Gordo’s PC Hints!

Welcome to Gordo’s PC Hints!

For those of us at WTPOTUS who are searching for help regarding computer applications, this is the where we will place valuable  information.   One of our readers, Gordo, has helped us with major hints and advice.   For his advice, assistance,  and easily understood directions,  we name this page, ” Gordo’s PC Hints.”

If you have a question or a comment about certain computer programs, we hope he will continue to help us by providing links  and/or commentary.

With the onset of Google tracking,  Gordo’s advice led us to start using “Do Not Track Plus.”   Those of us now using that application are amazed at the results.  We are definitely satisfied recipients and greatly appreciate his help.   Thanks Gordo!


273 responses to “Gordo’s PC Hints!

  1. My knowledge about setting up a website is ZERO.
    =========
    These might help – Weebly videos on YouTube:

    http://www.youtube.com/results?search_query=weebly+&oq=weebly+&gs_l=youtube.12..0l10.5594.8483.0.11099.13.13.0.0.0.0.150.1059.12j1.13.0…0.0.L2jIgnqjSVo

    • Someone who knows What A Hoot saw this posted and emailed me to tell me it is a flash set up. Funny, I did not even know they read or even knew about wtpotus! Says there are a lurker…….and figured out WAH is me, their relative……….bizarre. Weebly is difficult to use flash so if can figure out how to transfer my .com site someplace else or design site and upload to weebly I think I can figure it out. Thanks!

  2. Lincoln Spector:

    “My PC Randomly Shuts Down By Itself”

    “Overheating is the most likely culprit. PCs are designed to shut down automatically when heat endangers the hardware.

    To find out if this is your problem, download and install Speedfan. It’s small and free. Although Speedfan’s basic job is controlling the speed of your PC’s fans (you probably guessed that by the name), it also provides the CPU temperature.

    But that number is meaningless if you don’t know what’s too hot for your particular processor. Go to CPU World (no relation to PC World) for this information. Find your processor, select it, and scroll down the page. You’ll find the maximum operating temperature near the bottom.

    You should also clean and check your PC to make sure it’s properly ventilated.”

    http://www.pcworld.com/article/258309/my_pc_randomly_shuts_down_by_itself.html#tk.nl_alx_h_cbstories
    ==========
    From above:

    “And if you own a laptop:

    3. Blast compressed air through the vents.”

    This can damage the fan. I immobilize the fan with a paperclip (straightened and then bent into a U-shape). Hold the wire in place with two toothpicks.

    Remove pet hair, etc. by forming a hook on the end a piece of wire.

    [This is MUCH easier than disassembling most laptops.]
    ==========
    “SpeedFan”

    http://www.snapfiles.com/get/speedfan.html

  3. “Microsoft Fix It Center”

    “Automatically diagnose and fix a range of computer problems with this Microsoft support tool”

    “When a problem starts to affect your computer, attempting to work out the cause can be an immensely frustrating experience. Microsoft Fix It is a free tool from Microsoft which has been designed to help diagnose and fix a range of software and hardware problems with your computer through the use of automated troubleshooters.

    There are a number of troubleshooting tools available covering everything from Internet Explorer crashes to problems with hardware attached to your computer. Because the tool is able to scan your computer and determine precisely which hardware and software you have installed, it is able to provide tailored advice that could take a long time to track down online.

    The troubleshooters can be used in two ways. The first option is to allow them to detect and automatically fix and problems that may exist, but it is also possible to view a list of problems that have been found and choose which should be sorted out for you.”

    http://www.downloadcrew.com/article/6528-microsoft_fix_it_center

  4. Miri – August 23, 2012 at 11:59 am

    “My first version was even better, before WordPress LOST IT FOR ME. I had to rewrite the whole thing.”

    What A Hoot – August 23, 2012 at 12:34 pm

    “Many of my inspiration have gotten lost or clicked into who-knows-where.”
    ==========
    When comments are typed in a text document and then copied & pasted into the comment box, you still have the ‘original’ comment if something goes wrong with your browser or WordPress.

    To create & save a text document (td) on your desktop:

    1) Right-click on the desktop.
    2) Move the cursor to ‘New’, click (left or right) on ‘Text Document’.
    3) Open the td by left-clicking on it.
    4) Your comment can then be typed in the td.
    5) Left-click on ‘X’, select and left-click ‘Save’ to keep what has been typed.

    • I type my replies or items I want to post in Notepad and then transfer to comments. I seldom lose comments. Then I don’t have to deal with that tiny comment box. I think Word Pad works the same way. WordPress does have its glitches! I read it doesn’t like IE and prefers Firefox.

  5. Miri – July 26, 2012 at 1:04 pm

    “Gordo, I don’t see a counter, but I listened to Corsi.”
    ==========
    When listening at the KHOW site, move your cursor to the bottom of the ‘black play box’ – left-click on the ‘progress bar’ (aka: ‘seek bar’) which becomes visible. Just have to guess at the time and then narrow it down to the desired time with more clicks along the bar.
    ==========
    I usually download these radio shows.

    KHOW shows are MP3 files – they will play in your Windows Media Player. It’s better in the VLC audio/video player. With VLC, the time can be selected by moving your cursor along the ‘seek bar’ and then left-clicking on the bar.

    Link for VLC player download here:

    https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-78124

  6. “Macrium Reflect – Free”

    “Backing up your PC occasionally is a very good idea: there’s no better way to protect your valuable files from hardware failure, virus attack and other data disasters. But it’s important to do it properly.

    Use Macrium Reflect – Free Edition, though, and the program will take a complete image of your entire hard drive. … You won’t have to reinstall Windows, or your applications, or try to recover any lost data: just boot from the program’s rescue disc, restore the backup, and your PC will be back working as normal within an hour or two.

    Macrium Reflect – Free Edition also lets you create a bootable Linux-based rescue CD …. If your PC won’t start in future then you can boot from this, and use it to restore your last backup.

    The latest build also allows free users to create a Win PE-based rescue disc for the first time, although only the custom option – which involves a 1.7GB download – is available.”

    Verdict:

    A simple, reliable image backup tool that’s packed with useful features and now boasts an even friendlier user interface.”

    http://www.downloadcrew.com/article/4091-macrium_reflect_-_free
    ==========
    This is a GREAT image backup tool. I use it in addition to Acronis and Paragon [see link below] – keep multiple images of the C-drive on three other drives.

    Good to have ‘rescue media’ backup also: To be safe, I use Linux-based rescue on a CD and Win PE-based rescue on a flashdrive.

    https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-77426
    ==========
    BACKUP your info & system to save yourself from much grief:

    There are two types of hard drives – those that have failed and those that WILL fail.

    and

    It’s not a matter of if a hard drive is going to fail, it’s only WHEN it’s going to fail.

  7. Gordo, do you know if that ccleaner works against those long-lasting flash cookies?

    • “Cleaning Flash cookies”

      “A Flash cookie (also known as a Local Share Object, or LSO) is a collection of cookie-like data that a Web site running Adobe Flash can place on your hard drive. Like regular cookies, Flash cookies contain information about when you visited the site, and may contain tracking and settings information.

      Flash cookies are stealthier than regular cookies. Flash can install cookies on your computer without your permission by default. You can change the default setting for Flash cookies at

      Or, you can use CCleaner to clean Flash cookies when it runs. By default, CCleaner is set to leave Flash cookies alone.

      To set CCleaner to clean Adobe Flash Cookies:

      In CCleaner, click the Cleaner icon and then the Applications tab.
      Under Multimedia, select Adobe Flash Player.

      Note: Remember that cookies and Flash cookies are two separate things. Simply clearing the Adobe Flash Player setting will not set CCleaner to clean regular browser cookies.”

      http://www.piriform.com/docs/ccleaner/ccleaner-settings/cleaning-flash-cookies

      • Thanks. Do you have an opinion about whether it’s good or a mistake to clean those flash cookies? I still don’t understand them, other than that when you think you cleared cookies using your browser functions, you didn’t clear those things. Do these cookies ONLY apply to viewing videos or are we being tracked because most webpages these days use videos in the ads? Wish I understood this stuff better. I’m also concerned about using CCleaner, in case it messes up my registry. In your opinion, is that a stupid thing to worry about?

        • “I’m also concerned about using CCleaner, in case it messes up my registry. In your opinion, is that a stupid thing to worry about?”
          ==========
          You don’t have to use the registry cleaning feature – just clean the files. These registry cleaners make mistakes (should always backup). Many advise against ANY registry cleaning. I do it anyway because all those useless registry entries bother me – don’t like to have a ‘messy’ system. I’ll either run registry cleaners and look over each ‘invalid entry’ before deleting it or look thru the Windows registry editor.
          ———-
          Flash cookies:

          Most (99+ %) of my browsing is done with “Sandboxie”. It’s set to automatically delete the contents on closing of the browser. So flash cookies (and everything else) are ‘zapped’.

          https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-83765

          Use CCleaner to remove cookies accumulated when browsing un-sandboxed.
          **********
          **********
          “Local shared object”

          “User control”:

          “Users may also delete local shared objects either manually or using third-party software. For instance, BetterPrivacy,[7] a Firefox add-on, or CCleaner, a standalone computer program for Microsoft Windows, allow users to delete local shared objects on demand.”

          “Privacy concerns”:

          “As with HTTP cookies, local shared objects can be used by web sites to collect information on how people navigate those web sites even if people believe that they have restricted the data collection.[21] Online banks, merchants, or advertisers may use local shared objects for tracking purposes.[22]

          On 10 August 2009, Wired magazine reported that more than half of the top websites used local shared objects to track users and store information about them but only four of them mentioned it in their privacy policy. “Flash cookies are relatively unknown to web users,” it said, “even if a user thinks they have cleared their computer of tracking objects, they most likely have not.” The article further asserts that some websites use Flash cookies as hidden backups, so that they can revive HTTP cookies when user deletes them.[23]

          According to New York Times, since July 2010, there had been at least five class-action lawsuits in the United States against media companies for using local shared objects.[24]”

          http://en.wikipedia.org/wiki/Local_shared_object

      • let em flash. they –whoever in hell “they” are– have ruined every account I have ever had. i have used CC Cleaner. It cleans your registery but nothing can clean socialism, communism, or Islam except a piece of lead or a vote. I recommend the vote, lead even in paint is poisonous. The best CCCleaner in the world is the old fashioned vote. Get the hell out and VOTE!!!!

  8. Gordo, you know much about email? Just got notification that our small town server is “teaming up with google/gmail” and will no longer be handling our email, per say. I don’t want anything close to gmail. Any ideas on how to get all my zazillion emails and files to a new email server? Or to my computer without having to go through and open each one? Thanks.

    • “… you know much about email?”
      ==========
      Nothing.

      I’ve always had my email thru Cox cable. Never had any reason to go elsewhere.

      Outlook.com ???
      **********
      **********
      “Meet Outlook.com Preview”

      “Outlook.com is a preview of a free, modern email service from Microsoft. It has a familiar name and a fresh, modern design.”

      http://windows.microsoft.com/en-us/windows/outlook/home
      ==========
      “Move your mail to Outlook.com”

      “Take advantage of Outlook.com’s clean interface by migrating your current e-mail accounts to a single Outlook.com inbox.”

      “However, once I had imported my Gmail to Microsoft’s new service I was happy with Outlook.com’s easy, streamlined access to multiple accounts.

      Outlook.com’s clear, simple interface outshines Gmail’s

      My first impression of Outlook.com was how uncluttered it looks. Even after I had imported more than 20,000 messages from three different Gmail accounts the new mail system’s main screen retained its simple, elegant appearance.”

      http://howto.cnet.com/8301-11310_39-57487047-285/move-your-mail-to-outlook.com/

  9. I just tested this — very nice. Best to use a flash drive so databases and program modules can be updated.
    ==========
    “Kaspersky Rescue Disk”

    “Bootable Anti-Virus Scanner”

    “Kaspersky Rescue Disk is designed to scan, disinfect and restore infected operating systems. It should be used when it is impossible to boot the operating system due to a virus or malware infection.
    You will download an ISO file that needs to be burned to a bootable CD or DVD. Alternatively, you can also use the provided Rescue2USB tool to create a bootable USB drive from the ISO image.
    Once you’ve booted from the Kaspersky Rescue Disk, you will find a Linux desktop with icons to launch the Kaspersky scanner. Make sure to use the Update Center to download the latest definition files.”

    http://www.snapfiles.com/get/krescuedisk.html
    ———-
    Download link for utility to record Kaspersky Rescue Disk 10 to USB devices.:

    http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/rescue2usb.exe

    • At Kaspersky:

      “How to record Kaspersky Rescue Disk 10 to an USB device and boot my computer from it?”

      “1. Connect a removable USB device to your computer

      In order to successfully record Kaspersky Rescue Disk 10 to a removable USB device, space capacity of it must be not less than 256 MB. The connected USB device must have FAT16 or FAT32 file system. If NTFS file system is installed on the device, you are required to format it in FAT16 or FAT32.

      Do not use an USB device with other operating systems installed on it. It may cause incorrect booting your computer from Kaspersky Rescue Disk 10.”

      [much more]

      http://support.kaspersky.com/faq/?qid=208286083
      ==========
      “Run Kaspersky Rescue Disk 10 from USB Flash Drive by Britec”

      • It sounds good and I could have used it a while back, when another laptop got locked by a virus. But I don’t understand FAT16 or NTFS. Say what? How can I tell what my USB has?

        • “But I don’t understand FAT16 or NTFS. Say what? How can I tell what my USB has?”
          ==========
          1) Left-click on the “Start” icon in the lower-left corner.

          2) Left-click on “Computer” [you should see a list: “Documents”, “Pictures”, “Computer”, “Control Panel”, etc.].

          3) Right-click on the Flash drive icon.

          4) Left-click or right-click on “Properties”. The “File system” will be shown.

          To change the “File system”:

          1) Right-click on the Flash drive icon.

          2) Left-click or right-click on “Format”.

          !!!!!!!!!!!!!!!!!!!!
          *** Reformatting WILL DESTROY ALL DATA on the Flash drive ***

          *** Backup data BEFORE reformatting ***
          !!!!!!!!!!!!!!!!!!!!

          3) Take appropriate action.
          ==========
          I installed the Rescue ‘disk’ on a Flash drive containing some data as a test – nothing was destroyed.

          Best to not take chances. Make copieS of any data on the Flash drive, reformat (if necessary), create the bootable Rescue-Flash drive, then move your data back to the Flash drive.

  10. Gordo, if I’ve never run CCleaner before, would it be expected to run for a long time?

    • CCleaner is VERY fast.
      **********
      Just run the “Cleaner” (for files) — might want to “Analyze” before cleaning.

      You can see how many ‘issues’ the registry cleaner detects — don’t have to click on “Fix selected issues …”

      If you decide to clean the registry, be sure to create a ‘restore point’ first and ALSO use CCleaner’s backup.
      ===========
      “CCleaner (Slim)”

      “The Slim version of CCleaner is identical to the standard version but does not offer to install a toolbar. It is usually updated a week or so after the standard version is updated.”

      http://www.snapfiles.com/get/ccleaner.html

      • Well, the thing is–it’s been “cleaning” the Internet Explorer temporary internet files for hours! I have always thought that I clear temporary internet files, but maybe the Windows thing I use doesn’t really clear them. Sometimes, it doesn’t seem to work. It will hang up (Windows, not CCleaner). The cleaner really is going through the files. I can follow it on the screen. It’s in the b’s now. Going alphabetically. I assume that if my temp files have never been cleaned, then maybe there’s a lot to delete? I just clicked “run cleaner” on the pre-checked items that were selected by default. Not cleaning the registry!

        • When CCleaner finishes, be sure to note how much is ‘cleaned’.
          ==========
          By default, only files in Windows Temp folders older than 24 hours are deleted.

          1) Left-click on “Options”.

          2) Left-click on “Advanced”.
          ==========
          CCleaner’s “Lang” folder in the CCleaner folder in “Program Files” can be deleted – it’s 1.68 MB. English is the default language.

          • Gordo. I halted it because I didn’t want to leave it running while I went somewhere. Anyway, as soon as I halted it, I got a message that it wasn’t “responding.” Eventually the page returned and it said it removed something like 2000MB of temp files, and it was only on the b’s. I don’t know why it was running for so long or what it was doing. Do you think I ought to remove it and reinstall it? I don’t see anywhere where it explains what it does.

          • “Do you think I ought to remove it and reinstall it?”
            ==========
            Yes.

            1) Uninstall CCleaner.

            2) Restart computer.

            3) Run the Windows “Disk Cleanup” tool that came with your operating system.

            4) Download/install CCleaner (Slim) from SnapFiles link.

            5) Run CCleaner

            *** Best to not use computer while cleaning. ***

          • Thanks, Gordo. I’ll try that tomorrow. I have a problem, as I said, with the software that is on the control panel–the feature that is supposed to clear history, delete temp files and cookies. I click it and it seems to process for a while and then it blinks and goes back to the page and nothing seems to happen. Then, minutes later, it says “not responding” and then if I hit a key it will suddenly pop up a window saying it’s deleting browsing history. Then add-ons, but I never see it say anything about deleting temporary files. So I’ll just reload CCleaner but first run Disk Cleanup. I did that this evening, but I’ll run it again tomorrow. Thanks for your help. Maybe I screwed it up by using the computer while it was cleaning. Is it possible that I don’t have enough of the system resources dedicated to the cleaner? Maybe it’s running in the background, which is why it takes so long?

          • “Maybe I screwed it up by using the computer while it was cleaning. Is it possible that I don’t have enough of the system resources dedicated to the cleaner? Maybe it’s running in the background, which is why it takes so long?”
            ==========
            It’s best to not risk ‘confusing’ the operating system. I never clean files (or image hard drives) while using the computer for something else.

    • Miri,
      I would think it would run awhile if you’ve never used it before. I’ve used C Cleaner for years and never had a problem. It updates regularly. It was originally called Crap Cleaner or CC. I always do a backup of information when it cleans the registry in case there is a problem, but still it has never caused one iota of a problem. I read through those that it is cleaning on the registry and if I don’t recognize it, I let CC do its thing. I use it daily when I am getting off the computer. It depends on how many sites I’ve visited as to how long it takes to clean…perhaps it runs up to a minute or shorter now. when it is done analyzing, at the top you can click on that page and it will be broken down into categories for you to see where the cleaner is going to remove information.

      • Thanks for the info. I’ll try it tomorrow. I never did run it before and so I don’t know what it’s doing. As I said, at least I can see that it was working on temporary internet files. Who needs those? It was showing the names on the screen as it worked on them. Deleted a lot and it was still in the b’s, so I must have an awful lot of temp files on this computer. I wondered why my disk space is so full! I didn’t know what “analyze” was so I just told it to go ahead and “clean” the files. To clean the registry, you have to deliberately tell it to do that, right? I saw that there’s a “registry” option on the left side. I didn’t go into that because I was only going to use the history/temp file/cookies cleaner first, to see how it works.

  11. ebayer says:
    2012/10/22 at 3:20 pm (Quote)
    Uninstalling Obama……… █████████████▒▒▒ 90% complete.

    +15
    Reply
    Kevin DuJan says:
    2012/10/22 at 4:26 pm (Quote)
    ebayer –
    I really love that “uninstalling Obama” think you inserted.
    How did you do that?
    I have no idea how to do that…it is SO COOL.

    +8
    Reply
    ebayer says:
    2012/10/22 at 4:29 pm (Quote)
    I wish I could take credit for it,but I “stole it” from a commenter on a different story on Obama.

    +3
    Reply
    Kevin DuJan says:
    2012/10/22 at 4:32 pm (Quote)
    How did you insert it though?
    I don’t know how to do that with comments. Is it a JPEG you got to load?

    +4
    Reply
    jt says:
    2012/10/22 at 5:25 pm (Quote)
    All you have to do is cut and paste this █████████████▒▒▒. They are part of the extended ascii table – aka UTF-8 – (see ref here http://www.ascii-code.com/). Same way people add accented letters to text (ie Ö or À) or Blue Oyster Cult Symbols (¿) …. wait did I just draw a donkey’s behind? Well I guess that keeps in on topic then.

    +2
    LauraD says:
    2012/10/22 at 5:32 pm (Quote)
    I was able to copy and paste it into a document, so that may work.

    +0
    Lola LB says:
    2012/10/22 at 5:44 pm (Quote)
    It’s a unicode character, for example, U+2592 will create this: ▒
    Most fonts can now read Unicode characters, but how to create this on the keyboard is another issue. You’ll have to look up references for your particular system. This entry, if you go to the hexadecimal input section, should give you what you need for your setup.
    http://en.wikipedia.org/wiki/Unicode_input
    There are also several apps that let you view characters from which you can copy/paste into whatever you’re creating.

    +0
    Kevin DuJan says:
    2012/10/22 at 5:52 pm (Quote)
    Gosh, it’s shocking how much I don’t know what to do with computers. Justin knows all this stuff.
    I actually have this thing that happens to me more and more where I almost shut down when thinking about tech stuff. I just feel overwhelmed. I have to stop, realize some emotions are taking hold, and then try to understand the tech stuff a bite at a time. But with Twitter, Facebook, email, texts, Skype, cell phones, instant messaging…etc…I feel pulled in so many directions at once and every day it seems there is some new computer thing to deal with.
    Justin is not taxed by any of this stuff…but it all makes me feel like I’m having a breakdown.
    I feel so overwhelmed.
    But, I take that deep breath…or a long hot shower…or I go outside and jump rope for an hour and I feel better because I think the endorphins help my brain process this stuff more clearly. Not sure why, but I think the endorphins might counter whatever brain chemicals make me feel overwhelmed by the tech.

    Read more http://hillbuzz.org/ten-things-that-should-happen-in-tonights-foreign-policy-debate-between-president-romney-and-bathhouse-barry-27344

  12. “Adobe Flash Player Uninstaller”

    “In case Flash Player crashes every time you attempt to load a website, it blocks the browser or it simply becomes unresponsive, it’s time you uninstalled it and dropped in a fresh copy. To help you properly dispose of it, there is a simple tool you can use: Adobe Flash Player Uninstaller.

    This lightweight utility does exactly what its name suggests: it helps you erase all traces of Flash Player from your computer, so that you can install a new copy that should fix the issues.

    We’ve tried it on multiple machines, so we can confirm that Adobe Flash Player Uninstaller works on all Windows versions and it is able to remove the package for all browsers. However, this means that you will then have to reinstall Flash Player for Internet Explorer as well as for other browser you have installed onto your system.”

    http://www.softpedia.com/get/Tweak/Uninstallers/Macromedia-Flash-Player-Uninstaller.shtml

    • Thanks Gordo,

      I will try it and see if that fixes the issue. I only have a problem at Breitbart. I thought it had to do with them using Disqus or whatever it is.

      • Try disabling “Do Not Track Plus”.

        My PC:

        No video/audio at Breitbart when enabled – video/audio is OK when disabled.

        • See videos by allowing tracking at Breitbart.
          ==========
          1) Go to Breitbart site.

          2) Left-click “Do Not Track Plus” icon on your browser.

          3) Left-click “Allow site”.

          4) Reload page.

          • I reinstalled Adobe Flash and used the uninstall too. Then I disabled Do not track and it worked. I can now see videos that didn’t work before. TY so much.

          • TY, Gordo. That works to unblock them on the “Do Not Track”. Why does it work? This must be something new because it worked before and suddenly stopped working. Does this mean that certain sites require us to allow them to track us?

          • “Does this mean that certain sites require us to allow them to track us?”
            ==========
            That appears to be what is happening at Breitbart for their videos. I didn’t know about this problem until you mentioned it – never tried to watch videos there.
            ==========
            An easy way to check on your cookie ‘collection’ is to use CCleaner:

            1) Left-click “Options”.

            2) Left-click “Cookies”.

  13. “FileASSASSIN can eradicate any type of locked files from your computer.”

    “If you use a computer, you’ve probably come across at least one of the following messages:

    Cannot delete file: Access is denied.
    Make sure the disk is not full or write-protected and that the file is not currently in use.
    The source or destination file may be in use.
    The file is in use by another program or user.

    These messages commonly appear when you’re trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the locked file, File ASSASSIN can remove it.

    Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors.”

    http://www.malwarebytes.org/products/fileassassin/
    ==========
    “FileASSASSIN” also in “Malwarebytes’ Anti-Malware Free”:

    Left-click “More Tools”.

    https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-78099

  14. “IObit Unlocker”

    “There’s nothing more frustrating than attempting to do something to a file only to find it’s been “locked” by another process. Windows will helpfully tell you it’s being used, but it won’t reveal what’s using it, leaving you second-guessing what to do next.

    If a file is marked as locked, IObit Unlocker will attempt to identify it – from here you can then opt to simply close the program in order to unlock the file. Alternatively, you can try and unlock the file simply by clicking the large Unlock button. To make things even easier, click the down arrow next to the button and you can attempt to unlock the file and either delete, rename, copy or move it.

    If unsuccessful, tick the “Forced mode” box before trying again – IObit Unlocker will then attempt to terminate the process, which should unlock the file.

    Verdict:
    Does exactly what it says on the tin – small, simple and effective. Do use with caution, however – you could cause problems unlocking vital system files.”

    http://www.downloadcrew.com/article/20685-iobit_unlocker

    “Iobit Unlocker …”

  15. Your physical disks can be stored in a safe place.
    ==============
    “DAEMON Tools Lite”

    “Use CD or DVD images as though they were real discs with this CD/ DVD emulator”

    “DAEMON Tools Lite is a tool that can create CD or DVD disc images, and use them in virtual CD or DVD drives. So if you’re always swapping discs on your PC then this could save you a great deal of time.

    When you have a disc that you know you’ll need to access regularly, then, DAEMON Tools Lite allows you to create an image in just a couple of clicks. This then shows up in its Image Catalogue for speedy reloading later, and you can put the real disc away.

    And when you want to use that disc, right-click the image, select Mount, and it’ll appear in Explorer. You’ll be able to access its files, play audio CDs or video DVDs just as though the image was the actual disc. Only without having to keep a pile of discs around your PC, risking them getting scratched.”

    http://www.downloadcrew.com/article/19878-daemon_tools_lite

    ************************
    Be VERY CAREFUL during installation. As this is written (the options change) follow this:

    1) Yes – “Free License”

    2) No – “SPTD 1.83”

    3) No – “Windows Gadget”

    4) No – “Hotspot Shield”

    5) No – “RealPlayer”

    6) No – “DriveScanner”

    7) No – “MountSpace”
    ************************
    I’m providing a link to cnet for additional details. Better to download from above link because cnet uses a procedure which tries to ‘trick’ people into installing toolbars and other ‘junk’.
    ==========
    “Daemon Tools Lite is a free tool that lets you create and burn simple disk images and add up to four virtual DVD drives to your system. These drives work just like a physical optical drive, only you don’t have to keep shoving disks in and out of the tray. You can store your DVD and CD content on your hard disk and access the data quickly.

    Daemon Tools Lite creates two types of virtual drive: DT virtual devices, which offer basic emulating capabilities, and SCSI virtual devices, which emulate discs with special signatures such as security locks. Most users will find DT virtual devices sufficient for day-to-day use.

    Daemon Tools Lite is easy to use. We clicked Add Image, browsed to some ISO images, and added them to the Image Catalog. Then it was a simple matter of selecting drive and image and clicking the Mount arrow. We were able to access our new drive normally in Explorer. Daemon Tools Lite is a great choice for laptops, especially those that lack optical drives. But anyone who uses DVDs or CDs for data or pleasure can save time and power by using virtual disc drives instead.”

    http://download.cnet.com/Daemon-Tools-Lite/3000-2646_4-10778842.html?tag=mncol;1

  16. “How to Enable Firefox’s Built-in PDF Reader”

    “Firefox 15 includes an all new PDF reader built into the browser–for those of you wondering, that means you can finally disable the Adobe PDF Plugin and uninstall it once and for all.

    Note: obviously if you need to access more advanced PDF features, you’ll still need the Adobe plugin. For most of us, however, the built-in viewer is fine, or you could download PDF files and read them in the offline Adobe Reader.”

    http://www.howtogeek.com/123617/how-to-enable-firefoxs-built-in-pdf-reader/
    =====
    I’ve been using Firefox PDF Reader as the default. Also have Foxit PDF Reader (portable on a flash drive). Uninstalled Adobe long ago.

  17. A tool that can be used to email audio/video/document files which exceed the size limit for a single email. Just split the file into segments and mail each separately. The recipient joins the files with “hjsplit”.
    ============
    “HJSplit”

    “HJSplit is a free tool to split and recombine files as large as 100+ gigabytes. The Freebyte program comes with four easy to use features: Split, Join, Compare and Checksum. When splitting a file you can specify how small or large the parts should be. The size ranges from kilobytes (kb) to gigabytes (gb) to fit the individual parts on floppy disks, CD/DVDs, USB Drives and other portable storage, or send them via email or upload to an online webspace. HJSplit Join recombines previously split files to re-create a file of the same size as the original.”

    http://www.filehippo.com/download_hjsplit/
    ============
    Best to download from above link:
    —–
    More info at cnet:

    “HJ-Split’s ultrasimple interface has six buttons, four of which access tools: Split, Join, Checksum, and Compare; and About and Exit buttons, with Web links on the About button and the interface that access an online Help file. This program is ultrasimple to use, too. Clicking Split or Join calls up simple dialogs that involve browsing for source and destination files, setting the split file size, and pressing Start. The tool automatically splits and numbers the files and saves them to the destination folder.”

    http://download.cnet.com/HJ-Split/3000-2248_4-10550268.html

  18. Want to encrypt emails (audio/video/document) and/or stored files?

    If so, “Glary Utilities” has a ‘file encrypter and decrypter’ module.

    From GU Help:

    “File Encrypter and Decrypter is a powerful professional encryption tool with a easy-to-use interface. It provides the safest way to store your information or sensitive data and protect them against malicious or unintended intrusions. The program encrypts files using the Blowfish algorithm, which is extremely secure if you use a good password (longer passwords are more secure). Any type of file can be encrypted, including pictures, PDF files, text files, Word documents or executable applications. This module also allows for the creation of self extracting encrypted files, then you need not have a copy of Glary Utilities installed to decrypt the files.”
    —–
    [You may encounter problems trying to email ‘self extracting encrypted’ files because they are executable (.exe). Just use the regular encrypted files (.gfe).]

    Link to more “Glary Utilities” info:

    https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-77515

    “Glary Utilities: File Encrypter and Decrypter”

  19. “Was Your Email Account Hacked? PwnedList Can Tell You”

    “If you have an account with a company whose servers have been hacked, it’s nerve-wracking to wonder whether or not your private data has been leaked onto the Internet. Thankfully, a new Web service seeks to aggregate all the leaked account data on the Internet and make it easy for you to check and see if you’re on the list.”

    http://www.pcworld.com/article/249148/was_your_email_account_hacked_pwnedlist_can_tell_you.html
    ==========
    “With 12 Million Hacked Users’ Data, Pwned List Launches As A Breach Monitoring Service”

    “Having your usernames and passwords stolen and sprayed across the Web is never fun, as millions have discovered after hackers breach a company where they work or where they’ve registered an account. But worse yet is to have that personal information hung out for all to see and not even know it.

    Nine months ago, Pwned List was created to answer a simple question for users: Is your account among the millions whose credentials have been spilled onto the web? Visit PwnedList.com, (whose name comes from the verb “to pwn,” slang for hacking someone or something) type in your email address or username, and the site will check it against a database that has now grown to 12 million compromised credentials it’s collected from crawling public sites where hackers post stolen data. For each of those 12 million usernames or email addresses, Pwned List has confirmed that a password was also published online.”

    http://www.forbes.com/sites/andygreenberg/2012/03/19/with-12-million-hacked-accounts-data-pwned-list-launches-as-a-breach-monitoring-service/

  20. If the sound recorder included with your operating system is not working (or you want something else) – try this. I’ve tested several of these free recorders – it’s the best.

    Be VERY CAREFUL during installation – don’t be tricked into putting toolbars and other ‘junk’ on your computer.
    ***********************
    “Free Mp3 Recorder 1.1”

    “Free Mp3 Recorder is a handy and reliable application designed to enable you to record music or any other audio from your computer. It records the audio data played on the sound card, so any sound that can be played on the pc could be recorded. Including record music from online player which doesn’t have a download link or from your microphone when you are sing a song.

    To get started Click on the “Record Now” button it will start to record, you can select to record as Mp3 or Wav format. After finish, the recorded file will appear in the list below to let you play back to hear the effort. You can double click on the file name to play it or right click to select the menu options. Also a few button below to help you manage the play back and the recorded file list.”

    “Users are advised to pay attention while installing this ad-supported application:”

    http://www.softpedia.com/get/Multimedia/Audio/Audio-Editors-Recorders/TomatoSoft-Free-Mp3-Recorder.shtml

  21. The built-in recorder produces WAV files.
    ***************
    “Listen N Write”

    “Listen N Write can be used to play and transcribe ordinary WAV or MP3 recordings. Listen N Write has special features simplifying the transcription work as you can control via keys (while using its integrated word processor) and insert time markers (bookmarks).

    Moreover, the audio stream is automatically rewinded a few seconds when pressing the Stop key.

    Listen N Write can be considered the standard program for any transcription because of its simplicity of use and small size.”

    http://majorgeeks.com/Listen_N_Write__d7757.html
    ==========
    “Accelerate Transcription with Listen N Write”

    “The program provides an extremely consolidated and simple interface through which everything the program offers can be accessed. Not only does a small media player open by default, but so does a very simple text editor. Through this window you can simply scribe whatever it is you are listening to without being bothered by some of Word’s clumsier features. Together those two panes make up the heart and soul of Listen N Write’s offerings – although there are a few other helpful tools you might like as well.”

    http://www.ghacks.net/2011/06/25/accelerate-transcription-with-listen-n-write/

  22. “Why free proxy servers are dangerous”

    “If you search for information about unblocking sites and how to maintain your privacy while navigating the Internet, you will almost always find a lot of people talking about free or open proxy servers. This might seem to be a good idea at first glance. But in the end, it could cost you more than you can ever imagine.

    Another issue is that open proxy servers are often operated by hackers, Internet “con-artists”, and people with similar intentions. All they really want to do is collect personal information from you, which they will easily accomplish if you use their proxy server carelessly. If you’ve used free proxy servers in the past, you might have wondered why those proxy servers were often and suddenly shut down. This is very often due to the fact that the operator accounts were created by individuals using stolen credit card information. When they are discovered, these proxies are quickly closed by the providers.

    Hackers commit many illegal acts, including credit card fraud. They simply wait for you to use your financial information (including CC info, bank, passwords, etc.) while you are connected to their proxy server, and that’s that. Make no mistake, the server operators/admins can, and very likely will, read all your traffic and use it in any way they want to.

    The bottom line is: If you use a free proxy server, you are running the risk of being an identity theft victim, and your computer could even be used to commit crimes without your knowledge.”

    http://www.yourprivatevpn.com/?q=proxy_en

  23. “Tor Browser Bundle”

    “If you would have thought Onion Routing involved wooden crates and flatbed trucks or maybe a sandwich order, you might be surprised to hear it’s actually an online security technology. Think of an onion’s layers: in Onion Routing, layers of encryption make it impossible to trace messages back to their point of origin. …

    The Firefox-based Tor Browser Bundle integrates the Tor network’s enhanced privacy and security. It includes the Vidalia network connection utility, but it’s much less fiddly than previous Tor implementations. Basically, the Tor Browser does it all for you. Both the Tor Browser and access to the Tor network are free.

    In use, we found the Tor Browser to be just like other Firefox clones. We know what you’re asking: did the Tor Browser slow down our surfing? Yes; there’s no doubt that some familiar pages loaded more slowly than usual. Was it annoying? Hardly. Most users will see similar slowdowns on a daily basis. Bottom line: the Tor Browser Bundle makes it easy to take advantage of Tor’s proven benefits.”

    http://download.cnet.com/Tor-Browser-Bundle/3000-2356_4-75660251.html
    ***************
    Use the “Direct Download Link” under the green “Download Now” box. The ‘box link’ tries to trick you into downloading ‘junk’.

    I put the “Tor Browser Bundle” on a flash drive. Seems to be working ok.
    ***************
    At the “Tor” site:

    https://www.torproject.org/projects/torbrowser.html.en

    “Quick videos on how to use TBB

    How to download and use Tor Browser in different operating systems:

    Microsoft Windows
    Apple OSX
    Linux

    How to verify the digital signatures of Tor Browser in different operating systems:

    Microsoft Windows
    Apple OSX
    Linux”

    • At “PCWorld”:

      January 29, 2013

      “Review: Tor Browser Bundle lets you browse in anonymity”

      “If you want to beef up and anonymize your Internet browsing experience as well, Tor Browser Bundle (free) is the way to go. The Tor network provides a way to browse anonymously.

      The Tor Browser Bundle is a portable, self-extracting package which contains a special version of Firefox, along with an application for connecting to Tor. You extract the bundle, and double-click “Start Tor Browser.” A connection window comes up and steps through an initialization sequence. You don’t have to do anything; just wait a moment while the progress bar fills up. As soon as a secure connection with Tor is established, Firefox loads and you can start browsing.

      When you connect to Tor, all of your Internet traffic is encrypted and routed through a complex network of anonymous nodes until it reaches its final destination. It’s not 100% secure, but then again, no security solution is. Tor has been around since 2002, and has been field-tested in rough situations in Egypt and other oppressive regimes that restrict Internet access. It works.”

      http://www.pcworld.com/article/2026362/review-tor-browser-bundle-lets-you-browse-in-anonymity.html#tk.nl_down

  24. “Turn off your Java now – Dangerous vulnerability in latest Java version”

    “The latest Java version, Java 7 Update 10 contains a critical security vulnerability which is reportedly already being used for large scale cyberattacks. Users who have Java installed on their computers should deactivate the Java plugin in their browsers without delay.

    Because the vulnerability, thanks to the various exploit kits, requires minimum effort to exploit, it is reasonable to expect that the number of web sites hosting the exploit is likely to rise exponentially over the next few days. Simply visiting an infected web site is all that’s required to fall victim to a malware infection. The attack code may also be hosted on mainstream web sites.

    Users should therefore deactivate the Java plugin in their browsers without delay. Instructions for doing so can be found on the following web pages:” [go to link]

    http://majorgeeks.com/story.php?id=37214
    ==========
    “Is it time to say goodbye to Java?”

    “Disabling the Java plug-in in browsers”

    “You can disable the Java plug-in in every major Web browser without removing Java from your system.”

    http://www.digitaltrends.com/computing/is-it-time-to-say-goodbye-to-java/

    • Firefox: How to turn off Java applets. Make sure to disable both the Java plug-in and the Java Deployment Toolkit plug-in.

    • Gordo, if we don’t use Internet Explorer, do we need to do anything (other than not using it)?

      • You’re safe if IE is NOT used.
        ===============
        “Internet Explorer”

        “Disabling Java in Internet Explorer is unnecessarily difficult. The United States Computer Emergency Readiness Team (US-CERT) offers detailed instructions for (mostly) disabling Java in Internet Explorer; however, they are not for the non-technical or faint of heart. A safer recommendation is to remove Java entirely (if you don’t need it) or switch to a different browser (like Chrome or Firefox) if you do.”

        “Other options”

        If you absolutely must use Java in a browser, consider dedicating a browser specifically to that task, and use another browser for all your other Web tasks. If you’re on Windows, you could use Internet Explorer for your Java-specific site(s) or pages (since Java is so fiendishly difficult to disable in IE), but install and use something like Firefox or Chrome (with Java disabled) as your primary browser for everything else. …”

        http://www.digitaltrends.com/computing/is-it-time-to-say-goodbye-to-java/

    • Warning taken and JAVA disabled. I did have the latest JAVA 7.0.90.5 – update 10.9.2.5 on Firefox.

      I think the only time JAVA gets used is with Yahoo games – at least that is all I am aware of. I don’t use IE.

      Thanks Gordo!

    • More on Java
      ===========
      January 14, 2013

      “Oracle’s Java Fix Fizzles”

      “Oracle rushed out a patch for a Java flaw that was so serious the U.S. government advised users to uninstall the software. The fix might have come too quickly, however. “Developing critical software under pressure has only one consequence — even more bugs,” said Avira data security expert Sorin Mustaca. “I expect to soon see even more bugs and vulnerabilities related to this quick fix.””

      http://www.technewsworld.com/story/77079.html
      +++++++++++++++
      January 14, 2013

      “Security experts on Java: Fixing zero-day exploit could take ‘two years'”

      “Speaking to the news agency, chief security officer of business security company Rapid7 HD Moore estimated that it could take up to two years for Oracle to fix the flaws found in the version of Java used to browse the Internet — not taking into consideration any further exploits that are developed within this timeframe.

      It seems like something of a lost cause, as he advised:

      “The safest thing to do at this point is just assume that Java is always going to be vulnerable. Folks don’t really need Java on their desktop.”

      http://www.zdnet.com/security-experts-on-java-fixing-zero-day-exploit-could-take-two-years-7000009756/

      • February 25, 2013

        “Java’s latest security problems: New flaw identified, old one attacked”

        “We’ve advised before that users who don’t need Java should consider uninstalling it, or at least the Java plug-ins used to run Java content in Web browsers. Even savvy computer users aren’t necessarily safe. An iPhone developer forum was found last week to be hosting malware targeting Java-enabled computers—resulting in attacks targeting employees of Facebook, Twitter, and Apple.”

        http://arstechnica.com/security/2013/02/javas-latest-security-problems-new-flaw-identified-old-one-attacked/
        ==========
        “How do I test whether Java is working on my computer?”

        http://www.java.com/en/download/testjava.jsp

        • Thanks, Gordo. Has anybody else ever had a problem with Mozilla Firefox, where suddenly it “forgets” your homepage and settings and behaves as if you just downloaded it? This happened to me and also, when I clicked on the browser to open it, it also would open multiple tabs of bizarre stuff that I never looked at and never would look at. Any clues? I ran an anti-virus scan and everything was fine. I restarted. After that, everything reverted to normal, except my homepage and settings were still gone, so I had to reconfigure.

          • Not had any browser problems. You might need to do more scanning for malware.
            ===============
            I use this (in addition to Avast-free) for system and download scanning. Don’t have it activated to remove malware – just want the ‘opinion’.

            At Downloadcrew – 4 stars

            “Hitman Pro”

            “Hitman Pro 3 is what the authors call a “second opinion malware scanner”, a security tool you can use alongside your existing antivirus package to improve security, without causing any conflicts.

            The program scans your PC quickly, looking for suspicious files. Anything that appears dubious is referred to the Hitman Pro “Scan Cloud”, and if the file isn’t recognised, then it’s uploaded, and scanned using a number of antivirus programs from 5 separate vendors. As we write, these are Prevx, Dr.Web, G Data, IKARUS and Emsisoft.

            Verdict:
            An intelligent security tool that uses multiple antivirus engines to improve its accuracy.”

            http://www.downloadcrew.com/article/13747-hitman_pro_32-bit

            http://www.downloadcrew.com/article/13748-hitman_pro_64-bit

          • “Hitman Pro 3 Review”

          • I’ve had this on my PC for years.
            =========================
            “Softpedia Editor’s Review for SpywareBlaster”

            5 stars

            “To conclude, SpywareBlaster is a fierce fighter against malware and is surprisingly effective, for such a simple and non-demanding software.”

            http://www.softpedia.com/get/Internet/Popup-Ad-Spyware-Blockers/SpywareBlaster.shtml

          • “SpywareBlaster”

            “Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today.

            By simply browsing to a web page, you could find your computer to be the brand-new host of one of these unwanted fiends!

            The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available.

            – Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software.
            – Block spyware/tracking cookies in Internet Explorer and Mozilla Firefox.
            – Restrict the actions of potentially unwanted sites in Internet Explorer.

            SpywareBlaster can help keep your system spyware-free and secure, without interfering with the “good side” of the web.

            And unlike other programs, SpywareBlaster does not have to remain running in the background.

            SpywareBlaster is freeware for personal and educational use.”

            http://www.majorgeeks.com/SpywareBlaster_d2859.html

  25. Internet Explorer – very risky
    ======================
    January 14, 2013

    “Microsoft keeps calm, issues emergency IE update”

    “Microsoft today shipped an emergency update for Internet Explorer (IE) to stymie attacks that have been occurring since at least Dec. 7.

    Today’s MS13-008 update patches a single critical vulnerability in IE6, IE7 and IE8, plugging a hole acknowledged by Microsoft on Dec. 29 after security firms said the website of the Council on Foreign Relations (CFR), a noted U.S. foreign policy think tank, was hosting attack code targeting IE8.

    Because Microsoft patched only the one zero-day vulnerability, said Storms, it’s probable that next month’s Patch Tuesday will include a wider-ranging IE update. “We do need to remember that its very likely we will still have a regular IE update in February,” Storms said. “So just as soon as we are done getting this bad boy distributed, there will be another update waiting.””

    http://www.computerworld.com/s/article/9235799/Microsoft_keeps_calm_issues_emergency_IE_update
    +++++++++++++++
    September 18, 2012

    “Dump Internet Explorer until Microsoft issues patch, security experts warn”

    “If you use Internet Explorer 6, 7, 8 or 9 as your default browser on a Windows PC, security experts are advising you to use a different Web browser until Microsoft patches a critical vulnerability in IE. Microsoft on Monday confirmed that hackers were actively exploiting an IE vulnerability that could allow an attacker to take over your PC. …”

    http://www.pcworld.com/article/2010031/dump-internet-explorer-until-microsoft-issues-patch-security-experts-warn.html

  26. Gordo, My email provider is changing and I don’t want my emails to be connected to googleT or gmailT. How do I transfer all my email stuff to a new email on my own? Here is the letter from provider: And I don’t want this transfer to automatically happen and my stuff be in googlelalaland.
    Dear Valued Brightnet Customer,

    We are excited to announce that Brightnet of Indiana will soon be launching our new, feature-rich email and collaboration services powered by GoogleT, including the market-leading GmailT platform!

    That means we will be migrating your current bnin.net email to the new GmailT platform. But don’t worry, you won’t lose important data, and your email address won’t change. You will simply be able to access your emailvia this widely popular service platform and take advantage of significantly increased mailbox capacity (over 10GB), increased reliability, improved anti-spam filtering, and innovative communication tools such as Google DocsT, mobile sync, personal calendars and more!

    What We’re Migrating
    We will be migrating your email data as follows:
    . Messages in your current webmail Inbox (including subfolders) and Sent folder will be moved to your new bnin.net webmail account

    Please Note: We will NOT be migrating webmail calendar appointments or contacts.

    What Will Happen
    On January 25, 2013, we’ll turn off your current bnin.net email account access and turn on your new bnin.net GoogleT powered services.

    At that time, we will begin the migration of your email data. You will be able to continue sending and receiving email, but your old mail may take approximately 24 hours to populate in your new account.

    What You’ll Need to Do

    After 24 hours, after the migration, log in to your new bnin.net webmail account and begin using it for all your email correspondence, calendar management and online collaboration. Subsequently, you may still use your existing email client with some minor setting changes.

    Depending on how you currently use email you may also need to complete the following tasks:
    . Prior to January 25, 2013 you will need to download your contacts onto your desktop. After the migration has been completed, you then need to upload your contacts to your Google email account. (See Contacts Migration Step-by-Step)
    . Recreate your webmail calendar events (reschedule meetings and request new invitations from others).
    . Recreate email rules using the “filters” feature in your new bnin.netwebmail account.
    . Set up your mobile device and synchronize your data (if applicable).

    • Wow. That’s heavy handed. No choice, do you? I’ll let Gordo answer the technicalities. Google is taking over EVERYTHING. Them and Facebook. I went to a website lately that was recommended in a news article. It was just a shopping site, sort of like eBay. You have to sign in to use the site. Guess what? They seem to require you to use a Facebook sign-in! So everything you do on that site will be recorded by and USED BY Facebook to spy on you and provide you the “service” of selling your buying habits and surfing habits to third parties so they can (at best) advertise to you and (at worst) spy on you and build a dossier of YOU and all about YOU. Nice, isn’t it? Pretty soon, we won’t be able to function if we opt out of this spying. They will FORCE US to allow Big Brother to track us everywhere and anywhere at any time.

      • Well, we can be whoever we want to be; just create a seven-layer birth certificate on line.

        • How true! You know, I saw Judge Judy this afternoon and she accepts into evidence papers that people have allegedly printed out from their text messages or email messages. I wonder if she knows how easy it is to fake stuff like that? I mean, you can put it into a pdf, modify it (like the date or the text), and print it and it will look AS IF that’s what a person wrote or texted. Maybe they do “provenance” before taping the show, but who knows?

    • What A Hoot —

      Wish I could be of help, but my knowledge about email is really close to zero. I’ve always had my email thru Cox cable (with two addresses so that I can send email to myself for testing). Below is a link to an earlier post about Outlook. You may have to go with Google and then transfer to something else as soon as possible.
      ———-
      “Move your mail to Outlook.com”

      “Take advantage of Outlook.com’s clean interface by migrating your current e-mail accounts to a single Outlook.com inbox.”

      “However, once I had imported my Gmail to Microsoft’s new service I was happy with Outlook.com’s easy, streamlined access to multiple accounts.

      Outlook.com’s clear, simple interface outshines Gmail’s”

      https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-2/#comment-95213

      • What A Hoot: Maybe you can search on the Web for hints about how to migrate email to another account, such as a free one at Yahoo! or Hotmail or somewhere else you might trust more than them. I know when I switched ISPs, they gave me a program that transferred my email archives to the new account; but there was limited storage and not all of it came over and some was lost. You could do it the hard way: Create a new free account somewhere and forward all your older messages to it, but that would be time consuming. If you’re like me, you have thousands of old messages hanging around. I don’t use Outlook OR GMail. I have no desire to EVER use GMail. They spy, too.

  27. At MajorGeeks:

    “This will repair Internet Explorer”

    “When IE is corrupt and stops working you will notice you get just a white page and nothing more when using it. Also other errors and problems. This repair tool will get IE working normally again. This doesn’t replace ANY IE settings. It only repairs IE files. This tool is also a part of Windows Repair (All In One).”

    http://majorgeeks.com/Tweaking.com_-_Repair_Internet_Explorer_d7243.html
    +++++++++++++++
    At Microsoft:

    “Fix Internet Explorer issues to make IE fast, safe and stable”

    “Diagnose and repair ie problems that make ie slow, not secure, unstable or crash, caused by add-ons not working or inappropriate security settings.”

    http://support.microsoft.com/mats/ie_performance_and_safety/

  28. January 16, 2013

    “Microsoft bombs another security test”

    “For the second time in a row, Microsoft Security Essentials has failed to be certified as effective by AV-Test.org, an independent testing lab based in Germany.

    The lab publishes test results every two months, and the test from November and December 2012 looked at 25 consumer antivirus security programs. Three failed certification: PC Tools Internet Security 2012, AhnLab Internet Security 8.0, and Microsoft Security Essentials 4.1.

    This was the second test in a row in which MSE failed to earn certification. That’s notable because the software is the most popular security suite in North America and the world according to Opswat.

    While relatively few people are using AhnLabs’ ineffective security suite, the same can’t be said for Microsoft Security Essentials. If you are using MSE, I recommend uninstalling it and going with any other security suite. Free suites that received good ratings from CNET this past year are Avast, AVG, and Panda Cloud Antivirus.”

    http://reviews.cnet.com/8301-3667_7-57564385/microsoft-bombs-another-security-test/?tag=rb_content;main

  29. Easy-to-use PDF printer.
    ==========
    “doPDF”

    At Downloadcrew – 5 stars

    “… there are now many free PDF creation tools that will enable you to output a PDF document from most applications.

    doPDF is one of the best. Install the application and, when you want to produce a PDF, simply choose doPDF as your printer drive and a destination for your document. You can also choose to output your PDF as a low-quality 72DPI document (suitable for distribution by email or download from the Internet) or as a commercial-quality 1200DPI file suitable for printing. …

    Verdict:
    Simple but effective free PDF tool that will enable you to create a PDF document from just about any Windows application.”

    http://www.downloadcrew.com/article/163-dopdf
    ==========
    “How to download, install and use doPDF”

  30. http://fellowshipofminds.wordpress.com/2013/02/18/5-tools-to-protect-your-privacy-online/

    That’s a link where our friends at Fellowship of the Minds recommends some privacy software. Gordo, I know you linked about Tor, but I wonder what you think of these others? DuckDuckGo, HTTPS Everywhere, Cryptocat, and Silent Circle (if you know anything about them).

  31. I’m putting this here because it’s computer technology related: Did you know that you can quickly and EASILY make your screen larger by holding down CTRL and using the scroll wheel on your mouse? It’s very useful to me when I want to enlarge an image to see something more closely.

    • Firefox:

      “Font size and zoom – increase the size of web pages”

      “Zoom is a feature which allows you to increase or decrease either the size of a web page (Page Zoom, which is the default zoom) or the size of all text displayed in a web page (Text Zoom) in order to improve readability on a website basis. This article explains how to zoom in and out per website and describes the zoom text settings.

      Table of Contents

      How do I zoom in and out?

      Keyboard
      Mouse
      Menu
      Toolbar

      How do I use Text Zoom?

      How do I switch to Text Zoom?
      How do I set the minimum text size for Text Zoom?”

      http://support.mozilla.org/en-US/kb/font-size-and-zoom-increase-size-of-web-pages

  32. Archive Websites
    Saving Web sites to Archives (Red Pill)

    Quick tip: When you find a URL that you like, and want to ensure that we always have a copy even if the original gets “scrubbed”, then please go to http://webcitation.org/ and click on “Try it! Archive a URL here. It’s free and takes only 30 seconds.” (which goes to http://webcitation.org/archive.php ).

    On that page, you can enter the URL to archive, along with your email address. It will create an archive URL, and send you an email with the info, too. (sometimes this is helpful when you want to search those emails for a specific URL that you archived, and want to find the archived version of the URL).

  33. March 7, 2013

    “Malware attack poses as security warning from Microsoft Digital Crimes Unit”

    “Here’s what today’s spammed-out email, which uses the subject line “Security”, looks like:

    [go to link]

    Attached to the email is a file called Microsoft_STF_install.zip. And, according to the above email, “all users of the internet” should run the program to validate “there” (sic) email account.

    Sounds serious, right?

    Well, hopefully most of you will be rightly suspicious (even if it didn’t contain spelling mistakes) of the unsolicited email and too wise to blindly run a program just because of instructions which claim to come from Microsoft.

    Sophos products detect the attached file as the Troj/Agent-AANA Trojan horse.”

    http://nakedsecurity.sophos.com/2013/03/07/malware-attack-microsoft-digital-crimes/

  34. “Startpage”

    https://www.startpage.com/

    click on ‘details’:

    “Startpage offers you Web search results from Google in complete privacy!”

    “When you search with Startpage, we remove all identifying information from your query and submit it anonymously to Google ourselves. We get the results and return them to you in total privacy.

    Your IP address is never recorded, your visit is not logged, and no tracking cookies are placed on your browser. When it comes to protecting your privacy, Startpage runs the tightest ship on the Internet. Our outstanding privacy policy and thoughtful engineering give you great search results in total anonymity. Here are some of our key features:

    Free proxy surfing available.
    Praised by privacy experts worldwide.
    Twelve-year company track record.
    Third-party certified.

    No IP address recorded.
    No record is made of your searches.
    No identifying or tracking cookies used.
    Powerful SSL encryption available.”
    ==========
    “Startpage Protects Your Privacy!”

    https://startpage.com/eng/protect-privacy.html

  35. “Ixquick”

    “More comprehensive search results”

    “When you search with Ixquick search engine, you are searching many popular search engines simultaneously and anonymously. Combined, these engines cover more of the Internet than any one search engine alone.”

    “More accurate search results”

    “An Ixquick result is awarded one star for every search engine that chooses it as one of the ten best results for your search. So a five star result means that five search engines agreed on the result.

    This is significant because search engines choose results in different ways, and each approach works well in some cases and poorly in others. A result with many stars was chosen for many different reasons, and is a consensus choice of many search engines.”

    https://www.ixquick.com/eng/aboutixquick/

  36. “Trend Micro HouseCall 7.1”

    Downloadcrew – 4 stars

    “Installing an antivirus tool will give you substantial protection against most malware – but not all. Even some of the the best antivirus engines around will fail to remove perhaps 5% of the threats they encounter. And so there’s a good chance that, at some point, your system will become infected by a virus that your security software hasn’t recognised.

    It’s a very good idea to install a second line of defence, then, and that’s exactly what you get with Trend Micro HouseCall. If you think your PC might be infected (or just want to confirm that it isn’t), then simply run the program, let it scan your entire system, and wait for the verdict.

    HouseCall isn’t a substitute for a full antivirus package, because it has no real-time protection features – it provides on-demand system scans only. …”

    http://www.downloadcrew.com/article/4651-trend_micro_housecall_71_32-bit

    >>>>>>>>Download from this site:

    Trend Micro:

    “HouseCall – Free Online Virus Scan”

    “HouseCall is Trend Micro’s highly popular and capable on-demand antivirus software scanner for identifying and removing viruses, trojans, worms, unwanted browser plugins, and other malicious software.

    It features an intuitive interface and the ability to perform fast scans that target critical system areas and active malware. It also leverages the Trend Micro Smart Protection NetworkTM to help ensure that scans catch the latest threats.”

    Download HouseCall 7.1 (32-bit)
    Download HouseCall 7.1 (64-bit)

    http://housecall.trendmicro.com/#what-it-does

    • “How To Use Trend Micro Housecall Online Virus Scanner”

      • Gordo, I saved it and ran it and now I can’t find it! Any clue where it went? Okay. I found it in downloads and moved it to my documents, so now how do I get it on the list of programs, so I remember where it is?

        • Can do the following:

          1) Create a folder on the desktop.
          2) Put “HousecallLauncher” in folder.
          3) Name folder “Trend Micro Hc”.
          4) Put above folder in “Program Files”.
          5) Open folder and create a shortcut. [or you can “Pin to Start Menu” and/or “Add to Quick Launch” by right-clicking on “HousecallLauncher”]
          6) Drag shortcut to desktop or where you want to keep it.
          ========
          All my security-related shortcuts are in a folder named “Security-sc” with a Quick Launch shortcut for opening the folder.

  37. “VirusTotal”

    “VirusTotal is a website that provides free checking of files for viruses. It uses up to 46 different antivirus products and scan engines to check for viruses that the user’s own antivirus solution may have missed, or to verify against any false positives. Files up to 64 MB can be uploaded to the website …. Users can also scan suspect URLs and search through the VirusTotal dataset.”
    —————
    “VTUploader for Microsoft Windows”

    “VTUploader is an application that integrates into the Explorer’s (right-click) contextual menu, listed under Send To > Virus Total. The application also launches manually for submitting an URL or a service that is currently running in the OS.”

    http://en.wikipedia.org/wiki/VirusTotal

    • “VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.”

      Go to link for uploading:

      https://www.virustotal.com/en/
      ==========
      “VirusTotal Uploader: VirusTotal Windows Desktop Application”

      “To upload a file to VirusTotal, you can visit the home site and use the main file scan form [at above link]. You can make this process even easier with the free VirusTotal Uploader utility. After installing it, you can simply right-click any file under 32MB [now 64MB] and choose VirusTotal from the Send To Windows menu. The scan results will be displayed in your browser as usual.”

      https://www.virustotal.com/en/documentation/desktop-applications/

    • http://www.techresorts.org/2012/06/top-5-online-url-scanners.html

      “Top 5 online url scanners”

      “Today onwards online virus attacks are increased through phishing pages,url shortening services,tabnaping,infected url’s and more.Most of the urls are distributed through forums,social websites,file sharing services and some are through mail services.So every one beware of these urls.In this point of view i mention top 5 url scanners.If you have received an url from an unknown person first scan with any of the service and take further action.

      1.Virus Total :

      Virus Total is the leading file and url scanning service to check whether file or url may be infected by virus or not.To scan url just type or paste it into the box and click on Scan it.Now the scanning process will take one or two minutes and gives a detail result with 27 famous scanning services.

      2.Avg Link Scanner :

      website : linkscanner.explabs.com/

      3.Dr Web online scanner :

      website :vms.drweb.com/online/?lng=en

      4.Online link scan :

      website : http://www.onlinelinkscan.com

      5.Zulu url risk analyzer :

      website : zulu.zscaler.com
      —“

  38. Easy-to-use “YouTube” video downloader (combined with a very high-quality audio/video player).

    “SMPlayer”

    You can play videos, record videos, watch on “YouTube” or copy links.

    Use “MajorGeeks” link to download:

    http://www.majorgeeks.com/SMPlayer_d5673.html

    More info on “SMPlayer” here:

    https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-77789
    ===============
    Open “YouTube browser”:
    1) Left-click “Options”.
    2) Left-click “YouTube browser”.
    or
    Press F11.

    Search:
    1) Enter word OR video URL in ‘search box’.
    2) Left-click icon.

    Settings:
    1) Left-click ‘screwdriver’ icon.
    2) Select “Save to this folder” location.
    3) Select “Quality”.
    4) Select “Format”.
    5) Left-click “OK”.

    Choose action:
    1) Right-click on video.
    2) Left-click on choice.

    • [This video shows “SMPlayer” installed on “Ubuntu” (Linux operating system).]
      ==========
      “YouTube” browser in “SMPlayer”

  39. “Video DownloadHelper”

    The “YouTube” video downloader in “SMPlayer” is very good. If you want more download sites and/or video formats-resolutions, try this “FireFox” extension: “Video DownloadHelper”. I’ve added some new links.

    https://wtpotus.wordpress.com/gordos-pc-hints/comment-page-1/#comment-111639

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s