The question I am most frequently asked – when folks learn I have an Android smart phone – is “how is the typing?” (They ask that when tablets/iPads get mentioned, too.)
click to see how this image was made in photoshop (tutorial)
Sometimes, this question comes from Blackberry owners, or others whose phones have some kind of mini-keyboard (buttons). These folks are used to “texting” by “thumb-typing”, and some of them are .. um, leery of the “on screen” keyboard. With a “touchscreen” it is true, you do not get the tactile feedback that you do with buttons.
Other times, the person asking has managed to avoid the whole “smart phone” scene, but now that they have seen all the ads on TV for the new 4G world of Internet on your phone, and Androids and iPhones, now have a keener interest.
When I am asked, I tell them that I don’t “type” on my Android — I either talk to it (voice recognition) or “Swype” on it. People want to know if voice recognition, and touch screen typing work properly, or if it is buggy. In my experience with my HTC, running Android 2.2, I would have to say, yes, neither voice recognition nor Swype get it right all the time – 100% – no errors. But I am amazed at how infrequently I have to correct it. And I suspect each feature will only get better as they mature.
Instead of trying to explain what “swype-ing” is, I suggest watching this brief video. (It explains it better than I can.)
unrelated (fun): Been to Google yet today? Very cool mod to the homepage today.. to see it, click here.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
A Reader Asks a Very Good Question About the “Recovery Partition”..
Q: Paul,
When I open up the My Computer icon on my desktop to check my hard drive, the recovery disk is usually close to 2/3’s full and it is in GB. Is this a drive I want to do anything with? I have plenty of drive space on my C drive but this takes 3-4GB of space.
What is the recovery drive for and should I try to recover the the disk space it uses?
A: When you click on “Computer” (or, “My Computer” in XP) an explorer window will open showing the storage devices (aka “drives”) attached to your computer (storage “memory”). These storage areas will be assigned a “drive letter”, and usually start with the area which contains the Windows operating system and is responsible for “booting” your computer — labeled drive “C:” Why doesn’t it start with “A:“? Well, back in the day, it did. Long ago, computers came with A and B drives – which were 5.25” ‘floppy’ drives (which contained the operating system. Windows didn’t exist yet). When the first “hard” drive came along, it had to go next in line.. thus C:\ (c: equated to “hard disk” [with a “k”]). Eventually, operating systems were designed to run from “hard” disks, and – eventually – “floppies” went the way of the T-rex. (But “hard disk” still equates with “c””)
I digress, but! I need to keep talking about computer history/evolution for just a bit longer. Long ago, computers used to come with CD’s. Either a Windows CD or a Windows CD relabeled by the manufacturer to something like “Dell Recovery Disc”. These were used in the sad case of really bad errors crashing the computer, and tech support told you you had to “reinstall Windows”.
(Sometimes called “disaster recovery”)
At some point in time, some brick-headed, idjit barnacle of a CEO made the absolutely dumbest decision ever made by Man — in the hopes that they could save 3¢ per computer sold. (Can you guess what I would say to this *person* if I met them?) They decided to do away with the Recovery CD and instead put those files on a special section (called a “partition“) of the hard disk — which came to be Drive D:\ (aka “the ‘recovery partition’)… the topic today. Ahem, sorry.
Back to the topic: When you first start up your computer (aka “boot up”) you will see a drab screen that says something to the effect of “Press F11 to recover your computer” (or some F key.. maybe F10, maybe F2..) This function is used in the sad case of really bad errors crashing the computer, and tech support tells you you have to “reinstall Windows”. (Sometimes called “disaster recovery”)
This “recovery process” will wipe (aka “erase”, aka “delete”) your C:\ drive, and copy the “image” stored on D:\ over to there — thus returning your PC to “factory condition”.. complete with crapware, such as Connect to AOL and Polar Penguins, and minus all your installed programs, updates, and … files.
You do have a backup copy of all those.. right?
This disaster of a disaster recovery method was not necessarily the case if you had/have a disc. Which is why the CEO mentioned above is a jackass. And why you want to read, Windows 7 Owners, You Want To Do This…
Answer the question, Paul:Okay okay okay
The drive D: aka “Recovery” is a special, protected area, which contains the files necessary to restore your computer to factory defaults. You cannot modify it. Short version: Pretend it isn’t there, and … hope you never need it.
(If you are eyeballing that ‘open space’ because you have filled up your C:\ drive.. well, no. What you need to do is install additional storage [ aka “upgrade” ] and/or go in and remove stuff from C:\)
“Ever received messages from your Facebook friends containing a notice or invitation, such as an invitation to visit a particular site, added with an interesting message, like “Hey watch this, so cool!”? In most cases, the recipient of the message will be happy to follow it, especially if the message was sent by one of your best friends, which you trust. However, did you ever think that it could be sent by an intruder, spam, or even viruses?
Like yesterday, one of my friends received a “surprise” from Facebook, but then soon realized that his computer was now infected with the trojan, as well as making it a “spam machine.””
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
This installs a “rogue” anti-malware application. This video from security firm Panda Security shows exactly how this is done, and in this case, the criminal is trying to install MS Antispyware 2009.. which is just one of the thousands of these “rogues”.
I highly recommend that you watch it, as it is showing you two (increasingly common) attacks.. and exactly how a “rogue” looks and acts.
Please note: I have one, MAJOR, complaint about this video: it pretty much says that if you have an up-to-date anti-malware (such as an antivirus) on board, you’ll be protected from these things. WRONG! Once you click the links, ignore the the warnings, and click “Run”.. you’re hosed. (And you did it to yourself.)
Telling your machine to ‘run it’ bypasses all your protections.. even Vista’s annoying UAC.
Today’s free download(s): The best defense is to NOT click “Run” when you’re not sure. But there are tools you can add to your web browser to help you detect and avoid these poisoned websites in the first place — known as “anti-phishing”. I suggest installing both: WOT: (Web Of Trust) is a free Internet security add-on for your browser. It will help keep you safer from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky Website. It’s easy and it’s free. Link Scanner Lite: Automatically inspect search results for exploits, hacked sites, fraud/crimeware, and other online threats. Includes right-click, on-demand scanning of any URL you choose.
I am a Retired computer & network technician. I used to think the machines were pretty cool. Now I don’t.
They’re anything but.
I regularly posted how-to’s and tricks & tips and general computing advice here starting in 2007. (Use the Search tool to find answers. But be aware, many are rather dated.) Sometimes I answered (your) specific questions in an article if I believed the answer was generally helpful to “everyone”. All the writing you see was my own, typos and all. There always is/was an implied “IMHO” in what you see here.
Note: You are responsible for using this blog and its content. I am in no way liable for any losses caused by user error, viruses and/or other malware, hardware or software failure, or any other conceivable reason.
Say "thank you!" Buy Tech Paul a cup of coffee (and keep T4E ad free).
McAfee® Cybersafety Resource Portal, an online help center designed to assist victims of computer crime and provide information on how to avoid becoming a victim.
BELIEVE while others are doubting. PLAN while others are playing. STUDY while others are sleeping. DECIDE while others are delaying. PREPARE while others are daydreaming. BEGIN while others are procrastinating. WORK while others are wishing. SAVE while others are wasting. LISTEN while others are talking. SMILE while others are frowning. COMMEND while others are criticizing. PERSIST while others are quitting.