Computers and Computing

Section C - Spam: Item #6 Robocalls was added.
February 2017.

  1. Computer Viruses via the Internet
    1. Definition of Computer Virus and Its Variants
  2. Protect Your Computer
    1. Install Anti-Virus Software
    2. Install a Firewall
  3. Spam
    1. Spam - The Official Home Page
    2. Spamming Thru Windows Messenger
    3. Spamming Thru Pop-Ups Windows
    4. Phishing Schemes
    5. CAN-SPAM
    6. Robocalls
  4. The ‘Never’ Rules
  5. Cookies
  6. The List (ISP Providers)
  7. Linux
  8. Programming
    1. HTML
    2. Publishing Web Pages
    3. Other Programming Methods
    4. Web Hosting on the Internet
    5. Some Light Reading Material on Web Development
  9. How Secure is My Personal Information on the Internet?
  10. Specialized Search Engines
    1. The Big Six
    2. The Originals
    3. Other Search Engines
  11. Hardware
  12. Evolving Technology
    1. Wi-Fi
    2. Home Video Conferencing
    3. VoIP
    4. Competitive Market Pressures are at Work in This Industry
    5. Computer Back-Up:STORAGE
    6. Video Downloads
    7. Cell Phone Swap Service
    8. Podcast Web Links
    9. Hi-Def DVD War
    10. HD Radio
    11. GPS Units
    12. Chumby
    13. Electronic Reading Devices (ERD)
    14. Cellphones
    15. The Apple iPad
    16. The Language Translator
    17. Netbooks
    18. 3D TV
    19. The "Dark Side" of C & C
    20. Is There a 'Cloud' in Your Future ?
    21. ATM Fraud
    22. The New Digital Generation! Did Our Gen Miss Something?
    23. Smart TV's
    24. New TC Browsers
    25. Amazon Kindle Fire
    26. Guide to Mobile Music Streaming Systems
    27. Library eReaders-Opp or HeadAche
    28. Robo Calls Make Hit List
    29. Living Online in the Afterlife
    30. A Robot is the Life of a Party
    31. Could Cmptrs Protect the Mkt from Cmptrs?
    32. Protecting Vital Documents
    33. The Melding of Man and Machine
    34. Apple iphone 5s & 5c Reviews
    35. Smartphone Map Apps for Vehicle
  13. Technical Support
  14. The Webby Awards
  15. Miscellaneous

  1. Computer Viruses Via The Internet

    Viruses can spread more rapidly today with so many computers connected to the internet. The risks have increased greatly because beside viruses there’s the threat of a Trojan horses and Worms. These types of online threats are ever evolving. This has seen the rise of a security industry with various products - services and hardware - to meet demanding protection needs.

    1. Definition Of Computer Virus and Its Variants.

      Virus - This is a program or code that replicates by attaching itself to another program on the same such as erasing your files on your computer or changing your system files that your computer needs when it is turned on. A virus usually arrives on the computer as a file attachment to document or to a message that you receive by email. A virus can computer. A virus can create an annoying like pop-up window with a message. One should not forget that a virus can still do serious damage when it is transferred by a disk (floppy, Zip, CD) from computer to computer.

      Trojan Horse Program - This is a program that appears to perform a valid function because it may arrive as useful software. It relies on someone emailing it to you. The program has hidden in its code, instructions the cause damage - sometimes severe - to your computer. The most famous Trojan Horse program was a lady named Melissa. She used email to spread herself and in doing so did a lot of damage to internet and company mail servers.

      Worm - This is a program that makes copies of itself and can send itself through email. It can arrive at your computer as an email attachment that has subject matter that appeals to you and therefore has to be opened. The message will appear to be from someone perhaps known to the user and contain inviting subject lines like ‘approved’ or ‘screensaver’ and instructions to ‘see attached file for details’. Once activated, the worm searches for email addresses on the computer’s hard drive and send copies of itself to those addresses.

      The following is how a nasty self-replication was to work in the real world. The example was a worm called SoBigF - a worm modified for the 6th time (Note Version F) by very inventive but unscrupulous person(s). The worm appeared in late August 2003 timeframe. It contained an electronic timing control and it proceeded to swamp email inboxes on corporate computer systems and on individual PC’s. Once the file was opened and the computer was infected by the worm, the computer was instructed to contact another offline server or host at a specify time and receive additional havoc-making instructions. ( Note: This operation was SoBig because 20 servers/hosts were eventually identified.) These offline server instructions had these possibilities:

      1. Download a program to capture every keystroke made by the user including their secure passwords and other secure data.
      2. Download another worm to erase the computer’s hard drive.
      3. Direct the computer to another site selling all kinds of goodies including ‘porn’.

      It took a security team from F-Secure in Helsinki, Finland working with the FBI and various internet service providers to remove and isolate these servers from the network. They were able to stop the worm before it propagated. You can appreciate the magnitude of ‘misplaced’ thought that went into this worm’s design.

      Another major worm around this time was MS Blaster or LovSan. It was designed to commandeer computers with operating systems Windows® 2000 or Windows® XP and use them to strike the Microsoft web site flooding that site with requests for service so as to deny service to anyone else. Blaster’s major symptom was to cause the users computer to reboot repeatedly. Microsoft was able to identify this vulnerability in their Windows programs and release a security patch.

  2. Protect Your Computer

    The question arises about how to protect your computer’s vulnerability to viruses/worms accessing your computers hard drive. Here are two methods.

    1. Install Anti-Virus Software

      There are a number of security firms that provide anti-virus software. This type of software - a CD - can be bought at a retail computer stores ( The buyer must have internet service in order to install it on the computer) or this software can be downloaded directly from the security firm’s secure website. Either way, it is sold on a subscription bases. During the subscription period - usually one year - the security provider will have an arrangement to update (called virus definitions) this anti-virus software automatically and free of charge. Virus mania always flourishes because these unscrupulous person(s) do not rest as they continue to ‘generate harmful software’. Here are four (4) security firms and their respective links.

      1. Symantec Corporation (SC)

      2. McAfee

      3. Computer Associates (CA)

      4. Zone Labs (ZL)

      Anti-Virus programs can be purchased separately. However, some companies bundle all their programs together as ‘Internet Security Suites’. The purchaser gets Anti-Virus, Firewall, and other features such as Privacy Control, Ad Blocking and Spam Alert in one package. These ‘Suites’ such as Symantec’s Norton Internet Security are certainly worth considering.

    2. Install a Firewall.

      As long as computers have been connected to the internet, skilled PC ‘hackers’ - the unscrupulous kind - will devised ways to gain entry and rifle through your most private information for their gain. Each time a computer connects to the internet, it creates a temporary address made up of a series of numbers. If you have a high-speed internet connection and don’t have protection in place, a ‘door’ to your world has been unlocked, and a clever ‘hacker’ can direct his attention in on your IP address and begin looking for a way into your computer. This internet connection often remain alive even though the operator - you - are not actively ‘surfing’. An effective approach to locking the ‘door’ is put up a Firewall which is a barrier that screens traffic into and out of your computer. This Firewall can be in the form of software or hardware.
      1. Software: You can activate the basic firewall software that’s a standard part of Microsoft® Windows®XP operating system provided that this installed on the computer. This firewall software restricts information communicated between a single computer and the internet. It works with both cable and DSL modems, or a dial-up connection modem. There is a wizard available that will guide you through the configuration process. And Advance Users have the pleasure of custom settings. Home users should go to the Microsoft® Windows® Update website and fetch the latest ‘patches’ and have them automatically installed. The usual procedure is to then re-boot the computer once the ‘patch’ is installed to complete the update.

      2. Hardware: A hardware barrier is an advanced way of preventing intruders from penetrating the computer. A router is suggested due to the fact that with a high speed internet connection, people often remain online for hours and a single IP address is maintained which increases the vulnerability to ‘hackers’. A router should:
        1. Have capability to allow sharing of the internet connection between individual computers that make up a family home network or a business network.
        2. A built-in feature called Network Address Translation (NAT) which displays only one IP address while keeping the addresses of all the other computers on the network hidden. This provides robust protection when coupled with Windows® XP firewall.
        3. Be installation ‘friendly’ by having a built-in smart wizard to configure the router for its application.
        Here are four (4) manufacturers of inexpensive routers with their respective links. These routers have wireless capability so that a ‘home network’ can be established with other computers being used in the household be they desktop or notebook.
        1. NetGear® (NG)

        2. D-Link® (DL)

        3. LinkSys® (LS)

        4. SMC® Networks (SMCN)

    Referral For Information (RFI).
    Since this Section is called Protect Your Computer The Viewer should Beware the Digital Zombies.
    This an automated program which resides on the Internet and which can remotely take over a PC and turn It into a "Zombie."
    An article on 'Zombies' appeared in the NYT Business Day Section on 10/21/08. Click on following Link to get to their WebSite.

    NY Times

    Enter in the Empty Search Box: A Robot is Seeking to Enlist Your Computer. Then Click   Search  and Read On.

  3. Spam

    1. Spam The Official Home Page
      This luncheon meat product is made by the Hormel Foods Corporation. There is a link to their website where the viewer can gain some valuable insight. Once there, click on the link legal and copyright info. Within this info link, there is the link Spam and the Internet. It contains their view and a position statement on the term ‘slamming’. The term ‘spamming’ refers to the act of sending unsolicited commercial email.

    2. Spamming Thru Windows Messenger

      Advertisers took advantage of a feature in Widows Messenger service that was built into PC’s using Microsoft® Windows® 2000 and XP operating systems. This feature was to allow network administrators of a corporate network to broadcast text pop-ups to their respective computer users on their intranets. ‘Hackers’ found out about this little gem in fall of 2002 and began to exploit it. Advertisers soon gravitated towards it as means of ‘pitching their wares’ to any web-connected PC. And so came the ads for countless weight loss products; sexual enhancement products and websites - and this rather amazing -that offered software to block these very unwanted Pop-up boxes.
      There are a number of ways to prevent this intrusion .

      1. Disable the Windows Messenger Service via the Control Panel. Navigate to Administrative Tools; then to Services. Scroll down to Messenger. Open and reset Startup Type to Disable.

      2. Enable the Internet Firewall Connection (IFC) within Windows® XP via the Control Panel. Navigate to Network Connections. In the following order open: Your Internet Connection; Properties; Advance Tab.Within the IFC block, click ‘Protect my computer and network’.

      3. Take full advantage of this feature in your Internet Security Suite -if you have purchased this - that was discussed previously in Section B under Install Anti-Virus Software.

    3. Spamming Thru Pop-Up Windows

      Visit your favorite Web site, and you'll likely be slapped with "pop-up" windows that block the screen you want or "pop-under" windows that hide behind the main browser until you close out. These “pop-ups” are the devilish work of the ‘S & A’ boys; Mr. Spyware or Mr. Adware.
      These ‘boys’ usually introduce themselves to the computer’s hard drive on the back of some free program that the user downloads. The free program can be for automatic time updates or for music-sharing files. Before the download begins, the user is presented with a wordy legalistic EULA - End User License Agreement. Buried within the the terms for the use of the free program is acceptance of Spyware/ Adware software. Most people scroll down to ‘I Accept’ or ‘Okay’ without really taking the time to read the pages of fine print in the EULA. When you click that mouse on the above, it’s an ‘I Gotcha’.
      These internet ads have become big business because they produce revenue for those that generate these ads. They’re here to stay - so here are some several preventive measures that one can avail him/herself to.
      The fastest way to eliminate these ads according to Kenneth Terrell of U.S. News & World Report, is to turn off your browser's JavaScript function which is required for the interactive features of Web sites. In Internet Explorer, click on Tools and select Internet Options. From the Security folder, choose Custom Level, scroll down the menu to Scripting, and set Java applets to Disable. You can opt for Prompt, which warns you when a pop-up may be coming and lets you choose whether to block the JavaScript.
      In Netscape Communicator, click on Edit in the toolbar and select Preferences from the drop down menu. Click on Advanced in the new menu, and you'll get a page where you can turn off JavaScript.
      Now for the ‘down’ side of this method. Disabling JavaScript does make some popular sites unusable and could radically alter the looks of others. You can keep JavaScript running and dodge the ads by downloading and installing a program developed specifically to block pop- ups. Here are some popular programs which their links:

      1. Pop-Up Stopper® (PUS) Panicware, Inc. offers two Pop-Up Stopper® products, Companion and Pro. There is also a free download is available.

      2. WebWasher (WW) Webwasher AG offers their Classic® program for free for home use. They claim integration with Windows and Linux operating systems. They offer other products such as Anti Virus and Anti Spam.

      3. AdSubtract PRO (ASP) This top-of-the-line product by InterMute™ , Inc. blocks pop-ups and banner ads. It protects your online privacy with a ‘simple’ cookie control. A free download is offered as a trial.

      4. (Ads) A1Tech offers their all-in-one solution: PopupKiller®; Banner Ad Stopper and Spyware Detector Software. A product download is offered free for a 21-day period.

      5. Webroot®(Wr) One can take a free audit of their PC to determine what maybe buried on their hard drives. Webroot Software® offers a free Privacy Analysis of your computer. They also provide - for sale - several types software that are described as effective in ‘detecting, removing and blocking spyware.’

      6. Opera (O) This product was developed by an independent company in Norway. This alternative Web browser filters out most pop-ups. The browser has cross- platform availability for Windows, Mac, Linux, etc. Their ad banner will disappear when you pay and register Opera. A single copy cost $39.00 USD.

      7. Pestatrol™ (Pt) This software detects and removes spyware, adware, trojans, hacker tools, and other pests that anti-virus, firewall and other security software can miss.

      8. Ad-ware™ (Adw) This company is a provider of anti Trackware solutions to keep your computer free of intrusions to your privacy. They offer three (3) versions with the Standard Edition free for non-commercial use.

    4. Phishing Schemes

      This is a non viral junk email and a form of spam. The spammer sends out emails which have the appearance of being from a legitimate source such as an online bank or online store. Their email could read like this:"We suspect that an unauthorized transaction has been made in your account. We want to ensure that your account is not compromised. Please click on the link below and confirm your identify”. The PC user is asked to submit their account number, a password or the PIN number of the credit card. If the PC user does that, what you have is a case of plain old identity theft where these operators will make unlawful charges in your account.

      7 tips to beat phishing scams

      What is Phishing?
      Phishing (pronounced fishing) is a type of identity theft. By using fraudulent websites and false emails, perpetrators attempt to steal your personal data. Phishing scams are among the most prevalent forms of cybercrime.

      How to protect yourself against phishing.

      1. Be wary of emails asking for confidential information. Legitimate organizations will never request sensitive information via email.
      2. Don’t get pressured into providing sensitive information. Phishers use scare tactics, and may threaten to disable an account or delay services. Contact the company directly to confirm the authenticity of the request.
      3. Make sure you familiarize yourself with the website’s privacy policy.
      4. Watch out for generic-looking requests. Some phishing emails may come from a bank with which you don’t have an account. Don’t respond, just delete the email.
      5. Never submit confidential information via forms embedded within email messages.
      6. Never use links in an email to connect to a website. Instead, open a new browser window and type the URL directly into the address bar.
      7. Maintain effective software to combat phishing.
      The above was provided by
      This item was added January 2016.

      Here are some Tax Phishing Schemes that have that innocent appearance.

      1. An email purporting to be from“” which is aimed at getting the taxpayer to reveal his personal financial information.
      2. An Offer: “You’ve Won a Prize” or some other financial incentive. You get the prize money if you pay the estimated income tax on it. The scammer will take care of the paper work if you send him the payment.“ Please may I have your Credit Card Number!”

      Here are some of AOL’ s top Global Spam Subject Lines.1 The subjects are wide ranging and there’s something for everyone.

      1. Donald Trump Wants You ! – Please Respond (Popular Recognition)
      2. Body Wrap:Lose 6-20 inches in One Hour (Body Improvement Products)
      3. Get an Apple iPod Nano, Xbox 360 for Free (Technology Offers)
      4. Breaking Stock Market News ! Small Cap Issue Poised to Triple( Stock Scam)
      5. Thank You: Your $199 Rolex Special Included ( High- End Deals)
      6. Online Prescriptions Made Easy ( Pharmaceuticals)
      7. IMPORTANT !Your Mortgage Application is Ready ( Mortgage –Related Scam)
      8. Thank You for Your Business Shipment Notification [XXXXX] (Bogus Transaction)

      Ref (1): Top Spam Subject Lines, Discover AOL:

      The Federal Trade Commission (FTC) has a number of suggestions on How Not To Get Hooked by a ‘Phishing' Scam.
      For the Consumer Alert complete text, Click on URL AddressHNGHPS

      This Article is listed in Consumer Alerts.

      Here are the highlights from that FTC Consumer Alert. Note:Item #2 contains additional information relative to its topic taken from a CSM Article.

      1. If you get an email or pop-up message that asked for personal or financial information DO NOT REPLY. DONOT click on the link in the message either.

      Check Out Hooks of 'Phishers' Get more Ingenious.This article appeared in the Business Section of The Sunday Bergen Record on 02/17/08.

      Click on this URL Address.

      2. Use anti-virus software and a firewall on the input to your computer. Remember to Keep them Up-To-Date frequently.
      If the individual computer user has a subscription service with one of the commercial anti-virus companies, the virus update will be installed by them automatically over the internet.

      Here’s the good reason for Updating. It’s to avoid ‘Pharming’.2
      The ‘pharmers’ rely on the fact that the word address you use to connect to your financial organization is connected to a distinct numerical address. This routes your browser to the right website through the domain name system (DNS) servers. It takes a lot of expertise to corrupt a DNS. It’s far easier for the ‘pharmer’ to go after and – GET INTO - individual computers.
      Their need is to plant – in your computer – software (A virus) which will send you to a bogus website – even though you have typed in the correct website address. All you have to do is answer a bogus email – from a financial organization – by clicking on a hyperlink and then supply them with passwords or account numbers.
      The ‘Pharmer’ will then return you to the correct website so that you are not aware of what has happened. It's all very transparent. These are fake websites which last only a few days or hours because it's important for 'pharmers' to move on before they can be found out and shut down.

      Ref (2): New Twist on ‘Phishing Scam – ‘Pharming’;

      3. Never email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a financial transaction or want to provide personal financial information, look first for indicators that the site is secure.
      There should be a padlock symbol at the bottom of your browser or a URL that begins with 'https'. The 's' stands for secure.
      (Note: Click on the padlock symbol to open the SSL (Secure Sockets Layer) Certificate.
      From the Details tab, chose Subject. The current information should appear and an appraisal can be made of this information.
      This only works if you have the in your possession the TRUE website information to compare with.)

      It is unfortunate that these security schemes are not foolproof. Some of these spammers can and do generate forged security icons.
      If you are not sure, STOP THE PROCESS and contact by phone your financial organization for help.

      4. Review your credit card and bank account statements as soon as you receive them.
      Better yet, review these accounts on line because they are up-to-date.

      5. Be cautious about opening any attachment or downloads of files from emails you receive - REGARDLESS of who sent them.
      (You could be compromising the security of your computer.)

      6. Forward spam that is phishing for information to and to the company, to the bank, or to the organization that has been impersonated in the false email. They certainly have vested interest in this.

      7. File a complaint with the FTC if you believe you have been scammed. Victims of phishing can become victims of ID theft. It is in your interest to visit the FTC’s Identity Theft website. Click on URL Address:  FTCIDTFT

    5. CAN-SPAM

      CAN-SPAM is an acronym for Controlling the Assault of Non-Solicited Pornography and Marketing Act.

      On January 1,2004, the federal anti-spam law known as CAN-SPAM when into effect.

      First, let's start with the 'BAD' News.

      1. It did not ban unsolicited commercial messages (Spam).

      Now, here is the 'GOOD' News. Here are highlights of What the Law Requires since it merely regulates Spam.

      1. It bans false or misleading header information.
      2. It prohibits deceptive subject lines.
      3. An Opt-Out Option: Recipients are given the opportunity to either receive future messages or Just Say - NO MORE.
      4. It requires that commercial email be identified as an advertisement. It must include a valid physical postal address.

      The law provides Penalties if these type of Rules are not followed. Each violation of the above provisions is subject to fines up to $11,000.
      There are additional fines if commercial mailers gather - 'Harvest' - email addresses from web sites that have published a notice prohibiting the transfer of email addresses for the purpose of sending email.
      There are criminal penalties - (This where the DOJ gets involved) - such as imprisonment for commercial mailers who do - or conspire to:

      1. Use another computer without authorization and use it to send commercial email from or through it.
      2. Falsify header information in multiple email messages and then initiate the transmission of such messages.

      The reader can obtain additional information on the above subject. Click on URL Address:  CanSpamReqts

      The Federal Trade Commission (FTC) and the Internet Providers (IP's) like AOL and Yahoo have taken numerous separate actions against these Spammers. HOWEVER, these actions are against Spammers – Originating Only in the USA. The present Can-Spam law does not address the spam that comes here from overseas.
      What can be done about this porous opening in the Can-Spam Law?

      The FTC wants Congress wants a change in the present law that will allow the agency to share spam information with the law organizations that exist in other countries who understand the problem and are willing to cooperate with us. That maybe a very tall order when dealing with Third World Countries in Africa and Asia who may have a very different legal system and different laws than ours. Congressional action on this change to the present law is now in process.

      The internet knows no boundaries and the free email as we know it today is a benefit we get only from the internet. And because it is FREE, this allowed the Unscrupulous Element (UE) to make their assault on it with a vast number of unsolicited offers that threaten its very nature. This benefit was being abused severely and the legitimacy of electronic messages questioned. Something legally had to done. Congress acted and passed a law. This is why the CAN-SPAM Act came into being two years ago.

      It is estimated that there are hundreds of million spam messages being generated each day. How does this Phnom happen you ask ?

      The answer is Zombies! The UE has some 'Clever' computer guru's within its ranks. They have developed programs which take over a computer and turn that computer into a robotic spitting spam generator. The FTC has reported that 60 to 80 % of today's generated spam comes by way of big Z's .

      Meanwhile, the IP's have not been asleep at their wheels. They had their 'Clever' computer guru's look at the spam proliferation problem, too. Their answer was: Use the Bayesian Filter to 'scrub' these email messages. These are programs that look for spam in an email. On recognition, they don't pass GO. They do a BIE (Block It Entirely) or a DIS (Divert It Somewhere).

      (Note: Bayesian filtering is named for English mathematician Thomas Bayes who developed the theory of probability of inference.)

      If you wish to pursue greater knowledge of how these filters work, click on URL Address:  BaySpamFltrs

      An example of this type of service is AOL® 9.0 offers its users an 'Adaptive Spam Filter'. This sends e-mail directly to a spam folder based on user words or addresses that are not part of the users daily contact list. The user can view the contents of your spam folder and decides whether to Open or Delete. This is a great service to AOL users. Now you have the pleasure of sending into Cyberspace with a simple click of the mouse:

      1. The Nigerian who want to give you his fortune if you will provide him with a your Credit Card number or
      2. The Viagra Guy - who promises untold pleasure from your new sexual prowess.

      The IP's have powerful computers at their disposal to perform the necessary calculations when it comes to filtering these vast numbers of emails for spam that pass through their domain. They also limit the number of messages sent by any one using their service.

      AOL has published some very revealing results on their efforts to stem Spam.1 Their methods are a combination of software tools, filtering technology, public policy, and litigation and enforcement.

      1. Spam reaching AOL member email boxes remained at low levels in Yr.2005. There was a decline of more that 75% since its peak in late 2003.
      2. In Yr. 2005, AOL blocked an average of 1.5 billion spam messages each day. from reaching email boxes of the AOL network. The total number of emails blocked by AOL in Yr. 2005 exceeded half trillion (>500 billion). This was a slight increase over Yr. 2004.
      3. Finally, AOL blocked 8 out of 10 attempted emails as spam in Yr.2005.

      Ref (1): Spam By the Numbers, Discover AOL:

      Spam Filtering has also brought about a host of new products for the consumer computer market. Security companies such as McAfee, Symantec, eTrust offer software filters for these computers along with firewalls and anti-virus software. Does all this Spam Filtering work?

      YES! People do receive less spam than before.

      Has this WAR been Won?
      The IP's to their credit have taken the first steps to combat this problem. As we know from medieval history, castles even with their high walls can be breeched despite the deep moat that encircles it. Spammers will continue to try and find ways to bypass these filters since technology is a never ending process.

    6. Robocalls

      Tips for Fighting ‘Can You Hear Me Now’ and Other Robocalls
      by BEN POPKEN nbc news
      Consumer Alert: Beware of the 'Can You Hear Me?' a Robocall Scam
      Have you gotten one of these "Can you hear me now?" phone calls.
        No, "The Verizon Guy" (now the Sprint guy) is not ringing you up. It's a robocall scammer who wants to steal your identity and money.
        Here's how it works. Your phone rings and you hear someone say "can you hear me now?" or some variation. If you say "yes," the system records your response and uses it to make it sound like you agreed to their service. You could then get hit with unexpected charges.
        This scam is hot. The BBB reports that for the last few days of January more than half of the reports to the BBB scam tracker have been about this ripoff. In fact as I was writing this story I received one of these calls.
        What makes it even weirder is that this new breed of robocallers uses artificially intelligent voice recognition to string you along in a conversation and get personal information out of you. In one recording the robot was programmed to laugh and say "I am a real person" when the caller asked the computer to say "I am not a robot."
        "We have seen these robo calls get more sophisticated, and even mimic things like background noise and other manipulations to the audio to convince you as the recipient of the phone call that it's a real person," said Ryan Kalember, spokesman for cybersecurity firm Proofpoint.
        "This will continue to open up different ways for fraudsters to try to pretend that they are us, and commit fraud that will eventually hit our pocketbooks."
        Here's how to fight back:
        Hang up. Resist the urge to play around with the robot or even press any numbers. Tim Marvin with non-profit watchdog Consumers Union said scammers may use any kind of a response, even a negative one, to flag which numbers are working and you may just end up getting more phone calls.
        Report the number to the FTC. Real-time reported numbers are helpful for the agency in tracking the issue.

      This item was added February 2017


      The FTC website offers a "For Consumers" section on Spam. Click on URL Address: 

  4. The ‘NEVER’ Rules

    Here are some rules-of-the road for handling file attachment in emails.

    1. NEVER click on any file Attachment to an e-mail message from a source you never heard of, no matter how interesting, enticing or provocative the ‘Subject:’ line or message itself may be. Skillful hackers have developed all sorts of clever messages to arose your curiosity, fears, ego and exploit your naiveté. Delete the entire e-mail message.

    2. NEVER install any program or data from a floppy, Zip or CD disk that came from an unknown or suspicious source without first scanning it through an Antivirus Program.

    3. Even if you know the source (and may be expecting the e-mail with an Attachment) and decide to open the Attachment file, it is a good idea to first scan the file through an updated Antivirus Program (ie. Norton or McAfee) to detect whether a known virus has infected the Attachment file. This sometimes can be done by dragging and dropping the file onto the icon of the Antivirus Program. Otherwise locate where your e-mail program keeps its Attachment files.

    4. When downloading anything from the Internet-particularly from sites you are unfamiliar with it’s a good idea to send the downloads directly to a folder called ‘My Download Files’ on your C drive or alternatively to your floppy drive (or any Zip drive) provided the files size (MB) will fit on the respective disk. Then before you click to open and install these files (usually zip or exe) first scan them through your Antivirus Program. Some antivirus utility programs, like Norton, automatically scans downloads from the Internet.

    If a virus does manage to infect your computer and you do not know how to delete or correct it, it is suggested that you contact a computer professional to help you get rid of it before it does further or subsequent damage to your computer. It pays to be a bit PARANOID WHEN IT COMES TO VIRUSES.

  5. Cookies

    Remember when you were a kid and you would raid the cookie jar. You loved those cookies, but the cookies that the various web sites deposit in your computer are different. Internet sites and online advertisers want to:

    1. Know what products that you the consumer like.
    2. Know how much you spend.
    3. Know the website (online store) you visit when you ‘surf’ on the web.
    4. Recognize you when you return to their online stores and prompt you with their wares knowing the information contained in items 1 thru 3.

    Website use cookies which acts like a coded identity card that is placed on your hard drive to track your ‘surfing’, remember your shopping preferences, or to compile a profile of your web habits. This may look perfectly harmless as first for they do allow you to ‘surf’ web pages quickly. However, a lot of internet users think that cookies are a invasion of their privacy. There are two sides to this issue: Ease of Computer Use versus Privacy. It’s Your Choice.
    Here are some websites that relate to the workings of Cookies.

    1. Cookies: What They Are, Why You Are In Charge (CWTA)
      This website gives you the Microsoft® viewpoint on this subject. You can setup your browser to accept all cookies or to alert you every time a cookie is offered. Then you can decide whether to accept one or not. There are instructions for I.E.3.0 thru I.E.6.0 and Netscape Communicator 4.0. You can view Cookies You've Accepted and you can view the Cookie Code.

    2. Cookie Central (CC)
      This website provides Latest News about Cookies; Understanding the Cookie Concept; Internet Cookie Management Software; The Unofficial Cookie FAQ; A Crypto Primer and a Message Board.

    3. How Internet Cookies Work (HICW)
      Most Internet Cookies are incredibly simple, but they are one of those things that have taken on a life of their own. HowsStuffWorks explores the basic technology behind cookies, as well as some of the features they enable.

    Cookie Wrap-Up.

    Cookies were originated by Unix programmers when the web browser came into being a-way back then.
    Cookies are Very Small Files (VSF) that :

    1. Hold Information that the User Supplies and
    2. Lets the Particular Web Site Respond to that Information.

    The problem is that a huge number of these VSF’s are placed on the web user’s Hard Drive by a
    large number of websites when ‘Surfin’ the Web’.
    The computer user always has the option of deleting these VSF’s.Under Start, Select:
    1. Settings
    2. Control Panel
    3. Click on Internet Options
    4. Under the General Tab, In Section Temp Internet Files; Select Delete Cookies


    In clearing away all these cookies, the user will lose all your logon information
    and the various personal settings needed for those frequently visited web sites.
    Various software routines and display images that customize the screen for the
    viewer with the cookie installed are now purged. You now have to spend time
    re- entering website information and waiting for downloaded files from that website.

    And Guess What ?
    The Process Repeats Itself! While all this is going on, new cookies are being added to your
    computer. In the end, I’m sure that you the user will tire of this re-entering process.

    The cookie is a Means to the End; It’s an operational way for the contacted website to service
    your computer; To upload your input and to download your request.

    If you are worried about ‘hackers’ somehow getting hold of and using your cookies for their personal gain,
    a great deal of effort has been expended by the various websites on software encryption to prevent this happening.

    You might want to see this by becoming acquainted with your cookies.
    1. From the above procedure, Return to Internet Options;
    2. Under General Tab; Section Temp Internet Files;Click on Settings
    3. Click on View Files.The Cookie Files Appear (You have a choice of 5 Views; TN’s Icons, etc.)
    4. Click on any file to Open.

    You'll see a short string of text and numbers; the file information has been encrypted and is unreadable
    by us, the viewer. However, the server that gave you the cookie is the only one that matters because only
    it can read and identify that cookie.

  6. The List (ISP Providers)

    This is a link to an extensive list of national and local ISPs (Internet Service Providers). You'll find information on pricing and any additional services the ISP offers when you visit the ISP's Web Sites.

  7. Linux

    1. Linux® Resources (LR)
      Techie or not, you're probably hearing a lot about Linux. The open-format computer operating system has been getting a lot of media attention, especially since International Business Machines Corp. announced it will be including Linux in a number of its products such as eServer®, their Personal Computer ( ThinkPad ,and a certain line of Workstations. HP is another company offering Linux in its servers.
      The Linux Resources website, produced by the publishers of the offline magazine Linux Journal, has a Linux fare to fit a range of needs whether you’re looking for a primer to flesh out what you've read in the newspaper or searching for software to stretch the Linux you've already got installed.
      The ‘What is Linux?’ section is a good place to start for beginners. There are links where users can download different versions of Linux like Debian and other Linux compatible software. A beginner's page offers a step-by-step installation guide. And if you really get in a bind, you can always post your plea to one of the many Linux newsgroups.

    2. Linux World™ (LW)
      This site doesn't play around with any of the novice-friendly information that Linux Resources does. It is for the hard-core Linux user. Go to their link About Us. Their target is Information Technology (IT) decision makers. They provide in their newsletters and magazine ‘case studies of Linux in the enterprise, market overviews, industry features, product reviews’. Linux World is a part of a major publishing company called SYS-CON Media which serves the technology market.

    3. Red Hat Software Inc (RHS)
      Red Had is a major supporter for corporate Linux users. They offer Enterprise Linux for three types of applications: desktop/client systems; small/ mid-range servers; and high- end mission-critical systems.


    1. HTML
      HTML - Hyper Text Markup Language - is a computer language used to create web pages. An HTLM document consists of text and special instructions, called tags. These documents can be identified because they have the .htm or .html extension. The computer’s web browser interprets the document and displays as a web page .It can be displayed on any type of computer such as an IBM-type or a Macintosh. If you wish to see what you are now viewing in an HTML format, go to View on MS IE’s Menu Bar and click on Source.
      Here are some websites that offer courses on how to conceptualize a website and then implemented it.

      1. Builder.Com (B)
        Click on Web Development (WD). Within the WD Library, there is a section called Authoring And Site Design. Click on the link HTML.

      2. Goodies (G)
        This is an excellent website for a Non-Technical Introduction to HTML; a Primer on HTML and Tutorials.

      3. Werbach (W)
        Kevin Werbach offers ‘A Bare Bones Guide to HTML’.

      4. Evrsoft™ (E)
        1st Page 2000 is HTML editing software which lets you create web pages . Evrsoft offers Version 2 as Free Download to your computer. This is a good way to get introduced to this subject by having the necessary editing tools.

        This site is likely to be over the heads of technophobes, but serious computer buffs will be jazzed. Their website index has five main subjects with links to various topics. They are: Focus Area; News; Registry; Resources; and About. About contains FAQ About and their missiom. According to their FAQ, XML is ‘the next-generation of HTML, is now viewed as the standard way information will be exchanged in environments that do not share common platforms. Special purpose XML languages and standards are practically announced daily and with several hundred already adopted since XML 1.0 was released in February 1998.’

    2. Publishing Web Pages to a ISP Host Server

      The web pages become available to the public on the web when they are published. The publishing is accomplished through an FTP program: File Transfer Protocol. Here are two popular FTP programs.

      1. For Windows: WS_FTP Pro
        WS FTP Pro is a standard ftp utility that is very easy to use. Ipswitch Software allows a free download of this product for evaluation.

      2. For Macintosh: Fetch
        A download of a free trial is available.

    3. Other Programming Methods

      1. Dynamicdrive (Ddr)
        DHTML, or Dynamic HTML, is a new web technology that enables elements inside your web page to be, well, dynamic. DHTML can change things dynamically, that were once considered unchangeable once the page has loaded, such as text, page styles (font color, size etc), element position, etc.

        There is JavaScript and Java™. These are two different approaches to creating a web page.

      2. JavaScript™ (JS)
        JavaScript is a scripting language. It can display alert messages, drop-down menus, change images in response to the mouse movement over the computer screen. This website provides a link to web development ( JavaScript Primer by Goodies) and a host of subjects ranging from Background to Utilities.

      3. Javaboutique™ (Jb)
      4. Javashareware (Jshw)
        Here are two websites that offer Java applets. A Java applet is a program written using the Java™ programming language that was developed by Sun Microsystems®. These are very useful for adding special effects such as animation and displaying information that is constantly changing on the web page.

      5. FrontPage® (FP)
        FrontPage® is web development software by Microsoft®. A web page can consist of many different elements ranging from:
        Body Text which presents information to the viewer
        Tables which organize n
        Forms for collecting information.
        Hyperlinks. When clicked, they bring the viewer to a different area or page
        Images. Nothing beats a picture. It takes the form of graphics, clip-art and video.
        Contact Information between the viewer and the web developer via email.
        FrontPage has the ability to publish; to transfer the web pages to a host server on a commercial internet service provider - an ISP. Note: This server must be equipped with FrontPage Server Extensions in order for the FrontPage features to work.

    4. Web Hosting on the Internet
      Want to post pictures of your latest trip to Timbukto? Is there a cause - social or political - that you would like to bring to the fore front? Is their a community effort that demands immediate attention? You can set up your own home page in cyberspace very easily. The internet service provider (ISP) that you now pay for often offers free Web space along with the tools necessary to create this page.
      In addition, there are a lot of ISP’s that provide ample web space for a $5 to $20 per month fee to individuals and small businesses. Their services vary in storage capacity; the transfer capacity; technical support; email support; web features and tools. Some ISP’s offer a domain registration service whereby your website takes on only your name (It does not include the name of the ISP) using the new ICANN address suffixes such as .com; .org; .biz; .net.
      Here is a quick look at some ISP’s and their offerings.

      1. America OnLine (AOL) Users
        AOL offers 1-2-3 Publish where you have a fill-in-the-blanks tool. Go to their keyword, My FTP Space; Publishing Tools; Easy Designer. You then can create a one page website containing your information and design preferences. For this website, AOL will post a small ad in a corner on this page.

      2. Geocities (Gc)
        This site is owned by Yahoo!®. Click on their link They offer a free start-up; a GeoCities Home Page ( With an ad). They also offer three (3) types web hosting services (with a number of features and without ads) priced between $5 and $12 per month.

      3. Bizland (Bl)
        This web hosting service offers four (4) different packages differing in hosting space (70 to 600 MB’s), different bandwidth usage /mth, email accounts, and a domain name registration service.

      4. Bravenet (Bn)
        This website offers Free Web Hosting; Professional Web Hosting; and Domain Names. In addition, Free Web Tools are made available (HTML Tutorial, Clip Art, Free Fonts); and Webmaster Resources.

    5. Some Light Reading Material on Web Development
      All publications in this section are available at (Amz) .

      1. Goodies (G)
        They offer several books on their website such as:
        a) Web Design Goodies
        b) HTML Goodies
        c) JavaScript Goodies

      2. MaranGraphics® (MG).
        MaranGraphics develops visual learners. Here are two of their many publications.
        a) Teach Yourself Visually HTML
        b) Master Visually FrontPage® 2002.

      3. Oreilly® (Or)
        Click on topic Web in their website Index.
        a) Web Design in a Nutshell (2nd Edition) by Jennifer Niederst

      4. How The Internet Works ( 7th Edition) by Preston Gralla
        This edition is described as ‘Up- to-date on the hottest technologies’.

  9. How Secure is My Personal Information on the Internet?

    Financial information sent over the internet from an individual’s computer to another site be it a bank or an e-commerce site must be secure so that it cannot be tampered with and used by some third party. The valid user must have an User ID and a Password or a Personal Identification Number (PIN) before any personal or financial information is displayed. The receiving website encrypts the data that is sent to the site’s secure server from the individual’s computer browser.

    Encryption is mathematical process that takes a message and conceals its meaning. Secure Sockets Layer (SSL) is used to implement this method. How can one tell if SSL is working? You look for two (2) things.

    1. Look for HTTPS:// in the URL address of the site. The addition ‘S’ at the end of HTTP indicates the existence of a secure channel to the website’s server.

    2. Both Microsoft® IE and Netscape Navigator® display a padlock icon at the bottom of the browser when SSL is present. The padlock is closed when a secure channel exists between computer and website server.

      SSL uses public-key encryption. These keys can be of various sizes (56-bit, 128-bit). The whole idea is that larger the key length (This creates greater the number of possible keys) the more difficult it is to decrypt the message.

      An excellent website that explains SSL in greater detail is Verisign® (Vrsg).

  10. Specialized Search Engines

    As the Internet continues to grow, it becomes more likely that the information we want is out there - somewhere. Finding it is the trick. The following are some special "search engines" which may help.

    1. The Big Six

      1. AltaVista™.com (AV) One of the search engine classics.

      2. Google™ (G)
        A fast, accurate and informative search engine. Google’s Web search content is divided between:Images; Groups (Usenet Discussion Forums); A Directory ( Topics organized around categories); and News (Top Stories in the World, USA, Business, Sci-Tech; Sports; Entertainment; Health); Froogle™ (Just New) Smart Shopping Through Google.

      3. MSN ® . The MSN Search Engine is one of the popular surfing vehicles. Their web search content is divided in to ten (10) categories ranging from Computing to Travel.

      4. Yahoo® (Y) An excellent website which has many internet destinations to surf.

      5. Infospace® (Ifsp) A very informative search engine. It includes listings of businesses and services .It recently took a major acquisition step and acquired Switchboard Inc. This now provides search access to online Yellow and White Pages.

      6.™ (Shpg) This search website states that Information is Power. At this site, you can find the right product; Compare prices, products and stores; And Buy the right product. There list an extensive number of categories from books to services.

    2. The Originals

      1. Ask Jevees® (AJ)
        Ask Jeeves any question, and you will get an answer.

      2. DailyStocks™.com (DS)
        This is a stock market-oriented search site. You search the Web for stock market information by typing in a stock ticker symbol. Many, many links to various financial sources.

      3. Excite® (Ex)
        One of the original internet online services. This site is a destination site that offers world-class content and functionality from different sources. The content has a Web Search / Explore Excite; My News; My Stocks; Sports; Email & Community; My Weather; Best Fares.

      4. Galaxy®.com (Glx)
        This search site claims to be the Internet's First Searchable Directory (Since 1994). Its directory covers a number of subjects such as Community, Health, Leisure and Recreation, Medicine, Sports, Shopping. And Travel.

      5. Infoseek (If)
        One of the original internet online services which now a member of the Disney group. A comprehensive and accurate WWW search engine with links to ABC News;; ESPN; Disney OnLine; Family Fun;

      6. Lycos® (L)
        One of the original internet online services. This site offers a search.engine for: The Web; Shopping; News; Pictures. They provide the Lycos Top 50 (Content is Updated); Fun Search ( Select topics like Poker Secrets to Wedding Dress Deals); Finance via

    3. Other Search Engines

      1.™ (Ab)
        A search engine with over twenty (20) different categories. They have features: What’s Hot Now; Most Popular Articles; Guide of the Day.

      2. (ASE)
        Lists the top search engines as well as links for numerous topical searches.

      3. Aupairsearch (Aps)
        A search engine that can match you up with an in-home child care provider based on your criteria.

      4. Bigstuff (Bsf)
        Simple, fast search engine with several categories.

      5. Bottom Dollar, The Shopping Search Engine™ (BD)
        Bottom Dollar has multiple channels, such as computer hardware and software, books, movies, sporting goods, toys, flowers, etc., and searches all the main online retailers.

      6. (CI)
        Search through company profiles, and there are over 250,000.

      7. Digital Camera Resource (DCR)
        Reviews and Information; A Buyers Guide; FAQ’s; Links to Digital Cameras.

      8. Education-World (EdWd)
        Best Education Site Today. Search over 20 categories on education in their database.

      9. engines2go™ (e2g)
        Fast access to the most used search engines. Opens a window for each search engine you have selected.

      10. Free for Webmasters (FfWm)
        A search tool for over twenty (20) categories ranging from Cars to Travel.

      11. Global Network Academy (GNA)
        A research resource geared toward academia.

      12. Go2mypage (G2mp)
        This is an Audio, Video, Music Production Information Site.

      13. This Site is N/A

      14. Ibound (Ib)
        A search engine with categories ranging from Autos to Sports. The link to your weather via the Weather Channel.

      15. Information Outpost (IO)
        Find a web site in their directory or search their site. Get help searching from their staff by submitting a question. Store your favorite sites online for quick access from any computer and organize your schedule using their web based calendar.

      16. International Development Institute (IDI)
        The site has a list of search engines for: Information about Banking and Finance; Internet and Intranet data for Engineers; Wireless Application Development; Website Development; Security; Building an Internet Business; International Business.

      17. IQseek (IQk)
        This search site is organized around categories such as: Computing and the Web; Health; Reference and Research; Education and Career; Shopping; Home Life; Entertainment; Money and Finance; Travel.

      18. Langenberg ™(Lb)
        Offers lists of searches covering over 25 different topics, from acronyms to zip codes.

      19. (Lg)
        A law search engine. You can search codes, statutes, and opinions for multiple state, circuit and federal courts.

      20. Links2Go (L2G)
        Surf the web using their GoGuide Directory which has over 20 categories such as Arts & Humanities; Gov, Law & Politics; Home & Family; News & Issues; Real Estate; Kidz & Teenz.

      21. MasterSite® (MS)
        The best place to find anything on the Internet.

      22. Megacrawler (Mgcw)
        A Canadian search engine using CBC News as its source.

      23. Monster Crawler (MnCw)
        Performs simultaneous multi-thread searches. Their motto is: “Search All The Major Engines With Just One Click."

      24. OneLook Dictionary® (OLD)
        OneLook searches hundreds of online dictionaries. You tell OneLook the word you want defined and whether you want to look in general, specific subject or all dictionaries.

      25. This Site is N/A

      26. This Site is N/A

      27. Search Engines Net (ShEng)
        Their motto is: A search engine for your site.

      28. Ultimate Band List (UBL)
        Ultimate Band List provides an index to popular music entertainment. You can search by album, artist, or resources - the last of which includes radio stations, music news, concert information, record labels, record stores, and musician sites.

  11. Hardware

    1. Tom's Hardware Guide (THG)
      This is mainly an archive of computer hardware related news items plus editorial comments where the author feels it is necessary.

    2. CNET
      This the place that has it all: Product Reviews; Shopping; Tech News; Downloads. There are links to the major computer manufacturers - Dell, Gateway, HP, IBM and Sony - featuring their various products. Their website contains two information sections: Today on CNET and Digital Living which provide the reader with News, Features and Trends. CNET Services provides Buying Guides; Computer Hardware categories from Camcorders to Storage; Downloads and Software; Internet Services.

  12. Evolving Technologies

    Here are three definite possibilities.

    1. Wi-Fi

      There are three Wi-Fi sections to this Update. Click on the link below to connect to specific section of interest. Use you Back Arrow on your Browser to Return You Here.

      A. Wi-Fi: In The Home

      B. Wi-Fi: Outside The Home; ala ‘Surfing the Net’

      C. Future Developments

      A. Wi-Fi: In The Home

      Wi-Fi is short for Wireless Fidelity.In Year 2001 Wi-Fi was nil. Today, it’s the rage and it will soon be everywhere. First, Lets look at its existence in the HOME. You already have a DeskTop Computer (DTC) located in a small room upstairs in your house (Your Office) or perhaps located in the corner of your recreation room in your basement. You’re on the main floor – living room, dining room, bedroom, TV room. You read ‘Something’ in a book, magazine or a newspaper; or see ‘Something’ on TV that makes you want to ‘Surf the Net’ and find out more about that ‘Something’. You can do this very easily using a notebook computer- Laptop (LT) - with Wireless Capability and because it contains its own Rechargeable Power Source. This is true Portability1.
      You do pay a price for this Mobility. A well equipped LapTop (LT) will probably cost 3x to 5x the cost of a DTC depending on the options. Another thing to remember is that Wi-Fi signals do not travel particularly long distances. They reach theoretical distances of 150 feet. A MacMansion due to its size and floor levels might cause a problem depending on its structural and material content.
      First, you need to install a wireless router2 located in the wireline between your Cable/DSL modem and your DTC. This router provides:

      1. A Firewall
      2. The Wireless Access to the Laptop Computer which is equipped with Wireless Capability.
      Note 1: A LT contains an internal rechargeable battery as its power source. You have a choice of the LT power source within the home environment;Internal battery power or the house line -115Vac - power. The LT comes with an external power supply that operates from the house line power. You need this to recharge the internal battery which is generally a Lithium ion battery pack. Battery life is measured in Hrs-Min and is very dependent on the user’s interaction with the LT and its features such as the CD Burner/DVD combo drive. It’s an excellent idea to use the LT on Battery power at least one a month. The battery life is enhanced by performing this monthly discharge.
      Note 2: The need for a router was described in Section (B)(2) of this C&C: (B) Protect Your Computer; (2) Install A Firewall.

      This wireless technology uses the 802.11 family standard for over-the-air modulation techniques which are defined by the b, a, and g amendments to the original standard. 802.11b was the first widely accepted wireless networking standard, followed somewhat by 802.11a and then 802.11g. The 802.11b and 802.11g standards use the 2.4 gigahertz (GHz) band. The 802.11a standard uses the 5 GHz band. The 802.11g technology operates at around 54Mbps at 2.4 Ghz. which is five times faster than the older 802.11b standard.
      Today’s Laptops have the wireless functionality described above built into them (The Intel Centrino Chip is good example of this.) An external Wi-Fi card is needed if this circuitry is not available. This Wi-Fi card is attached to the Laptop through a USB port or through its PCMCIA ( Personal Computer Memory Card Interface Architecture.) The next level in Wireless Connection is between the Laptop and a Peripheral such as a Printer. Here are three possibilities to Make Your Day.

      1. There are Printers on the market today with built-in Wi-Fi.
      2. There are Printers on the market today with built-in BlueTooth Technology (BTT). The printer must be located CloseBy because BTT has a range of only a few yards from thr LT.

      The reader can investigate these two printer possibilities. Here are hyperlinks to three different vendors who make a limited models of printers equipped with either of the above technologies. These printers cost range is between $200 - $300.

      1. Hewlett-Packard
      2. Epson
      3. Canon
      4. Belkin.
      Your LapTop must be BTT equipped for a BTT Printer.The above suggested Vendor(g) provides external BT USB Adapters that are cable free connection.
      1. Reverse Wireless: Your DTC has your Printer already attached via a USB or Parallel connection. On your LapTop, Command your Print Function. This command will go back through your Router to the DTC - Printer combo and perform the required print operation. (Note: Here are some operational subtleties. The DTC & Printer both have to be powered on for this to work---- and the Printer has to have paper in its Paper Tray.)
        The Advantages: Available In-House @ Zero Cost. The Disadvantage: LOCATION! LOCATION! It’s not NearBy !
      2. The LapTop Input Devices (LTID);For Home Use, Only ! The DTC has two external components attached to it; a keyboard and a mouse.The LTID has a built in Keyboard, Hot Key/ Window/ Application functions, and a TouchPad (TP) for pointing the cursor. Some of us ‘Struggle’ using the TP when operating the LT due to old habits formed over years of DTC use which refuse to die. There is ‘Hope For US’ when attempting to use a LT. Its takes the form in a Wireless Optical Desktop Combo which consists of Wireless Keyboard and an Optical Mouse. Both devices require batteries to function and it operates within a range of 5-6 ft of the LT.A common transreceiver accepts their respective commands and interfaces the LT through a USB port. Microsoft and Logitech are two vendors which offer these products. Their cost is under $100.

      Are YOU ready for a LP with wireless capability? It is suggested that the following reference3 be read which will provide the reader some insight into this question. This reference takes you through various Set-UP steps that are required in order to connect; Its A Do-It-Yourself approach. Remember, if you get ‘lost in these technicals’, there is professional help available - via your local computer dealer or through a major computer store - that can get you on the ‘air’.

      Note 3: AARP’s How To Guides: Connecting to Wi-Fi. Click on link:


      The reference in Note 3 listed a number of HotSpots. These links are repeated here.

      1. Free HotSpots/Commercial Hotspots

        1. Goto: WiFiPanera Bread.   Click on Topic Our Locations for a list of Free Wi-Fi locations.

        2. Goto: WiFiMcD's.   This is a Commercial site that offers: 'Bites or Bytes – We Do Both!'

      2. Free HotSpot Listings

        1. Goto: WiFiFreeSpot This a Free Wi-Fi Directory of Airports, Hotels, Motels Public Libraries, Restaurants / Cafes, etc. listed by State.

        2. Goto: Wi-FiHotspotList

          Enter a partial or complete address or ZC and and receive a listing of all HotSpots with a 1 mile of that address.

      B. Wi-Fi: Outside The Home ; ala ‘Surfing the Net’

      Wi-Fi is being installed today in a number of places. Some of these installations are Free and some are Commercial. Wi-Fi operations can be found in shopping malls, hotels, bookstores, college campuses, pubs and coffeehouses4. If your LapTop is Wi-Fi equipped, you could be sitting right now in your favorite Starbucks sipping your favorite latte and ‘Surfing the Net’. Starbucks Coffee Company has teamed up with T-Mobile to provide HotSpot Service at their various locations. A HotSpot is defined as a location which has wireless network capability.

      Click on this link to explore this possibility:


      This link will provide an Information Web Page about T-Mobile’s HopSpot Service and about Starbuck Coffee Locations. There are four topics under the headingInternet Service. The topicSecurity Statementshould be read because it gives the LT user good insight into a major area of concern when using Wi-Fi in any public place where access is available. This Security Statement refers to the T-Mobile WLAN’s – Wireless Local Area Networks. T-Mobile states that: These WLAN’s are not‘inherently secure’. They cannot‘guarantee the privacy of your date and communications while using the Hotspot Service’. Therefore: You – the User:
      1. Are responsible for protecting your own data.
      2. Should be aware of your surroundings in a public place. That Someone standing behind you and your LT could make note of your passwords and through their use obtain other personal information that resides on your LT’s H-D files.

      In their Security Statement, T-Mobile suggest that the LP user take advantage of their 802.1x WPA ( Wi-Fi Protected Access) security technology to better protect the wireless communication. They recommend that sensitive information should be sent only to websites that offer Secure Socket Layer (SSL) technology. This is where the receiving website URL is identified by ‘https’.
      Here are some other suggestions on using Wi-Fi in the Outside World at a Commercial installation based on your own individual usage.
      1. Occasion User.You may want to pay for access on a pay-as-you go bases. Do inquire about these plans.
      2. Regular User.You frequent the same public HopSpots. In this case, you may want to subscribe to an access plan offered by their Wireless Internet Service Provider so that each time you use your LT, you have a reliable secure connection which no change necessary in setup.

      Note 4: The list of Wi-Fi operations continues to grow. Here are few recent Headlines from the issues of USAToday about the World of Wi-Fi.
      1. Philadelphia fitted with Wi-Fi Deal (03/02/06) The city has signed agreements with Earthlink to own, build and operate a high-speed wireless Internet network, with initial deployment starting in the summer and to be completed in early 2007.
      2. Google, EarthLink team up on Wi-Fi Bid in San Francisco (02/22/06) This joint bid is in competition with 5 other bidders to provide free wireless, or Wi-Fi, service throughout San Francisco (SF) area despite problems that will be encountered by its hills. SF hopes to pick a winning bid in April 2006 and have this Wi-Fi network operational late this year.
      3. Disclaimer:H/AREA does not recommend or endorse any of these products or web sites listed in this Update. Starbucks Coffee was chosen in this article because it serves as a very good illustration of an organization that:
        1. Provides Wi-Fi capability outside the home as a service for their customers and
        2. Provides a Security Statement about that capability.

      C. Future Developments

      Wi-Max stands for ‘Worldwire Interoperability for Microwave Access’. It refers to any broadband network with wireless access and is based on the new IEEE 802.16 standard. Wi-Max is capable of transmitting signals covering in excess of 30 Miles of linear service area. This is MUCH greater coverage than that offered by Wi-Fi and makes it very suitable:

      1. For integrating the existing wireless operations in various buildings that make-up a corporation campus to an existing WLAN.
      2. Providing wireless service –hi-speed internet – in rural areas where they lack the wire connections. The Farmer is ‘Up-To Date in Kansas City’ when it comes to commodity grain prices.
        There is a link to a short article on this subject called ‘Will Wi-Max Make Wi-Fi Obsolete’.

        Goto:  Wi-Max/Wi-Fi.

      3. There is a link to see implementations of Wi-Max BrdBnd Access Technology.

        Goto: Wi-Max.

    2. Home Video Conferencing
      Your son or daughter’s family now live in Tucson Az. The telephone was one way of keeping up with them and their growing family via voice communication. But this is the internet age and both of you have up-to date computers at home. Email is nice since you can insert Pics. A far better way is use the internet for Home Video Conferencing where you can Talk to Them and SEE THEM. If you use a cable or DSL for your internet connection, you are ready to enter the Web Cam era.
      An excellent web cam is made by   Logitech (Lgth). The Pro 4000 Web Cam interfaces both PC and Mac and it:

      1. Has a high quality VGA CCD sensor.
      2. Has a built in microphone for sound.
      3. Utilizes the computer USB port as the interconnect.
      4. Comes with easy-to-install software.

      There is also a Web Cam version suited for the Notebook. Both types of Web Cams cost under $100.
      The Web Cam manufacturer recommends that the support medium be MSN® Messenger. [Note: MSN Messenger is now called
      Windows Live Messenger (WLM) and the latest is Version 8. This is a free download from Microsoft.
      WLM will give you instant access to your family/friends via text, voice or video.DONOT CONFUSE this program
      with MS's Windows Messenger which does have similar but limited features
      WLM's start-up procedure requires that you enter two items; your email address and a password. You register
      these with Microsoft.NET Passport. WLM has link for this on its opening web page.
      Now,You can now see and talk to all the grandchildren in ‘Living Color’. And if the six year old
      suggest a game of chess, you’re in the game because WLM has a game que.
      How ‘Bout That ? Not a bad idea if you are stuck in the house on rainy or snowy afternoon and you’ve got
      a little buddy 2000 miles away. Enjoy !!

    3. VoIP (Voice over Internet Protocol)
      Voice over Internet Protocol (VoIP) has begun to take hold in the business world since it can produce cost reductions in phone access charges due to limiting the use of the existing phone network in favor of the existing internet structure.
      Internet based phone service is also available to individuals. The cost of this VoIP service to an individual has two basic components; the internet calling plan from a provider and the cost of broadband internet service whether it be a digital subscriber line (DSL) or cable.
      There is a downside to VoIP service since the computer interface is powered from the local public utility. A power outage due to a Rage of Mother Nature or an outage similar to The Great Summer Blackout of 2003 would render VoIP service unavailable in that area until power was restored.
      Your normal telephone service has its own separate power system and should continue to function (The cordless type will not).

      It is suggested that the Viewer gain more insight into VOIP by reviewing How VoIP Works.
      This article examines a) How VOIP works; b) Compares the Operation of the Standard Phone System to The VOIP System and c) Lists the Pros and Cons.

      Click on Link:  HwVOIPWks

      Here are two VOIP Services:
      1. Net2Phone® (N2P)

        Merger Update:
        IDT Corporation (NYSE: IDT, IDT.C), an international telecom, entertainment and technology company, and Net2Phone, Inc., a leading Voice over IP (VoIP) enabler for service providers, jointly announced today that they have executed a merger agreement, dated February 17, 2006, providing for the acquisition of Net2Phone by IDT.

      2. Vonage® (Vn)

    4. Competitive Market Pressures are at Work in This Industry
      1. Major Cable Companies such as TWC, Comcast, Cablevision, Charter, Cox offer the consumer a 'Bundled Service Package'.
        This consist of Digital Cable, High-Speed Internet, and Digital Telephone. This Triple-Header Service does have a nice "Sales Appeal."
        There are two (2) important question to ask the Cable Provider.
        • Can I call 911 using a Digital Phone Service?
          This Service S/B capable of transmitting your address and phone number to emergency services should you dial 911.
        • Can I call 911 using a Digital Phone Service when there is a Power Outage?
          The answer C/B YES or NO. Some Cable Companies supply a Back-up Power Source (BUPS) to meet this situation. If a BUPS is not available, your Cell Phone is Your Friend-In-Need.
      2. Verizon Communications is spending close to $25B nationwide to build a new fiber network - FiOS - which can deliver TV, High-Speed Internet and Digital Phone Service.
        Note: In answer to above Power Outage / 911 Question, Verizon does provide a BBU - Battery Back-up - to power the FiOS phone service only.
        There are four states including New Jersey which have passed a video franchise law. The law, as applicabe to New Jersey, allows any cable provider to apply for a statewide franchise and by-pass the lengthy town-by-town negotiating process. The idea is to spur market competition thats been long dominated by a single cable provider in a particular area and give consumers greater choice. The hope is that competetive market forces will produce lower cable bills and stop their annual climb.
      3. And then there is Skype.
        Skype users essentially make telephone calls and video calls through their computer using Skype software and the internet. The basis of the system is free communication between users of Skype software; however the product also allows Skype users to communicate with users of regular landline and mobile telephones.
        This software is currently available free of charge and can be downloaded from the company website.


        Before doing so, It is suggested that the viewer might want to compare Skype and Vonage Calling Operations.

        Click On Link:  Skype-Vonage

    5. Computer Back-Up:STORAGE

      One of the 'Do' Commandments when using a computer is performing a habit called BACK-UP. This is a discipline that requires TIME To Do after the task of creating or updating critical documents has been accomplished.
      Critical documents can be financial records, email correspondence, pictures, videos, and whatever you consider personal documents.
      There are 'User-Justified ' reasons why the BackUp task is not done -- It requires Additional Operatot Time and a Storage Capability.
      The reader should be aware that Information stored on a computer Hard Drive (HD) can be lost in an instance due to certain situations.
      • HD disks can fail.
      • Operator Error. You toggled the 'Delete' Key once too often.
      • Virus Corruption.

      Here are some methods to avoid the these type of Disasters.
      1. Back-up Your Files Via the Internet using a Remote Server.

        A Recommended Online Storage Service is:   Mozy

        This site is an automated service via the internet to their remote server for File Back-UP and which provides file encryption so your privacy is preserved.
        • Mozy Free
          This is 2GB of 100% Free Back-Up Space which may be enough space for the average user to preserve their personal files.
          It is necessary to download Mozy's software onto your computer and then check off the files you want to preserve.
          Their software program works in the background so that Mozy does not interfere with your normal activity at the computer. It checks periodically your computer HD and does a back-up When a file is added/changed and when there little or no compter activity.
          The user can set the upload schedule for back-up.
          It is highly recommended that you have a fast DSL or Cable Internet Connection to do backups and restore files. Experience has shown that the 1st Backup may take several hours if the user stores files at the maximun limit such as 2G's
        • Mozy Unlimited
          Mozy offers additional space -Upto 30G's- for a price of $4.95/mth.
      2. BackUp Using Commericial Programs.
        Roxio Easy Media Creator 9 Suite.
        This program has disc-burning utlities for CD's and DVD's. Their website is:   Roxio

      3. Big Storage: An External HD Attached to Your Computer
        Port compatability is thru USB2 or Firewire. The drive itself is rectangular shaped and can usually sit on top a desktop tower, or along side the computer.
        It should recognized that this type of Backup is Internal. An event to your home ( Fire, Storm Damage, etc.) could also wipe out your BackUp HD.
        The Golden Rules When Buying External HD's.
        • You can never really buy a hard drive with "too much" memory. ( FILES MULTIPLY. YOU WILL STORE & STORE MORE FILES.)
        • Hard drive capacity is measured in Megabytes (MB) or Gigabytes (GB).
        • Buy as many GB as your budget allows.

        There are a number of External HD Suppliers: Iomega, Lacie, Maxtor, Seagate, Western Digital. Drive capacities range <100G to +500G.
        External HD Prices range btwn $100 - +$250. As an example (& As of 02/07):A Western Digital 320G My Book Essential is priced by one electronic 'house' @ $140. Iomega offers a similar HD for the same price.
        The reader is encouraged to review these products @ CNET. Their Home Page offers a large Product Review Section.

        Goto:   CNET

      4. Portable Storage: Flash Memory
        Once upon a time (And Not So Long Ago) in the Land of Computers there was the Floppy. It was limited to around 1.4M of storage so you had to have a deck of floppies to save your data. The Floppy is still around but applications have changed. Todays computers do not come with Floppy Drives installed unless requested by the buyer. It's been replaced by a multi-use CD/DVD Drive.
        Now comes the Flash Drive (FD) with its USB interface. The interface is compatible with USB 2.0 or the slower USB 1.1. The user can make fast data transfers of his files and its very small size makes it quite portable.
        The FD Memory Capacity runs from 256MB to 4GB. The 1GB/2GB FD's are now priced under $50. Lexar Media, Memorex, Kingston are some of the FD suppliers.

    6. Video Downloads

      The Wal-Mart Video Downloads Service closed on 12/21/07.

    7. Cell Phone Swap Service

      There are various reasons you may want to swap your cell phone service.
      1. Spotty Coverage in your area. You get a lot of ‘Drop-Outs”.
      2. A Better Monthly Plan is available.
      3. You got "New Phone Fever". You want a more productive phone for your particular usage.

      The big road block stopping you from this Change is the high early-termination fee in your contract. Your Cell Phone Provider (CPP) does that because ‘They sold the Phone to You at a Reduced Price’.

      What to Do:
      1. You might be able to bargain with the CPP over ‘spotty’ service -- if You can prove this to them.
      2. A Cell Phone Service Swap.
        This means: Trade the Remainder of Your Contract to Someone else. The Qualifiers are:
        1. You have a Long-Term Cell Phone Contract. It allows You to opt out of the termination fee if you find someone to take over the remaining term.
        2. Your Contract has a Year of Life or so remaining which makes it Short Term in Duration.
        3. Here are Two (2) Websites that offer this ‘Matchmaking Service (MS)’.

      You pay a small fee to the MS website to post an add seeking someone who wants short term access to cell phone service. If a ‘Match’ is made, it is up to the CPP to qualify the new person (He passes their credit check ).
      The CPP authorizes the transfer of the contract between parties. Once that happens, You are now free and clear of that CPP.

      There are reasons why people pickup the remainder of a cell phone contract.
      1. They get cell phone service w/o paying an activation fee.
      2. They get to try the service w/o a long term commitment.

    8. Podcast Web Links

      Podcasting is a free service that allows Internet users to pull audio files (typically MP3s) from a podcasting Web site to listen to on their computer or personal digital audio player.
      The name comes from a combination of the words IPod (a personal digital audio player made by Apple) and broadcasting. Even though the name is derived from the iPod, you don't need an iPod to listen to a podcast.
      You can use virtually any MP3 player or your computer. Many podcasters have websites that link to their shows. Here are three (3) of them.1
      Suggestion: You'll need the QuickTime Player on your cmptr. The latest version can be DL'd from the Apple Website.
      1.   Podictionary

        Each day Mr.Charles Hodgson examines the History and Origin of an English Word. A directory of previous Words is available to the VIewer.
      2.    Art History

        This is a video podcast by a Mr.Christopher Witcombe. Watch his takes on two (2) Leonardo da Vinic Masterpiece's: The Last Supper and Mona Lisa.
        Both are Excellent Presentations. To Quote the Show's Credits: It's Art History in A Minute.

      3.     Speaking of History

        This is an education podcast by Eric Langhorst who's a school teacher of history in MO. This is his way of geting his students to connect to history.(Apparently, They Have Pod's and are into the new technology.)
        Click on Link Mr. L's Virtual Classroom -My Classroom Site.
        Click on Link Listen to Studycasts & Podcasts Here.
        Select and then Click on the Subject You Wish to Listen To. There might be some delay before a Sound Player appears on your screen and the program begins. Don't Lose Patience; It will arrive.

        1.See USA Today, Section D - Life; dated Friday, 03/16/07; "Get an Earful of the OffBeat" by M. Puente.

    9. Hi-Def DVD War

      There's a great cartoon in the 02/20/08 issue of USA Today. A man walks past a group of tombstones (TSs) in a Cemetery (Which Shoud Aptly be Named - The Hi-Tech Repository}.
      The TSs Read L-R: The 8-Track; The Cassette; BetaMax and now the latest to be buried HD-DVD.
      The Blue-ray format, promoted by the Sony Corp.,is the 'likely' winner in high-stakes tech drama that they fought against rival Toshiba's HD-DVD.
      This DVD format battle reminds one of a similar tape format battle that was waged years ago between the winning VHS format and Sony's Betamax.

      In this latest Industry Battle, Toshiba claimed that their format benefited the Consumer in two ways:
      1. Their HD-DVD Player were less expensive than their rivals and
      2. Their HD DVD's used the same disc design as the current DVDs. This made them cheaper to produce and buy.
        Sony claimed that their Blu-ray disc could store more content which had a big appeal factor to certain movie makers.
        An Industry Comparison of storage capacity for a Single Layer Disc had the HD-DVD at 15GB and the Blu-ray DVD at 25GB.
        Both type of discs use the blue-laser light technology where the laser read data 'Pits' in the disc.
        The 'Fork-in-the-Road 'is in the disc internal design. The two types of disc differ on the internal placement of polycarbonate layer(s), the location of the data 'Pits' and their 'Pit' width.

        The DVD Industry Parties took sides in this format 'War'. Universal and Paramount favored the HD-DVD. Disney, Fox and Lionsgate favored Sony's Blu-ray format. And Then Came Warner Bros.
        Warner Bros. carries a BIG HAMMER. They account for a very large percentage of all U.S. DVD sales. They made a decision to favor Blu-ray over H-DVD.
        Once said, the major retailers like Best Buy and Walmart followed up by announcing they would only sell Blue-ray DVDs and hardware. Netflix, Inc will no longer have the H-DVD format in their inventory for rent.
        So, What does this mean to the Consumer.
        Consumer: H-DVD Player. If You were an early buyer of this technology thats the Risk You Run and it may leave you with a very bad feeling.
        You might want to stock up Now on H-DVD Titles. The On-Line Retailers are bound to have discount sales in order to reduce their H-DVD stock.
        Toshiba will most likely support their player with parts and service. This pays off having a ' Good Rep.'
        It's possible that retailers might come up with some sort of "Buy-Back' programs to help recent HD DVD buyers switch players and ease their 'pain'. It was an Industry Decision to go Blu-ray. The Consumer Had no Vote.
        Toshiba's lower price H-DVD player(s) did force Sony to lower the price of their least expensive Blu-ray Player to around $400.
        The price of Blu-ray Players will only come down (To Earth) when SomeOne - More manufacturers - decide to enter the Blu-ray Player Business.
        We do have a Global Economy Today. There must be somwewhere on the China Road -just west of Shanghai -that SomeOne.

        The Viewer can gain further Insight on this Subject:Sony's Blu-ray Wins DVD 'Format War' over Rival Toshiba by clicking on Link below.
        There are (2) choices: Read the Transcript or Watch the PBS Video. Please Turn on your Speakers & Up the Volume for the latter.
        This was originally Aired on PBS: February 19, 2008. Ray Suarez has the story. He's with The WSJ's technology columnist WALTER MOSSBERG to explain the move and its likely impact on consumers.

      3. Blue-ray Wins DVD 'Format War'

      Reference Material for the above Article are:
      • The Forum,USA Today, 02/20/08.
      • As Toshiba Surrenders, What Next for DVD's; WSJ Marketplace, 02/19/08.
      • Sony Disc Poised for Victory; The Record, 02/19/08.

    10. HD Radio

      Some 50 years ago FM stero was introduced to radio broadcasting. In Yr 2002, HD Radio technology made its debut in the U.S.A. This permits AM and FM radio stations to broadcast their programs digitally.
      The HD term isnot the High Defintion associated with television. It was the brand name chosen by Ibiquity Digital who is the developer and licenser for its digital radio technology.

      Here is what HD radio offers:
      • FM stations now with CD-quality sound.
      • FM Multicasting – the ability to broadcast multiple program streams over a single FM frequency.
      • AM stations now with FM-quality sound.
      • Crystal-clear reception with no audio distortion.
      • Unlike Satellite Radio, There is no subscription fee for this service. HD Radio is a free broadcast supported by commercial advertising or via public braodcasting.
        You do have to get a new HD Radio receiver for your home or car.

      Their WebSite is:
      1. HD Radio

        This Site has information on:
        • What Is It?
        • How Does It Sound.
        • How Does It WorK.
        • Find a Station in Your Area. A U.S.A Map is supplied where one can select his locale.
        • Products.
          This is a list for the Retail, Home, and Automotive Products and their Suppliers. And There are Many !

        This Site has internal Links to:
        • Consumer News.
        • Ibiquity Digital.
        • An FAQ which should help Answer the Many Questions You Have. Browse thru this section to get the 'Jist".

        The Viewer can get further Insight into this Technology by going to this WebSite.

      2. Wiki - HD Radio

        This WebSite provides:
        • An Overview of AM & FM.
        • A Comparison to European Union's Digital Radio.
        • Criticisms with Respect to Awareness, Expense, Coverage.
        • Programming such as Simulcasting.
        • Availability of Receivers for the Home/Office & Auto.

    11. Global Positioning System (GPS) Units

      You can now keep those road maps in the glove compartment. The GPS unit is an invaluable 'friend' when one is traveling in unfamilar territory and wants to navigate there.

      GPS uses Satellites to pinpoint your location.
      The Viewer can gain further Insight on the subject of GPS and their use of Satellites by going to:
      1. About GPS

        This Site has information on:
        • How it Works
        • How accurate is GPS?
        • The GPS Satellite System
        • What's the Signal?
        • Sources of GPS Signal Errors

      Here are some GPS Navigation Features to consider.The GPS Unit should:
      • Provide a list of PoI's - Points of Interest.
      • Be capable of providing alternate routes.
      • Turn - by -Turn Voice Directions that translate Street Names into Speech. This is important because the driver does not pay attention to the screen.
      • Real-Time Info. This is for the Commuter because the info contains traffic flow and the tie-ups due heavy flow, road construction, weather, or accidents.
        There will be an additional cost to you for this type of information.Pay for What You need.

        Two Major Considerations If You Buy into This Product:
      • Maps Change & Need Updating.  Its the Nature of the Beast as New PoI's and New Roads/Route Changes become Available. These Map Updates will be Expensive.

      Here are some GPS Unit Names and their Manufacturers to Consider.
      1. Garmin US

        Click on Products
        ( Next screen): Click on Automotive. The Viewer has the opportunity to compare the selected unit with the many other GPS Unit listed on this page by the Mfr.

        ( Next Screen): The Nuvi 660

        This unit has:
        • A sunlight-readable, 4.3-inch display.
        • An FM transmitter so that You can hear the Audio prompts thru Your car's stero.
        • A Traffic Receiver.

      2. Navigon

        Click on Products.

        ( Next Screen.) Click on:Navigon 7100

        This unit has:
        • A 4.3in screen.It translates Street name into Speech.
        • It offers the ability to:
            a. Enter routes with several destinations
             b. A Zagat Directory which is free. You are served up with restaurants and hotels. A Phone Icon is available so that You call -hands free -for a reservation.
              c. The Traffic Report feature is free (For 3mths). Alternate routes are provided if there is a road problem.

      3. Magellan GPS

        Under Products, Magellan offers GPS in Action. Click on Driving and Find Out More.

        Under Products, Click on:  GPS Units.   The Viewer has the opportunity to compare the selected unit with the many other GPS Unit listed on this page by the Mfr.

        ( Next Screen.) Click on:   Maestro 4250

        This unit has:
        • A 4.3in wide color touch screen.
        • Voice Command & Control. This enables hands-free operation.
        • Maps of the U.S. and Canada.
        • 6 million points of interest (PoI) and an AAA TourBook Information. This enables you to easily find destinations.

    12. Chumby - An Internet Info Device

      This is a Smart Device that fetches information from the Internet.

      It has been descibed as 'A Little BeanBag ' which displays its content on an LCD screen.
      This Device is perfect for your Kitchen, Office, Den, etc. for Internet Info OverLoad ---- as long as You Have a Wireless Broadband Router (Wi-Fi).
      The Chumbly Network (CN) -- ( There is No subscription Fees ) --- furnishes you with:  Time, Weather, Music , News. Photos, All from the Web.
      The CN WebSite has over 400 Streaming Widgets to chose from to update your particular needs.
      The Vitual Keyboard - A PopUp - is strictly for Reading and Viewing. It is not for Typing & Sending Messages.
      It has a Touch Screen. This handles your commands of 'Play' and 'Stop' for Music streams.

      The Web Address for the Device Manufacturer is:
      1. Chumby

      This WebSite has the following information on this device
      • Home.  What is a Chumby?
        This Question can be answered by clicking on the Various Information Categories that are located on the Bottom of this Page.
        Goto 'About Us' and Click on 'The Company Fact Sheet' & then 'Their Management Team'.
      • Widgets.
        These are mini-applications,simple bits of code, easily dragged onto a desktop or pasted into a personal page,
        where they are constantly updated with whatever information you want.
      • The Store. Various Models are Displayed along with:
        Their Specifications.
        What the Device is Capable of Doing.
        Wireless Requirements.
      • A Help Area where Top Questions are Answered.

    13. Electronic Reading Devices

      Electronic Reading Devices (ERD).
      Here are two (2) Devices on the Market that the Viewer may wish to Explore which let You Carry a Library Wherever You Wander.

      The Amazon Kindle and the Sony Reader Sections were Updated.
      Information from the 2010 CES on T-S Tablets and EDR's was added.

      1. Amazon Kindle

        Under Shop All Departments,Click on Categoty Kindle.

        The Kindle Section will provide the Viewer:
        1. Product Overview
        2. A Video Demo
        3. Tech Details: Display; Size; Weight; System Reqm'ts
        4. Product Description
        5. Books, Newspapers & More.
          Amazon Claims that:
          • The Kindle Store currently carries more than 400,000 books,newspapers and magazines
          • All titles are wirelessly delivered right to your Kindle for free.
          • Buy a book and They auto-deliver it to you wirelessly in one minute.
      2. SonyStyle

        Under the Special Offers, Click on Reader Digital Book.
        This opens a section called Readers Offers & Information + Content.
        Sony offers E-Books and Periodicals such as regional Newspapers.

      The Yr.2010 Consumer Electronics Show (CES).

      The CES was held in Las Vegas, NV during the 1st week of January.
      Dozens of companies, both well known and unknown, brought slender touch-screen tablets and electronic reading devices to the CES.
      Here is NYT article on these various devices.

      T-S Tablets & ERD

    14. Cellphones

      Cellphones is a New Addition to the Evolving Technology Section.

      There is today a proliferation of Cellphones with different features and prices being offer to the public. Names like iPhone and Droid are have become commonplace words in cellphone vocabulary.
      Here are some Websites where one can find information about the present Cellphone World and what variables to consider when purchasing one.

      CNET provides the latest Cellphone reviews. This includes the Editor's Favorites and The Most Viewed.
      The viewer can located a particular Cellphone through a Cellphone Sponsor Block which features AT&T, T-Moblie, Sprint, HTC, and Verizon Wireless.

      1. CNET/Cellphones

        Click on their Buying Guide. It lists:
        1. Pick a Cellphone Provider
        2. Choose a Cellphone Plan
        3. How to Purchase a Cellphone
        4. Key Cellphone Features
        5. Buy & Upgrade Your Cellphone

        Their Buying Guide lists Cellphones by their Usage:

        1. The Camera Phone
        2. The Basic Phone (W/o Camera)
        3. The 'Smart' Phone'
        4. The MP3 (Music) Phone

        Here is another Cellphone Information Website.

      2. WM.AllThgsDigital

        Walt Mossberg (WM)write a weekly Personal Tech Column for the WSJ. The Viewer may have to use the Archieves for Article Retrieval.
        The following products were reviewed.
        1. Google's Nexus - 01/05/10
        2. The Smartphone War (SpW) - 04/10/09
          SpW looks At:
          • Apple's iPhone
          • RIM's Blackberry
          • MS's Window Moblie
          • Palm
          • Nokia

    15. The Apple iPad

      This Evolving Technology Section has been Revised to Included the Following Article on the Apple i Pad 3.

      Here are two (2) Independent Reviews for this Product that will be introduced to the public on Friday March 16,2012.

      These Reviews looks at both its New Features and at Their Shortcomings.

      The 1st Review is by Peter Grad, Record OP-ED Page Editor, THE PC GUY.

      The 2nd Review is by Walt Mossberg, the Wall Street Journal columnist has his own technology-focused website All Things D.

      i Pad 3 Review #1

      i Pad 3 Review #2

      The following Evolving Technology Section is for the Apple i Pad 2.

      And A Man named Jobs will Lead Us to the i Pad 2 !

      The Apple i Pad 2 was released on 03/11/2011.
      Here is an i Pad 2 Presentation from Apple's WebSite.

      Apple i Pad 2

      The following Table is a Price & Features Comparison between i Pad 1 and i Pad2 for 16GB, the 32GB and the 64GB Models.
      The i Pad Models that have the WiFi +3G features have additional Costs associated with their usage. See Review #3 below.
      Table Reference: Business Section, Bergen Rcd, Friday, 03/11/11.

      Price & Features Comparison of the i Pad 1 / i Pad 2

      i Pad 1 Price/Features i Pad 2
      $399 16GB WIFI $499
      $499 32GB WIFI $599
      $599 64GB WIFI $699
      $529 16 GB WiFi+3G $629
      $629 32GB WiFi+3G $729
      $729 64GB WiFi+3G $829
      None Cameras Frt & Bck
      10 hrs Battery Life 10 hrs
      A4 1GHz Processor A5 dual-core 1GHz
      1.5 lbs Weight 1.3 lbs
      13.4mm Depth 8.8mm
      1042x768 Screen Resolution 1042x768

      Here is Review #1 of Apple's new i Pad 2. This review looks at both its new features and at its shortcomings.

      A Flat Out Tech Marvel

      Here is Review #2. This is a Roundup of Critics. The Reader can have a 'Quick Read 'on the various Views
      Or a 'Long Read' by clicking on the internal Links within Critic's Website.

      Critics Weigh In on i Pad 2

      Here is Review #3.

      i Pad2 (Wi-Fi +3G)

      This article looks at the cost factors associated with using this model. Monthly plans are available from both ATT and Verizon Wireless.
      It also covers: 1) Full Product Review: 2)A User's Review: 3) Specs.

      And Then There is The Competition. How Does Apple Maintain 'Market Share in this Environment ?'

      Apple's Price Advantage

      An Then There are Apps for the i Pad: Some Apps are Built-In. Apps are Available from Apple's App Store (65K & Counting).
      Note: The development of Apps has given rise to a new Lucrative Industry for programmers.

      Click on the Link Below.

      App Store

      This is not the only App Source. The Viewer can go on the Internet and find other sources using various search programs such as Google, Bing, etc.

      A Look Back
      The i Pad 1 was introduced on 01/27/10.

      The Introduction of the i Pad2 creates a secondary market for the i Pad 1. The 'Techies' and '1st on the Block to Have' will move up to the i Pad 2 shedding their original buy.
      This could then be a 'Good Buy Opp' for those persons that have never owned an i Pad1 and wanted to find out 'What's It All About' !
      Here is a Review of one i Pad1 Device from CNet to help you. Note: Please bear with the Commercials.

      i Pad 1 -16GB Review

    16. The Language Translator

      The Language Translator (LT) is a New Addition to the Evolving Technology Section.

      GOOGLE LT translates text, webpages, and documents in 52 different languages ----- FREE. Click on this Link below to Open.

      • The GLT

        Here FYI is a very recent news article that discusses their development of the LT. Click on this Link below to Open.
        The Viewer can compare Google's Translation of some text to translations by two other competitors.
      • Tech 09 Translate

    17. Netbooks
      Netbooks is a New Addition to the Evolving Technology Section.

      A Netbook (NtBk) is a small Notebook PC with lightweight mobility.
      It appears to function as a Notebook but there are differences.
      Here are its Main Features.

      1. NtBk Demensions are S & S:
        Small ( Approx.12” L x 7” W): Slim (Approx. 1”H)
        Weight: Less than 3 lbs.The NtBk is no Back-Breaker to Carry Around.
      2. It DOES NOT Have a built in CD/DVD drive. It requires an external drive to use these two types of discs.
      3. The Screen Size is approx. +10 inches on the Diagonal.
      4. Storage Capacity: >160GB.
      5. Built in Webcam and Digital Microphone.
      6. Ram Memory: 1GB Min.
      7. A QWERTY Keyboard. Its size will be around 90% of that used on a NoteBook Cmptr.
      8. The NtBk is powered by a Lithium Battery or an AC Adapter.
      9. Several USB Connectors to allow connection to various external devices.
      10. The NtBk uses a special processor; The Atom from Intel.
        This processor is very efficient low power device specially designed for this application.
      11. Operating System: S/B MS Windows 7.
      12. Wireless Capability: Built-In.
      13. 3G Connectivity (3GC). This is for people who have to have access to the internet for their endeavors.
        The 3GC can be arranged thru carriers like AT&T or Verizon Wireless. Its cost varies and depends on monthly usage.
      14. Wi-Fi Friendly. Its should have 802.11b, g or n capability. This brings the WWW to your home; to your work or to public places.
        And the Best Part:
      15. Cost: NtBk average price is around $300 - $500.
        This requires(AS ALWAYS) Shopping Around for Price Comparison.
      16. There are several NtBk manufacturers to choose from.
        They are: HP, Gateway, Acer, Toshiba, Sony, ASUS.

    18. 3D TV
      3D TV is a New Addition to the Evolving Technology Section.

      This is a new technology.
      There are several well known Manufactutrers of 3D TV's. They are:
      LG,Panasonic, Samsung, Sony, Toshiba, and Vizio.

      The following Web Source CNET provides an extensive review of this technology.
      Click on:


      In Their Search Box, Type In 3D TV FAQ and Click.
      On the Next Screen, Under Related News & Featured Articles

      Click On: 3D TV FAQ.

      This FAQ Review contains some 20 Topics and there are several Pages devoted to Reader Comments on these various Topics.
      Note:There are Limited Comments made below on that particular Topic by this writer The entire Topic Commentary from CNET S/B Read.
      Here is a Sample of the Topics.

      What is 3D TV ?
      Comment:We see the world around us in 3D everyday using our eyes and brain. 3D technology creates the illusion of depth in a two-dimensional image by
      presenting a slightly different view to each eye. Special 3D glasses compatible with your 3D TV screen create three-dimensional images.

      Can the 3D Feature on 3D TV be Turned OFF?
      Comment: YES ! All 3D TV's will display current 2D content with no problem and with no glasses required.

      What 3D Movies are coming out this year on Home Video? 3D TV Channels? 3D Games ?
      Comment: A new 3D Blu-ray Player will be required for many viewers to view the new full - HD 3D Blu-ray DVD's.
      Direct TV and ESPN have said that They will launch 3D Channels this year.

      I'm Thinking of Buying a New TV. Should I wait for 3D TV's?
      Comment: Its your Choice of Entertainment Viewing. There are several TV manufactutersthat now offer 3D TV sets such as Sumsung and Panasonic.
      These 3D TV Sets can cost well over $2000.
      SO-O How 'Deep' are Your Pockets?

      Buying into 'NEW' Tech at the beginning of its Cycle is always expensive and perhaps 'Subject To Change'.

    19. The "Dark Side" of C & C

      The "Dark Side" of C & C is a New Addition to the Evolving Technology Section.
      It contains four (4) Videos from the PBS Newshour that Looks at CyberCrime, at 'Hackers' and at Cyber Conflict.

      Video #1 - 12/22/09

      How Dangerous is the Cyber Crime Threat?

      There was a WSJ Story that there had been a Computer Attack on the Financial Institution CITI Group by a Russian Cyber Group resulting in a large loss of money.
      PBS Anchor Jeffery Brown interviews James A. Lewis, Director & Senior Fellow,Tech & Public Policy Program, Washington D.C.
      This is a 7+ Minute Video that looks at the Computer Attacks, the Cyber Crime Threat and Its Complexities.

      Video #2 - 08/10/10

      What is the 'Hacker Mindset?'

      PBS Reporter Spencer Michels interviews Jeff Moss the founder of both the Black Hat and the Conventions.
      This is a 3+ Minute Video.The subject is Cyber Attacks - Computer Hacking into Systems for Fun and Profit and Intrigue.
      The Attendees at these Conferences want to learn how to better defend against on-line attacks. Their info souce is the BAD GUYS.

      Video #3 - 08/11/10

      Hayden: Hackers Force Internet Users to Learn Self Defense

      PBS Reporter Spencer Michels interviews Gen.(RET.) Michael Hayden who has served both as director in the CIA and NSA.
      This is 7+ Minute Video. They discuss the openness of the Internet design which is a great plus for hackers over those people
      who must find ways to defend their data.

      Video #4 - 08/12/10

      Online Fraudsters Increasingly Skilled at Hacking Bank Accounts

      PBS Reporter Spencer Michels interviews Guardian Analytics (GA) CEO Terry Austin. GA is a fraud prevention software company.
      This is a +2.5 Minute Video that looks at how vulnerable our Online Banking Infomation is.

    20. Is There a 'Cloud' in Your Future ?

      Is There a 'Cloud' in Your Future ? is a New Addition to the Evolving Technology Section.

      'Cloud' is a term that refers to Cloud Computing (CC). These are business features that You run on somebody else’s computers using a Computer-Data Center (C-DC #1).
      You provide back-up protection to your business features thru a different Computer-Data Center (C-DC #2).
      These two C-CD's are interconnected to your In-House Computer System via the Internet. You -the User- access these features on your Web Browser.
      The following Website Article provides the Reader an Update on this Subject.

      Cloud Computing Explained

      NOW --- What brought this all about ?

      And the Answer is ---- Server-Virtualization Software (S-VS). A company called VMWare is leader in this particular field.
      S-VS allows one computer to take the place of several computers. This is accomplished by the running of more than one operating system
      and adjusting their allocation on a As Needed Bases.
      The Reader may want to explore the VMWare Cloud Computing Site for an Info Tour.
      Click On:

      VMWare - CloudComputing

      Two companies -Amazon and Google - are presently the main Computer-Service Providers. They have the Computer- Data Centers with the capacity to
      "Do Their Own Thing" and at the same time Provide CC Services and Applications.
      It was the growth of the various social-networking companies + your moblie services that gave Amazon and Google a headstart on the utilization of their C-DC's
      (And Has Provided Them- Within the Last Few Years - A Sizable Increase to their Bottom Line).

      'Cloud' has also produced companies that provide Software Applications (SWApps) for business via a subcription service route.
      SWApps is in an Envolving State based On the Need and the Competition. is a major provider of Customer-Relations Management (CRM) software which is utilized on various sales management operations.
      There are other companies -niche players- who serve certain narrow business applications.

      Many companies have embraced the Cloud Computing technology as way of 'Bettering Their Bottom Line'. On the Other Side of this Envolving Tech,
      Companies that once sold servers, storage,and networking equipment to them will find their market decreasing as the need for individual Company data centers shrink.
      Their customers will be limited to the Computer-Service Providers.
      This leads to a very competitive environment over Equipment Pricing, Servicing and Possible Industry 'Shake-Outs'.  TBD !

    21. ATM Fraud

      The following WSJ article shows Criminal Ingenuity when its comes to targeting bank automatic teller machines -ATM's.
      They use some very sophisticated methods.

      AND THERE ARE STEPS that the ATM User can take to avoid this ordeal happening to his bank account.

      ATM Fraud Gets Even More Brazen

    22. The New Digital Generation! Did Our Gen Miss Something ?
      The following NYT article is about the New Digital Generation. The High School Students (HSS) of Today now have at their disposal
      a host of communicating websites ( My Space, You Tube, Facebook, Twitter, etc ) via their internet service
      or via their cellphone (equipped with the latest built-in camera).
      And Then There Are the Numerous Video Games (VG) that could occupy a Student's study and homework habits.

      Note: VG's is a World unto itself. There are the Game Consoles - XBox, Nintendo, PlayStation - and the Games themselves that have ESRB's ranging from Children Only to Adult Only.

      These technologies were never available to the 'Older Generation' when they were HSS simply because ---"They Hadn'Been Invented Yet!".

      The article looks at Today's High School Students Growing Up in This Digital World and Where It Might Lead Them To.

      It might also go towards answering the Question ---Did Our Older Generation Miss Something ?
      This is left to the Reader to Decide !

      Growing Up Digital, Wired for Distraction

    23. Smart TV's
      For a very long time consumer electronic manufacturers have been trying to interconnect the internet and TV.
      It appears that the 'Push' is ON!
      This very recent WSJ article looks at possibility of 'Smart TV's' in your Living Room.

      TV Makers Turn Their Hopes to Apps

    24. New TC Browsers

      This Evolving Technology Section has been Revised to Included the Following Article.

      New Powerful Web Browsers have been released. They are:
      1. Firefox 4 -
      2. Google Chrome -
      3. Internet Explorer 9 - www.

      The following article reviews them. Click on the following Link.

      New,Turbocharged Browsers

    25. Amazon Kindle Fire

      The following article reviews the introduction of this this device. It includes:
      • A 2.5 Min. Video.
      • A Kindle Fire vs IPad Comparison (See Interactive Feature).

      Click on the following Link.


    26. Guide to Mobile Music Streaming Systems

      Apple, Google and Amazon now connect You to your Music Library. Each system now lets you buy songs,store them faraway in 'Cloud Computers'
      and when you desire, retrive them wirelessly on devices connected to the internet.

      (The Viewer-For Reference -may wish to review the following Evolving Technology Entries:
      (1) ET Entry #20: Is There a 'Cloud' in Your Future ? and (2) ET Entry: #25 Amazon Kindle Fire.)

      Click on the following Link.


    27. How Libraries View e-Readers - Opps or Headaches

      This Section has been Revised on 01/12 to Included the Following Article.

      The Kindle, the Nook, the iPad - e-Readers – are now popular with the public. Public libraries see two sides to them: An Opportunity or A Headache.
      The following article by Mike Kerwick, a Bergen Rcd (NJ) Staff Writer, explores both sides of this Issue and provides a pathway on how to borrow an e-Book
      from your local library ( YES – You do need a library card).
      Some e-Books are very popular and there will a waiting list for them. Libraries have only so much money and have to set limit on the number of e-Books
      that they can purchase of a particular book.One major factor is that Interest in a certain book does wane after time.
      Click on the following link.


      The New Jersey Viewer can see if a library in his area is in the e-book system by clicking on the following link to this Website:


      Once on the Site, Click on Libraries to determine what is in your locale.

      Viewers Outside NJ should do a search ( Using Google, Bing, Yahoo) for Digital Libraries in their particular state.

    28. RoboCalls Make Hit List

      This Section has been Revised on 03/12 to Included the Following Article.

      There's going to be fewer annoying RoboCalls (RC) to your home. The telemarketers promote their sale of a product or a service using a phone technology
      that allows them to connect to a vast number of consumers including You at the same time. The following article indicates that RC days are numbered by the FCC after
      receiving a large number of complaints from the public.

      Click on the Link RoboCalls for the full story.


    29. Living Online in the Afterlife

      This Section has been Revised 03/12 to Included the Following Article.

      When We die, Our Online Existence lives on. You cannot close out your internet life from the grave. Here are two newspaper articles on the subject.
      1. Peter Grad, PS Guy columinst for the Bergen Rcd explores this new area in the Online Article where Estate Planning may be very necessary.

      Click on the following Link.


      2. A Bergen Rcd Editorial - Dated 02/25/12 Virtual Immortality - examines this unknown area also and what steps an individual may have to take.

      Click on the following Link.


    30. A Robot is the Life of the Party

      This Section has been Revised on 03/12 to Included the Following Article.

      You're Having a Major Party and 'SomeOne Special' cannot be there in person. What Can U DO ?

      You Go Out and Rent a Personal-Presence Robot ! It now becomes your R2D2. This all takes place in the following WSJ article.

      Robot LoP

    31. Could Cmpts Protect the Market from Cmptrs?

      This Section has been Revised on 05/12 to Included the Following Article.

      It would appear that the recent meltdowns in processing stock market trades appear to be due to high-speed computerized trading which has become very difficult
      for traders to monitor and to control.

      Jason Zweig - WSJ Columnist - has written an article in his byline - The Intelligent Investor - about these electronic markets that are now inplay.
      Click on the following Link for his View of What is Happening and What maybe Necessary to solve this present day problem that financial market now faces.


    32. Protecting Vital Documents

      This Section has been Revised on 06/12 to Included the Following Article.

      Many Retirees have accumulated a great number of personal records. New tools are Available on the Web for Protecting Vital Documents.
      Click the following link to view this recent WSJ article about this Subject.


    33. The Melding of Man and Machine

      This Evolving Technology Section has been Revised August 2012 to Include the Following Article.

      Raymond "Ray" Kurzweil is an American author, inventor and futurist.
      Click on the following Link.
      In this +7 Minute Video dated 04/2009, He details the technology timeline leading up to Yr 2029 including the downsides to Singularity.

      The Coming Singularity

      The following two (2) Videos are from the PBS Newshour that were broadcast in 07/12. P.Solman, PBS's Business & Economic Editor, Interviews R.Kurzweil on two subjects.

      RK1 Melding Man & Machine

      RK2 Immortality

      The Viewer can get a Bio on R.Kurzweil by clicking on the following the Link.


    34. Apple iphone 5s & 5c Reviews

      This Evolving Technology Section was Revised on September 2013 to Included the Following Web Sites.

      Click on the following Web Site Links.




    35. Smartphone Map Apps for Vehicles

      This Evolving Technology Section was Revised on October 2013 to Included the Following Web Site.

      Click on the following Web Site Link.

      Vehicles - Map Apps Take Over

  13. Technical Support

    1. Experts Exchange (ExEx)
      This site seems to have a lot of everything. Windows stuff, Computers, Programming Operating systems Graphics and Networking.

      If you’re in the market for a Dgital Camera, All You Want to Know About Digital Cameras, Is Now Playing at These Websites.

    2. Digicams

    3. DCResource

      Click on Reviews & info.

    4. CNET

      Under Reviews, Click on Digital cameras.

  14. The Webby Awards

    Each year the International Academy of Digital Arts & Sciences™ (IADAS) sponsors The Webby Awards (WAw).
    The Webby Awards honor the most creative and innovative Web sites on the Internet.



    1. Task Managers
      Here are two sites that offer tools to manage to-do lists.
      • HiTask
        HiTask offers an online task manager, time management tools, to-do lists, and project manager. You can create and manage to-do lists and use the calendar feature to schedule and plan day-to-day activities. This site was added January 2012.

      • Toodledo
        Toodledo is a free Web-based tool that prioritizes, organizes, and schedules your personal to-do lists. You can organize your lists into folders using tags and subtasks. You can set remindwers and alarms for upcoming tasks. This site was added March 2012.

    2. Here are some tech gifts and sites:
      • PasswordGenie organizes login information and signs you into Web sites when you visit them. Because you don't need to remember your passwords, you can use the built-in password generator to create new, strong passwords. And, you can access the passwords from your smartphone. The cost of the service is $15.00 per month.

      • Pholium lets you create a digital photo album from the images on your iPad. You can also share your albums with other iPads. You can buy and download Pholium for $9.99 in the App Store.

      • Toddy is a double-sided microfiber cloth that lets you wipe away fingerprints and other smudges on tablets, smartphones and other gadgets with screens. The cost for a Toddy is $9.99.

    3. WebSite Revision Added 02/2015.

      The PC Guy - A Weekly Column by Peter Grad for the Bergen Record is No Longer Available.

      WebSite Revision Added 02/2015.

    4. WSJ.D

      The Present Catagories on this Wall Street Journal (WSJ) website are: Companies, Personal Tech, Start-Ups, Privacy & Security, Moblie, Commerce, Asia, Europe, CIO Journal.

      WebSite Revision Added 02/2015.

    5. Re/code

      This is a new website launched by Walt Mossberg and Kara Swisher.This website is descibed as a "New tech and media news, reviews and analysis site."
      Mr. Mossberg was the computer columnist for the Wall Street Journal. The WSJ chose not to renew his contract at the end of Yr 2013.
      On January 2, 2014, Walt Mossberg and Kara Swisher launched a new tech website called Re/code.
      The Re/code website provides a biograph for W. Mossberg, K.Swisher and other Re/code writers.

    6. Kim Komando Show (KKS)
      Kim Komando is a tech columnist for USA Today.This website offers her weekly tech column; A Column Archive; A Shareware Archive; Consumer Reviews on Computer Hardware and Software; Free Newsletters.

    7. New York Times (NYT)
      Click on Technology.

      WebSite Revision Added 02/2015.

    8. The Busswack Website

      This Website is Undergoing a Change as of this Date (02/ /15).
      This website lists common buzzwords and their meaning. The site was founded back
      in Yr. 2000 by a John Walston.

      Here are some examples of Buzzwords (BZ)and their definitions.
      buzzword: This a usually important-sounding word or phrase used
      primarily to impress laypersons.
      404: A derogatory term used to describe a person who is totally clueless.
      This BZ comes from that a computer message.: 404 Not Found.
      Cellular Macarena: When a cellular phone rings in a public place,
      Everybody reaches for his or her coat pocket, front or back pants pocket.
      Data Smog: This BZ means that you are overwhelmed with too much
      Example: A Google search that turns up six million references is data smog.
      Pretexting: To pose as someone else in order to obtain that person's private
      phone records or other personal information.
      Fugitive Information: I once knew it and it didn't matter then so I let it go.
      But it does matter NOW and I can't remember it.
      SEP: Someone else's problem.

    9. Interactive Social Networking Websites (ISNW).
      These are User-Submitted Material- Personal Profiles, Groups, Photos,
      Music, and Videos for groups of all ages.

      1. YouTube

        YouTube is a popular free video sharing web site which lets users upload, view, and
        share video clips.The wide variety of site content includes movie and TV clips and music
        videos, as well as amateur content such as videoblogging.
        You must registered to use YouTube. It's free to join.

        It is STRONGLY suggested that a 1st TimeViewer - IN Order to Gain an Understanding of this Site -
        read the subject matter listed under the such topics as You Tube, Programs, Help, Legal  which appears on the site's main page.
        It is also suggested that the viewer read the subject matter provided by the following website:


      2. MYSPC

        The viewer must register in order to gain access to this ISNW.
        It is STRONGLY suggested that a 1st TimeViewer - IN Order to Gain an Understanding of this Site -
        read the subject matter listed under the such topics as Terms, Privacy Policy, Safety  which appears on the site's main page.
        It is also suggested that the viewer read the subject matter provided by the following website:


      3. FaceBook

        The viewer must register in order to gain access to this ISNW.
        It is STRONGLY suggested that a 1st TimeViewer - IN Order to Gain an Understanding of this Site -
        read the subject matter listed under the topics  About, Terms, Find Friends, Privacy, Help  which appears on the site's main page.
        It is also suggested that the viewer read the subject matter provided by the following website:


    10. AF

      This website sorts out Acronyms. This a dictionary that various people use to decrypt today's expanding daily output
      of acronyms.This site is run Mike Malloy, USAF, Ret.and his wife from their home in the Rocky Mountains of CO.
      He started this project in 1985 while in the AF. When he retired in 1997, his list had 43000 acronyms.
      It now totals well over 520000 --- and counting. The site attracts advertising because certain companies have products and services
      that are associated with an acronym thats being looked up on site.

    11. RedOrbit

      Your Universe Online

      This website features:
      • Breaking News
        Space & Tech, Health, Sci-Fic & Games.
      • Streaming Videos
      • Image & Photos
      • Space Exploration
      • Science & Research
      • Tech & Invention
      • Education & References
      • A Search Program for Various Articles.

    12. TeleGeography

      This Site has a Large Map featuring Submarine Cable Routes that Tranverse around the World.


      This Site shows the Cable Route starting in Europe and makes its Way into Asia via the Floor of the Mediterranean Sea, Egypt's Suez Canal, the Persian Gulf and Onward.

    13. Radio-Locator

      Not Sure How to Locate a Radio Station ? The User can search by ZIP Code, State, A Station's Call Letters, or Format.
      It also Lets You search for Programming in other Countries.This WebSite was started in 1995 and now has around a 10k listing.

    14. OnLine Video Websites.

      1. Blinkx

        The WWW is awash in digital video. Too often we can't find the videos we want or browse for what we might like. Search Engines, which are text based,
        do a poor job in searching through this multitude of videos. Blink doesnot reject any existing video search method but supplements them with
        Speech-Recognition Technology and other methods. When You visit, Don't be Startled ! The 1st thing You will see is a "Video Wall" which consists of 25 small, shimmering tiles,
        each displaying a popular video clip that has been indexed to that hour.You can Search for your Video by typing in a Phase. You will have to Experiment to Get "The Hang-Of-It".

      2. Hulu

        Hulu is a free online video service that offers hit TV shows.

      3. PBS NOVA
        PBS NOVA provides a very wide range of video presentaions ranging from Ancient Worlds to Tech + Engineering.

        Their recent presentation (02/13/13) was Earth from Space.
        The Use of Satellite Images from its near Earth Orbit exposes a web of forces that sustain life on earth and help forecasts possible disasters.
        The interaction of brillant sunlight and water off of Cape Verde, Africa led to the formation of two massive hurricanes that battered the USA:
        Katrina- NOLA & The Gulf Coast (08/2005) and Sandy - NJ/NY/CT (10/2012).
        Section 14c. PBS NOVA - was Added 02/2013.

    15. OnLine Websites Featuring Celebrity and Entertainment News and Gossip
      They can contain Previews and Reviews of various Movies,TV,and Music.

      1. TMZ

      2. E!

      3. US Magazine

      4. WndrWall

        WonderWall is an interesting concept in its presentation. It is a Wall You scroll thru. You find your favorite topic and then Click on it.

    16. A New Way to Communicate

      1. Twitter

        If You're NEW to this type of media, Catch the Movie on the above Website.
        This is a service which brings together today's online and mobile tech advances. The User can publish short messges- 'Tweets' - to the Web or to Cellphones
        to those persons who wish to receive them. These 'Tweets' are much like text messages but limited to 140 characters. It has gained a following from
        various organizations because it does permit a number of communication tasks to be performed.

        As an RFI, The Viewer is offered the following article on Twitter.

      2. A Primer on Twitter

    17. Creativity

      1. A Remarkable Painting

        Click on the Following Link.

        • Rmk Pntg

          This is a great Painting. Run your cursor over the people and it tells You who they are. If You click on a certain person,
          a link is provided which gives you more infomation about that person.
          This should keep you occupied for hours. You'll be 'Brimming' with a World of Knowledge.

      2. An Advertisement for A Dutch Department Store

        HEMA is a Dutch department store. The first store opened on November 4, 1926, in Amsterdam. Now there are 150 stores all over the Netherlands (Holland).
        Take a look at HEMA's product page when You click on the Link below. All the Items shown have Labels which are written in Dutch.
        Here are some Instructions.
        • Don't click on any of the items in the picture.
        • Just wait a couple of seconds and watch what happens.
        • Make sure that your sound is on.

        Click on the Following Link and ENJOY THE SHOW

      3. Tater People

        Click on the Following Link and Enjoy 'Tater People'.

      4. The 1900's

        WebSite Revision Added 02/2015.

        Here are two Presentations from that Period of Time.

        Just Sit Back and Enjoy the Memories!

        The Contents move pretty fast so U may have to Catch It Twice.
        Okay Turn on the Sound! --- AND Click on either of the following Websites.

        Presentation #1: Take Me Back to the 50's

        • TkMeBktt50's

          Enjoy your Scroll thru this website. The following programs - 50sTV,50sSongs,50sMovies - are found at the end of this web page.

        Presentation #2: Burma Shave Signs

        These Burma-Shave Sign series appears on our highways from 1925 - 1963. Typically, six consecutive small signs would be posted along
        the edge of the highway,spaced for sequential reading by passing motorists. The last sign was almost always the name of the product.
        The signs were originally produced in a color red-and-white combination.
        For a some History:

        The following website has Burma-Shave Jingles from Yrs. 1927 to 1963.

        C&C: In Section O - Miscellaneous - Item #17 Creativity - was Revised on October 2013 to Included the Coffee-Trick Web Site.

        Please Turn on the your Sound!

        Click on the following Link and Enjoy the 'Coffee-Trick' video.

    18. The Tech That Will Change Your Life in 2015

      In Section O - Miscellaneous - Item #18 was Added on January 2015.

      Apple Watch, Windows 10, biometric passwords and more—WSJ Personal Technology columnists Geoffrey A. Fowler and Joanna Stern take a look at the key tech trends of 2015.
      Geoffrey A. Fowler and Joanna Stern

      Updated Dec. 30, 2014 6:25 p.m. ET

      This was a year of big technology promises—2015 is the year we find out how many live up to the hype.

      We looked into our crystal ball for the gadgets, upgrades and ideas we think have the greatest chance to change—and hopefully improve—your life in the year ahead. Will this be the year you actually wear a smartwatch, drop cable TV and love Windows again?

      The new year may not bring you a shatterproof phone or a truly smart home, but here is what’s coming and what you can do to be ready for it.

      Windows Strikes Back

      The international calamity that was Windows 8 will finally end in 2015 with the fall release of Windows 10. (No, you didn’t miss 9: Microsoft skipped right over that number.) The OS still has a traditional mouse-and-keyboard desktop plus a tablet touch interface, but it now aims to prioritize these better based on what device you’re using. That’s huge for people on laptops or desktop PCs. The beloved Start menu is resurrected and modernized, and multiple virtual desktops will improve multitasking.

      How to get ready: Microsoft has yet to release Windows 10 launch details and system requirements. We’re betting there’ll be an easy upgrade path for many computers still running Windows 7. (Others may need extra memory or a faster processor.) On the other hand, you may want to wait for the great assortment of new Windows 10 PCs that will appear in late 2015.

      An Apple for your Wrist

      When the Apple Watch debuts in the coming months, you won’t be able to avoid the hype—Apple’s entering its first new product category since the death of Steve Jobs . While Apple has yet to establish why a wrist computer is as essential as a smartphone or tablet, the Apple Watch is clearly more than a Dick Tracy gadget. It will undoubtedly kick-start a new wave of ideas about how to stay connected with your friends, work and fitness through a device that’s literally always on you.

      How to get ready: Don’t buy one of the smartwatches already on the market. Most don’t look great and aren’t especially useful. Even if you favor Android, Apple’s entry will likely stimulate the competition to build better, sleeker wrist-tops.

      Fitness Trackers That Actually Help You

      Two big advances may, when they finally reach maturity, make us healthier humans. First, fitness bands and smartwatches—even connected workout clothing—are getting packed with sensors to track everything from heart rate to sun exposure. Second, instead of just saying you walked 4,382 steps today, cloud-connected apps are gaining increasing powers to interpret this data to provide meaningful workout and lifestyle feedback.
      How to get ready: With Google, Apple, Microsoft and countless startups vying to win your heart (or at least your heart-rate data), the best thing you can do, ironically, is sit back and see which devices and platforms start living up to their lofty promises. If you’re wondering if a fitness tracker is something you’d want at all, try a cheap, dependable one like the $50 Jawbone UpMove.

      Stream More, Pay Less

      It’s finally time to break up with your overpriced cable TV service, or at least seriously rethink the relationship. It’s easier, and often cheaper, to stream movies and TV shows from Internet services with vast libraries such as Netflix, Amazon Prime and Hulu. Some things you still can’t stream, like live sports and cable news, but even those walls are tumbling. This year, a lot more of the stuff you really want, including HBO, will be available online without a cable TV subscription.

      How to get ready: Find a home broadband service that offers downloads of at least 5 megabits per second. (Yes, you might have to make a new deal with your cable provider.) Then buy a streaming box or stick for your TV. The best is the $100 Roku 3, which supports the widest array of movie and music sources and has universal search. If you live in an all-Apple home, check out the $100 Apple TV first, since it’s the only box that plays iTunes videos. Virtual Assistants You Won’t Want to Fire.

      Virtual Assistants You Won't Want to Fire

      “You have an 8:30 a.m. meeting with your supervisor. Last time you met, your heart rate was high. Go to bed early tonight, don’t drink coffee before the meeting and leave home early—traffic will be heavy.”

      That’s how much smarter predictive personal assistants like Google Now and Microsoft’s Cortana will begin to get, thanks to increased information coming from our bodies, cars, Web searches, calendars, GPS location and more. For some reason, Apple has yet to endow Siri with predictive powers. Perhaps that, too, will change in 2015.

      How to get ready: In order for predictive intelligence to work, you have to buy into a specific platform or ecosystem. Google Now centers around Gmail and the calendar, and it’s coming to cars, via Android, in 2015. Cortana will be integrated into Windows 10. But because they get more intelligent (and useful) by finding out more about you, you’ll want to pick a system that you trust.

      It’s a 4K World

      This year, 4K TVs will become standard at 65 inches or higher. These Ultra HD TVs pack four times the resolution of HD, so you can see every bead of sweat on the actors’ brows. The cost of making these TVs has fallen dramatically, and 4K video has arrived via streaming from Netflix, Amazon and others. Those extra pixels aren’t worthwhile on smaller TVs, but if you’re finally buying a big set, you’d be mistaken not to consider 4K.

      How to get ready: By next fall, quality 4K TVs will be available for laughably low prices. (But since the tech is evolving fast, never ever buy last year’s model.) And for better color, keep an eye out for “quantum dot” technology.

      Android and iOS Take the Wheel

      This may be the first year you pick your car based on the type of phone you use—or vice versa. Apple has partnerships with over 20 car makers, such as Volvo and BMW, to extend iOS to the dashboard with CarPlay. Many of those same car makers, including Audi, Dodge and Ford, have teamed up with Google to roll out Android Auto, which similarly brings phone functions, messaging, music and navigation to the front seat.

      How to get ready: Many auto makers will offer CarPlay and Android Auto on top of their own dashboard systems. In some cases, all of these options may be found in the same car. As the first models are introduced, there will be confusion, so ask your dealer a lot of questions, and don’t take “I’m not sure” for an answer.

      People-Powered Apps

      The app that most changed urban life in 2014 was Uber, the car service. Beyond making a night on the town easier, Uber has proved that smartphones are effective at connecting customers with nearby workers. Now that model is multiplying into a zillion services, like the “Uber” for grocery delivery (Instacart), chores (TaskRabbit), parking (Luxe Valet), laundry (Washio) ... even massages (Zeel).

      How to get ready: Not every service treats workers or customers equally well, so ask around. The good news is you’ve got choices because these services are easily (and often) cloned.

      Cheap Smartphones Worth Buying

      The arrival of a lot of cheap, powerful smartphones from China could mean it’s the year we finally stand up to our cellular carriers. Instead of paying $200 upfront and agreeing to pay down the rest of a phone for two years with high monthly service and data fees, you could buy an unlocked Android phone from OnePlus, Xiaomi, Huawei and perhaps even the Lenovo-owned Motorola for that much sans contract. That could spell trouble for Samsung and HTC, which will be forced to lower prices (as Moto already has).

      How to get ready: When your contract is next up, break the habit of running to your carrier’s website or store for a subsidized handset. Shop around for one of these new, ultra-affordable unlocked phones, and see how much your carrier will charge for talk and data off contract. It could be very liberating!

      Your Phone Replaces Your Wallet

      It will become possible to step out of the house with nothing but your smartphone (and pants) this year. Apple Pay, the credit-card replacement that made its debut in the fall, has so far shown that using an iPhone to pay at a store can be simple and secure. Now your phone is out to conquer the rest of your overstuffed wallet—an app to replace your driver’s license is already on its way in Iowa. More and more apps are replacing door keys (like the August smart lock), loyalty cards and even proof of insurance.

      How to get ready: You’ll need a recent phone with a technology called NFC to use Apple or Google mobile payment services. And since your phone contains even more sensitive information than ever, be sure to secure it with a screen lock and remote-wipe capabilities.

      Not-So-Social Social Networking

      This year marked the beginning of public social networking fatigue. Now, it’s about enhancing your more personal, private communications. Facebook broke off its Messenger app, and Twitter is strengthening its direct messaging with the ability to share and discuss tweets privately, among other tools. Meanwhile, anonymous communication within smaller groups, using apps like Whisper, Secret and Yik Yak, will remain popular.

      How to get ready: A messaging service is only as good as the people on it. Talk to your friends and family about what they are using for private, day-to-day communications. (You may use different apps for different social clusters.) And when it comes to anonymous apps, be safe and remember: None of the apps can fully guarantee anonymity.

      The Password Is You

      When it comes to the annoyances of digital life, typing in a million different passwords all the time is second only to trying to remember them all. What if your body could be the password? Biometric readers have been around for some time, but now they’re found in devices we carry around. Fingerprint readers on high-end phones and tablets can unlock their home screens—and an increasingly wide range of apps. And your finger is just the beginning. The coming year will bring 007-style gadgets that scan your eye, listen to your voice or just recognize your heartbeat.

      How to get ready: Start with a fingerprint scanner, available today on a number of phones including the Samsung Galaxy S5 and iPhone 6. Apps for iOS that already accept finger scans include American Express, Amazon and Mint; if you have a new Samsung phone, try PayPal and the password manager LastPass.

      Write to Geoffrey A. Fowler at or on Twitter @geoffreyfowler and Joanna Stern at or on Twitter @joannstern

    19. Six ways to speed up your internet connection

      Section O - Miscellaneous - Item #19 was Added on April 2015.

      · A slow Internet connection can be a productivity killer, whether your a gamer or a Netflix addict. Here a few suggestions you can use to help improve your Internet speed without spending a fortune. 
      By Louis Ramirez, DealNews April 16, 2015

      · Your Internet connection is your lifeline to the world. Whether you're a gamer, a Netflix addict, or an Internet TV pioneer, nothing can destroy your productivity like a slow Internet connection.

      But before you waste hours on the phone arguing with your ISP, we've got a few suggestions you can use to help improve your Internet speed. (And if you try everything and want to upgrade your hardware, check out all of our latest networking deals and sign up for our electronics newsletter.)

      Test Your Current Speed
      Before calling your ISP in a fit of rage, there are two simple steps you should take. First, find out your current speed. You can do that by running a simple speed test on In its simplest form, the free service measures your download and upload speeds by sending information to your computer and back to its servers.

      Now that you have this information, log on to your ISP account and find out what your speeds should be. Keep in mind that most ISPs give themselves some wiggle room, so your speeds may not match exactly, but if your numbers are reasonably close to your advertised speeds, chances are you just need a faster plan. However, if your numbers are horribly off, some of our tips below may help.

      Give Your Modem and Router the Boot
      Over the years, routers and modems can go bad. Twisted or bent cables can also wreak havoc on your connection. So you'll want to give your hardware a check before attempting anything else. Routers and modems can be rebooted with the click of their reset button. You may want to check with your ISP or manufacturer for precise instructions.

      Once they've rebooted, check the Internet connection on all your devices. If it's slow on every computer, it's likely something is wrong with your connection, but if you notice the problem is in just one room or with one computer, it could be something interfering with your network and not your actual ISP. If the latter sounds like your scenario, try repositioning your router and take into account if there are other wireless devices in the area which could slow things down.

      Delete Any Broadband-Hogging Apps
      These days it's common to have various broadband-sucking apps and clients running in the background. Whether it's your anti-virus software, Skype, or a torrent client, it's easy to loose track of them. One or two of these programs may not have a significant impact on your network, but if you have numerous apps running on different machines, then it could slow down your network when you most need it.

      Check your systems to see what's running on start up or what apps run in the background. Try to keep only necessary apps active and see if that improves your connection.

      Switch to a QoS Router
      A router with Quality of Service (QoS) technology may help improve your network. QoS routers work by assigning priority to each device operating on your network. So whenever there's a bottleneck, the router will decide (based on your settings), which devices get the most bandwidth. While some of these routers may require some technical know-how, other "smart" QoS routers prioritize network traffic on their own, optimizing voice and video traffic over other tasks like file downloads. There are numerous types of QoS routers available, so consumers should definitely do their research before opting for one model.

      Alternatively, if you live in a large house, you may want to look into buying a range extender, which essentially extends your home's WiFi signal so that devices furthest from your router can still receive a WiFi signal.

      Invest in a VPN
      As some commenters have noted, a VPN can significantly slow down your Internet speeds. So why include it in a roundup of ways to speed up your Internet? Because some ISPs play dirty with traffic shaping. Let's say you're a power-user of bandwidth — maybe you stream Netflix all day, maybe you're a serious gamer, or maybe you're torrenting. If your ISP can see what you're doing, it can use traffic shaping to decrease your internet speeds for certain applications. As anyone who's experienced traffic shaping first hand can tell you, this is extremely frustrating. That's where the VPN comes in. A VPN works by routing your Internet traffic through data centers in various locations. In addition, because a VPN encrypts all your traffic, your ISP won't be able to tell what you're doing, so you'll also get more uniform speeds across all your applications. Yes, you may sacrifice a little speed overall, but you're immune to the most common form of ISP traffic shaping, as described above.

      It's worth pointing out that not all VPNs are created equal. If you choose a VPN with overly crowded servers located far from you, with low ping, your data is going to slow to a crawl. Price matters, too; free VPN services can lack the encryption bells and whistles of subscription services, and can have busier servers. Definitely do your homework, and choose a service that's best suited to your needs.

      Call Your ISP
      If you've tried everything and your Web connection is still slow, then it's time to call your ISP (Comcast, Time Warner, etc.). Before you call, research other ISPs in your area and try to see if your current ISP can match their speeds or their prices. Even if you're bad at haggling, you'll be surprised at how quickly providers react when you mention the competition. And of course, be polite while on the phone. The customer service representative on the other line isn't out to get you and they're more likely to help a polite customer than one who screams at them.

      Louis Ramirez is an editor for DealNews, where this article first appeared. 

Tell us what you think of the H/AREA Home Page by clicking here: Comments. We'd love to hear from you.