideas, so don’t be afraid to mention them to any BOD member. Don’t forget the APCUG Photo COntest See apcug.org for details Electronically Speaking Page 4 Managing Device Drivers By Vinny La Bash, Member of the Sarasota PCUG, Florida labash(at)spcug.org www.spcug.org Windows is the most widely used operating system (OS) in the personal computer world. For each piece of hardware that’s connected to a Windows based computer, somebody somewhere has written a piece of software to make the device work with a computer. This piece of software is called a “Device Driver.” One of the most useful features of a well-written device drive is making itself all but invisible to whoever is using the computer. You create a document, send it to your printer, and somehow the document prints. Your device driver takes care of all the little details necessary for the printing operation to occur. Drivers are one of the three most important broad categories of software in computers. The first is the operating system, the second is whatever applications are installed, including communications, and the third is device drivers. Drivers are important for two reasons. First, your peripherals won’t work without them, and second, corrupted or out-of-date device drivers are responsible for most system crashes. There are other reasons why it’s important to keep your device drivers up-to-date. Sometimes a manufacturer will become aware of some kind of defect or glitch in the driver software and issue a fix. You will need it. A different manufacturer may have a driver for its own device that will cause a conflict with an outof-date driver on your device. Over time, updates for Windows may eventually cause problems with an out-of-date driver. Proper device driver management is essential to keeping your computer crash proof. If device driver management is unfamiliar territory, please pay attention. You’ll be glad you did. Microsoft introduced the concept of Signed Drivers with Windows 2000 and continued with Windows XP. If a device driver is “signed” by Microsoft, it means that the driver has been subjected to meticulous, painstaking, extensive testing to ensure compatibility with your Windows operating system. Anytime you install a signed driver, Windows checks it by default and also guarantees it has not been altered or changed in any way. If the driver is not signed, Windows alerts you with a strong message that the driver has not passed Microsoft’s rigorous certification tests. Windows will also ask if you want to install the driver anyway, and will do so if you give it permission. Keeping your computer safe from unstable software is always a good idea. Fortunately, changing the Windows default is relatively easy, but you need Administrator privileges. Right-click the My Computer icon on the desktop, then select Properties. Click the Hardware tab and then the Driver Signing button. Choose Block to let this be the new default, and you’re done. Windows will now block any device drivers that it does not recognize as signed. Not all manufacturers send their drivers to Microsoft for testing. For small firms this can be an expensive proposition. Does this mean you should never install an unsigned driver? No, but you should do some checking of your own to ensure that the company has a good reputation in the industry. Sometimes a new device driver will prove unstable for various reasons. Windows XP has the ability to delete the driver and install a previous version. Open the Device Manager, and double click the drive that’s causing problems. Switch to the Driver tab and Roll Back the driver to the previous version. What we’ve discussed so far is fine if you’re using relatively new equipment, but suppose you’re having trouble with something that’s old and the manufacturer has gone out of business. Chances are good that the original installation disk is lost or deteriorated to a point where it is no longer useful. There are many other reasons why you could have difficulty finding a device driver, but these are the most common. In the past, finding the right device driver or firmware was often a tedious, time consuming, and frequently impossible task. Nowadays, we have web sites such as www.driverguide.com to help us. The site has been around since 1997, and has seen many improvements. It has a unique membership base of thousands who collectively compiled a massive database of drivers, firmware, and support documents that is the largest and most comprehensive on the Web. Recognizing that most people who use computers are not experts, they have devised an easy step-by-step process that will help you find and install drivers. There is an archive of hundreds of thousands of files containing not only drivers, but voluminous information on manufacturers including links to other sites with driver information. Also useful are the discussion boards where you can chat with others who have the same hardware, and learn from their experience. After you search for a driver and find it, help doesn’t stop. The Driver Summary provides you with a rundown of all the information you’re likely to need to make the decision about whether or not to download and install the driver. This information is put together from the original manufacturer, plus ratings and comments from those who have previously downloaded and installed the file. It’s nice to have everything in one place. There are many web sites where you can find information about device drivers, but this is one of the best places to use as your starting point. Managing device drivers does not have to be a search in the dark. Use the tools available to you, and your system will be stable and a lot less prone to crash. The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you. Electronically Speaking Legal Bytes: Do Shield Laws Extend to Bloggers? By John Brewer, member of the Computer Club of Oklahoma City johnb(at)jnbrewer.com http://www.ccokc.org/ The first amendment to the US Constitution contains a number of important personal rights. It reads as follows: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.” Analysis of the amendment confirms why the courts have been given the task of interpreting the language through the years. One of the important parts of the amendment is freedom of the press. In order to protect the press, approximately 31 States have enacted “shield laws.” Journalists are protected by a qualified (limited) First Amendment right protect their confidential sources. Many of the federal circuits have held that a qualified privilege exists. However, journalists are frequently challenged to reveal their confidential sources. This privilege has received attention recently in the New York Times Co. v. Gonzales case that involves the phone records of Judith Miller. An interesting variation to this issue is whether Internet journalists have the same protection as print journalists. A recent case in California has examined this issue. The case involved some Internet web site and Apple Computer. Apple brought an action in California alleging that persons unknown caused the wrongful publication of secret plans on the World Wide Web to release a device that would facilitate the creation of digital live sound recordings on Apple computers. In an effort to identify the source of the disclosures, Apple sought and obtained authority to issue civil subpoenas to the publishers of the Web sites where the information appeared and to the email service provider for one of the publishers. The publishers moved for a protective order to prevent any such discovery. The trial court denied the motion on the ground that the publishers had involved themselves in the unlawful misappropriation of a trade secret. A California Court of Appeals held that his was error because (1) the subpoena to the email service provider could be enforced consistent with the plain terms of the federal Stored Communications Act (18 U.S.C. §§ 2701-2712); (2) any subpoenas seeking unpublished information from petitioners would be unenforceable through contempt proceedings in light of the California reporter’s shield [note: California has a shield provision in the State Constitution] and (3) discovery of petitioners’ sources is also barred on this record by the conditional constitutional privilege against compulsory disclosure of confidential sources. The Court of Appeals issued a protective order. The Electronic Frontier Foundation is directly involved in the litigation. The following is extracted from the EFF web site. “The whole mess began in December 2004, when Apple filed suit against 20 unnamed and presumably unknown individuals, referred to in the court filing as “Does,” for leaking confidential materials on an Apple product under development to several Web publications. As part of its investigation, Apple subpoenaed Nfox — for communications and unpublished materials obtained by PowerPage publisher Jason O’Grady. A Santa Clara trial court FPCUG Needs your hSeptember 14 - Robotics Team Dave Shotwell Page 5 upheld the subpoena in March of 2005 and the EFF appealed. “In a 69-page ruling, the 6th District Court of Appeal ruled that bloggers and webmasters are no different in their protections than a reporter and editor for a newspaper. “We can think of no workable test or principle that would distinguish ‘legitimate’ from ‘illegitimate’ news,” the judges wrote. “Any attempt by courts to draw such a distinction would imperil a fundamental purpose of the First Amendment, which is to identify the best, most important, and most valuable ideas not by any sociological or economic formula, rule of law, or process of government, but through the rough and tumble competition of the marketplace,” they wrote. “Today’s decision is a victory for the rights of journalists, whether online or offline, and for the public at large,” said EFF Staff Attorney Kurt Opsahl in a statement. Opsahl argued the case before the appeals court last month. “The court has upheld the strong protections for the free flow of information to the press, and from the press to the public.” “Apple argued its right to trade secrets trumped Constitutional rights, and it had exhausted other sources to determine the source of the information, even though Apple had not deposed employees who were in a position to know, Kevin Bankston, a staff attorney for the EFF told internetnews.com. The lower court decision agreed, and said Apple’s trade secrets rights would trump any journalist’s rights to source confidentiality. “Bankston said the ruling is a win for anyone who uses email. “A lot of people will hear about this decision and think it doesn’t affect them since they are not journalists, but it has a broader impact because of the number of email providers, particularly the number based in this district,” he said. “The court read Federal privacy law to forbid civil litigants like Apple from subpoenaing an individual’s e-mail from e-mail providers. Instead, the court said civil litigants must subpoena you directly, and if you are a journalist, you can assert your rights of confidential sources. “So they have to subpoena you rather than doing an end run around your rights and going straight to your e-mail provider,” said Bankston. If Apple chooses to appeal, the case goes to the state Supreme Court. Thus far, the sources for the original story have not been revealed, “and hopefully based on this decision they never will,” said Bankston. This is an interesting issue. The California case is far from over and this issue will continue to be litigated across the country. John Brewer practices law in Oklahoma City, is a member of the Governor’s and Legislative Task Force for E-Commerce, and enjoys issues relating to eBusiness and cyberspace. Comments and questions are welcome and can be emailed to johnb(at)jnbrewer.com. In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. The article may contain sources for content as attributed within the article. The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you. Electronically Speaking Page 6 Windows Secrets Down at the bottom of the left hand column of fpcug.org there is a little window about Microsoft Windows Update Tips. Click on this panel and you get the latest information on Windows updates, secrets and all kinds of good information. CHECK THE WEBPAGE!!!! Community Service Special Interest Groups (SIGs) meet at 7:00 PM at the Falmouth Fire House on Butler Road. SIGs are lead by members who have learned through hands-on experience. All SIG leaders serve on a voluntary basis and, frequently, are participants in other SIGs lead by other members. So, whether you want to lead or learn, we welcome you as a participant in FPCUG SIGs. FPCUG members and their family can join in as many SIGs as they like at no cost. Scheduled SIG Meetings SIGs marked with an * will be available only if requested. Email the SIG Leader if interested. SIG Beginner Digital Photography SIG Leader Jim Jordan Pete Shatswell Meets 4th Thursday 3rd Thursday Genealogy Anne Zink Graphics Anne McGrath 3rd Tuesday Kay Pollock 4th Thursday Neurofeedback Web Site Developmen t* Internet Investing * Technology Video Production* Word Processing Spreadsheets* Windows 9x/XP Chuck Hart ?????? 1st Tuesday 4th Thursday Email Address [email protected] [email protected] [email protected] [email protected] Josh Cockey Linda Mayhew New to computers-this is for you Make your camera work better Look up your ancestors Photo Editing & Image creation neurofeedback_ sig [email protected] [email protected] 1st Thursday Chuck Hart About what? Brain Training Web Site problems Where and what on the internet 3rd Thursday [email protected] 1st Tuesday When available [email protected] [email protected] Investing ideas and research Exploring what’s available Using video ????? 4th Tuesday [email protected] All about Word-Excel & others James Hopkins 4th Tuesday [email protected] Learn about operating systems Please note! All SIG Leaders may be contacted at: “Name of SIG”[email protected]. Substitute the actual name of the SIG and remove the quotes. What is FPCUG All About? Fredericksburg Personal Computer Users Group * Problem Solving and Information Sharing * Community Involvement and Public Service * Special Interest Group Meetings Every Week * Christmas Party (Member Families) * Friendly People That Want to Help You * Learning About Your Computer and Software Phone FPCUG at 540 373-7929 (Voice Mail) Next General Meeting September 14, 2006. 7:00 PM Come On Out! Electronically Speaking Tweaking Windows’ Taskbar By Gabe Goldberg, APCUG Advisor; Columnist, AARP Computer & Technology Website, www.aarp.org It’s easy to use a key part of Windows’ screen real estate, the taskbar, without really noticing it. Like a car’s dashboard, taskbar components summarize what’s happening on your computer and access running software. But unlike your car’s dashboard, the taskbar can be customized for individual needs and preferences. www.aarp.org/learntech/computers/howto/ tweaking_windows_taskbar.html Fun with Windows’ Taskbar I’ve read reports that most people can’t accurately draw their car’s dashboard, no matter how many hours or years they’ve stared at it. Similarly, many of us look at and use a key part of Windows’ screen real estate — the taskbar — without paying much attention to it. Like a car’s dashboard, taskbar components — Start button at one end, notification area icons at the other, and application buttons in between — summarize what’s happening on your PC and give quick access to running software. But the taskbar is more interesting than a car dashboard: you can customize it for your individual needs and preferences. This article describes Windows XP’s taskbar; other Windows versions have mostly similar facilities. People sometimes worry when their taskbar disappears or suddenly looks odd — or moves to an unfamiliar place on the screen. We’ll see how such glitches are easily fixed. Right-clicking a blank taskbar area displays Windows’ familiar context menu, showing available options. Clicking Toolbars lets you display or hide built-in toolbars (groups of icons representing programs, folders, or files) or create your own. My favorite toolbars are Desktop (a handy pop-up list which duplicates desktop icons) and Quick Launch (which holds the few key icons I always want immediately available). Other standard toolbars are Address and Links. Cascade and Tile options specify arrangement of open application windows: fanned like playing cards or arranged in a grid. A key option — Lock the Taskbar — controls whether you can change the taskbar. When the taskbar is unlocked, you can change its size by dragging its edge away from or towards the screen’s edge. You can move individual toolbars by grabbing their handles (perforated line near each one) and move the taskbar by grabbing a blank area. Clicking Properties brings up a detailed options dialogue box. It’s safe to experiment but only change one thing at a time until you learn your way through all the choices. The Taskbar tab customizes the taskbar itself and its notification area. You can auto-hide the taskbar — handy on small monitors to reclaim space for application windows. When it hides, moving the mouse near it makes it visible. Page 7 You can always keep the taskbar on top of other applications, or allow it to be covered. If it’s hidden, pressing ctrl-esc displays it. Similar task bar buttons — for example, representing multiple Word documents — can be grouped to save taskbar space, or spread out. If they’re grouped, left-clicking the group displays all open files, and right-clicking lets you manipulate the files simultaneously. You can add and delete Quick Launch toolbar icons by dragging them on or off the toolbar. I trimmed mine to two icons: Show Desktop and Windows Explorer. From a Windows keyboard, these are available by pressing Win-D and Win-E, respectively. The notification area (called the “tray” in earlier Windows versions) shows icons for small applications or utilities that are running, plus your clock. Mousing over an icon pops up its name. You can control which icons are displayed and whether inactive icons (representing programs you haven’t used for a while) are hidden. Each program running consumes PC resources so it’s worth monitoring these icons and pruning any which aren’t necessary. Right-click an icon to display options. Closing some applications prevents them from automatically starting at system boot, while others offer an explicit option. Continuing our tour through taskbar properties, the Start Menu tab lets you specify Start Menu appearance and operation. You can pick large or small icons and determine how many shortcuts are saved in it for recently used programs. Key programs can be “pinned” to the Start menu by right-clicking a desktop icon or dragging an icon to the Start button and placing it in the permanent top area. The Advanced tab determines Start menu behavior and lets you select modern or “classic” Start menu format. Finally, when the Taskbar is unlocked, three extra toolbar rightclick options are available: View, Show text, and Show title, for fine tuning your PC’s “dashboard”. While Windows operates just fine as it’s installed, tweaking taskbar settings and other options can make it faster and more pleasant to use. And since there are usually multiple ways to accomplish tasks in Windows, it’s worth exploring — for example, right-clicking to explore context menus and clicking various options/customize/advanced buttons to see what’s available. Don’t be afraid to tinker, but remember what you change so you can undo it! This article originated on AARP’s Computers and Technology Web site, www.aarp.org/computers, and is copyrighted by AARP. All rights are reserved; it may be reproduced, downloaded, disseminated, or transferred, for single use, or by nonprofit organizations for educational purposes, with attribution to AARP. It should be unchanged and this paragraph included. Please e-mail Gabe Goldberg at gabe(at)gabegold.com when you use it, or for permission to excerpt or condense. The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you. Electronically Speaking Page 8 August 2006 S UN MON TUESDAY WED THURSDAY 1 2 Directors Meeting-Firehall 7:00 PM 8 9 Technology Internet FRIDAY 3 6 7 13 14 Graphics 15 16 Digital Photography 17 20 21 Windows 9x-ME-XP 22 23 Neurofeedback 24 27 28 29 General Meeting Beginners-Intermediate 30 10 FPCUG Team 2 UUFF Team 3 UUFF Team 4 SAT 4 5 11 12 18 19 FPCUG Team 3 25 26 31 Indicates the deadline for submission for the next issue of Electronically Speaking. September 2006 S UN MON TUESDAY WED THURSDAY FRIDAY SAT FPCUG Team 4 3 4 10 11 17 18 24 25 5 Technology 12 13 19 20 26 27 Directors Meeting-Firehall 7:00 PM Graphics Windows 9x-ME-XP The Newsletter of theFredericksburg, Va. Personal Computer Users Group P.O. Box 276 Fredericksburg, VA 22404 To: 6 Internet General Meeting Digital Photography Neurofeedback Beginners-Intermediate 7 14 21 UUFF Team 1 UUFF Team 2 FPCUG Team 1 28 1 2 8 9 15 16 22 23 29 30 FPCUG Team 2 Stamp