Tid Bits `N Bytes - The Winnipeg PC User Group

Transcription

Tid Bits `N Bytes - The Winnipeg PC User Group
If undeliverable, return to:
Winnipeg PC User Group
337C Pembina Highway
Winnipeg, Manitoba R3L 2E4
Tid Bits ‘N Bytes
Newsletter of the Winnipeg PC User Group Inc.
“A Charter Member of the Association of PC User Groups (APCUG)”
August - September 2005
Upcoming General Meetings
• The General Meeting, August 18, 2005, will be held at Assiniboine Park,
in the Pavilion picnic area west of the Pavilion. We will be having our annual
picnic. Food, refreshments, contests, prizes and cake will be provided. .
• The General Meeting on September 15, 2005 will be held at the Resource
Centre and the presentation will be Konfabulator 2.0 - a demonstration by
Roger Buchanan. Yahoo liked this program so much they bought the company!
Announcements
• If you can pick up your copy of the newsletter, to save the group on mailing
costs, please let Doug Hutsel, our membership secretary, know!
40599174
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 2
The Winnipeg PC User Group, Inc. is a non-profit
organization formed to provide those with an interest in the
IBM Personal Computer or compatible computer, with an
opportunity to come together and otherwise assist one
another in the use and understanding of these computers.
The group serves as a forum to exchange ideas, to discuss
the latest developments, and share information.
••• ••• •••
This periodical is published bi-monthly for the purpose of
advising members of the various group activities and
sharing of information between other similar User Groups
around the world. It is mailed to all members of the group
and to all other User Groups who reciprocate with a copy
of their newsletter.
••• ••• •••
The group is not affiliated with any commercial organization and receives no financial support other than through
membership dues and paid advertising in the periodical.
The officers are volunteers and only receive the following
benefits: they learn more about their computer, gain
satisfaction from having helped others and meet many
people with common interests and problems.
••• ••• •••
Monthly Meetings are held on the 3rd Thursday of each
month, except December when the meeting is held on the
second Thursday. The Executive meets on the 2nd Thursday of each month, except December when the meeting is
held on the third Thursday. Members are welcome.
Volunteers for many activities are always needed.
Winnipeg PC User Group
ISP Dial Up Number
975-0200
Website: http://www.wpcusrgrp.org
COPYRIGHT POLICY & LIABILITY WAIVER
WPCUG Board of Directors
Elected Officers for the period ending October 2003
Home Phone
President & Program ......... Jon Phillips .......... 888-9180
<[email protected]>
Vice President ...................... Paul Kesson .......... 489-7617
<[email protected]>
Treasurer ............................. David Estey ......... 489-3728
<[email protected]>
Exec. Secretary ................... John Kesson ......... 489-7617
<[email protected]>
Membership ......................... Doug Hutsel .......... 831-7478
<[email protected]>
Online Services Manager .... Greg McClure ....... 942-3301
<[email protected]>
Group Buyer ........................ Rodd Provencher ..
<[email protected]>
Forum Coordinator .............. Ryan Rapson ........ 475-1568
<[email protected]>
Advertising ........................... vacant ...................
<[email protected]>
Appointed officers
Bookkeeper ......................... Werner Wiebe ....... 269-1584
<[email protected]>
Resource Centre Mgr. ......... Arnold Zatser ........ 488-8765
<[email protected]>
Web Master ......................... Ryan Rapson ........ 475-1568
<[email protected]>
Internet Service Admin. ....... Brian Lowe ............ 478-3561
<[email protected]>
Internet Service Support ...... Greg McClure ....... 942-3301
<[email protected]>
NEWSLETTER
Home Phone
Editor
Paul Stephen ................ 284-2810
<[email protected]>
Co-editor
Tom Howard ................ 224-3430
<[email protected]>
Co-editor
Glen Ash ...................... 489-2474
<[email protected]>
Co-editor
Bill Webster ................. 888-3544
<[email protected]>
Please do not call Board/Executive
members after 9:00 P.M.
Resource Centre 24-hour information line ...... 958-7228
Resource Centre FAX .......................................... 958-7229
ISP Line ................................................................. 975-0200
This publication is © Copyright, Winnipeg PC User Group Inc., 2003.
The reprinting in another publication, of original material appearing
in this newsletter must give credit to the Winnipeg PC User Group Inc.
and to any author indicated. Such material may be reprinted at no
cost, but a copy of the publication in which it has been reprinted must
be provided at no cost to the Winnipeg PC User Group Inc.
All copy must be prepaid and must reach the
Resource Centre before the second Thursday of the
month. Other size rates are available.
Views and opinions expressed are those of the author indicated (or the
editor) and not necessarily of the group or executive. The group,
contributors, and the editor of this newsletter do not assume any
liability for damages arising out of the publication or non-publication
of any advertisement, article, or other item herein.
All copy should be in EPS or TIFF (300dpi) file
format. If you need help with this, please ask for
help.
The WPCUG does not assume responsibility for damages arising from
the publication or non-publication of any advertising in this newsletter.
Acceptance of advertising does not imply endorsement by the group
Members are entitled to one FREE Ad (4 line 42
Char.) Non-commercial - per issue. Others $3.75 per
4 line ad, extra lines $0.90 each. Please ask for further
information.
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 3
Mailing Addresses
General Correspondence: Attn.: Executive Secretary
Membership:
Attn.: Membership Secretary
Mail to the Resource Centre
337C Pembina Highway
Winnipeg, Manitoba
R3L 2E4
Newsletter Exchange & Review Software
Paul Stephen
401-1025 Grant Avenue
Winnipeg, Manitoba
R3M 1Y4
Yearly Membership Dues
Junior Membership (under the age of 18) ....... $25.00
Adult Membership ........................................... $49.95
Associate Membership .................................... $20.00
Corporate Membership .................................. $125.00
With an adult membership you receive one copy of our
periodical and any member of your family may attend the
User Group General meetings. After an adult membership
has been purchased, additional associate memberships may
be purchased which include a draw ticket at the general
meeting, but no newsletter. A corporate membership
entitles you to two copies of the periodical and any
member(s) of your organization may attend our general
meetings. Contact Doug Hutsel (membership@
wpcusrgrp.org or 831-7478) for further details.
Contents Of This Issue
Mail Merges -------------------------------------------------- 5
Search Engine Tips & Tricks ------------------------------ 12
Konfabulator ------------------------------------------------ 15
Shreware Awards for 2005 --------------------------------- 19
People’s Choice Awards ----------------------------------- 20
General Meeting for May 2005 ---------------------------- 21
Adventures in Linux Land --------------------------------- 22
How to Record your Cassette Music on CD ----------- 23
Security - Simple Password Practices -------------------- 24
Another Silent Attack On Our Computers -------------- 27
Calendars ---------------------------------------------------- 29
Meeting Schedule ------------------------------------------ 30
Forums ------------------------------------------------------- 31
Internet Application ---------------------------------------- 31
Advertisers
Healey Visual Inc. ------------------------------------------- 4
Ink Jet Refills ------------------------------------------------ 16
Dave’s Quick Print ------------------------------------------ 26
WPCUG ISP ------------------------------------------------ 32
Full page
Half page
Business card
Flyer inserts
Classified
Ad sizes and Rates
width
height
insertions
1
3
7.5
10
$65
$165
7.5
5
$35
$85
3” x5”
$10
$225.00
Members are entitled to one free ad
(4 lines - 42 characters) - per issue.
others $3.75 per 4 line ad.
Extra lines $0.90 each
6
$270
$135
Newsletter Submissions
The editor will accept almost anything you wish to
contribute. Short submissions may be in any form what so
ever. If you have a favorite Shareware programme that you
use, (or one that is unregistered and you’d like to have
registered), write me up a 1-2 page review of the product
and I’ll try and get you a FREE registration! Contact the
editor if you would like to review a specific software
package.
Longer submissions should be made on 3.5" floppy
disks, or sent to my e-mail address: [email protected].
Files should be zipped before being uploaded or attached
to e-mail messages.
Other acceptable formats include: WordStar 3.x-5.0,
WordPerfect 4.x-5.1, Word, and ASCII. If you use one of
the above word processors. Special formatting such as
autonumber cause great problems for the special software
that we use to prepare this newsletter. Remove extra
paragraph and line feeds. DO NOT “format” your text PLEASE!
This newsletter is produced using the following software
and hardware tools: Microsoft Word 97, OmniPage Pro,
Graphic Workshop Professional, for conversions and
graphic library control. Printing is done using a HP Series
5MP LaserJet. Adobe’s Acrobat is used to produce the
PDF files. A special friend of this User Group is the Corel
Corporation and we use Corel Draw 10. Other hardware:
HP ScanJet 4300C, 638 megs of memory, 400 MHz
Pentium II CPU.
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 4
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 5
Some Reflections on Doing Mail Merges
and Why There Are No Maytag User Groups
by John Robin Allen
Dedicated to the memory of Jeffrey Raskin
(1943-2005)
Jeffrey (“Jef”) Raskin, who
died this past February 25th,
was an amazing gentleman. He
invented Apple’s “Eighty
Column Card” that changed
computer screens from the
forty columns of capital letters
on the old Apple II computers
to eighty columns in upper and
lower case letters on the Apple IIe. Raskin’s own
Apple II computer had the serial number “2”. His
most famous creation was, no doubt, the Macintosh
computer, which he named after his favourite apple,
the McIntosh. (Apple had to change the spelling of
that name to avoid copyright problems with a
manufacturer of Hi-Fi equipment.) You learn more
about Raskin, from Wikipedia at http://
en.wikipedia.org/wiki/Jef_Raskin, which provided
the photo to the left. His official web site is http://
jef.raskincenter.org/home/, which gave us the photo
at the end of this article.
I never had the pleasure of meeting Raskin, but
we were in correspondence in the early 1970’s
when he was a member of the University of
California at San Diego Visual Arts Department and
was also the software editor of Computers and the
Humanities. I had submitted an article to that journal
on “Two Routines for Computer Assisted Language
Instruction Programs,” and he accepted it for
publication.
The simplicity of use that guided the development
of the Macintosh is reflected in one of Raskin’s
favourite questions: “Why are there no Maytag user
groups?” The answer, obviously, is that washing
machines are so simple to use that there is no need
for a network to help persons fathom the mysteries
of washing clothes automatically. Raskin wanted to
make the Macintosh as simple to use as a washing
machine. He insisted, for example, that its mouse
have only one button, although the original mouse
developed at Xerox’s PARC [Palo Alto Research
Center] had three buttons. Before the release of the
Mac, he had succeeded in his quest so well that
Steve Jobs stopped working on the Lisa and,
instead, took control of Raskin’s machine. In the
end, Jobs took credit for what was largely Raskin’s
creation, Apple made a lot of money, made a lot of
persons happy, and it took years before Microsoft
could develop Windows to try to approach that
simplicity. No doubt the development of the GUI
[“graphic user interface”] of the Macintosh and
Windows parallels the drop in worldwide
membership of all computer user groups. As
computers become easier to use, there is less a need
for organizations such as ours.
Yet not everything to do with computers is as
simple as Raskin would have wanted. Take using
mail merge in Microsoft Word, for example. That
enables us to write a letter and then personalize it
with information contained in another file so that
different versions of the same letter can be sent to
persons, with each letter containing comments and
personal information unique to the recipient.
It should be quite a simple task to do mail
merges with Microsoft Word, but due to some poor
programming decisions, one ends up with two
annoyances and two major bugs. We still need user
groups and newsletters to learn how to overcome
the following problems. As they used to say in
Rome, praemonitus praemunitus (‘forewarned [is]
forearmed’).
Annoyance 1: No matter where you store merge
letters, the default location for mail merge data for
those letters is “My Data Sources,” a subdirectory
of “My Documents.” If you want to store your data
elsewhere, perhaps in a directory of mail merge
Tid Bits N’ Bytes
letters that you write, you can do so, but it requires
some extra work. Each time you want to link a data
file with a letter, you have to start from “My Data
Sources” and then move from there to where you
actually have the data. You can never make that
other directory be the default location for mail merge
data.
Annoyance 2: Part of the work in doing a mail
merge is to insert different fields from the source
data into the proper places within a letter. You locate
to where you want a piece of data to appear in the
letter, and then you click on the “Insert Merge
Fields” button to open up a dialogue box. (One has
to use the mouse because there are no keyboard
shortcuts to insert merge fields.) You then click on
the field to insert in the letter, for example the first
name of the addressee. If you then want to type a
space and insert the last name, you cannot. You first
have to use the mouse to close the dialogue box.
After a few seconds while the hard disk grinds
away, you then get control back and can add a
space or move to the new location where you need
to insert the next item. Then you have to use the
mouse again to reopen the “Insert Merge Fields”
dialogue box, page down to the last name (or
whatever field you want), click on it and click to
close the dialogue box again. That is not the way
that God intended “Insert Merge Fields” to work.
It is frustrating, but we can work around those
annoyances. We can manually switch to a different
directory to get data, and one can take the time to
close and reopen the “Insert Merge Fields” dialogue
box each time we need to insert a different piece of
information. The bugs described below, however,
are far more serious and can prevent persons from
using mail merge for anything but the smallest of
letters.
Bug 1: If you use a spreadsheet like Excel to
hold data and one or more of merge fields are
numbers, you may have serious problems using that
information in a mail merge letter. During the
academic year, I use mail merge approximately once
a week to let students know their current mark along
with all the marks they received on a few dozen
previous tests, quizzes and essays. Depending on the
grade in question, I have the spreadsheet display
August 2 0 0 5 / September 2 0 0 5 P a g e 6
numbers either as integers (e.g., “76%”) or
calculated to the nearest tenth of a point (e.g.,
“75.9%”). Excel, however, is much more accurate
than that. It calculates all numbers to fourteen
significant digits before it displays the results.
The bug is that when I put numbers such as “76”
or “75.9” into a mail merge letter, the numbers
appear with all fourteen digits, to display not
“75.9%” but “75.9479395371853%.” Anyone
receiving a grade calculated to the quadrillionth of a
point will know that the letter was not written by a
human being. Even worse, due to round off errors
some integers display erroneous decimal values. If a
student missed three classes, instead of having a
merge letter say “… you missed three classes,” it
can say “you missed 3.00000000000002 classes.”
To solve that problem, I could, of course,
manually edit all the numbers in the mail merge
output, but with sixty students each of whom writes
forty tests, quizzes, or essays in the course of a year,
then I would have an average of 1,200 numbers to
change in each weekly mail merge mailing. Over a
course of twenty-six weeks, that comes to 31,200
editing changes to make. One session of editing
numbers in that way made me find a simpler solution
for subsequent letters: to preface each with an
apology for the bug in Microsoft Word that would
not let me send simple grades to students.
Fortunately there is a better way to solve the
problem
Bug 2: A more serious bug that prevents many
persons from using mail merge at all is that it can run
out of memory, no matter how much RAM is in the
machine. If you have several fields of data to put in a
mail merge letter, say more than fifteen or twenty
items to send to thirty persons, when you reach
whatever internal memory limit exists in MS Word,
the program will try to combine several items into
one field and will also let you know that your data is
bad. It will try to destroy references to the “bad”
data in the letter, and you cannot get out of the loop
that asks whether it should remove this and that
reference in the letter or make the references point
to incorrect data. You have to answer that question
for each “bad” reference, and only when the
program has destroyed perhaps twenty or thirty
Winnipeg PC User Group Inc.
items will it let you look at the letter. At that point
you have to close the file without saving it, unless
you want the job of using the clumsy interface
described above under “Annoyance 1” to put back
each reference that the program destroyed. The only
solution appears to be is to go back to the
spreadsheet and delete the less important items you
first wanted to have appear in the letters.
In any but the smallest of letters, this bug also
prevents one from inserting merge fields into running
heads (such as “Your Name / Recipient’s Name, p.
2”). To be more accurate, we can insert a recipient’s
name in a running head to appear at the top of
pages, but the name will not change in letters sent to
other persons. Only the first recipient will see his or
her name correctly in the header.
There are some elegant solutions to those
problems. We can make it very easy to locate to the
“My Data Sources” or to any other directory. We
can customize commands in MS Word to make it
easy to insert merge fields with either the mouse or
the keyboard. We can also convert Excel data to
another format that uses less memory and will
display numbers properly. Let’s do just that. Let’s
coin a new verb, “to Maytag”, meaning (a) to clean
up something and (b) to make it more simple. Let’s
“Maytag” Microsoft Word, à la manière de Raskin.
Mail Merge Without Toil
With apologies to the O’Reilly Press, the
following are “missing manual” directions on how to
do mail merge letters. We need to do three steps
and work with two files. In the first step we create a
document with the words that will appear in each
letter. The second step has us create a data file to
contain in-formation that individualizes the letter for
each recipient. The third step combines the two files
to generate the letters to be sent. If you already
know how to do a standard mail merge, you can
skip the first parts of the steps below. You may,
however, want to read certain marked sections in
those steps: The “Hints” paragraphs give some extra
advice on mail merges, while “Disaster Relief”
paragraphs indicate steps to take to avoid the
problems described at the start of this article.
August 2 0 0 5 / September 2 0 0 5 P a g e 7
Step 1: Writing the letter in MS Word
This is simplicity itself. One just decides what
sort of a letter to send, and then one writes it. For
example, we might want to send a “personal”
invitation to a dozen persons, addressed to each
individual or couple and calling the recipients by
name, to invite the person or couple to attend a
lunch. Later we might want to send the attendees a
personal note to thank them for coming and to recall
something that each might have said or done at the
lunch. Another example: we may want to send a
two- or three-page personalized Christmas letter to
five hundred of our closest friends and make each
recipient feel obliged to write a three-page reply.
Just write whatever should appear in each letter we
will send.
Hints: Imagine that you are writing a letter to a
single person and write the letter accordingly. You
want to avoid giving that impression that what you
are writing is really meant for a group of persons.
Do not hesitate to make personal comments
destined for the specific person or couple to whom
you are writing. Of course you should avoid
expressions such as “all of you”, “persons reading
this letter,” and so forth. This letter is supposed to be
addressed to a single person or couple.
Save the document, perhaps in a separate
directory named “Mail Merges.” If it is a Christmas
letter for 2005, we could name the file “MM Xmas
2005 mm dd” where “mm” is the current month in
two digits, and “dd” is the current date, again it two
digits. (“MM” of course stands for mail merge.) If
we make changes in the document tomorrow before
sending it, we can save the document under the
same name but with a slightly revised date. In that
way, we can always go back to earlier versions of
the letter, and the different versions of the letter will
sort chronologically in Windows Explorer or My
Documents.
Disaster Relief: We should permanently
customize Word a bit for this and for future mail
merges. The following steps need be done only
once. Click on “Tools” > “Customize” (or right click
one of the tool bars at the top of the screen and
Tid Bits N’ Bytes
choose “Customize”). In the dialogue box that then
appears, click on the middle tab at the top, the one
that says “Commands”. The left window of that
dialogue box shows different categories of
commands. If we press the letter “m” on the
keyboard, the cursor will jump to “Mail Merge” in
that window. (One can also just page down in the
window a bit to get to that category.) One of the
“Mail Merge” commands in the window to the right
is “Show Mail Merge Toolbar”. We need to drag
that command to inside the “View” menu at the top
of the screen. Click on the command, keep the
mouse key down, and drag the command to the
“View” menu. If you hold the cursor for a second or
two on “View”, the menu opens up and you can
drag the command inside of that menu to put it
wherever you want it to appear. Do that and then let
go of the button. The command will stay there.
The dialogue box is still open and just beneath
the command we just copied is another important
command: “Insert Merge Field ?”. Click and drag
that command to insert it inside the “Insert” menu at
the top of the screen. Since this command has no
shortcut key, we should place it at the very top of
the “Insert” menu. In that way we will be able to
access it more easily with the down arrow (“?”).The
“Insert Merge Field” (singular) command has a
different and better interface than the “Insert Merge
Fields” (plural) command on the Mail Merge
Toolbar,
Click on the “Close” button to close the
“Customize” dialogue box. Note that in Word
version 2000 or changes are lost unless we click on
the “Close” button. With Word version 2003 we can
also close the window by pressing the “Escape” key,
but that will not work in the earlier version. It closes
the window but throws away any changes we made.
We need to do one more customization. Press
Ctrl + “o” (or click on “File” > “Open”). To the left
of the dialogue box that appears are some icons
designating “My Recent Documents”, “My
Documents”, “Desktop”, and so forth. Since the
next step will add another icon to those already
there, we should make them as small as possible. If
we right click in that column, one of the choices will
be either “Large Icons” or “Small Icons”. If you see
August 2 0 0 5 / September 2 0 0 5 P a g e 8
“Small Icons”, click on it and the icons will all switch
to a smaller size. If it says “Large Icons”, then your
icons are already small and you should not change
them.
At the top of the dialogue box, next to the words
“Look in:”, the window will normally show “My
Documents”. If it does not, click on the “My
Documents” icon in the left column. Then look for
the directory called “My Data Sources” in the big
window. If you have trouble finding that directory,
click on any-thing in the big window and then keep
pressing the letter “m” until the cursor highlights “My
Data Sources”. When you have found that directory,
click on it to highlight it or to open it. Then, with the
dialogue box still open, click on the “Tools” menu at
the top right of the box. Then select “Add to ‘My
Places’ ”. That makes “My Data Sources” appear
as one of the choices at the bottom of the left
column. If you can-not see it, the dialogue box is
also resizable, so you might want to adjust its
bottom border to make it display all the locations we
have available.
We can then close the dialogue box by pressing
the Escape key. We will use “My Data Sources” in
the next step.
Step 2: Create a Data File in Excel:
To do a mail merge, we need to store the data
that will change with each letter. We could put them
(the data) in a table in another Word document, but
it is easier to use an Excel file. (See the “Hints”
section below.)
If you use Microsoft Outlook or Outlook
Express, one way to create a data file is to use the
contacts directory from either of those programs.
With Outlook, open the program and click on “File”
> “Import and Export” > “Export to a File” >
“Microsoft Excel” and then choose “Contacts” from
the directory of things you can export. If you use
Outlook Express, the procedure is almost the same.
Click on “File” > “Export” > “Address Book” >
“Text File (comma separated values)”. In either
case, the computer will ask what we want to name
the file and where we want to save it. The choice is
yours, but since you will probably use the data file to
send other letters, I would suggest you choose a
Winnipeg PC User Group Inc.
general name like “MM Data.xls” or “My
friends.xls” and then store it in the same Mail Merge
directory where we had just stored the letter. In that
way we can keep almost all the Mail Merge source
files in one directory.
Another way to get a data file is simply to create
one from scratch in Excel. In the top row of an
empty worksheet put the names of the different
fields you need, fields such as “First Name”, “Last
Name”, “E-Mail”, “Address1”, “Address2”, and so
forth. Then from row two on down, put the specific
data for each person to whom you intend to send
this letter, one row for each recipient. Let’s also sort
the rows by the last name column.
Hints: It is important that we use a spreadsheet
rather than a word processor to hold the data. Word
document tables are limited to the width of the page
we are using. We could artificially expand the page
width to twenty-two inches, but that would not help
very much. In contrast, Excel data can spread out
over as many pages as we need, as long as we stay
within the 256-column limit of the spreadsheet. To
make the data more manageable, it helps if we
ensure that the data is not restricted to a single cell.
That is the default, and we can check it with the
commands “Format” > “Cells” > “Alignment” (the
tab at the top) and if the “Wrap text” box is
checked, we should uncheck it.
We should have three or four fields with specific
comments for individuals. Go back to your original
letter and see whether anything in was directed
toward a specific individual, the one to whom you
imagined you were sending the letter when you first
wrote it. Use “cut and paste” to move those
comment into individual fields for that person in the
Excel data file. Then see if you can think of
comments for other persons to put in the same field,
eventually to appear in the same location in the letter.
There is no obligation to put comments for each
person there, but you might want to have more than
one recipient seeing something there. Any blank
fields are ignored in the letters so that the recipients
see no empty spaces, while fields with data simply
push the following words so that they wrap around
the field and leave no trace that the inserted words
are any different than the words that precede or
August 2 0 0 5 / September 2 0 0 5 P a g e 9
follow the inserted field. It is up to us to ensure that
any inserted words are followed by a space while
there is no space in the letter after the inserted field.
Make these additional personal comments more
than just a few words. They should be at least two
or three sentences long to make each letter appear
more personal. Open a new and temporary word
document for composing comments so that the
computer can check for spelling errors and
grammatical infelicities before you put them in the
Excel file. If what we write takes more than a
paragraph, we have to put individual paragraphs into
separate fields. When we have finished writing
comments for one person in the temporary
document, “copy” (not “cut”) and “paste” the words
into the data file. We should copy the words
because parts of a comment for one person may
well be the basis of a comment we might write for
some-one else. It is easier to “cut and paste” those
words than retype them.
Disaster relief: When we have finished working
with the Excel data file, we should save it as one
would normally save any Excel file, preferably in our
“Mail Merge” directory that we set up earlier for this
sort of work. Then click on “File” > “Save As” (Alt
+ “f”, “a”) to save the file again in a different format.
When the “Save As” dialogue box opens, there are
three changes to make before we can actually save
the file. First, click on the “My Data Sources” icon
we made earlier so that the file will be saved in that
directory. Second, whatever general name we have
for the data file, now specify s name appropriate to
this specific mailing. If we are working on a 2005
Christmas letter, then “MM Xmas 2005.xls” could
be an appropriate name. A luncheon invitation could
have a name like “MM Lunch 2005 08 15.xls” to
indicate a luncheon invitation sent on August 15,
2005. Finally, and most importantly, tab to or click
on the “Save as type” window just beneath the file
name we just specified and press the letter “t” twice
to get to the choice “Text (tab delimited) (*.txt)”.
With those three changes are done, click on
“Save”. The computer will raise some objections: It
will warn us that text files do not support multiple
sheets in a work book. Just click on “O.K.” (We
are trying to save memory, and multiple sheets cost
Tid Bits N’ Bytes
extra memory.) The program will warn us that text
files do not support all the features of an Excel file
and ask whether we really want to lose that
information. Just click on “Yes”, since we are saving
it in this format to save more memory and also get
rid of the weird Excel formatting of numbers. The
program may also say we already have a file with
that name. We can then choose to replace that other
file (because it contains defects that we have
corrected with this new version) or we can choose a
different name. If I have not yet sent the letter, I
normally overwrite previous useless versions of the
file, but if for some reason you want to keep earlier
versions, chose a similar name but change the date
at the end.
When you have saved the file, close it (“File” >
“Close”). Even though you have just saved the file
and have done nothing else with it, the computer will
again ask if you want to save the file. (Microsoft
would call that a “feature” and not a “bug”.) Just
click on “No”, and then open the file again in Excel
(“File” > “1”). The program will ask us to confirm
that the file has fields delimited by tabs. It is. You
can check that the different fields appear properly
separated, or you can just click on “Finish” to work
with the file. Any formatting we had (and still have)
in the original file will be gone, all hidden and
grouped rows and columns will be visible, all rotated
text will be horizontal, and it will look beautiful.
Then, to make the file as small as possible, we
should delete any columns that we do not need for
the mail merge. If we are sending an E-Mail
message, we do not need the “Address1” to
“Address5” columns. If we are mailing a normal
letter to be delivered by the post, we can delete the
E-Mail field and possibly also the “Address”
columns too since those are really just for making
the envelopes. We should also delete any
unnecessary rows, for example persons to whom we
do not want to send this letter. When that work is
done, we can save the file again as a text file. The
program will again ask whether we really want to
save it in text format. We do, and now we have
finished the second step.
August 2 0 0 5 / September 2 0 0 5 P a g e 1 0
Step 3: Insert the data file information in the letter
file:
Go back to the original letter file. We may have
to reload it again if you closed it earlier. If this is the
first time you have done a mail merge, you might
want to go through the wizard to see how the system
works (to start the wizard, click on “Tools” >
“Letters and Mailings” > “Mail Merge …”).
Hints: (There is no “Disaster Relief” in Step 3,
because we have already done everything we need
to do to avoid the annoyances and bugs mentioned
earlier.) If you feel adventurous, we can work more
quickly by skipping the wizard. We will need the
mail merge toolbar, so click on “View” > “Show
Mail Merge Toolbar” (the command we put there
back in Step 1 above). The bar shown below
appears.
The second button from the left on that toolbar is
the “Open Data Source” button. Click on it to
display the “My Data Sources” directory.. Click on
the text version of the data file back in Step 2 and
our two documents are linked. Now all we have to
do is show where the different fields in the data file
should appear in the letter.
Find and click on the first place in the letter
where something from the data file should appear.
Then click on “Insert” > “Insert Merge Field”. We
can use the Alt + “i” key sequence to get to the
Insert Menu, but the “Insert Merge Field” command
has no shortcut key. However, since we put the
command at the top of that menu, all we have to do
is press the down arrow “(?)” > “Enter” to move to
and select it. A drop-down menu appears with all of
the fields. Click on the appropriate field, and the
program inserts the field into the letter and the menu
closes. If so desired, we could have used the “Insert
Merge Fields” (plural) from the Mail Merge Toolbar.
The disadvantages of that, as described as an
annoyance at the start of this article, is it requires
using the mouse rather than the keyboard and we
have to click on a button to close the box after
inserting the reference.
Winnipeg PC User Group Inc.
To see how the letter looks, the button to the
immediate right of the “Insert Word Field” button is
the “View Merged Data” button. When we press it
down (by clicking on it), the letter shows the actual
data from the Excel file. If we click on it again, the
button pops up and we revert back to showing the
name of each data field. Normally one would want
to see the actual data, the way the letters will appear
to the recipients, but if a number of fields have
similar data (for example when writing to students to
show them their grades on tests), then one would
want to see the names of the fields to make certain
the references are correct.
The buttons on either side of the window with a
number let us look at each letter as it will appear
when sent. In the course of looking at those, we may
think of something else to say or see an error.
Spaces give particular problems. If in certain letters
a field is blank, there should be no space after it. Put
spaces at the end of fields in the Excel file rather
than in the letter that will display the fields. If you see
an error or two, it is easy enough then to close the
file, return to the original Excel data to correct the
error, save the file again as a text file under the same
name you had before, and then reopen the Word
document. MS Word will then ask us whether we
want to attach that data file to the document we are
opening, and, of course, we do. The two files are
again linked and the errors you saw or the additions
you wanted should all be in place.
Finally we must let Word know how it is to send
the letter. If it is to go as an E-Mail, the “Merge to
E-Mail” button toward the right of the toolbar leads
to some simple questions: Which field has the EMail address? Should the letter be sent as plain text,
HTML (i.e., formatted), or as an attachment? What
should we put in the subject line of the message?
(Although the letters can be individualized, the
subject line has to be the same for all the letters.)
The other possibility is to print the letters on
paper and then send them by snail mail. If so, we
should check to see whether the letter takes up
more than one page and should thus need a running
head with the name of the recipient on the second
and subsequent pages, as in “Your Name /
Recipient’s Name, p. 2”, etc.” When the file is ready
August 2 0 0 5 / September 2 0 0 5 P a g e 1 1
to print, the most important button to avoid pressing
is the choice “Merge to Printer”. There will almost
always be one or two letters that have “Sincerely
yours” at the bottom of one page and your name at
the top of the next page. To avoid that problem,
choose instead to “Merge to New Document”. That
produces a second Word document that we can
check and edit to ensure that there are no awkward
page breaks. When all the errors are corrected, we
can print the file to get all the letters printed in a form
suitable for sending. We will then probably want to
make a new mail merge document to print the
envelopes with addresses to send the letters to
individuals. Our work is done.
Jef Raskin’s question about why there are no
Maytag user groups was certainly not meant to
suggest that PC User Groups are useless. Quite the
contrary: while in an ideal world there would be no
need for them, we live in the real world, where user
groups help us simplify life. I hope that this article
will do just that. Eventually no doubt Microsoft or
some other software publisher will make mail
merges simple, eliminating all the bugs that currently
annoy or even prevent persons from using mail
merge with MS Word. I hope that in the meantime
this article can serve as a small tribute to a gentleman
who did so much to simplify life.
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
Professor John Robin Allen, Department of French,
Spanish, and Italian at the University of Manitoba, has
lunch with other members of the Winnipeg PC Users
Group each Saturday at the
Park Tower restaurant on
Portage Avenue (Winnipeg),
just east of the footbridge to
Assiniboine Park. You are
welcome to join the entire group
there or you can contact Allen
by E-Mail at
[email protected]. You
can also phone him at his home
at (204) 889-3561.
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 1 2
Search Engine Tips and Tricks
By Richard Johnson, TUGNET, Granada Hills CA
www.tugnet.org
Part 1: Google
I don’t have to tell you about Google, which has
for many years been the search leader. Aside from
the quality of its searches, a big plus is that all
Google’s paid listings are clearly distinguished, and
do not even appear in the same part of the page.
This is unfortunately not the case with other search
services such as Yahoo, which intersperses undifferentiated paid and unpaid listings.
Newbies will want to know they can initiate a
Google search at www.google.com. All the services
I’m recommending here, most of them from Google
but a few from other sources, are entirely free.
Google Toolbar
If you don’t already use the Google Toolbar,
you’re missing a terrific navigational aid. Its features
are really too numerous to detail here, but I find
especially useful its ability to:
• readily bring up a parent Web page,
• search within a website,
• find pages similar to what you’re looking at,
• find sites linking to that page,
• translate a page into English,
• browse by name (if you don’t know the URL),
• highlight search terms on the page,
• find on the page your search terms or any other
terms (more handily than with your browser’s
“Find” function),
• fill forms, and
•block pop-ups.
(There are better pop-up blockers and form fillers,
but Google’s may suit you fine.)
The toolbar enables most of the standard Google
tasks, including some described in the next section.
Not only are all these tasks easily accessible, but
also you won’t have to re-type your search terms
(for example, when you search for an image after a
standard search).
I strongly recommend version 3, which adds
many useful tools, the best of which will allow you to
• spell-check what you’ve typed on a Web form by
clicking a toolbar button,
• bring up a map page (using the impressive new
Google Maps—see below) just by clicking on an
address, and
• track a delivery by clicking on its tracking number.
Since it’s still in beta, version 3 is not publicized,
and won’t automatically replace your present
Google Toolbar. To get it, go to
www.toolbar.google.com/T3.
Other Google Goodies
Google Maps and Google Local
Google has recently introduced its own map
system, that’s head and shoulders above the competition. It’s available as a stand-alone service at http://
maps.google.com and as an adjunct to the more
established Google Local, at http://local.google.com.
Compared to other online maps, the area of a
Google map is huge, taking up more than half the
screen, and expanding to fill any additional space
(for example, if you move to a full-screen view).
Zooming (in or out) is very quick, and re-centering is
instantaneous. A new feature brings up a birds-eye
view if you click on “Satellite.”
Google Maps and Google Local are now pretty
much the same service: A page brought up by
Google Maps has a link to “Local Search,” which
provides the local data on the same page; and a
page brought up by Google Local includes the map
(which, although smaller, can be expanded with one
click). The local data includes the names, addresses,
phone numbers, and websites of businesses, and,
often, third-party reviews (like restaurant reviews).
You can now get to Google Maps by typing a
Winnipeg PC User Group Inc.
location in the standard Google search bar. And
you’ll find a link to Google Local at the top of every
page of Google search results.
The best of the rest.
The following are, in my experience, the most
useful (or most interesting) of Google’s non-standard
services. You do not need the Google Toolbar to
employ them:
Google’s image search at www.google.com/
imghp, touted as the Web’s most comprehensive,
indexes (according to Google) over 880 million
images.
Google will give you a business address and
phone number. The easiest way is through the
ResearchBuzz! form at www.researchbuzz.org/
archives/001408.shtml.
Google will bring up one or more definitions for
nearly any word. In the Google search box just type
“define:” (without the quotes), followed by the word
of interest. This service is now multi-lingual.
Reverse phone directory. In the search box type
the area code and phone number (with a space
between them), and there’s a good chance you’ll
bring up at the top of the results page not only the
person or company name for that number, but also
the address.
Google offers special searches, limited (for
example) to U.S. government or to Microsoft. Go to
www.google.com/options/specialsearches.html.
For those who like to purchase through the use of
catalogs, Google’s catalog search is at http://
catalogs.google.com.
Google will enable you to view a page that’s been
removed from the Web. Look for the “Cached” link
after the description of the page in a search result.
(Or click the Page Info button on the Google
Toolbar.) This function will give you access to many
closed-down sites not yet available via the Internet
Archive. (The Internet Archive — not a Google
service — is at www.archive.org.)
August 2 0 0 5 / September 2 0 0 5 P a g e 1 3
The Google Directory at http://directory.google.
com combines the Open Directory Project (the
Web’s largest human-edited directory) with
Google’s proprietary ranking system. Use of the
directory is helpful to narrow down what might
otherwise be an overly broad search. (This tool is
also available from the Google Toolbar.)
Google Answers at http://answers.google.com/
answers is a paid research service—but users are
free to browse previous answers, which can be quite
helpful.
Weather forecasts are easily obtained by typing in
the Google search bar the word “weather” followed
by the city of choice (for example, “weather canoga
park.”) The forecast will speedily appear at the top
of a page of search results.
Froogle, a comparison service for online shopping
whose listed vendors pay neither for inclusion nor
placement, is at http://froogle.google.com/froogle.
Google Print gives you access to books’ contents
and lets you search within those books. Look for the
“book results” entry in standard search results,
accompanied by the Google Print logo.
Google Suggest, at www.google.com/
webhp?complete=1&hl=en, appears and acts like
the standard Google search, except that as you start
typing your search request, Google types its own
suggestions. These could save you time and also
point you to related searches.
Google Desktop, to search files on your own
computer, can be downloaded from http://
desktop.google.com. Unfortunately, it’s available
only for users of Windows 2000 and Windows XP.
Gmail, which on March 31 started offering rich
text formatting, has as of April 1 doubled its storage
capacity to a whopping 2 gigabytes. Gmail is not yet
open to the public, but invitations can be obtained
from various sources, including this writer.
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 1 4
Note that without re-typing you can extend your
standard Web search not only to Google Local but
also to Google Images and Froogle (as well as to
Google Groups and Google News), by clicking on
links at the top of every results page. Or you can
skip the Google entry page and go to Xtra Google at
www.xtragoogle.com for a selection of twenty
Google tools, all tied to one search box.
Google Tips
Toolbar tips
Use Alt-G to enter search terms in the search box.
For your news search, don’t enable the separate
news button, but instead use the Search News
option in the drop-down Search the Web menu.
That way you’ll be able to use the Alt-G shortcut to
enter your news search query, and to use the same
query for news and general Web searching, without
retyping.
When using the word-find function, hold down the
control key to find the exact whole word, and
similarly use the shift key to move backwards.
Other Google tips
For academically oriented results (often the most
useful), try typing site:edu either before or after your
search terms. This will eliminate commercial sites,
and limit results to those from educational institutions.
Although Google now implements “stemming”
(automatically searches for variants of words as well
as the words themselves), you can cover still more
bases by using the tilde [~] symbol right before a
search term (leaving no space). This will tell Google
to use synonyms as search queries. For example, a
search for ~food ~facts will turn up cooking information.
Don’t worry too much about misspelled words.
With any search engine, a search query with a
misspelling might get you some good results that you
wouldn’t see otherwise! Google will suggest a
corrected spelling along with its search results, but if
the initial search comes up empty will correct the
spelling on its own and re-run the search.
Google will ignore some common short words
(like a, on, and by) in your queries. The best way
around these so-called stop words in most cases is
simply to enclose the phrase in quotes, which will
force Google to search only for the phrase as given.
(A phrase search will of course come in handy on
other occasions as well.) Otherwise, you can
precede a suspected stop word with the plus sign
(for example, +on).
Google recognizes the OR operator, or, in its
stead, the vertical line. So if you’re seeking search
results concerning cats or dogs (but not both), you
could type “cats OR dogs” or “cats | dogs” [without
the quotes]. Use the minus sign right before a search
term for “not.” (“Animals -dogs” [without the
quotes] would ignore dogs in the search.) For
complicated queries, you can if necessary group
search words within parentheses.
Instead of clicking on the main link at the top of
each Google search result, try clicking on the word
Cached. The page that will come up will now have
your search words highlighted. (Don’t use this
technique if you need to see the most recent page
revisions.)
Google supports word wild cards. That is, you
can in your query use the asterisk [*] as a stand-in
to represent any word. (This won’t work in Google
for parts of words.)
Next month: Beyond Google.
Richard Johnson is a writer and editor, and
founder/administrator of FREE FOR ALL The
Skills Pool, a 29-year-old membership organization (http://theskillspool.org). He is a volunteer
with TUGNET HelpContact for assistance with
Internet Explorer, Outlook Express, and Gmail.
You may reach him at [email protected].
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 1 5
Konfabulator 2.0
by Roger Buchanan
Past President, WPCUG
Editor’s Note:
This review is timely as Yahoo liked this
program so much that they bought the
company! Konfabulator is now likely to
undergo a name change and be called
Yahoo! Widgets . It is now available for free
from Yahoo.
The Windows desktop. When we think
of a virtual desktop we envision piles of
applications, a start button, some shortcuts
and maybe a taskbar. Yet look at the
physical desktop that your computer sits
on. What do you see? Likely it will include
items like a dictionary, a clock, maybe a
picture frame, a to-do list and the like.
Konfabulator bridges the gap between
your computers virtual desktop and your actual
physical desktop through the use of neat little items
called “widgets”. Version 2.0 comes with new
widgets, and many updated widgets. I’m getting
ahead of myself though.
Yes Konfabulator 2.0 ($19.95 US), a product of
Pixoria Inc., was originally developed for, aaccckkk,
err, the Mac. That said, it is still a darn good
application, and it’s original platform should not be
held against it. Konfabulator for Windows
XP is quite simply Konfabutastic! Besides
that, using it is downright fun at times.
Konfabulator is a shareware application
that is available for download at http://
www.konfabulator.com/. Konfabulator is
the interface control between you and your
widgets. Widgets are individual little task
oriented applications. Some are designed
to just display information, like a clock
widget or a weather widget. Other widgets
offer interactive functionality like the search
bar widget, ftp widget or to-do list widget.
Just like the various items on your real
desktop you can position your collection of
widgets anywhere you like on your virtual
figure 1
desktop. Needless to say this poor misguided user
has been “Konfabulated”.
My personal Konfabulator setup can be seen in
Figure 1. If ever there was an application that made
me want to have a bigger monitor Konfabulator is it!
I’ve played a fair number of games, edited lots of
digital still images, even ran some video, but only
Konfabulator has gotten me thinking of higher
resolutions, smaller dot pitch and larger screen size.
Once I set up my Konfabulator configuration I was
figure 2
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 1 6
INK-JET REFILLS
by nomi
ONE OF THE FASTEST GROWING
PRODUCTS IN THE COMPUTER INDUSTRY!
COLOUR & BLACK
COMBO (JUMBO)
COLOUR & BLACK
COMBO (REGULAR)
BLACK
(JUMBO)
BLACK
(REGULAR)
Our full colour packaging quickly and easily helps you locate the correct kit for your printer.
• SAVE UP TO 80% each time you refill
• FAST & EASY to use with step-by-step illustrated instructions
• NO MESS with easy refill methods
• HIGH RESOLUTION INKS!
•
•
•
•
•
HP
CANON
EPSON
LEXMARK
APPLE
Quick and Easy
YES!
Your cartridge can be refilled!
also
• CANON MULTIPASS • EPSON PHOTO
• CANON FAX • CANON PHOTO
AND OTHERS!
Ink-Jet Refills are available at Winnipeg PC User Group General meetings, and the WPCUG
Resource Center. For more information drop by either location or contact the
WPCUG group buyer at [email protected]
Winnipeg PC User Group Inc.
productive like never before. I easily tripled my
current rate of virtual work with this new style
desktop. See Figure 2 for my collection of widgets.
A: Chrome Clock
B: FTP icon
C: Power Down/Log Off
D: To – Do List
E: Thesaurus/Dictionary
F: Variable Engine Search Bar
G: System Resource Monitor
H: E-mail Monitor
I: Current Weather Monitor
It takes time to get the Konfabulator desktop set
up the way you like though. There are just so many
widgets to choose from http://
www.widgetgallery.com/. The last time I checked
there were almost six hundred widgets comprising
various categories. Widgets are open source
applications where the functionality is provided
through the use of JavaScript, and the appearance is
developed by using XML (eXtensible Markup
Language). All widgets submitted for “publication”
on the widget gallery site are first reviewed by the
folks at Konfabulator (i.e. Pixoria Inc.) You’ll have
to reference online material, or an expert, for any
more information on the development of widgets
though.
With version 2.0 you have even more added
widget functionality. There is now “COM” support,
“Widget messaging” allows Widgets to accept
messages, “Image Tiling and Clipping” and
“Colorization/Adjustments” are also offered. Now
there are “Context Menu Items” available that can
be added to a Window, image, text and text area
object. As if that was not enough, “Timers” have
been updated and there is now “Multiple Window
Support”. “Multi-Click Handlers” now better follow
mouse clicks and “Multi-Pane Preferences” are
now available in all widgets. The list of upgrades and
functionality just goes on and on and on. The folks at
Pixoria, the makers of Konfabulator 2.0 don’t just
sit around all day, they work hard! Go to their
website to get even more insight into this app.
With Konfabulator installed, and your selection of
widgets made, you still have to configure their
August 2 0 0 5 / September 2 0 0 5 P a g e 1 7
figure 3
functionality. An e-mail monitor will require your
account information. An FTP widget will require
your server, account and password. The list goes on
and on, depending on the variety of widgets you
have.
Widgets do have a number of features in common
however. Widget Preferences are divided into at
least two panes, “General” and “Window” (Figure
3), though there can be many additional panes. They
all have user defined degrees of opacity. You can
have a Chrome Clock widget in plain sight, but it is
opaque to a degree that allows you to see your
application underneath. Widgets also share a feature
called “Level of Window”. This feature adds even
more functionality. With items like the Chrome clock
or the system monitor you can have them “Floating”
so that you can see them, but not really interact with
them. When a widget is floating you can work with
the application that is beneath it, just as if that widget
wasn’t there. Other widgets, ones that require you
to input information, like the to-do list or the search
bar can be put “Topmost” where they can stay on
top of an application waiting for your input. The
other levels are self-explanatory. I use either floating
or topmost widgets for all my work.
Tid Bits N’ Bytes
In spite of my new found functionality using
widgets I did get to the point where I had effectively
“widgetized” myself. Control lost I switched over to
August 2 0 0 5 / September 2 0 0 5 P a g e 1 8
viewing requirements. Finally, when I widget myself
right outta my gourd, I always have Konspose
Mode for total widget control.
It has been a long long time since I
was this excited to write about an
application. Konfabulator just enthralls
me with it’s myriad of configuration
options. Now I can have a desktop that
is truly mine, and unique in its
functionality. This application is for
anyone who is longing to get away from
the dreary virtual desktop that comes
with the default Windows configuration.
Highly recommended!
Want More? Version 2.0.1 was
released just after this review was
completed. Here is the link to a list on
what else is new http://
www.konfabulator.com/versionhistory .
figure 4
Registration is free now that Yahoo
has purchased the program.
“Konspose” mode by hitting the F8 key (Figure 4).
Konspose mode gives you access to all of your
The single user license is good for two computers
currently running widgets, and is a boon when you
running on the same platform (i.e. both Windows, or
spin out of control.
both Mac OS), that are not being used at the same
time.
I did run into a problem in a couple of instances
where my widgets suddenly, and inexplicably turned
Requirements: Windows XP or Windows 2000
into nothing more than rectangular cyan coloured
Roger Buchanan is a long time member of the WPCUG. He
boxes. A quick email was fired off to the support
has written for the newsletter in the past. Owing to his
team at Konfabulator. The reply was prompt and
long term standing as a “poor misguided user” he can
informative and easy to follow. Following the
often be heard muttering “what did I do wrong this time”
instructions I was quite relieved that the problem
over weekend lunches at the Park Tower restaurant.
seemed to have nothing to do with running
Konfabulator 2.0. It is nice to know that support is
there when you need it.
If I had to list my top three features regarding how
“I” use Konfabulator they would be, in no particular
order: The “Floating levels” of the widgets, the
ability to click “through” a widget to use the app
below it, and last but not least “Konspose Mode”.
There is certain information that I always want
access to, and the widgets that float on top of my
apps provide me with this feature. That I can click
through the widget to the app below means I don’t
loose any functionality. Remember, you can set the
opacity of each widget individually to suit your
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 1 9
The shareware industry held an awards gala recently and announced the best shareware of 2005.
The following is the official news release.
Fourteenth Annual Shareware Industry Awards Winners
The Shareware Industry Awards Foundation
news release by Michael E. Callahan, SIAF Chairman, at 1-888-882-7423
The Shareware Industry Awards Foundation was
pleased to announce the winners of the fourteenth
annual Shareware Industry Awards during a gala
awards banquet held recently.
- Best Action/Arcade Game
Astrogeddon by ORT Software
- Best Program for PDA’s
Google Mobile by Google, Inc.
Awards were given in nineteen categories:
- Best Overall Utility
TuneUp Utilities 2004 by TuneUp Software GmbH
- Best Application
UltraEdit by IDM Computer Solutions, Inc.
- Best Graphics Program or Utility
SnagIt by Techsmith
- Best Desktop Enhancement
Microangelo Creation by Eclipsit Corporation
- Best Photo Program or Utility
Images: In Context! by Liquid Mirror Software
- Best Application Using .Net
Guitar and Drum Trainer 2 by Renegade Minds
- Best Utility Using .Net
Filehand Search by Filehand, LLC.
- Best Sound Program or Utility
Microsoft Media Player by Microsoft Corporation
- Best Vertical Market Program or Utility
Help and Manual by EC Software
- Best Business Application or Utility
Black Hole Organizer by Lincoln Beach Software
- Best Educational Program or Game
Cherokee Trails by Pharos Games
- Best Hobby or Personal Interest
PhotoMix by fCoder Group, Inc.
- Best Internet Enhancement
FTP Voyager by Rhino Software, Inc.
- Best Internet Communication
FeedForAll by NotePage, Inc.
- Best Web Enhancement
HTML Match by Salty Brine Software, Inc.
- Best Server Program or Utility
Servers Alive by bvba Woodstone
- Best Non-Action Game
No Limits Roller Coaster Sim
The Shareware Industry Awards Foundation is a
non-profit corporation that was created in 1991 for
the purpose of hosting the annual Shareware Industry Conference. The SIC is attended by software
developers, e-commerce providers, vendors, and
others involved in the shareware industry from
around the world. The conference features educational sessions on a wide range of topics of interest
to software developers including marketing, Web
site design, press releases, and more. The conference is sponsored by a number of companies both
large and small.
For more information on the Shareware Industry
Conference, the Shareware Industry Awards, and
the SIAF People’s Choice Awards, please visit the
SIAF Web site at http:// www.sic.org. Or call
Michael E. Callahan, SIAF Chairman, at
1-888-882-7423.
Editor’s Note:
The Shareware Industry Awards are awarded
annually. This is the 15th annual selection. They
are awarded by the SIC board based on many
factors. In addition there is the People’s
Choice Awards.
Do check out their website at www.sic.org
There you will find the lists of winners and
runners up. Each has a link with downloadable
files. It you will be entertained for many months
to come following up on these many leads to
great shareware.
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 2 0
Shareware Industry Awards Foundation’s
“People’s Choice Awards” 2005
Best Overall Utility
WinZip by WinZip Computing, Inc.
Best Internet Communication
ICUII by Cybration, Inc.
Best Application
NoteTab Pro by Fookes Software
Best Web Enhancement
Mozilla Firefox by The Mozilla Foundation
Best Graphics Program or Utility
Paint Shop Pro by Corel Corporation
Best Non-Action Game
Pretty Good Solitaire by Goodsol Development
Best Sound Program or Utility
Blaze Media Pro by Mystik Media
Best Action/Arcade Game
UnReal Tournament by Epic Games
Best Vertical Market Program or Utility
Macro Express by Insight Software Solutions, Inc.
Best Program for PDA’s
Pocket Informant 2005 by Web Info Solutions
Best Bussiness Application or Utility
Microsoft Office 2003 by Microsoft Corporation
CNET “Most Votes”
Ad-Aware SE by Lavasoft Sweden
Best Educational Program or Game
AceReader by StepWare, Inc.
Simtel “Most Votes”
Registry First Aid by Rose City Software
Best Hobby or Personal Interest
Picasa 2 by Google, Inc.
Tucows “Most Votes”
Spyware Doctor by PC Tools
Best Internet Enhancement
Ad-Aware SE by Lavasoft Sweden
PC World “Most Votes”
Spybot Search & Destroy by Patrick M. Kolla
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 2 1
General meeting Report May 19, 2005
Greg opened the meeting and introduced our
presenter for the evening: Neil Longmuir. Neil had
come out to show us four utilities that work with
Adobe Photoshop and Adobe Elements, two of
the most popular programs for editing digital images
under Windows.
DIGITAL GEM airbrush Pro
- smoothes skin surfaces
DIGITAL GEM Pro
- reduces image noise and grain
DIGITAL ROC Pro
- restores and balances image colour
DIGITAL SHO Pro
- optimizes contrast and exposure
Neil started by directing our attention to the
demonstration disks that were available at the group
buyer’s table. They contained a time-limited copy of
Digital Ice, a program that does a very good job of
removing ‘dust’ and noise from digital images that
were scanned with imperfections. The disks were
free for the taking.
He then talked about Adobe Elements 3, the
newest version of the image editing program. Neil
said that it is much improved and now includes a
copy of Photoshop Album. It also includes many
tutorials that you can take on-line.
Many digital cameras available today allow you
to save an image in a raw format. In other words,
rather than being in a ‘jpg’ or ‘tif’ or some other
format, it is simply a copy of the information that
was read from the sensor in the camera. While
Elements can read many of these files and convert
them into a standard image format (eg. ‘jpg’) Neil
stressed the importance of doing any image
corrections *before* you convert to another format.
This is because the raw format has the maximum
amount of information. Once you do a conversion,
some of the data is lost and this is especially true
when your output file is a ‘jpg’.
After giving us a quick tour of the other plug-ins,
Neil showed off the capabilities of Digital Roc Pro.
He had scanned several forty to fifty year-old slides
provided by members. Even though the slides had
been stored properly, the colours had shifted. One in
particular (a shot of two horses) was predominantly
red with the other colours muted or missing. Neil
then applied the plug-in in automatic mode, letting
the program make its best guesses as to what the
slide should look like. The results were astonishing!
What was an unacceptable image now had naturallooking colours. While you could achieve the same
results by ‘hand’ (given enough skill and time), the
speed and quality of the processing certainly justified
the cost of the plug-in. Other ‘off-colour’ images
showed a similar improvement.
But Neil had some cautions too. For one thing,
the plug-ins he showed us are all eight-bit products
while the computer industry is moving to 32-bit. For
another, these utilities have no preview function: you
must apply a change and then ‘undo’ it if you don’t
like the result. Also, batch processing closes the files
after making the change(s) rather than leaving them
open for further modifications. Because of antipiracy schemes used by Adobe you can’t install any
of the products on two machines: for instance your
desktop and your laptop computers. And if you
decide to upgrade to a new computer you can’t
install the software on the new machine without
calling the manufacturer.
The plug-ins sell for about US$50.00 each. Neil
was pleased to say that he had arranged a deal with
Kodak to give User Group members 25% off the
price of any plug-in until 1 June, 2005.
We gave Neil an appreciative round of applause
for his presentation.
In Random Access a member had an interesting
and unusual problem: if he selects a ‘favourite’ in
Internet Explorer, the web page is displayed and
immediately sent to his printer. Greg said he would
do some checking and report back to the group.
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 2 2
Adventures in Linux-land
By Siles Bazerman, APCUG Representative,
Orange County IBM PC Users’ Group, California
As many of you know I became bored with
Windows XP a while ago. Bored with both writing
about it and actually using it. Windows went from
“Gee, look what I found!” in Windows 3 to using an
appliance in Windows XP with the release of SP2.
Very usable but not much fun to play with.
I decided to give Linux another try. The first time
was with Red Hat 3 back in 1998-1999. At that
time it was not ready for Prime Time and there was
still a lot to discover in Windows 98 and 98SE.
Also, there were only one or two other distros
(distributions) available and little in the way of a
GUI, so you used mostly command line.
Now there are many, many distros out there,
some commercial and some free. Red Hat went
commercial, but is available as Fedora for free
download. One of the more popular free distros is
Debian (Debra and Ian Murdock, authors). It too is
available in several varieties. The two most useful for
beginners to Linux are Knoppix and SimplyMepis. I
use the latter. Both of these are downloadable, fit on
one CD with a number of useable programs, and
can run from the CD without installing on your hard
drive. You can also install them if you so desire.
After downloading Mepis, using it and finally
installing it, I decided I needed more information
than was available on line. I found a book Point and
Click Linux by Robin Miller that was written to
exactly parallel the CD. For less than $22 from
Barnes and Nobel on line I received the book, a CD
(exactly the same as the download) and an instructional DVD. The distro uses the KDE (K Desktop
Environment) and includes several editors, Open
Office Suite (similar to Microsoft Office, but free), a
CD/DVD writing program, GIMP graphics program
(GNU Image Manipulation Program) and Mozilla
web browser. There are numerous other programs
included but I have listed the main ones. Also you
can download and install many other programs free
to enhance or replace the ones on the CD.
If all you want to do is send and receive email,
browse the web, do some word processing or
similar things, then you can use Mepis as installed.
Web browsing is relatively virus free and almost
totally popup free. Both Mozilla and its successor,
Firebox, are also available for Windows, but windows update will not work in any other browser but
IE. Linux is relatively free of viruses for two reasons.
First, it represents only a very small percent of
desktop installations and virus writers want the
biggest “bang for the buck” so they don’t bother.
Second, you work in Linux as a user, but all changes
to the system must be done as either an administrator or “super user” which are not accessible from
outside and are password protected. Also the
browser does not allow popups. This would be
labeled EASY.
If you wish to do customization or add established
Debian packages then it can be easy or difficult
depending on the need for the command line interface. Many of the commands are arcane and rather
like in a foreign language, although they are really in
English. I believe much is written in C, Perl, and
Python. I am sure some other programming languages are involved also. Many of the free backup
programs are written for Tape Backup Units,
although they might be configurable for other media
such as HD or CD/DVD. These things would rate
DIFFICULT.
I have one MUST HAVE, no substitutes allowed,
program. It will run only in Windows, not in Linux or
on a MAC, or any other operating system. I have
tried to port it to Linux using four different Windows
Emulators. The commercial three all have free trials
available that are time limited but otherwise full. The
free qemu (Q EMUlator) requires an installation of
Windows 98 from a full install, and does not seem to
ever access the CD drive or, for that matter, any
drive outside the virtual machine. This prohibits the
addition of other programs. Of the commercial ones,
Winnipeg PC User Group Inc.
Crossover Office allows installation of Microsoft
Office and a number of other programs whose
hooks are built in. It will also allow the installation of
some others but it is hit or miss. Paint Shop Pro 7
will install and work, but will not print, as an example. Newer versions of PSP will not even install.
Photoshop 6 or 7 will work but not later versions.
Crossover Office does NOT require a copy of
Windows to work. All the others do.
VMWare never did load on my system as I could
not find one compatible with the kernal version I am
using, and I do not have sufficient knowledge to
recompile one myself; besides who wants to bother?
That leaves the two versions of Win4Lin, regular and
Professional. The regular version works with all the
DOS-based Windows up and including Windows
ME. The Pro version works with Windows 2000
and XP. I did find that loading WINDOWS XP in
the pro version was about like loading Windows 3.1
on my old 286. S——l——o——w. It loaded
Windows 2000 about the speed it loaded on my P3;
I am running an Athlon T’bread 2600+ with 1G of
memory. Under Windows XP, when I tried to load
my program I received the message “Catastrophic
Failure.” What the Hey? Under 2000 it installed but
when run would fail with “ActiveX could not create
a database module.” I spoke to one of the programmers of my program and he never heard of the first
and could not suggest how to fix the second. As a
matter of fact, he asked me to call him if I had any
success in porting it over. He knows of no one else
even trying. (Figures) I could devote several pages
to just this area, but not now. This whole area is
very FRUSTRATING.
Keep tuned and I may present more Adventures
in Linux-land in the near future. That is if I don’t find
playing more appealing than writing.
The Editorial Committee of the Association of
Personal Computer User Groups (APCUG), an
international organization of which this group is
a member, brings this article to you.
August 2 0 0 5 / September 2 0 0 5 P a g e 2 3
How To Record Your Cassette
Music to a CD!
By Bob Elgines,
CRCC Editor, [email protected]
Most of the equipment you already have includes
the Soundboard and a Cassette player. Next of
course things needed are a recording program, such
as Musicmatch Jukebox and a cable to connect your
cassette player with your computer. This basic
Jukebox software is available free at:
www.musicmatch.com (go to JUKEBOX tab and
click on “Free Jukebox download”, it is over 24
MB in size) The cable is made up of 1/8” Phone
Plugs (RS 274-284c) and a three wire shielded
cable. This cable can be purchased or made on your
own. (Some of the older cassette players will use a
larger ¼” Phone plug.)
Now we are ready to setup your computer and
programs. Connect your cable between the “Output” (might be labeled Headset) of your Cassette
Player and the “Line in” of your computer Sound
board.
Do a right click on your Speaker icon located on
the right hand side of the task bar. Select (or left
click) “Adjust Audio Properties”, click on “Audio”.
Under “Sound Recording” click on “Volume”. Select
“Line in” and set the input level at approximately
20%, this may have to be changed later, so you can
leave this on the screen if you wish.
Next activate Musicmatch Jukebox, then go to
“Options”/ “Recorder” / “Settings”. Set “Recording
Format” to WAV, “Recording Source” to LINE IN.
Now click on “Advance”, set “Fadeout” to 1, and
under “End of Record Notifications” uncheck “Play
sound” & “Eject CD”. Click OK
On the bottom left click the red “Record” button.
Another window appears with a number “one” on
the right. You can click on here and change the name
now or do it later. If you are going to record the
complete side of the cassette under one file then
name it now, otherwise if you are going to record
one track (or song) at a time then you can change
the name later.
continued on page 25
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 2 4
Simple Password Practices Keep
PC and Online Data Secure
By Gabe Goldberg, APCUG Advisor and Columnist, AARP Computers and Technology Website
Password dilemma: We can’t live an online life
without them, but if they’re too numerous to remember, they encourage unsafe practices. What to do?
First, basics. A password is just the key that
opens a computer lock. It may gain access to a
newspaper’s online edition, protect banking records,
let you bid on auctions, open a frequent-flyer
account, or do anything requiring verified identity.
Some Web sites assign passwords; most allow
choosing them. Rules for selecting passwords are
easy to find but are often impractical. Don’t use
easily guessed familiar names or words; use letters
and numbers and special characters? OK. Avoid
anything related to facts about yourself? Makes
sense. Don’t share passwords with anyone? Good
advice. Change passwords periodically? Oops, it’s a
memory test [http://www.evalu8.org/staticpage?
page=review&siteid=8906]. Use unique passwords
everywhere? Hm, that takes a *lot* of passwords.
Don’t write them down or store them in a computer
file? Tilt!
Maintaining passwords is a nuisance. So some
people use one password for everything — a bad
idea, since sharing or compromising one access
opens them all. Password hierarchies are common:
use one password for financial matters, another for
commerce, and one for trivials such as newspaper
sites. That avoids revealing your sensitive e-mail/
password combination to junk Web sites.
But don’t use a common password for all ecommerce sites (amazon.com, buy.com, etc.) since
they’re occasionally hacked. And treat sites like
PayPal as financial rather than e-commerce. And
don’t just guess which password you used on a site;
some sites lock accounts after just a few failed
logins.
As passwords proliferate, it’s common to store
them in a computer file. And having too many siteassigned passwords guarantees the need to record
them. But please, don’t call the file “passwords.txt”
and don’t use the word “password” in it. The
paranoid and geeky encrypt such files, but that risks
losing the file by forgetting the encryption key.
You can print and save registration pages, but that
leads to bulky files, cumbersome to search and
requiring updating. Some people use an address
book or print lists of sites and accounts, then
handwrite passwords. But that still needs updating,
and can be lost, destroyed, or found by someone
untrustworthy.
If you have multiple email addresses, note which
you use on a given site, since that’s often the key for
logging in or receiving password reminders.
Hackers use special software to attack logins,
applying dictionary word lists and other guessing
techniques. Passwords are described as “strong”
(hard to crack) if they have at least eight characters,
include upper/lower case and punctuation characters
and at least one digit. So even if you use a memory
aid for remembering passwords — such as words
from a poem — convert them to strong passwords
in a way that only you will know.
High-tech devices can add security, but they’re
usually used only in business settings; they include
biometric devices which check fingerprints or eye
structure and random logon-key generators.
Software password managers are more practical.
These record and secure passwords and then autofill online logins. Good ones offer a “don’t remember/don’t ask” option to avoid recording info about
sensitive sites. Encryption is desirable but not
mandatory; it should be possible to secure the
password manager itself with a master password.
Many managers are free, some are bought, and
common software such as Web browsers and e-mail
clients often includes it. Google returns many hits
related to “password manager” and classy software
site Tucows [www.tucows.com] numbers 300 such
Winnipeg PC User Group Inc.
tools. Before installing one, make sure it supports
your software applications, especially if they’re nonMicrosoft.
Many people don’t secure home computers —
but consider cleaners, workers, friends wandering
through, perhaps even having permission to use the
computer. Suddenly security becomes more appealing. If you handle money online, check banking/
financial sites occasionally for unauthorized transactions.
Remember that you may occasionally need access
to secure sites while away from your computer. You
can copy passwords to a thumbdrive or PDA or
simply print them, but remember that they’re powerful keys and must be protected. Before traveling,
check your passwords so you’re not surprised on
the road. If you leave your computer running, you
can access it remotely via tools such as
GoToMyPC.
On business-owned PCs, separate personal from
work-related material. Determine whether your
August 2 0 0 5 / September 2 0 0 5 P a g e 2 5
office has policies for personal computer use and
monitoring of computer activity. Some businesses
install keystroke loggers which can capture passwords before they’re encrypted. And remember that
system administrators can often defeat security
measures as part of their job, so you may not want
to store sensitive personal material at work.
Work and home PCs both need disaster preparation, so family members or colleagues can access
what’s needed in an emergency. Work-related
passwords and instructions can be stored securely
so they’re available but can’t be secretly used.
For home computers and facilities such as e-mail
and finance, remember that many ISPs and companies have privacy policies prohibiting revealing
information to family members, even in cases of
illness or death. Instructions and important passwords should be stored with essential family
records. Note that changing situations may require
special care — for example, a divorce might motivate tight security.
This article appeared originally on AARP’s Computers and Technology Web site, [www.aarp.org/
computers]. (c) AARP 2004/2005. Permission is granted for reprinting and distribution by non-profit
organizations with text reproduced unchanged and this paragraph included. Please e-mail the
author, Gabe Goldberg, at [[email protected]] when you print or post it.
The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you.
continued from page 23
Now play your cassette to check out the input
level for no distortion listening to it on your computer
speakers. If it is to loud and there is distortion then
reduce the input level or the volume out of the
player. Rewind the cassette.
We are ready to roll, start your player and press
the “Record” button on the lower left window.
When the song is over press the “Stop” button, then
press “Record” again because the next song will
start within a second or two. The press “Stop”,
continue this until each song is recorded from the
cassette.
Now we have them in the computer, let’s name
each one, but keep the names short. Use “Windows
Explorer” and go to “My Documents” / “My Music”/ “Artist” / “Album”. Here you will find your
recordings and you can rename them by doing a
right click on each one. After you are finished, exit,
go to your CD recording program such as “EZ CD
Creator” or “Nero”. Now you can grab all of the
recordings you made and make an AUDIO CD.
(Do not record any faster then 8X, because most
players will not accepted anything faster)
Another method can be used and that is by using
MP3 sound files. If you covert from WAV to MP3
files, you can put up to 150 (or more) songs on a
CD instead of just 15.
continued on page 29
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 2 6
Daves Quick Print AD
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 2 7
Another Silent Attack on Our Computers
by Ira Wilsker, APCUG Director; Columnist, The Examiner,
Beaumont, Texas’ Radio Show Host; Police Officer
WEBSITES:
http://research.microsoft.com/rootkit
http://www.sysinternals.com/ntw2k/freeware/
rootkitreveal.shtml
http://www.f-secure.com/blacklight
http://www.f-secure.com/blacklight/rootkit.shtml
with a rootkit produces what was known as full
stealth viruses in the MS-DOS environment.”
Because rootkits are currently very effective at
hiding malware from our antivirus and anti-spyware
scanners, it is quite possible or even probable that
our computers are infected, despite repeated scans
with properly updated software.
At the recent computer security symposium in
Microsoft, and other vendors, have acknowlCorpus Christi, one of the speakers mentioned
edged the threat and are now beginning to produce
something that I was vaguely aware of as a threat.
software that can detect and destroy the rootkits on
The threat is considered as a silent attempt to invade our computers. The software is still in its infancy,
our computers for the purposes of installing viruses, and lacks the ease of use, automation, and attractive
Trojans, worms, or other malware devices. This
graphical interfaces that we are used to with our
silent threat may be used by terrorists to launch a
antivirus software. It is inevitable that as word of the
coordinated attack on our infrastructure, steal our
rootkit threat spreads, and more computers are
personal information, or otherwise wreak havoc. So identified as having stealthy rootkits hiding viruses
insidious is this threat that it would sound like the
and other threats, that the small current crop of
content of an urban legend, yet it is documented as
rootkit detecting software will improve, and other
real. Imagine a threat that would be undetected by
competitors, probably the major antivirus vendors,
the current antivirus, firewall, and anti-spyware
will join the fight. If rootkit technology continues to
software, yet be so powerful as to effectively take
spread, the current crop of generally excellent
over our computers, without our knowledge. This
computer security suites from the likes of Symantec
threat, formerly considered solely as an unproven
(Norton), McAfee, Panda, TrendMicro, and others
concept, is now known to be real. This threat is
will be forced to add rootkit protection to their
also now implicated in taking over countless comrespective suites, or face competitive obsolescence.
puters. This contemporary threat is known by the
Fortunately for us, there are a few rootkit detecinnocuous term “Rootkit”.
tors already available, mostly for free! This first
A rootkit is defined on the Sysinternals website
generation of products still needs much refining to
as, “ … the mechanisms and techniques whereby
enable the average person to scan for rootkits with
malware, including viruses, spyware, and trojans,
ease, but they are still a very good first step. There
attempt to hide their presence from spyware
are a few rootkit detectors available which are
blockers, antivirus, and system management utilities. currently free. One “RootkitRevealer” is from a
There are several rootkit classifications depending
company known for its excellent and often free
on whether the malware survives reboot and
software, Sysinternals. This software uses a patentwhether it executes in user mode or kernel mode.”
pending technology to detect rootkits, and is curThe security software company F-Secure expands
rently available for download at
the definition with, “Rootkits for Windows work in a www.sysinternals.com/ntw2k/freeware/
different way and are typically used to hide malicious rootkitreveal.shtml. RootkitRevealer will run on
software from for example an antivirus scanner.
almost any Microsoft operating system, NT4 and
Rootkits are typically not malicious by themselves
later, which includes Windows 2000, and XP.
but are used for malicious purposes by viruses,
Another rootkit detector is from F-Secure, a
worms, backdoors and spyware. A virus combined
Tid Bits N’ Bytes
well-known computer security company headquartered in Finland, with offices in the US and elsewhere. F-Secure’s product is “Blacklight”, available
as a free beta (pre-release) version until July 1.
Blacklight can be downloaded at www.fsecure.com/blacklight.
I have recently tried both products, and I personally found Blacklight the easier to use. It seemed
effective at detecting and eliminating rootkits.
Microsoft will shortly be making available its
rootkit detector, the “Strider GhostBuster”, details at
research.microsoft.com/rootkit.
Persons unknown who wish to do us harm, either
at a personal level such as stealing our account
information and committing the crime of identity
theft, or the impersonal level, such as cyber terrorists
intent on shutting down our critical infrastructure,
may use the rootkit technology to bypass our
otherwise necessary defenses.
Until such time as the integrated computer security
suites catch up with this threat, I will now have to
add a rootkit detector to my recommended list of
essential computer security utilities, alongside
antivirus software, a good firewall, and a spyware
detector. It is also imperative that all four of these
utilities be frequently updated to ensure a reasonable
degree of personal security. We will also have to
add rootkits to our vernacular of cyber threats,
along with the now ubiquitous terms “virus”,
“spyware”, and “hacker”.
I shudder to wonder what may be coming down
the pike next.
The Editorial Committee of the Association of
Personal Computer User Groups (APCUG), an
international organization of which this group is
a member, brings this article to you.
August 2 0 0 5 / September 2 0 0 5 P a g e 2 8
continued from page 25
To covert the WAV files bring up your “Jukebox”
program. Go to “File” / “Convert”, then select your
Source folder that contains your music files. Select
“Source Data Type” and set to WAV, then click on
“Select all”. Next select your Destination folder and
select your “Destination Data Type” setting it to
MP3. Click on the start button and it will now make
MP3 files out of your selected WAV files.
After you are finished, Exit, go to your CD
recording program and record your MP3 files on a
CD as data files (do not make an audio CD), this
MP3-Data CD will now play in a DVD Player or
computer capable of having over 150 songs.
The Editorial Committee of the Association of
Personal Computer User Groups (APCUG), an
international organization of which this group is
a member, brings this article to you.
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 2 9
A ug us t 2 0 0 5
W i n n i p e g P C U s e r G ro u p C a l e n d a r o f E v e n t s
Sunday
M onday
Tue s day
We dne s day
1
2
Thurs day
Friday
3
4
Saturday
5
Inve s tme nt
Forum
Ins tall/Drop-In
Forum
7:00 p.m. - 9:00 p.m.
8
7
WPCUG Exe c
M e e ting
7:00 p.m. - 9:00 p.m.
14
9
10:00 a.m. - 4:00 p.m.
11
Windows Forum
Digital Imaging
Exce l XP Forum
7:00 p.m. - 9:00 p.m.
7:00 p.m. - 9:00 p.m.
7:00 p.m. - 9:00 p.m.
12
13
Compute r
Bas ics Forum
10:30 AM to 12:30 PM
15
16
M S Acce s s
Forum
7:00 p.m. - 9:00 p.m.
.7:00 p.m. - 9:00 p.m.
22
17
18
19
WPCUG
Powe r Point
Forum
21
10
6
Ins tall/Drop-In
Forum
Annual Picnic
6:30 PM at
Assiniboine Park
23
24
20
10:00 a.m. - 4:00 p.m.
25
26
27
Inte rne t/
Hardware Forum
10:30 a.m. - 11:30 a.m.
28
29
30
31
All Forums and Board me e tings are he ld at the Winnipe g PC Us e r Group Re s ource Ce ntre 337C Pe mbina Highway.
The Winnipe g PC Us e r Group Ge ne ral M e e ting is he ld at M ontros e School, M ontros e & Grant.
Note: The data on this page can change at the last minute.
Please check website, the weekly bulletin or phone before going to the session.
S e pt e mbe r 2 0 0 5
W i n n i p e g P C U s e r G ro u p C a l e n d a r o f E v e n t s
Sunday
M onday
Tue s day
We dne s day
Thurs day
Friday
1
Saturday
2
3
Ins tall/D rop-In
Forum
10:00 a.m. - 4:00 p.m.
5
4
6
Outlook Forum
Windows Forum
7:00 p.m. - 9:00 p.m.
7:00 p.m. - 9:00 p.m.
11
12
7
13
WPCUG
Exe cutive
M e e ting
8
9
10
Inve s tme nt
Forum
Compute r
Bas ics Forum
7:00 p.m. - 9:00 p.m.
10:30 AM to 12:30 PM
14
15
Linux Forum
Exce l XP Forum
7:00 p.m. - 9:00 p.m.
7:00 p.m. - 9:00 p.m.
16
17
Ins tall/D rop-In
Forum
10:00 a.m. - 4:00 p.m.
7:00 p.m. - 9:00 p.m.
18
19
Powe rPoint
Forum
21
Acce s s Forum
26
27
22
23
WPCUG
Ge ne ral M e e ting
cancelled for this month
7:00 p.m. - 9:00 p.m.
25
20
Inte rne t/
Hardware Forum
7:00 p.m. - 9:30 p.m.
at Re s ource Ce ntre
28
24
10:30 a.m. - 11:30 a.m.
29
30
All Forums and Board me e tings are he ld at the Winnipe g PC Us e r Group Re s ource Ce ntre 337C Pe mbina Highway.
NOTE: Winnipe g PC Us e r Group Ge ne ral M e e ting is he ld at M ontros e School, M ontros e & Grant.
Tid Bits N’ Bytes
August 2 0 0 5 / September 2 0 0 5 P a g e 3 0
Group Meeting Schedule
Regular meetings are held on the 3rd Thursday (2nd Thursday in December) of each month. Mark your calendar now
so you don’t miss any of the great sessions that will be
“happening” through all of 2003 & 2004.
Meetings are held in the Montrose School -- located at
691 Montrose St at Grant Avenue. Free parking,
wheelchair accessable. Call any member of the executive
for more information.
The General Meeting format is as follows:
6:30 p.m.
7:15 p.m.
8:30 p.m.
8:50 p.m.
9:30 p.m.
Doors open -- get aquainted
Main Presentation
Break
Question/Answers
Adjourn
Don’t miss it!
Winnipeg PC User’s Group Annual Picnic August 18, 2005
at the picnic grounds adjacent to the Pavilion.
Winnipeg PC User Group Inc.
August 2 0 0 5 / September 2 0 0 5 P a g e 3 1
W i n n i p e g P C U s e r G r o u p F o r u ms
b y R y a n R a p s o n , F o ru m C o o rd i n a t o r
Fo rums @ wpc us rg rp. o rg
A fo rum is a gro up o f me mb e rs who me e t to s ha re info rma tio n
o n to p ic s o f mutua l inte re s t, i. e . Be ginne r' s F o rum, Ha rd wa re
F o rum. M e mb e rs c a n he lp , a nd le a rn fro m e a c h o the r. Ea c h
fo rum ha s o ne o r two le a d e rs .
M e e ting Pla c e
Unle s s o the rwis e s ta te d , a ll F o rums me e t a t the Winnip e g P C
Us e r Gro up Re s o urc e C e ntre a t 3 3 7 C P e mb ina Highwa y
(P e mb ina Highwa y a t F le e t S tre e t).
And N o w . . . He re a re the Fo rums
(lis te d a lp ha b e tic a lly)
M icros oft Acce s s FORUM
Meets every third Tuesday of the month.
7:00 p.m. - 9:00 p.m.
Leader: Harve y Zimbe rg
Compute r Bas ics FORUM
Meets the s e cond Saturday of the month
10:30 a.m. - 12:30 p.m.
Leaders Barb Randle /Jim Roy
D ig ita l I ma g ing FOR UM
M e e ts the s e c o nd We dne s da y o f the mo nth.
7 :0 0 p . m. - 9 :0 0 p . m.
Le a d e r: N e il Lo ng muir
Exce l XP Forum
Meets the s e cond Thurs day of the month.
7 :0 0 p . m. - 9 :0 0 p . m.
Le a d e r : G l e n A s h
Ha rdwa re /I nte rne t FOR UM
M e e ts the fo urth S a turda y o f the mo nth
1 0 :3 0 a . m. - 1 2 :3 0 p . m.
Le a d e rs : J o n Phillips & Gre g M c Clure
I ns ta ll/D ro p-I n FOR UM
M e e ts 1 s t & 3 rd S a turda y s o f the mo nth.
1 0 :0 0 a . m. - 4 :0 0 p . m.
Le a d e rs : J o n Phillips a nd Gre g M c Clure
I ntro duc tio n to Co mpute rs - M e nto ring
O ne o n O ne M e nto ring is a va ila b le to ne w me mb e rs who ha ve
little o r no c o mp ute r s k ills . Yo u will b e ta ught the b a s ic s k ills to
he lp yo ur ge t up a nd running with yo ur c o mp ute r. The re is no
c ha rge fo r this s e rvic e . Yo u jus t ha ve to b e a me mb e r o f the
gro up . C a ll Ba rb a ra a t 6 6 7 - 6 4 7 4 to ma k e a rra nge me nts .
I nv e s tme nt FOR UM
M e e ts the firs t Thurs da y o f the mo nth
7 :0 0 p . m. - 9 :0 0 p . m.
Le a d e r: Art Ca v e na g h
Linux FOR UM
M e e ts the third Tue s da y o f the mo nth
7 :0 0 p . m. - 9 :0 0 p . m.
Inte rim Le a d e r: B ria n Lo we
Windo ws FOR UM
M e e ts the s e c o nd Tue s da y o f the mo nth
7 :0 0 p . m. - 9 :0 0 p . m.
Le a d e r: M y le s M unro
Al l f o r u m s a r e s u b j e c t t o l a s t m i n u t e c a n c e l l a t i o n !
P le a s e r e a d t h e U G w e e k ly e - m a il " b la s t " o r v is it
o u r w e b s it e t o v ie w o u r m o n t h ly F o r u m C a le n d a r s !
Internet Access Form
Complete and return with $15.96
[ $ 14 monthly fee (first month’s fee) + $1.96 (PST & GST)]
To:
Winnipeg PC User Group
c/o Internet Subscriptions,
337C Pembina Highway
Winnipeg, Manitoba R3L 2E4
Name: (Last, First, Middle Initial)
Home Address:
City:
Postal Code:
Home Phone:
Business Phone:
PC User Group Membership Number:
Bill Method::
Pre Pay
Visa
Mastercard
Card #:____________________________________
Expiry Date (Mo/Yr) ____/____
Direct withdrawl from bank account (provide a
sample void cheque)
____________ _______________ ______________
Bank
Branch
Account
I authorize the Winnipeg PC User Group to charge my
bank account monthly for my use of the WPCUG
Internet Service.
Signature:______________________ Date:_________
Parental/Guardian signature required for members under 18.
__________________________________________
49K+
Connects!
August 2 0 0 5 / September 2 0 0 5 P a g e 3 2
WPCUG
Tid Bits N’ Bytes
Internet Service
“Let us connect you to the world!”
WPCUG
Winnipeg PC User Group Inc.
Need help getting set up?
Call ahead and bring your
PC to the
Resource Center
for “hands on” help.
People Helping People Use Computers Since 1982
**
0
n
** TUP
SE E!!
FE
þ *40* hours/month FREE
þ V.90 Support
þ PPP dial up access
þ Guaranteed user/modem
ratio of 15:1
þ 2 MB of disk space
for your own home page
þ Full Telnet shell access to
maintain your home page
þ Unlimited technical support
via e-mail, phone, Web BBS
and the Resource Center
þ Your own e-mail address
JUST $14*/Month!!
$0.25/hr after 40 hours
Maximum
billing of
*
$20 /month
(*Plus PST/GST)
Make a one time payment
of $192 (plus taxes)
and get UNLIMITED ISP
Access for a year!
We run on a cost recovery
basis. Every dollar goes to
improve, not just the Internet
Service, but all the other
services the User Group
provides as well.
If it weren't for the ISP, the RC
would close its doors!
Please remember that the Internet Service is a
cooperative effort. Give others a chance to
connect. Hang up when you are not actively using
the Internet! Thanks!!!
Make the RIGHT connection so YOU
don’t end up like this!