Beware of Charity Scams. To use an old Ragonism, "Trust, but verify".

Useful Websites:

Confusing Words is a collection of 3210 words that are troublesome to readers and writers.
FILExt is a detailed database of file extensions and programs that use them.
eHow.com - How-to manuals
ProcessLibrary.com
Answers.com
How Stuff Works

VCR Repair Instruction
Identity Theft a Five Step Stop Plan

The Geekend Dictionary:
HelpDesk [ 'help-desk ]
1. IT euphemism for slave labor. 
2. The first circle of computer hell.
3. The last line of defense between idiot product managers and idiot users.

Tips-n-Tricks:
Bo's Windows XP Performance Tips n Tricks
Bo's Windows XP Performance Tips n Tricks

 

Featured Freeware:
Windows Defender Beta 2
Microsoft Joins the Anti-Spyware group
Defender to replace Microsoft Windows Antispyware beta.

Microsoft PowerToys for Windows XP
MSN Messenger 7.5 for Windows
Microsoft Baseline Security Analyzer 2.0
Windows Media Encoder 9 Series
Microsoft's Malicious Software Removal Tool
Windows® Defender (Beta 2) 

Got Windows?
Windows XP SP-2, what you should know!
Your Next Gen OS, Vista, Code Named Longhorn

Computing & Security:
Virus Alerts
Going Phishing? Hackers are. See more on this type of scam here
Free Firewalls

Browsing:
Firefox Version 2.0 Beta Candidate Released
Firefox 1.5, available free via download 
Microsoft Internet Explorer 7.0 Beta
Netscape 8.1 now available with enhanced security features 
Alternative Browser's To MSIE due to IE flaws
How To's
Use these four Registry tweaks to accelerate Windows XP
10 things you should know about PowerPoint abuse
Who hasn't sat through a badly constructed, poorly delivered presentation? This list will help you avoid some of the most commonly made PowerPoint blunders.

"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety. "
                              Benjamin Franklin
Memoires De La Vie Privee or The Private Life of the Late Benjamin Franklin

Got a Problem?

Maybe we can help

| Computing News you can UseComputing News Quick Clicks |
Albion
| Freeware | Freeware From A-Z | Search this site | Security | Virus Information | Updated 11/05/09 | Disclaimer |

Menus - Open a folder for associated links

   Mission statement      Computing News Quick Clicks  Go to The Page Index

Computing News you can use







Check out the latest updates for your Windows product

10+ essential (and free) Windows applications

Copy an Excel chart to the desired spot in a Word document
Mary Ann Richardson: You can protect your formatting by creating a table cell as a placeholder for the chart in your Word document.

redarrow

Firefox Vulnerable Through Old QuickTime Bug
Mozilla is just now getting around to fixing a vulnerability in the interaction between Apple's QuickTime and Firefox that was reported a year ago. Read this story

Hacked .gov Sites
A security company has identified government web sites unwittingly serving malware. Read this story

 DriveImage XML

DriveImage XML Upgrading to Windows 7 and need to backup your system? With DriveImage XML, you'll never again be stuck with a useless backup. Using Microsoft's Volume Shadow Services (VSS), you can create safe "hot images" of your system even while you work. Images are stored as XML files and you can restore them to your drive without having to reboot.
License: Free
OS: Windows

LogMeIn can control some PCs, even when off

How can you be sure your data is safe when off doesn't mean inaccessible? A remote-control technology that is part of Intel's VPro architecture raises some security questions.
redarrow Microsoft to release free security software soon
redarrow Reducing threats for Net-linked security cameras, ATMs
redarrow LogMeIn can control some PCs, even when off
redarrow Google Apps bug: You've got (my) mail
redarrow Why virus writers are turning to open source

 

How to troubleshoot a computer problem

Video Feed | What steps do you go through in order to diagnose a computer problem? There's more than one correct answer, of course, but here's one way to work through the troubleshooting thought-process. redarrowredarrowRead more

Tech Republic's most popular Windows XP resources

Bo's How To's:

Geekend Windows product keyChange the product key on Windows XP
Even in the most carefully managed shops, software tends to get installed without authorization, and so from time to time you may need to reset the Microsoft Windows XP product key. Brien Posey shows you two effective ways to change the Windows XP product key: editing the registry and using a Microsoft WMI script. | TechRepublic

News From the Major Computing News Magazines:


Computing News Quick clicks
From Around the Web


Reports from; C|Net.com, ZDNet.com, MSNBC.com,
PcWorld.com, & Others

Shortcut For Maximizing a Window

This tip should save you some time throughout the day. If you ever need to maximize a window of some sort, don't fumble around looking for the maximize button in the upper right corner of the window. Just double click on the title bar instead. You won't have to worry about being precise for fear of hitting the close or minimize buttons instead.

 

3 stubborn PC problems you can fix

Ever notice how each PC has a personality of its own? Or maybe even multiple personalities? In the course of a week, your computer may act friendly, moody, and sometimes downright mean. These tips, from Microsoft's How Tos may be just what you're looking for.

You keep getting a Your system is running low on virtual memory message You keep getting a Your system is running low on virtual memory message
Your windows slide off the desktop . . . and you can’t grab them Your windows slide off the desktop . . . and you can’t grab them
Your taskbar has disappeared Your taskbar has disappeared
Artificial brains for robots?
Roland Piquepaille: An international team of European researchers has implanted an artificial cerebellum -- the portion of the brain that controls motor functions -- inside a robotic system.
READ FULL STORY | ZDNet.com


How Microsoft puts your data at risk
Robin Harris: Data loss is painful and all too common. Why? Because your file system stinks. Microsoft's NTFS (used in XP & Vista) with its de facto monopoly is the worst offender. But Apple and Linux aren't any better.
READ FULL STORY | ZDNet.com

Customization tricks to save you time in Windows XP
From adding Safe Mode to the Boot menu to including UNC information in the command prompt to displaying My Computer as a menu of drive options, these tips will give you some great ideas about how to tweak WinXP to help you work more efficiently.

Want more? See Bo's How to Pages One & Two


The best things in life are free:
Featured Freeware:

ZoneAlarm 6.1.737 - Freeware
ZoneAlarm 6.1.737Protect your Internet connection from hackers and other security breaches.
OS:
Windows 98/NT/2000/XP


HijackThis 2 - Freeware Remove spyware by listing the content of key areas of the Registry and hard drive -- areas that are used by hijackers.
OS: Windows (all)

CCleaner 1.29.295 - FreewareClean up junk files and invalid Registry entries from your system, allowing it to run faster and more efficiently.
OS: Windows (all)

McAfee SiteAdvisor for Internet Explorer - Freeware
McAfee SiteAdvisor for Internet Explorer
security threats including spyware, adware, spam, viruses, browser exploits, phishing, online fraud, and identity theft.
OS: Windows 2000/XP

7.52 MB
Trusted by 35 Million Users to Care for Their PCs

A comprehensive PC maintenance tool with a one-click approach to optimize system, clean registry, repair and speed up your computer –– with daily use.
Mercora IM Radio 5 - Freeware

Mercora IM Radio 5Search, listen, and record any music legally from thousands of radio channels.
OS: Windows 2000/XP/2003 Server

101 Microsoft Windows XP Tips, Tweaks, and Hacks

101 Microsoft Windows XP Tips, Tweaks, and Hacks These tips will help you achieve better performance, troubleshoot problems, and properly configure your Windows XP system. You'll find many tweaks and hacks to customize all aspects of Windows XP to suit your needs.


Bo's Featured Freeware Front Page | Microsoft Office Addons for Free

Important Updat

Microsoft Patches, Collect them all...impress your friends!
Bo's Microsoft Bug of the Month Bo's Security Updates by the Month

Check out Bo's Recent Virus List  Check out some Security Freeware

 

Digitally-Signed Malware
We've got another case of malware being digitally signed. What does it mean for the usefulness of this technique? 
Read this story | PCMag.com  

Defendants Convicted in 1st Criminal CAN-SPAM Trial
In what could be a highly-significant case, the perpetrators of a fairly big spam operation have been convicted of violating the CAN-SPAM statute. 
Read this story | PCMag.com  

Peer-to-Peer Predator Pinched
Seattle Resident Gregory Kopiloff was arrested for identity theft and related fraudulent activities related to his abuse of peer-to-peer networks. 
Read this story | PCMag.com  

Spam that just might kill you
Those who patronize unsolicited online pharmacies risk not only possible identity theft, but their personal health as well, thanks to counterfeit medications. CNET editor Robert Vamosi looks into the consequences of responding to pharmacy spam and reminds us that if the prices are too good to be true, chances are you're not getting the legitimate drugs you're supposed to be taking.
When is it safe to order drugs online?
 More on spam 'brandjacking'
 News: Net drug dealer gets 30 years in prison
 All Security Watch columns

SECURITY: Beware Malicious RTF Files
There's a mailware threat lurking that's been under our noses for years, lying wait in embedded RTF files. Have you been hit?

Vinoo Thomas of McAfee's Avert Labs stumbled onto a malware issue that has been sitting under our noses for years: embedded objects in RTF, or Rich Text Format files. (He writes about it here www.avertlabs.com/research/blog/index.php/2007/05/ 25/rich-text-malware.)

Threats

DOWNLOAD

Innobate Product Key Recovery - Freeware
Recover and backup your Windows product keys.

Security Freeware
IObit Security 360™ 100% Freeware
Download | 8.54 MB
Scan and Remove the Deepest Malware that Your Antivirus/AntiSpy Missed

IObit Security 360 is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers

For more on computing and security news, click here


Security Freeware Worth Your Download Time:

Spamfighter 4.3.7 - Freeware
Spamfighter 4.3.7Filter spam from your Microsoft Outlook or Outlook Express inbox. Simple, reliable, and efficient.
OS: Windows 98/Me/NT/2000/XP
Fake Antispyware
Fake antispyware software has been a problem for years, and this week we have two new examples. BraveSentry hits all the hot buttons: drive-by installs, false positives, and exaggerated claims in advertising. Read about it in the Fake Antispyware section. Read this story | PC/Mag

Family Matters:

Dangers children face online
A recent study found that one in five children online is approached by a sexual predator, a predator who may try to set up a face-to-face meeting. In a Dateline hidden camera investigation, correspondent Chris Hansen catches some of these men in the act. http://www.msnbc.msn.com/id/6083442/

Parents shaky about kids' safety online
special feature Most parents say they use monitoring software or content-filtering tools, according to new study.
C|Net | Read full story

More protection through freeware
ParentalControl Bar is an add-on for Internet Explorer that helps parents prevent their children from accessing adult-oriented Web sites. It comes with a set of pre-defined filters based on sexual material, strong language, violence, and other criteria, allowing the parent to select the appropriate filtering options for their kid. 

You can also add your own sites to a blocking list, or allow specific sites by simply clicking a button in the newly added IE toolbar. The current version only works with Internet Explorer. Click here to get your copy

For more Family Matters, click here....


Going Phishing? Hackers are.
When crooks go Phishing, don't bite:

Top Phish
Who wouldn't want to collect $20 just for answering a few questions in an online survey? Find out what you pay for your free money in this week's Top Phish. Read this story

For more on Phishing, Click Here....

If you use Microsoft Internet Explorer as your Main Browser, try PhishGuard a free service to detect scam sites.Not Reviewed
This week in phishing
Phishing attacks skyrocket in 2004
5 Steps For Users To Protect Themselves From Phishing Scams
Here are a few resources that you can check out to see what scams are running rampant, and how you can avoid them:

FDIC warns about e-mail 'phishing' scam

Internet ScamBusters
Avoiding Internet Scams
ScamWatch
Internet Scams - General Information

Go to
The Page Index


& How To's -

Tired of Elevator music from your tech support personnel? Then skip the always on hold dogma and come over to the light. Try:

Bohunky0's Tech Support Help Web
Latest Addition: 

Add Windows XP systems to Vista's Network Map with the LLTD Responder
Greg Shultz

Greg ShultzVista's new networking interface, the Network and SharingVista's new networking interface, the Network and Sharing Center, allows you to check your connection status, troubleshoot connection problems, and see a graphical view of how the computers and devices on your network connect via the Network Map -- but normally, it can only see Vista systems and devices. Here's how to add Windows XP to the Network Map and have Vista recognize it using LLTD Responder.

Clean Out Unused Device Drivers

More from Bo's Help and HowTo
Windows
Microsoft Office
The Browser Wars
Found a problem? click here
Go to The Page Index

Disclaimer

Questions and answers submitted to Bohunky0 or BLCOW are the property of Blaisdell's Little Corner of the Web and are not open for negotiation.

BLCOW reserves the right to edit, expand, or make clarification to any submissions to be used for instruction set without prior consent. News items are offered in capsulated form and is displayed under the American Freedom of Speech Amendment 1, and Citizens Freedom of Information Act (Citizens Right To Know Laws). If you feel your content was used improperly, please click here with an explanation and the location on this site of the questionable material. We will review, and in most cases, remove any content which is an infringement on intellectual or creative property. News snippets however, are not considered intellectual or creative property, they are considered News. If available, the site on which the news snippet was found, contains a link to that site's start or front page. We recognize that while we do not advertise or charge for space, others do and will never intentionally attempt to circumvent that right. It is up to the reader, rather or not, they wish to view the entire article.

No payment or sequesterment is asked for nor received on any of BLCOW content. It is free to view and free to use as long as we are showing these pages to the public. If there is something you would like to see on this site that has to do with computing, and isn't here now, why not drop us a line, maybe we can help. Click here

BLCOW is a family oriented site and is safe for use by anyone. Unfortunately, many of our pages are linked to off-site content. On occasion, these links may be sold to another party. The purchasing party may be porn sites or even hate group sites. We make every effort to monitor some links but unfortunately, some slip by us from time to time. We depend on your reports to keep this site safe and acknowledge that this would be impossible without your help. If you find objectionable content on this site, please drop us a line and let us know about it. We will make every effort to either rewrite the content or dispose of it. To tell us of objectionable material, please click here and tell us on what part of the site you found the material. Also, please copy and paste the material into the email form you will receive by clicking on the above link. The subject header is designed to alert our server of questionable material and is given top priority when it arrives in our inbox. We then pay strict attention to that email. In that light, please do not alter the subject header. Thanks, Bo.

Attention Telemarketers:

I do not allow organizations to use my name or to contact me to make solicitations other than as permitted in my Junkbusters Declaration.

Version Dec 7 Copyright © 2001 Larry Blaisdell

| Try Bohunky0's Tech Support Help Web | Bo Explains Internet Security Needs | Bo's Requested Conversions
Go to
The Page Index |

You are visitor Number 

FastCounter by bCentral
As of November 1999

Bohunky0's Nature Tip
Preserve Nature
Pickle a Squirrel Today

Return to Comp. News Index