Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Enable ShadowCopy On Home Editions / XP

From time to time Vista creates ’snapshot’ copies of your files with a service called “Shadow Copy”.  This allows you to retrieve older versions of files you accidentally delete or alter.

To go back to a prior version of your file/document, you simply right-click on the file and select “Restore previous versions”, which can get you out of some nasty jams. (For more on recovering deleted files, click here.)

Shadow Copy is enabled on all versions  of Vista, but Microsoft grants user access to these copies only in the Ultimate, Business, and Enterprise editions. (Clearly as a method to try to sell more copies of the pricier Ultimate Edition.)

Tip of the day: Users of the “Home” editions of Vista can use Shadow Copy too.
The odds are pretty good that if you bought a new computer, and it came with Vista, it came with Vista Home Premium. I say that because if you walk into a store selling computers, I dare you to find the one that has Ultimate Edition on it. It seems to me that they all come with Home Premium!

Remember how I said Shadow Copy was “enabled” on all versions? Yes? Well, for owners of Vista Home Premium and Vista Home Basic, the service is running, but you need a way to “interface” with it (sometimes called a “front end”). To do that, download and install ShadowExplorer, and gain some of Ultimate Edition’s functionality. This cool piece of software is free, but donations are accepted.

Today’s free link: People who are using Windows 2000 or XP can get an almost identical file functionality with FileHamster from Mogware. This program is designed for people whose talents lie in the Creative Arts, so you don’t ave to be a geek to use it. There’s helpful user forums, too.

Please note: This ability is by no means a substitute for regular system backups. This is for small “oopsies”, not recovery/restoration.

Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix

Share this post :

December 30, 2008 Posted by | advice, Backups, computers, file system, how to, missing files, PC, performance, software, tech, tweaks, Vista, Windows | , , , , , , , , , , , , , , , , , , | 4 Comments

Securing Cyberspace for the 44th President

Folks, the Center for Strategic and International Studies (a “think-tank” which advises Presidents on issues of national security) has released its final report, “Securing Cyberspace for the 44th Presidency.” The Commission’s three major findings are:

  1. Cybersecurity is now one of the major national security problems facing the United States;
  2. Decisions and actions must respect American values related to privacy and civil liberties; and
  3. Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.

The report is available as a PDF, here.

It’s nice to have such high-powered folks confirm what I’ve been saying, and maybe there’s hope that the next President will realize that no economy can be bleed of $10 – $105 billion dollars a year.. (estimates vary, as so much is unreported.) I wonder how long it will take to implement a comprehensive international policy?
(And, an old saw about horses and barn doors comes to mind..)

Today’s free link: Do you think your computer is clean? Don’t be part of the problem, please read Our Modern Nightmare – Zombie Attack and note the Top 10 Things You Can Do To Your Computer link (towards the bottom).

Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix

Share this post :

December 29, 2008 Posted by | advice, computers, cyber crime | 1 Comment

A must read

Folks, a quick Recommended Reading link. I agree with the premise, but I also believe in the “layered defense” offered by an Internet security suite.

Following two simple rules will make your home computer much safer. Roger Grimes lays out the facts on computer security for home and business computing.

Click here, The only two things you need to know about home computer security

December 26, 2008 Posted by | advice, anti-spyware, antivirus, computers, cyber crime, hackers, Internet, kids and the Internet, security, tech | Leave a comment

New PC? Migrate Your User Account The Easy Way

[note: Microsoft has since removed the utility, Windows Easy Transfer Companion. Apparently, it doesn’t work on Vista SP1, and/or XP SP3. No word on when it might be made available again. I regret this, and hope Microsoft will correct this soon.]

For those of you who have ever used a User State Migration Tool, or Easy Files and Settings Transfer tool, to migrate your data from an old computer to your new computer — or purchased a special program, or cable — you know that getting your new machine exactly as you had your old machine required some time and effort.

The other day, the proud owner of a new laptop wanted me to replicate his XP set up onto the new Vista machine, and the usual method has been to to use one of the techniques mentioned in the paragraph above. But I didn’t. I used an adjunct to Window’s (built-in) Easy Files and Settings Transfer tool (which will be today’s free link).

* Those of you who want to use your LAN may want to read Add a Vista machine to your XP network

I downloaded this program to both his XP machine and the new Vista machine. Then I connected his XP machine via wireless. Surprise! The XP machine was instantly seen and recognized. Then I launched the Windows Easy Transfer Companion on the Vista PC and followed the wizard. The two machines established a “transfer” connection and the XP machine transferred its installed programs, and all the files, and all of the owners tweaks and settings (like bookmarks, and custom toolbars).

All I did was watch. This was, by far, the fastest and easiest user state migration I’ve ever experienced, and truly was painless. This is bad for a PC Tech’s bottom line, but great for Vista owners.

Today’s free link: When you buy a new PC, you will almost certainly want to transfer all kinds of things from the machine you’ve been using to the new one. Microsoft has “a companion” for the Easy Files and Settings Transfer tool called the Windows Easy Transfer Companion. It is actually a ‘stand-alone’. This tool not only transfers your documents and personalized Settings tweaks, but the programs you have installed. This is a huge time saver. I did my transfer over the local network, but you can use the other methods of data storage to make the transfer as well– including USB thumb drives. [Note: while Microsoft still considers this program to be in beta, I have experienced absolutely no hiccups or difficulties at all.]

Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

December 25, 2008 Posted by | advice, computers, file system, how to, PC, Plug and Play, tech, Vista | , , , , , , , , | 3 Comments

greeetchristmas-decoration

Photographer: Ian Britton

December 24, 2008 Posted by | computers | Leave a comment

A Brief History – Holiday Edition

Over the 500+ articles I have written, I have tried to help educate people about the dangers we face in this era of ‘always-on’ Internet connections — such as hackers, cyber-criminals, phishing, and malware — and offered advice on how to get protected.
Yesterday, and continuing on into today, I have been assisting a client in trying to rid their machine of malware
(trojans, worms, etc.) infections and to do so short of wiping their drive and starting over. Part of this person’s problem was they were tricked (scared may be a better word) into installing a rogue anti-spyware program.. which in fact infected their machine. So I have decided that I will re-post my article on such applications, in case you missed it the first time. Originally titled “25 years since the first virus”, it appeared 9/12/07–

Time marches on.. twenty five years ago a High School freshman wrote the first “true” virus, and distributed it to his friends (via floppy disk) as a practical joke. That the “Elk Cloner” virus was harmless, and the young man went on to become a heavyweight in the computing industry, allows us to bear him no ill will. If it hadn’t have been him, it would’ve been someone else; there were “experimental” viruses written before his.

Those of you who have been around for a while may remember the evolution of viruses: from a harmless prank to system destroyers to profit-centric spyware. Security experts generally agree to the important historical malware events as being as follows: Elk Cloner, 1982; Brain, 1986; Morris, 1988; Melissa, 1999; Love Bug, 2000 (aka ILOVEYOU); Code Red, 2001; Blaster, 2003; and Sasser, 2004. (For a much more complete history of viruses, worms, and trojans, click here.) (Today, we have the Storm worm in the news.)

Today, the business of keeping data and communications safe from viruses and other malware is a $38 billion dollar industry.. and growing. Yes, a lot has changed in twenty five years: I have gray in my hair now, for one.

Tip of the day: Beware of “rogue” anti-spyware programs (aka “scareware”). There is so much money to be made off of stealing corporate data, identities, and sending spam that the malware writers (hackers) have created spyware that claims to prevent spyware. You think you’re installing a spyware remover, but you’re not. You are actually installing their malware.
Some claim to give you an anti-spyware scan for free, and they “discover” a critical infection (again bogus) which, if you buy the “Professional” version, they’ll clean up for you. Please, Dear Reader, never fall for this.

There are, literally, hundreds of these  rogues, and they’re designed to appear as legit products in every way.They have websites, and “user reviews”, etc. The quality anti-spyware programs are well-known and are routinely rated and compared by reputable sources like PC World and PC Magazine and C/Net.
[Note: there is an excellent list of know rogue anti-spyware apps posted on Spyware Warrior.]

One such program is currently sending a few people my way for assistance, named Spy Shredder. There is plenty about this nasty on the Internet. Most reputable anti-spyware utilities will detect and remove this (see today’s free link as well) item. The people infected with it (who contacted me) had no protections except an antivirus, and it was kind of hard to feel sorry for them. There is no excuse, in this day and age, to not be running Internet Security programs. Full Internet Security Suites are easy to find that are free after rebate, after all.

For those of you looking here to find out how to remove Spy Shredder, I suggest you click on the word “anti-spyware” in my Tag Cloud, download and run the anti-spyware programs I have suggested in the “Today’s free links” area (always at the bottom of Tech-for Everyone articles), as well as today’s — do not try the manual removal methods found at other websites unless you’re a skilled and experienced Registry editor.

[Update 4/5/08: Bill Mullins has just posted a wonderful article on rogue anti-spyware programs which includes a list of known villains, and a tool useful for removing them (prevention is better, but..). http://billmullins.wordpress.com/2008/04/05/don%e2%80%99t-download-antispywaremaster-%e2%80%93-rogue-security-software/. I also recommend looking at his How Fake/Rogue Software Affects Real People]

Today’s free link: SpyCatcher Express from Tenebril. From website:

  • Allows novice PC users to remove aggressive spyware
  • Stops next-generation, mutating spyware
  • Blocks reinstallation of aggressive spyware
  • Removes spyware safely and automatically 

    Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix

  • Share this post :

    December 23, 2008 Posted by | advice, anti-spyware, antivirus, computers, cyber crime, hackers, how to, Internet scam, PC, security, software, tech | 4 Comments

    Word Trick Makes Letters Merrier

    It is the Holiday time of year. (Is it just me, or did 2008 pass-by rather quickly?) Today I’m going to demonstrate some tricks to make your Season’s Greetings letters more joyous, and your docs more visually interesting.

    Tip of the day: Add some festivity to your documents with fonts and color. MS Word has a lot of features and options built into it that allows for some very creative elements to be added to your correspondence, and is not at all limited to cold, “professional” documents. I’ll use Word for this demo, but you can do this in most text editors, and e-mail composers.

    Today I’m going to use a hypothetical holiday greeting letter to show how to add some fun. By default, Word sets the font to Times New Roman at 12 “points” in height. I have typed in my text, to get things started, and will demonstrate using this letter’s “opener”. As it is a header, I have “centered” the text. 1.jpg As you can see, this font and text does not quite convey the joy and cheer and “best wishes” I am hoping to express. In fact, this may as well say, “Memo from Giganti Corp.” Yawn! So first thing I’m going to do is ‘tweak’ the font style, and make some word bigger (louder), to express a less formal tone. 2.jpg I “highlighted” Season’s Greetings, and used the Font drop-down arrow and selected a cursive font– Lucida Handwriting (explore Words various fonts, and find the one you like best). I set the point size to 36. I repeated the process on the second sentence, but set the type smaller.. only 18. I think you’ll agree, this is much more “friendly” than the default’s look. But this is just not Festive enough! Let’s use some color and improve things some more. 3.jpg I have again “highlighted” season’s greetings to select this font, and then clicked the Font Color button on the Formatting toolbar (If this is not showing, click here to read how to customize your toolbars). I then clicked on the little red box in the color-picker. Now season’s greetings is red. I want to alternate letters in green, so I hold down the Ctrl key and use my mouse to “select” every other letter. 4.jpg I didn’t really like the greens available on the color-picker, so I clicked on “More Colors”…. 5.jpg … and selected a green that contrasted nicely with the red– as the box in the lower right corner shows. This is the result of these steps. 6.jpg Much more jolly! But, something’s missing… dpress.com/files/2007/11/9.jpg”>9.jpg Let’s add one more thing– a picture of a candy cane. I went on the Internet and found a Royalty-free graphic (though a piece of Clip Art would do just as nicely) and…10.jpgVoila!I could ‘go crazy’, and get carried away with adding things here… but I hope you will be able to see by this little demonstration — using only two of Word’s functions — that you are limited only by your own creativity, and that it’s easy to personalize and ‘spice up’ your documents.

    Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix

    Share this post :

    December 21, 2008 Posted by | advice, computers, how to, MS Word, tech, tweaks, word processors | , , , , , , , , , , , , , , , | 2 Comments