COMPUTER NEWS Inside This Issue The Napa Valley Personal

COMPUTER NEWS Inside This Issue The Napa Valley Personal
Napa Valley
Personal Computer
Users Group
http://www.
nvpcug.org
P.O. Box 2866
Napa, California 94558
COMPUTER
NEWS
Volume 28, No. 9
Sept 2011
Inside This Issue
2 NVPCUG Special Interest
Groups
2 About Opera
3 Officers List
4 My iPad
4 NVPCUG Calendar
4 P-Flip Power Dock
5 The Google 2-step!
6 Discovering Windows 7 – Part 14
7 Discovering Windows 7 – Part 16
8 Training My Dragon
10 Paragon Drive Copy 11
Professional
11 SuperTooth Buddy Can it be too good?
12 Review - Apple TV
13 Database Redux
14 Ganked by a nOOb
15 IPv6 is Coming
16 This and That or Things
That May Interest You
17 Tips & Tricks | Tutorial
17 Better File Information with
Windows Explorer
18 My Photo Is Being Used
Without Permission:
Now What?
20 Malware, Viruses, Trojans Defined
22 Corel Paint It
26 Membership Application/
Renewal
The Napa Valley Personal
Computer Users Group will meet
Wednesday, Sept 21st,
7:00-9:00 P.M.
At the Napa Senior Activity Center,
1500 Jefferson Street, Napa, California
The meeting begins with Random Access,
an open-floor question-and-answer period
during which attendees can ask questions
about computers and computer-related
problems and receive helpful information
from other meeting attendees. Questions
may be submitted before the meeting by
emailing them to Random Access moderator Jerry
Brown at [email protected]
July 20th, 2011 Computer Tutor topic
member Jeff Solomon will show us a
System Tray Cleaner. This program can help
you which helps you remove useless icons
from your system tray. If you have an idea or
question that the Computer Tutor Jeff Solomon at
[email protected]
This month Beth Pickering will tlak to us
about a new/old browser, OPERA. By NEW I
mean you may never have heard of it and by
OLD I mean that this browser has been around
longer than Mozilla Firefox, the search engine Google and
even IE. If you have a suggestion on which feature and topics
should discusses in the future, please contact Susy Ball at
[email protected] ya all at the meeting.
*
Could you use some practical information that would help you
make better use of your computer? Come to this meeting! Guests
are always welcome. Admission is always free.
Interested in becoming a member? See page 26 for
application information.
NVPCUG Computer News, Sept 2011
NVPCUG
SPECIAL INTEREST GROUPS
& MAC GROUP
In SIG meetings you can learn about
a subject in greater detail than is
feasible at NVPCUG general
meetings. SIG meetings are open to
everyone. M e e t i n g t i m e s a n d
locations occasionally change, so
for current meeting information, see
our Web site, www.nvpcug.org, or
contact the SIG leaders.
Investors SIG
Meets: Monthly, second Monday
5:30 to 7:30 p.m
Jerry Brown’s home,
23 Skipping Rock Way, Napa
Leader: Jerry Brown
(707) 254-9607
bqandjbb
@sbcglobal.net
Napa Valley Mac User Group
Meets: Monthly, second Thursday
6:30 - 8:30 p.m.
Napa Senior Activity Center
1500 Jefferson St., Napa
Leader: Ron Rogers
(707) 226-5352
ronrogersnapamug
@gmail.com
About Opera
Opera Add-ons
With Opera Add-ons, you can change the browser’s look, feel and
functionality with a single click. Add-ons include extensions, widgets, unite,
link, mail, turbo, and skins.
What are extensions?
Extensions run inside the browser allow you to easily add functionality to
your Opera browser. Some extensions have user interface elements, but
not all. An extension can for example add a button next to the Google
Search field with a popup menu when you click on it. Other extensions
don’t have user interfaces at all, but run in the background. More
extension examples are adding the option to download videos from
YouTube or notifying you of new Facebook events. There is an Opera
extensions forum where you can discuss the extensions you are using, or
want to use. Currently there are 746 extensions.
What are Opera Widgets?
Opera Widgets are fast, free and connected applications that are easy-toinstall and use. They run outside the browser and will work even if the Opera
Web browser is not running. Each Opera Widget runs in a separate process,
providing more speed, security and stability In fact, they can look and behave
just like normal desktop applications. There are 1,820 available widgets.
What is Opera Unite?
Opera Unite is a new technology platform allowing you to share content
directly with friends, without having to upload anything to a Web site. It was
designed to offer a simple and easy way for people to share data and
collaborate online. You can stream music, show photo galleries, share files
and folders, or even host your own Web pages directly from your browser.
Opera Unite is not designed to replace professional Web servers, but to
make it easy for people to share content and communicate without the
technical knowledge required to run a server, let alone program in PHP.
What is Opera Link?
Opera Link allows you to share data between all your computers and devices that run the Opera browser. It can
synchronize your browser information, such as bookmarks, Speed Dial, passwords, and notes, so they are available
to you wherever you go. Once you enable Opera Link, you can easily access your search engines, bookmarks and
Speed Dial from your phone, tablet or another computer. Log in to Opera Link and your data is always synchronized
until you log out. You can also choose what you’d like to synchronize. Synchronization occurs continuously. This
means that if you delete a bookmark while at home, this bookmark will also be automatically deleted on the online
server and, therefore, your work browser and any other instances of the browser that has Opera Link enabled
using the same Opera account. The browser is kept exactly as you left it each time, wherever you are. However,
as changes are applied to all instances of the browser, it’s best not to think of Opera Link as way to keep a backup
of your data. There are more applications and types of data you can link with computers than devices that use
Opera Mini or Mobile.
What is Opera Turbo?
Opera Turbo loads webpages faster on slow Internet connections while other browsers get left in the dust. It is
available on computers and phones. You cannot always get fast web access. Perhaps you have to connect with
Wi-Fi in a busy cafe or use a laptop connected to a mobile phone. In these situations, surfing the Web can be
frustratingly slow. That is why the Opera browser includes the unique Opera Turbo mode that can load webpages
up to five times faster than other browsers. Even while using Opera Turbo, secured connections do not go through
Opera’s servers. This means that when you are using your bank or transmitting sensitive data, you are talking
directly with the website.
Note: This is the program Beth Pickering will bring to us at the general meeting. If you can, download
this program before you come at www.opera.com.
*
NVPCUG Computer News, Sept 2011, Page 2
Napa Valley Personal Computer
Users Group Contact Information
Officers for 2011
Board of Directors
President
Jim Gray
unlisted
[email protected]
Vice President
Ron Dack
unlisted
[email protected]
Secretary
Marcia Waddell
252-2060
[email protected]
Treasurer
Roy Wagner
253-2721
[email protected]
Other Directors: Susy Ball, Julie Jerome, Bernhard Krevet , Dick Peterson, Bob
Simmerman, Raylene Thompson, Tom Uboldi and Dean Unruh
Appointed Officers
Computer Tutor Coordinator
Jeff Solomon
553-2114
[email protected]
Facility Arrangements Coordinator
Dianne Prior
252-1506
[email protected]
Greeter Coordinator
Raylene Thompson
unlisted
[email protected]
Greeter Coordinator
Bob Simmerman
259-6113
[email protected]
226-9164
[email protected]
Membership Director
Bob Simmerman
259-6113
[email protected]
Newsletter Editor
Susy Ball
337-3998
[email protected]
Product Review CoCoordinator
Susy Ball
Marcia Waddell
337-3998
252-2060
[email protected]
[email protected]
Co-Programs Director
Bernhard Krevet
Susy Ball
unlisted
337-3998
[email protected]
[email protected]
Librarian
Dean Unruh
Publicity Director
VOLUNTEER NEEDED
Random Access Moderator
Jerry Brown
254-9607
[email protected]
unlisted
[email protected]
Webmaster
Ron Dack
• All telephone numbers are in Area Code 707.
NVPCUG General Meetings
Held the third Wednesday of each month, 7:00 to 9:00 p.m.
Napa Senior Activity Center,
1500 Jefferson Street, Napa
NVPCUG Computer News, Sept 2011, Page 3
NVPCUG
Computer News
Computer News (ISS
0897-5744) is published
monthly by the Napa
Valley Personal
Computer Users Group,
Inc. (NVPCUG), P.O.
Box 2866, Napa, CA
94558-0286.
Subscriptions: $30 for
one year (12 issues).
Editor: Susy Ball,
[email protected] The
material in Computer
News is intended for
noncommercial
purposes and may not
be reproduced without
prior written permission,
except that permission
for reproducing articles,
with authors properly
credited, is granted to
other computer user
groups for their internal,
nonprofit use only. The
information in this
newsletter is believed to
be correct. However, the
NVPCUG can assume
neither responsibility for
errors or omissions nor
liability for any damages
resulting from the use or
misuse of any
information.
The NVPCUG is an IRC
501(c)(3) tax-exempt
nonprofit educational
organization (EIN 680069663) and is a
member of the
Association of Personal
Computer User Groups
(APCUG), an
international
organization. Donations
to the NVPCUG are taxdeductible as charitable
contributions to the
extent allowed by law.
Copyright © 2011 by
NVPCUG.
P-Flip Power Dock
A review by George Harding, Treasurer, Tucson Computer Society, AZ, April 2011 issue, TCS
eJournal, www.aztcs.org, [email protected]
This is a compact portable battery you can use to charge
your MP3 player, mobile phone, camera or whatever
when you run out of power. It’s frustrating to find out
you forgot to charge your phone when you need to make
an important call, or your camera when you have the
opportunity for a great shot. The device is attractively
designed to sit upright when your phone is connected to
it. The unit I received for review works with the iPhone
3G/3GS and iPod 2G/1G. There are other versions of the
device that work with Blackberry units.
The charger base contains the battery and is about 2"
X 3" and has a hinged holder for the device to be
charged. The accompanying cable has a mini-USB
plug on one end and a USB plug on the other. Charging
is solely by a USB port in your laptop or other unit .
There is a small button on one side that allows you to
check the charge status. The three LED lights on the
top light up: 1 or 2 for partial charge, all 3 for fully
charged. The battery stores enough to provide up to 8
hours of talk time, and provides 2,000 mAh of power.
The battery is lithium polymer. If your phone is connected
to a laptop, you can sync your iPhone data with iTunes.
So, this is a dual-function charger, updating your saved
data as well as charging the phone. A version of the
device charged by solar energy is also available from
the manufacturer.
yM
P
a
di
*
By
Tery
Cue
ri,r
Pe
rd
sient
of
the
W
N
N
E
R
IS
W
N
d
o
w
Is
u
s
E
R
S
About: P-Flip Power Dock
Manufacturer: Dexim
www .dexim .net
Price: $30 from AT&T.com
NVPCUG Calendar
Sept 21
Oct10
Oct13
Oct19
Nov 5
Nov 10
Nov 14
Nov 16
Dec 8
Dec12
Dec14
Dec 14
7:00-9:00 p.m.
5:30-7:30 p.m.
6:30-8:30 p.m.
7:00-9:00 p.m.
10:00-11:30 am.
6:30-8:30 p.m.
5:30-7:30 p.m.
7:00-9:00 p.m.
6:30-8:30 p.m.
5:30-7:30 p.m.
7:00-9:00 p.m.
7:00-9:00 p.m.
NVPCUG General Meeting, + A
Investors SIG meeting + C
Napa Valley Mac User Group + A
NVPCUG General Meeting, + A
Board of Directors meeting + D
Napa Valley Mac User Group + A
Investors SIG meeting + C
NVPCUG General Meeting, + A
Napa Valley Mac User Group + A
Investors SIG meeting + C
NVPCUG General Meeting, + A
NVPCUG Annual
Christmas Party, + D
Meeting Locations
A - Napa Senior Activity Center,
1500 Jefferson Street, Napa
B - Piner’s Nursing Home,
1800 Pueblo Ave., Napa
C - Jerry Brown’s home,
23 Skipping Rock Way, Napa
D - Peterson’s Family Christmas
Tree Farm, 1120 Darms
Lane, Napa.
NVPCUG Computer News, Sept 2011, Page 4
The Google 2-step!
By Drew Kwashnak, Member, Danbury Area Computer Society, CT, June 2011 issue,
DACS.doc, www.dacs.org, [email protected]
If you are one of those users with “password” as your
password, might I suggest you use Google for your
email, calendar and other online needs! Even if you use
a password not on the list of “The Top 500 Worst
Passwords of All Time” it might be a good idea to use
Google’s 2-step verification.
are randomly generated, strong passwords that allow only
applications to access your Google Applications, not a
browser and not your account settings.
The 2-Step Verification is,
in Google’s own words:
2-step verification adds an extra layer of security to your
users’ Google Apps accounts by requiring them to enter a
verification code in addition to their username and
password, when signing in to their account.
This Verification code is not another password to
memorize. Instead, the verification code is generated at
the time you try logging in, and is only valid for a short
period of time. Even if somebody were to pluck your
username, password AND verification code out of the air
they are to act quickly before the verification code is
expired.
Corporations have made use of this verification method
for years but have had to rely on distributing a keychain
FOB with an automatically changing verification code.
Google uses something more readily available; your phone.
When turning on 2-step verification for your Google
Account you are walked through the set up process. At
minimum you have to supply a phone number and you have
the option receiving the verification code either as an SMS
(text) message, or an automated voice message.
While you can change which method to receive the
verification code when logging in, you cannot change
where it is sent. This also means anybody trying to log into
your account cannot redirect the verification code to their
phone. You can, however, set up a second backup phone
and method. This is helpful just in case you don’t have your
phone handy.
That’s it! The next time you log into your Google
Account, or any of the numerous Google Apps, you will get
the familiar login request except when you click Sign In,
you will see a page asking for your Verification code and
within moments your phone will be receiving this code.
Once you have successfully logged in, you don’t have to
worry about going through this process every time. It
remembers the computer you are using and afterwards it
will function with just your username and password, unless
you log completely out.
Since most local applications, such as email or chat
clients, do not know how to handle a verification code, you
can create what is called Application Passwords. These
These passwords can be easily created and deleted as
necessary only after logging into the account using the 2step Verification. This could be used for temporary use,
easily changing the password every so often, or having
each system or application use their password.
So not only does Google add a layer of security with the
additional verification code, it also separates applicationlevel access with the account settings controls to limit the
damage somebody can do if they were to gain access to
your username and password.
Once set up it is not a difficult process to follow, and the
return of greater security is well worth it in my opinion.
Drew Kwashnak spends way too much time on the web
and ran across this feature from Google when his account
was closed for “suspicious activity”. Since then, he hasn’t
had any issues with “suspicious activity” or the like.
*
Folder Icons
If those boring manila folder icons
on your Desktop are too bland for
your taste, go ahead and change
them. Right-click a folder, select
Properties, and click the Change
Icon button on the Shortcut tab.
Scroll through the available default
icons on your system (or browse to
other icons you’ve downloaded from the Internet). Just
highlight the new icon and click OK.
Reprinted with permission from Smart Computing. Visit
www.SmartComputing.com/Groups to learn what Smart
Computing can do for you and your user group!
NVPCUG Computer News, Sept 2011, Page 5
Discovering Windows 7 – Part 14
By Neil Stahfest, Vice President, Tacoma Area PC User Group, Washington, April 2011 issue,
the Data Line, [email protected], www.tapcug.org
I have a new laptop computer. It came with Microsoft
Do you have trouble seeing the text on your computer’s
display? New computer displays come in a wide range of Word 2010 on it. My old computer has Word 2003 on it.
sizes. Twenty years ago an 800 pixel by 600 pixel display When you create a document with Word 2010, Word places
was considered to be pretty high resolution. Modern LCD a file extension of .docx on it. If you create a document using
displays are available in a number of sizes that can range Word 2003 it has a file extension of .doc. Why? Because
from 1024 by 600 pixels to 1920 by 1080 pixels. By default Microsoft changed something in the way it formats document
Windows attempts to match your computer’s display file with Word 2010. Word 2010 can read .doc files created
setting to the number of pixels in the display to give you the by Word 2003 but Word 2003 cannot read Word 2010
sharpest image possible. Sometimes, particularly if you documents with a .docx file extension. For people like me
that use Word 2003 on one computer and Word 2010 on
have a very large display, the text may look to small.
Sometimes, however, your display settings may get another computer, it means that I can’t read documents
changed. If you attach a different display or a projector to created on the new computer on my old computer. Fortunately
your computer may change your settings. When you Microsoft has provided a solution. It lets me save documents
change back to your original display things may look created with Word 2010 with the format used by Word 2003
“different” (icons in new locations and bigger or smaller, (with a .doc file extension) so I work with the same
document on both computers.
text larger or smaller).
Windows 7 makes it easy to check and change your
display settings. Just click on the Windows Start button and
then the Control Panel. Under Appearance and
Personalization, click on Adjust screen resolution. This will
produce a window like the one shown here which lets you
change the appearance of your display. What we want to
look at is the button next to Resolution. As shown, when you
click on it a small window with slider appears which shows
you the range of settings available to you.
Now that we’ve” conquered” the subject of video settings,
let’s talk about file extensions. File extensions are a group of
letters at the end of a file name that identifies the type of file
for the programs in your computer. For example, if I had a
picture on my computer it might be named cat.jpg. The name
of the file is cat and the extension .jpg identifies it as a picture
file for the Windows Photo Viewer program, as well as other
programs that I might have for viewing pictures. Through
the magic of Windows, you don’t have to specify a particular
program to open or view a file. In our example, just doubleclicking on cat.jpg will start the right program so I can see
the picture of a cat.
Now we get to Part 2 of my problem. By default
Windows 7, as well as other versions of Windows, hides
file extensions. This means that by just looking at the name
of a document, I can’t tell if it was saved as a .doc or .docx
file. In older versions of Windows there was a way to
unhide file extensions. I did that years ago on my old
computer, it was something to do with “folder options” nut
I no longer remember how I did it. It doesn’t matter. I want
to unhide file extensions on my computer with Windows 7.
As it turns out, this is very easy.
Start by clicking on the Windows 7 Start Button. In
the Search Box that appears above it, type “folder

NVPCUG Computer News, Sept 2011, Page 6
options.” In the window that appears above the Search
Box we’ll see “Folder Options.” We can also see that it is
located in the Control Panel, but that isn’t important right
now. Just by double-clicking on “Folder Options” gets us
to the Folder Options window. Which is what we want? If
we click on the view tab (as shown in the illustration) we
see a list of Advanced settings, including one that says
“Hide extensions for known file types.” Notice the check
mark in the box next to it. Click on the box to uncheck it and
click “OK” to unhide file extensions.
While we’re here in the Folder Options window, notice
that there are a lot of other options. I’ll leave it to you to
explore them. Just remember, if you mess things up, just
click on the “Reset Folders” button to restore everything
to the default settings.
*
Discovering Windows 7 – Part 16
By Neil Stahfest, Vice President, Tacoma Area PC User Group, Washington, June 2011 issue,
the Data Line, [email protected], www.tapcug.org
One of the features of Windows 7 lets you pin program
icons onto the taskbar at the bottom of the screen. This
allows you to easily start your favorite program without
opening the Start Menu or hunting around your desktop for
the icon. It also lets you start and run programs with a
single mouse click.
You can attach programs to the taskbar by first opening
the Start Menu and locating the program you want. Then,
place your mouse pointer on the program name and press
the right mouse button. In the window that opens, locate
“Pin to taskbar” and left-click. That’s all there is to it!
You can remove icons from the task bar just as easily.
Just move your mouse pointer over the icon to be removed.
Right-click and select “Unpin this program from taskbar”.
Some people like to pin start icons for all the programs
they routinely use to the Windows Taskbar. Windows will
push the icons closer together when it needs more room
but eventually it may be impossible to see them in the space
available.
So is what can you do if this happens? I would probably
figure I had too many icons and start deleting some.
However, Windows 7 provides another solution.
Move your mouse pointer on the taskbar to a place on the
taskbar where it doesn’t touch any icons. This may be hard
to find but try someplace near the Windows Start button.
Now, right-click to reveal the window shown on the right.
You’ll probably see a check mark next to “Lock the
taskbar”. This locks the size (height) of the taskbar. Click
to remove the check mark. Now move your mouse pointer
to where the taskbar touches the main window. The
pointer should change into a vertical double arrow. Hold
down the left mouse button and drag the top of the taskbar
up. This will give you a wider taskbar and should reveal any
hidden icons. At this point you can relock the taskbar if you
choose.
NVPCUG Computer News, Sept 2011, Page 7
*
Training My Dragon
By Beth Pickering, member of the Napa Valley PCUG, www.nvpcug.org,
[email protected]
Dragon NaturallySpeaking 11.5 needs two
things to work well: memory to move around in,
and training. I think training is the most important.
My Dragon is a little cramped, but it still works
better every time I use it. I have decided I need
to do training every day, unless I am out of town.
My Dragon is at a slight disadvantage. I use web based
e-mail, so there are no e-mails it can read. The documents
I have written are mostly saved in PDF format, something
else Dragon cannot read. So my Dragon is learning only by
me reading other people’s material, and my dictations. I
also need to add more memory to give it room to work. Still,
my Dragon is doing very well.
I am also in training. I need to learn which commands to
use. The dictating commands are fairly easy for me.
Commands to control other things, however, are not so to my Dragon on the Accuracy Center. This helps my
easy. Because of time constraints, I have also had to learn Dragon learn how I pronounce words. When Dragon
“on the fly”. It can be frustrating when I don’t get the NaturallySpeaking first opens up there is a box with tips or
command right and think I am misunderstood, or am me. Later I may turn these tips off, but right now I need
actually misunderstood. Trying to make corrections often them because I am learning.
result in some pretty funny dialogue. It also doesn’t help
My Dragon does much more than typing. He can find
that the people who write help menus never used terms I
things for me. I don’t know where the Accuracy Center is.
try to search for. I am not doing so well.
When I want it, all I do is tell my Dragon “open Accuracy
We haven’t been training very long, but I am trying to use Center” and he fetches it for me. He will open any file or
my Dragon in a very noisy situation anyway. I want to know folder I can name. When I’m done all I have to say is “click
how it’s going to handle this. It seems to be doing pretty well close” and he will put them back. He can also open
there seems to be no errors at this time. I am surprised. This programs, work with menus, and search the Internet.
is actually in a supermarket with all the noise of the carts, and Right now there are three problems:
the registers, and the announcements - still my Dragon is just
• My Dragon cannot work all of the
listening to me. It is not putting anything else in. When I
features unless he has more
pause I get a flash to “please say that again”, so my Dragon
memory to move around in.
does pick up the sounds. But as long as I’m talking, it doesn’t
•
I don’t always know the right
seem to have any problem telling what is and isn’t me. [It
command to use.
knows I am its owner/master
]
• The words I use for help don’t
I also like working outside on my porch (more of a
get me the results I need.
veranda). My Dragon is very good at ignoring street Dragon NaturallySpeaking 11 Premium is a lot better than
noises, even the garbage trucks. The first time we worked the other versions I have experienced. It can be used right
out here it had trouble understanding me, but today we are out of the box, although it does better training. It isn’t as
doing very well. More training definitely makes a difference.
sensitive to outside noises and can be used in very busy
I don’t always have something to dictate, so I created a environments. It’s dictation mode works well even on
new document “Dragon Diary” for just talking to my computers with less memory than recommended.
Dragon. This document is called “Dragon Dialogue”. My
I am going on a trip, and my Dragon has to stay home.
Dragon never mixes them up. Sometimes we work on When I get home, I am going to get more memory for my
commands. This training is more for me, so I can get the computer. This will let my Dragon access all the features
commands right. When there is a dictating mistake I have of Dragon NaturallySpeaking. As then we will really get to
my Dragon read back what I said. When I goof, I delete
work – but that’s another story for another day.
the word and say the right one. When my Dragon goofs,
I use the correction menu to get the right word. Since what Minimum System Requirements:
we do each session is added to my profile, this helps my
• CPU: 1 GHz Intel Pentium or equivalent AMD
Dragon learn correctly. At the end of each session I read
*
NVPCUG Computer News, Sept 2011, Page 8
•
•
•
processor, or 1.66 GHz Intel Atom processor. (SSE2
instruction set required.)
Processor Cache: 512 KB
Memory (RAM): 1 GB for Windows XP and
Windows Vista, 2GB for Windows 7 and Windows
Server 2003/2008.
Free hard disk space: 2.5 GB (2.8 GB for localized
non-English versions)
Supported Operating Systems:
•
•
•
•
•
Windows 7 (32-bit and 64-bit)
Windows Vista SP1 and SP2 (32-bit and 64-bit)
Windows XP SP2 and SP3 (32-bit only)
Windows Server 2003
Windows Server 2008
DVD-ROM drive (required for
installation)
•
•
•
•
•
Microsoft Internet Explorer 6 or higher (free
download available at www.microsoft.com)
Nuance-approved noise-canceling headset
microphone (included, except for upgrades).
Creative Labs Sound Blaster 16 or equivalent sound
card supporting 16-bit recording.
For details on Bluetooth microphones, Tablet PCs
and other hardware, please go to
support.nuance.com/compatibility/
An internet connection is required for activation
•
•
•
•
•
Microsoft Outlook (Office 2003, 2007 and 2010)
Outlook 2010 (Natural Language Commands in
English only)
Microsoft PowerPoint (Office 2003, 2007 and 2010)
Microsoft InfoPath (Office 2003, 2007 and 2010)
Mozilla Firefox 2.x and 3.x (up to version 3.63)
Note:
Firefox 4.x is compatiable with Dragon
NaturallySpeaking 11.5 and higher.
•
•
Mozilla Thunderbird 2x and 3.x (up to version 3.04)
OpenOffice Writer 3.1 and 3.2
Note: OpenOffice Writer 3.3 is compatiable with Dragon
NaturallySpeaking 11.5 and higher.
•
•
•
Microsoft Outlook Express 6
Windows Mail (Version 6 running on Windows
Vista)
Windows Live Mail version 14 (Full Text Control,
Menu Tracking, and Natural Language Commands)
Note: Windows Live Mail 15 is compatiable with Dragon
NaturallySpeaking 11.5 and higher.
•
•
Microsoft WordPad (on Windows XP, Windows
Vista and Windows 7)
Corel WordPerfect X3, X4 and X5
Recommended Specifications:
•
•
•
CPU: 1.8 GHz Intel Dual Core or equivalent AMD
processor. (SSE2 instruction set required).
Processor Cache: 2 MB
Memory (RAM): 2 GB RAM for Windows XP and
Windows Vista, 4 GB for Windows 7 and Windows
Server 2003/2008 64-bit.
Notes:
During the install process, the software checks that
your system meets these requirements; if they are not met, it will not
be installed.
Only the Medical edition of Dragon supports dictation directly into
Electronic Medical Record (EMR) Systems.
The following applications have been
tested and are compatible with
Dragon NaturallySpeaking 11:
•
Internet Explorer 6.x, 7.x and 8.x
Note:
Internet Explorer 9 is compatiable with Dragon
NaturallySpeaking 11.5 and higher.
•
•
•
Windows Explorer (on Windows XP, Windows Vista
and Windows 7)
Microsoft Word (Office 2003, 2007 and 2010)
Microsoft Excel (Office 2003, 2007 and 2010)
Can’t Open Email Messages?
It sounds like your PC is missing a supporting
application. To resolve the issue, you must determine
the file type as indicated by its three- or four-letter file
extension. You can view the extension by accessing
My Computer, opening the Tools menu, selecting
Folder Options, clicking the View tab, and deselecting
the Hide File Extensions For Known File Types option.
Click OK to save the new setting and then access the
file on your PC. The extension will appear at the end of
the file name. Once you determine the file type, you
need to identify a program that supports it. A file
extension directory, such as the one found on
SmartComputing.com, can help you accomplish this
task. After identifying the corresponding application,
download and/or purchase it and then install the
application on your system. You should be able to open
the file attachment from within the specified application.
Reprinted with permission from Smart Computing. Visit
www.SmartComputing.com/Groups to learn what Smart
Computing can do for you and your user group!
NVPCUG Computer News, Sept 2011, Page 9
Paragon Drive Copy 11 Professional
Reviewed by Terry Currier, President of the WINNERS WINdows usERS group, Fountain
Valley, CA, June 2011 issue, The Notepad, www.windowsusers.org, [email protected]
• Prepare a bootable recovery
Paragon Drive Copy 11 Professional is sort of a do-all utility
environment from any ISO
for anyone wanting to copy a hard drive. What I used it for
image, including their WinPE
was to clone my hard drive to an external drive connected
3.0 image
via USB. I have a 1.5TB drive in my computer and right now
I’m using about 450GB of that space. There are other
programs that will clone the drive, but you have to have the Paragon Drive Copy Key
same size drive to copy it to. The Paragon Drive Copy did
benefits:
great copying it to the 500GB drive with no problem.
• Ultra high-capacity HD support
I set it up to Migrate Hard Disk. I started it before going
(>2.2TB) migrates existing
to bed and expected the process to still need some time in
system from Master Boot Record (MBR) to modern
the morning. But, it was done when I checked it in the
Retained GPT (GUID Partition Table also known as
morning. When I first backed up the drive with Rebit it took
Hybrid GPT) HDD and gain access to complete
much longer. To be fair, though, Rebit creates a database
HDD capacity
and saves the files in a special way.
• All partitioning (resize, move, creation) and copy
Using Paragon Drive Copy is the ideal way to migrate to
with resize operations now take partition alignment
a larger drive, or to an SSD drive. Another use is, as they
problems into account with all volumes being
call it, migrate hard drive to container. It creates an image
automatically aligned by sector
file of your drive making it so you can create a copy onto
• Dissimilar hardware support allows migration of
another computer. This is what many companies will do in
existing system and makes it bootable in a new
setting up new computers so they all match.
environment
• Copy features – copy a full hard disk or a separate
One thing we should all have is a
partition, and resize a partition while copying
recovery disc. Their Recovery
• Supports all major virtual machines: MS Virtual
Media Builder can help you:
PC, VMware Workstation, Oracle Virtual Box,
• Prepare the Linux/DOS recovery environment
VMware Fusion
(included in the installation package) on external
• Basic partitioning features
media (CD, DVD, or flash memory) to boot and run
• Refined User Interface – improved two-level
utilities under Linux or PTS DOS, and that way to
user interface (Easy/Advanced) to satisfy needs
get access to your hard disk for maintenance or
of every customer
recovery purposes.
• Boot Corrector
• Create from the master CD the Linux/DOS or
• Empowered data safety and disaster recovery tools
WinPE (Windows Pre-installation Environment)
for both physical and virtual Windows environments.
recovery environment on a CD/DVD disc, or flash
• Updated wiping technologies can efficiently dispose
memory.
of data on any HDD, SSD, flash-drives and laptops.
• USB 3.0 ready: New USB 3.0 port grants the
possibility to access to external HDD and Flash
drives on the new high-speed version of the traditional
serial port
Drive Copy 112 s interface is good and easy-to-understand.
The help that comes with it is very good with illustrated
instructions to help the user.
Paragon Drive Copy 11 Professional is available for
$39.95 via download from http://www.paragonsoftware.com/home/dc-professional/
System Requirements
•
Operating systems: Windows XP/Vista/7 and XP
SP2/Vista/7 64-bit
NVPCUG Computer News, Sept 2011, Page 10
•
•
•
•
•
Internet Explorer 5.0 or higher
Intel Pentium CPU or its equivalent, with 300 MHz
processor clock speed
128 MB of RAM (256+ recommended)
Hard disk drive with 100 MB of available space
SVGA video adapter and monitor
•
•
Keyboard
Mouse
Additional requirements
External USB hard drive to store data
*
SuperTooth Buddy - Can it be too good?
By Terry Currier, President, WINNERS (WINdows usERS Group), CA, January Issue, the
Notepad, www.windowsusers.org, [email protected]
The SuperTooth Buddy is a hands free Bluetooth
speakerphone (bar) for your car. On the back is a strong
round magnet, and it comes with a metal clip you put over
your sun visor. You simply “attach” the unit to the metal
clip. Pairing it to my phone was very easy. It can be paired
with two mobile phones simultaneously, if both want to use
it at the same time it will default to the last one paired. In
fact it will remember and pair up to eight phones.
While driving you are facing the microphone so it picks
up your speaking very well. In testing it my wife said I
sounded very clear. The microphone is designed to absorb
noise and vibrations to enhance outgoing voice quality. It
has full duplex audio with echo canceling and a double
noise canceller. The speaker produced good sound with
plenty of volume. If your phone supports it you can also use
call waiting, and voice dialing.
Voice Dialing
I tested it with a Samsung phone. It uses Bluetooth version
2.1; they say it is compatible with all Bluetooth phones,
including the iPhone, Blackberry and Smart Phones
(Android O.S., Windows Mobile).
You may be tempted to turn it off when not in use, but the
SuperTooth Buddy has a standby charge of 40 days (1,000
hours.) Talk time is up to 20 hours. It was easy to just leave
it on all the time and have it automatically reconnect with
my cell phone when I got into the car. Note: it did take a
couple of minutes for the reconnect, it was not instant.
When the charge is low it gives a steady red light behind
the multi-function button. With the adapter they supply you
plug it into the cigarette lighter socket and it will charge in
three hours. It can also be charged from a PC via USB
Cable.
I really did like the SuperTooth Buddy for its clarity,
So why did I ask can it be too good? Well the strength of
the connection is actually too strong. It says it will connect
up to 30 feet away from the unit, and it’s true. I can have
the car parked on my driveway walk in, and in the back of
the house hear the phone and read the message on the
phone saying Bluetooth was disconnected. That would not
be so bad, but I can actually walk to the front of the house
and have my cell phone reconnect to the unit on the
driveway. And of course the microphone and sound functions
are transferred to the SuperTooth Buddy – in the car. I
have parked the car and in a straight line get about 50 feet
away before it finally disconnects.
www.hypercel.com/Z004088E
Company Website: www.supertooth.net
Dial2Do
www.dial2do.com
While not exclusive to SuperTooth Buddy a new service
was listed on their website since I started this review.
Dial2Do allows the subscriber to create reminders, send
texts, listen to and send email, and access favorite 3rd
party services - all while keeping your hands on the wheel
and your eyes on the road. They say it will work with any
phone, but have extra features on Smartphones.
When you subscribe to the service you are given a
number to call. When you call a voice will ask you what you
want to do. Some of the other things you can do is check
your calendar, Toodledo task list, post to your blog on
WordPress, weather, news, and yes you can even use
Twitter. You can try a free 30-day trial of their basic
service – create and listen to reminders, voice to text
transcription, and Smartphone applications. The Basic will
cost you $2.49/month or $24.99/year. With the pro version
you can do all the other neat things at a cost of $5.99/month
or $59.99/year.
NVPCUG Computer News, Sept 2011, Page 11
*
Review - Apple TV
By Richard Corzo, President, Danbury Area Computer Society, CT, January 2011 issue,
DACS.doc, a Computer and Technology Newsletter, www.dacs.org, [email protected]
Last fall, Apple came out with a second generation Apple
TV device (h t t p : / / w w w . a p p l e . c o m /
appletv/) for connecting to your high-definition TV.
It’s significantly cheaper ($99) and contains no hard drive.
It’s a way to stream video and music to your TV and stereo
or home theater surround sound system.
I never owned the
previous model, probably
because I don’t have an
HDTV. But I got curious
about the new one and was
interested in a way to show
my recent Turkey vacation
photos to my family out of
state on a Thanksgiving visit.
My family members all
have an HDTV, and the new Apple TV is so compact that
I thought it would be easy to travel with. I could potentially
show photos from my iPod with an audio/video cable to
connect to the TV, but they would be in standard definition.
I hoped the Apple TV might be able to show my photos
at a higher resolution.
I went to the local Apple store and explained my
interest to the salesperson. I already had my photos
uploaded to a MobileMe (http://www.apple.com/
mobileme/) gallery. The salesperson said I should
notice a difference, but it was hard to tell by looking at
their sample photos she showed me on their demo TV.
For $99 I decided to take a chance.
Although I don’t have an HDTV at home, I have a flat
panel monitor with an HDMI connection, so I was able to
set it up before travelling to visit my family. You need a
home network to connect to, either via a wired Ethernet
connection or the Apple TV’s built-in Wi-Fi capability, and
a power outlet. Using the small 7-button remote I navigated
the on-screen keyboard to enter the Wi-Fi password, and
the Apple TV came up to show its home menu: Movies, TV
Shows, Internet, Computers, and Settings.
Movies and TV Shows are things you can rent from the
iTunes Store right from the Apple TV. You can also view
Apple’s collection of movie trailers under Movies > In
Theaters. If you have previously purchased music or movies/
TV shows from iTunes on your computer, you can listen to
or watch them by looking for your computer’s iTunes library
name under Computers. Your computer will need to be
turned on and running iTunes. In iTunes 10 you need to
enable Home Sharing on the computer as well as on the
Apple TV by entering your iTunes Store account and
password. Once you do that, you’ll be able to browse all the
iTunes content on your computer from your Apple TV.
Internet has a list of things that can be streamed from the
Internet. The first is Netflix and if you have a Netflix
account you can stream any movie or TV show in their
growing catalog of items available via streaming. Some
movies are only available in DVD form, but I’ve seen a
couple on Netflix that are only available by streaming. If
you’re not interested in receiving mailed DVDs from
Neflix, you can now get a Netflix streaming-only account
for $8 a month.
The next item under Internet is of course the ubiquitous
YouTube. If you have a YouTube account you can enter
that to get access to your favorites and YouTube channel
subscriptions. Otherwise you can browse recent videos or
search for specific ones using the on-screen keyboard.
You can view photos that have been uploaded to a
MobileMe gallery or Flickr by entering your account
information. MobileMe is a paid cloud service offered by
Apple, and photo galleries is just one of its features. I can
vouch for the fact that the photos looked better on the
HDTV than they would have if I had connected my iPod to
the TV. In the case of Flickr, your photos will need to have
been marked as public in order to view them. My handful of
Flickr photos are marked as viewable only by friends and
family, so I’m not able to see them on the Apple TV.
If you have a flat panel TV you may have already figured
out that the built-in speakers are OK for watching TV, but
don’t impress much for watching movies or listening to
musical programs. So you should have your HDTV
connected to a home stereo or surround sound system for
better sound. In addition to an HDMI connection the Apple
TV has a “TOSlink” optical digital audio connection. Your
home theater system should be able to handle this kind of
input, but if you have an older home stereo with only analog
stereo audio jacks, you’ll need to buy a converter like this
GefenTV Digital Audio to Analog Adapter (http://
www.gefen.com/gefentv/gtvproduct.
jsp?prod_id=5279).
NVPCUG Computer News, Sept 2011, Page 12
The features I’ve mentioned so far may be enough for
you to shell out $99 for an Apple TV, but Apple has sneaked
in an additional killer feature that could really convince
you. If you have a recent iOS device: iPhone, iPad, or iPod
touch, you can use a feature called AirPlay. This won’t
work on some older devices like my iPhone 3G, but if you
have a newer model, you start playing something on your
device and you’ll see a little AirPlay icon (rectangle with
a triangle). Tap it and select Apple TV. The media will start
playing on your TV or stereo connected to the Apple TV!
You can also initiate this when playing something in iTunes.
There are some restrictions on what will work—one of our
Mac SIG members had trouble getting a video from his
iPad to play on the Apple TV. I initially had trouble playing
something from iTunes on Windows 7, but was able to get
it to work after modifying the Windows firewall settings.
My assessment is that if you’re already into the Apple
ecosystem: iTunes, iPod, MobileMe, etc., then the Apple
TV is a really nice device. If you’re not already so much
into Apple technology, you may want to check out some
alternative devices such as the Roku box (http://
www.roku.com/), which supports Netflix and a number
of services not available on the Apple TV, but won’t be able
to play your iTunes purchased content.
*
Database Redux
By Wil Wakely, President, Seniors Computer Group, California, May 2011 issue, Bits and
Bytes, The Official Electronic Newsletter of the Seniors Computer Group,
www.SCGsd.org, [email protected]
About this time last year the Prez article discussed the longer 8-track)), Xmas lists, Publication subscriptions,
basics of databases. (See Prez Article Bits & Bytes, Contact lists for various organizations and Collections
March 2010). This subject needs to be addressed again (art, jewelry, etc.). Pictures can also be stored with each
because it is such a powerful computer tool and has record along with the data. We seniors recall that in the
become very pervasive in today’s culture. The computing olden days obsessive types spent hours keeping such lists
power and storage capability of modern computers has so by hand in notebooks, and if they were very large,
improved that huge databases are being generated and searching and sorting was a real headache.
utilized as never before.
There are many database programs available in all price
So here’s a quick recap of what a database is: A single ranges from free on up, depending upon their power.
subject such as an address book is broken down into the Microsoft provides Access database program in the Office
individual parts (called ‘fields’) that need to be tracked, Pro suite. AskSam is a low cost database program that is
such as last name, first name, street address, city, state, zip, simple to use and readily available. A Google search will
phone, etc. For each contact (person, business, etc.) a return a list of many database programs. Search for
record is stored with specific information in each field. Database Reviews to determine the best one for you.
Now the beauty and power of a database is that each of
these fields can be searched and sorted in many different
ways. For example, if you want a list of all contacts
(records) with last name ‘Smith’ who live in zip code
Printers
‘92101’ and are between the ages of 45 and 55, and have
When you print a document, the printer doesn’t print it
email addresses with AOL, then a single simple search
immediately. Instead, it is sent to a file on the hard drive
retrieves them in seconds. Excel or Word documents
(called the spooler) and printed from there. Spooling is
cannot do anything this complicated.
a timesaving technique. Because even complex printing
This is how Google can return umpteen thousand hits
files can be saved on a hard drive faster than being
in milliseconds for some obscure search you have made.
printed, spooling a document lets the printing program
Their database is huge and is constantly updated as new
continue working while printing continues from the
sites come on line or old ones are updated. A ‘web
spooling file in the background. However, you can
crawler’ program constantly seeks out new Internet
adjust spooling options. In WinXP, click Start, Control
information which is immediately added to the giant
Panel (make sure you’re in Category view), Printers
database. New databases on a plethora of subjects are
And Other Hardware, and Printers And Faxes. Rightbeing created every day which add to the universal
click your printer, select Properties, and select the
information pool, both public and private. Printed
Advanced tab. If you have trouble spooling a document,
encyclopedias are practically obsolete with on-line
click the Print Directly To The Printer radio button and
databases instantly available to all who have access to
click Apply
the Internet. Is the Britannica still published? Recently, I
Reprinted with permission from Smart Computing. Visit
updated some databases that I maintain: Computer CDs,
www.SmartComputing.com/Groups to learn what Smart
Video tapes and DVDs, Music (LPs, CDs, cassettes, (no
Computing can do for you and your user group!
Happy computing!
NVPCUG Computer News, Sept 2011, Page 13
*
Ganked by a nOOb
By Vinny La Bash, Regular Contributing Columnist, Sarasota PCUG, Inc., FL, April 2011 issue,
Sarasota PC Monitor, www.spcug.org, [email protected]
If you find the above phrase meaningless, you haven’t
experienced the online social networks where you can
have the most fun. We’re not talking about Facebook or
Twitter. Ditto for other social network sites like MySpace
which these days looks like Empty Space.
If you’re not playing one of the more popular Massively
Multiplayer Online Role Playing Games (MMORPG), you
may be missing out on one of the most interesting and funfilled experiences you can have with a computer. MMORPG
is a genre of web based role-playing games in which a very
large number of players interact with one another within a
virtual game world. You’re certainly not alone in this world.
It could be inhabited by dozens, hundreds, and in some
cases thousands of players. One game, World of WarCraft
(WoW) has over a million players.
Most MMORPGs need only a PC to connect to an online
server to play. Others require a game console. After storing
some basic information about the player, the action starts.
In a MMORPG you the player create and control a
character represented by an avatar which you direct to
explore, solve problems, and find items necessary to complete
tasks which take you closer to achieving the ultimate
objective of the game. Other tasks may be part of the game
such as building and destroying things, fighting opponents,
interacting with other characters, assembling tools, earning
or otherwise acquiring the local currency, and so on.
There are games which require you to make moral
choices which will affect the outcome of the game. For
example, you are leading a team of specialists in an attempt
to rescue a large group of people from an imminent natural
disaster. Because of the circumstances, which are no one’s
fault, you can succeed only by leaving an important member
of your party behind to ensure the success of the rescue.
However, the team member will almost certainly die in the
process, and he or she could be crucial to the success of an
even more important operation
further along in the game.
Some academics devote time
to study games that require
players to work with currency
of one form or another. There is
one game that uses bottle caps
for money in the context of its
virtual world. Characters
designed by players have
developed
sophisticated
economies within games, at
times with mechanisms to
exchange online currency for real money. These “synthetic
economies” bear an eerie resemblance to our own world
which is remarkable considering that the most popular
games have players who come from all parts of the globe.
These “synthetic economies” evolve from players of
different cultures which means they may be tapping into
something fundamental about human nature.
All this has been made possible through the world
wide penetration of broadband internet connections.
MMORPGs have gained enormous popularity not only
in America but in South Korea, Taiwan, and China.
Playing a MMORPG might mean you could be a member
of a team that is truly international, requiring levels of
continuous cooperation from individuals that most
governments haven’t been able to pull off.
Many of these games require a monthly subscription fee
to play but many of them don’t. Simply search on “Free
MMORPG Games” and your search engine will bring up
dozens of these games that you can play for free. Use them
to get a sense of how to play before committing any cash to
the most popular ones. Don’t neglect to go to http://
www.mmoglossary.com/mmorpg_terms/1/
index.html to get familiar with common game
terminology before traveling to an unfamiliar world.
The better you understand the virtual world, the
more you can enjoy the experience. Make an effort
to understand at least some of the vocabulary.
“Ganked” is a combination of two words, gang kill,
which refers to a group of experienced players ganging
up on a new, greenhorn player and killing off his
character for amusement. nOOb is a way of referring
to a new, inexperienced player. It’s a variation of
“newbie”, but has the additional meaning of clueless.
That’s why it’s spelled nOOb to make it resemble
boob, a real dummy. Therefore if you’re “Ganked by
a nOOb” you’ve experienced the ultimate indignity
of MMORPG playing.
NVPCUG Computer News, Sept 2011, Page 14
*
IPv6 is Coming
By Cal Esneault, President and leader of many Open Source Workshops & SIGs, Cajun
Clickers Computer Club, Louisiana, April 2011 issue, Cajun Clickers Computer News,
www.clickers.org/, http://cccclinuxsig.pbwiki.com, [email protected]
Canonical (Ubuntu Linux) and Google recently announced a colon, leading zero’s can be omitted, and blank fields can
they would participate in a 24-hour trial of IPv6 on June 8, be represented by multiple colon marks. There will be a
2011, along with Facebook, Yahoo, and others. This means protocol which allows current IPv4 addresses to be
that some of the big names in open source software will be contained within the new IPv6 address. If all works as
involved with the new Internet Protocol, version 6 (IPv6) hoped, we won’t care since our DNS resources will fill in
which will be needed to replace the current Internet numbers for us when we type in Clickers.org, etc., just
like it happens today.
Protocol, version 4 (IPv4).
Modern operating systems (Windows, Mac OS, Linux,
To get to an Internet address, we usually type in a
name, such as Clickers.org or Google.com. Software BSD) have already been configured to allow for IPv6
then goes to a distributed database from a Domain Name protocol. However, your current router and your ISP
Server (DNS) and uses a table to translate this into a 32- (Internet Service Provider) equipment may not be ready.
bit numerical identifier. The identifiers are split into four In complex computer networks, all of the interactions
8bit segments. Since 8 binary digits (bits) can span the between equipment and older software are not sufficiently
range from 0 – 255, we sometimes see these addresses known. Therefore, the test on June 8 will be the first of
as the decimal equivalents separated by periods. For probably many to debug the issues which will have to be
example, 192.168.1.2 is a typical address for our internal addressed. A similar situation was envisioned when we
networks when using routers. If we use the last “block” moved into the 21st century (known as the Y2K issue,
(last 8 bits), we could theoretically have 256 computers where ambiguity between dates could occur since early
in this network. The total number of distinct addresses in software only used the last two numbers for years).
IPv4 is 256 x 256 x 256 x256 = 4.3 billion. When the
In that case, the situation was handled well and none of
Internet first started, no one could conceive that more the dire predictions about airplane crashes and business
than 4 billion addresses would be needed, but the need for shutdown came to pass. It did, however, take a lot of work
each home network and each mobile phone to have an and effort to prevent chaos. Will IPv6 be a big event, or just
address is straining that concept. Recently, the last big a problem for computer professionals? We don’t know yet,
“blocks” were issued to area centers for distribution. The but open source folks are in there with everyone else to
problem is not as bleak as it may seem since many help keep our systems functioning.
addresses can be issued temporarily, some early users
took more than they really need and can give some back,
Locked Up
and only one address is needed for a private network
If you travel with your laptop, you may need to leave it
which handles many computers within its structure.
unattended, so a physical lock is a handy security
Some believe that we will run out of freely available
accessory. A laptop lock features a cable that you can
addresses by the end of 2011, and that new addresses will
wrap around an immobile object and a connector that
have to wait for an old one to be freed up.
attaches to a port or security slot on your laptop.
Internet designers have been working on the new IPv6
Kensington’s MicroSaver Alarmed Lock ($54.99 ;
protocol to solve issues with the old system. It will have
www.kensington.com) fastens via security slot,
128-bit addresses which will provide for a possible of 340
and the lock sounds an alarm if the cable is cut.
trillion, trillion, trillion addresses (3.4 x 10^38). This at first
seems silly today since each person on earth could have
Use Your Hard Drive First
trillions of addresses, but it becomes more reasonable
Prepare all DVD projects (and ideally all CD projects,
when you realize that any electronic device in your home
as well) on your hard drive before burning them. Use
(which will soon be a computer) and any device in a
your DVD software’s preview and testing features;
factory or automobile could have a unique address for
make sure that all links (chapters, scenes, features,
control purposes. Also, it is hoped this will be sufficient for
etc.) work properly and that all video displays as it
a very long time so that the change will be permanent in
should. With everything in place, burn the content to
even our grandchildren’s lifetimes.
the DVD. Use this guideline whether you’re preparing
The addresses for IPv6 will be split into eight 16-bit units.
original DVD video or copying existing video.
Since the decimal number for each unit is large (2^16 =
65,536), the addresses will be in hexadecimal notation (a
Reprinted with permission from Smart Computing. Visit
www.SmartComputing.com/Groups to learn what Smart
= 10, b = 11, … , f =15). An example address might look like
Computing can do for you and your user group!
fe80:0:0::200:f8ff:fe21:67cf where fields are separated by
*
NVPCUG Computer News, Sept 2011, Page 15
This and That or Things That May
Interest You
By Lynn Page, Editor, Crystal River Users Group, Florida, December 2010 & January 2011
issues, CRUG newsletter, www.crug.com, [email protected]
menu select Find All and then click Messages from
Sender. The Advanced Find dialog box appears with a list
of related messages.
Windows Explorer
Color Code Outlook Items
Color categories can be assigned to items like messages,
contacts, appointments and tasks. So color code messages,
tasks, and calendar items relating to the same project with the
same color. For an existing item like a message in the Inbox,
right-click it, point to Categorize, and click a color category.
Reading Pane
Check Boxes
I use the Control key to make multiple selections in
Windows Explorer but you can also use check boxes. With
Windows 7 in Windows Explorer, click Organize and select
Folder and search options in the drop down menu. Select
the View tab and in the Advanced Settings window scroll
down, check the box for Use check boxes to select items
and click OK. Then when hovering the mouse over a file
in Windows Explorer, a check box appears next to it. Click
the check box to select the file. The checked box remains
next to the file. Clicking it again removes the check and the
box disappears when the mouse is moved away.
Windows 7
Run Multiple Copies of Applications from the Taskbar If a
program is already running, to launch another copy of the
application from the taskbar, hold down the Shift key and
click the icon.
Outlook 2007
The Reading Pane lets you read the content of a message,
preview and open attachments, follow a hyperlink, use
voting buttons, view the follow-up information in the
InfoBar, and respond to meeting requests.
Preview Messages without Opening
View messages safely in the Reading Pane. Potentially
malicious scripts or attachments are not activated or
opened automatically in the Reading Pane.
View Email Properties
When viewing a message in the Reading Pane, view email
properties about a name in the From, To, or Cc field by
double-clicking it .
Turn on or Off
Turn the Reading Pane on or off in the
View drop down menu.
To turn the Reading Pane on in the View menu, point to
Reading Pane, and then click Right or Bottom to specify
where it will appear. To turn the Reading Pane off in the
View drop down menu, point to Reading Pane and select
Off. On the View menu, point to Reading Pane, and then
click Right or Bottom.
Preview an Attachment in the Reading
Pane
Find Related Messages or Messages
from Same Sender
To find related messages, right-click the message, on the
drop down menu select Find All and then select Related
Messages. The Advanced Find dialog box appears with a
list of related messages. To find all messages from the
same sender, right-click the message, on the drop down
With the Reading Pane you can quickly see what the
attachment contains without opening it. But you need the
appropriate 2007 Office application installed on your
computer.
To Preview an attachment, in the message list, select the
message that has the attachment. in the Reading Pane,
select the attachment and click the Preview file button. To
NVPCUG Computer News, Sept 2011, Page 16
return to the message body, click the Message button.
Windows Live Mail Options
AutoPreview
Access Mail, Email Account, Newsgroup, Feeds and
Safety options through the drop down menus.
Write Messages Offline
Another way to quickly scan through email is using
AutoPreview. I personally use AutoPreview only and do
not have the Reading Pane turned On. It displays the first
three lines of each message in the message list, along with
the sender’s name and the subject line. In the View drop
down menu, point to Current View, and then click
Customize Current View. Click Other Settings, and then
click Preview unread items.
AutoPreview and the Reading Pane can be applied to
any mail folders, like Sent Items and Drafts, but must be
set for each folder.
Windows Live Mail saves messages on your hard drive,
rather than on the web. So when travelling or using an
unsecured WI-FI write messages and read those already
downloaded while offline. Then connect to the Internet to
download new email and send messages you have ready
and waiting in the Outbox.
Add Recipients to Windows Live Mail
Contacts
To add other recipients of an email, right-click on the
recipient, select Add to Contacts and confirm the details.
This works for recipients in the To and CC lists. Right
clicking a recipient already in the Contacts list offers an
Edit Contact option.
*
Tips & Tricks | Tutorial
Better File Information with Windows Explorer
Sort your files more intelligently with a few simple clicks.
By Les Townsing, a member of the Melbourne PCUG, Australia
April 2011 issue, PC UPDATE,
There is often a lot of information automatically recorded
when you save a file. This information can be easily
displayed and can prove to be useful when sorting/
categorizing files.
Normally, when you open Windows Explorer (right-click
on the Start button and select ‘Explore’) you get displays
indicating the file name, size, date modified, and other
general information (see below).
If, however, we right-click anywhere on the Column
Heading bar we get a lot of additional columns we can add.
Depending on the type of files you can select some
meaningful columns. If we are looking at picture files (jpg)
some appropriate columns may be Date Taken, Dimensions
or file size.
If you right-click on a file and select properties, you get
to view all the possible information as well as the ability to
edit some of the fields.
You can now sort your files by any of the columns (just
left click on the column heading).
If we right-click on a file, we can select Rename and
change the name to a more meaningful title rather than a
bunch of numbers. These features may be more meaningful
if we use music files as an example.
www.melbpc.org.au, [email protected]
Unfortunately, some of the “Ripper” programs (programs
that copy CDs and often convert the files to MP3s) get it
wrong or leave a lot of stuff out, which can be quite annoying,
particularly if it is the artist’s name or the title of the song.
When selecting a CD Ripper program this is one item
worth checking.
Extra Tip
If you select a file (click on it) then hold down the shift key
whilst clicking on another file then the system will select all
the files in between and including the first and last file you
clicked on. Now, if you right-click on any one of the
selected files and choose properties, you can edit a field for
all the selected files. This is no good for titles as every file
must have a different name. However, it is good when you
want to edit the album title or artist for a number of tracks.
Extra Extra Tip
Often the files you want to select are not consecutive
in a list. No problem, hold down the control key then
click on the files you want. As you click on the files
they become marked as selected. You can then rightclick on any selected file to edit the properties of all the
selected files.
NVPCUG Computer News, Sept 2011, Page 17
*
My Photo Is Being Used Without
Permission: Now What?
By Carolyn E. Wright
difficult to enforce or runs a small personal website with
little traffic, you may decide that it’s not worth your time
and effort to fight the infringement.
Option #2 – Prepare a DMCA TakeDown Notice
You’re sitting in your easy chair, surfing the web. You’re not
paying much attention, until you see it. It’s your photo, but
you did not post it on this website. You can’t believe someone
used your photo without your permission. Now what? The
next steps you take are important to protect your rights.
Make Sure That the Use Is an
Infringement
Not all uses of your photographs are infringements. Do
you use a licensing agency that may have authorized the
use? Did you grant too broad of a license so that a licensee
could have licensed your photos to others? Finally, is the
use a fair use? While only a court can ultimately decide
what is fair use, the law gives us guidelines as to what may
qualify. (Read more about fair use in my blog entry here
(http://www.photoattorney.com/?p=299).
Save Proof of the Infringement
After you decide that the use is an infringement, make
copies of it – both in electronic and print forms. The
infringer may remove your photo without notice or once
the infringer knows the infringement has been discovered.
You may need that evidence later.
Investigate the Infringer
Next, find out what you can about the infringer. Research the
infringer’s website to find a contact name and address, such
as by searching the website’s “who is” information. Several
websites provide free “whois” services, such as whois.net
(http://www.whois.net/). After you enter the website
name there, you may be able to find contact information for
the owner/administrator of the website.
Option #1 – Do Nothing
You always have the option of doing nothing. If the
infringer is in a foreign country where infringements are
Thanks to the U.S. Digital Millennium Copyright Act
(“DMCA”) enacted in 1998, the Internet Service Provider
(“ISP”) that hosts a website is not liable for transmitting
information that infringes a copyright only if the ISP
removes the infringing materials from a user’s website
after receiving proper notice of the violation. The notice
must: be in writing, be signed by the copyright owner or the
owner’s agent, identify the copyrighted work claimed to be
infringed (or list of infringements from the same site) and
identify the material that is infringing the work. Additionally,
the notice must include the complaining party’s contact
information, a statement that the complaint is made in
“good faith,” and a statement, under penalty of perjury, that
the information contained in the notification is accurate
and that the complainer has the right to proceed (because
he is the copyright owner or agent). Check my article here
(http://www.nppa.org/member_services/
advocacy/dmca_takedown_procedure.pdf) to
learn more about how to prepare a DMCA take-down
notice. Even if you don’t reside in the U.S., you may use
this great tool to stop an infringer from using your work as
long as the ISP is in the U.S.
Option #3 – Send a Cease and Desist/
Demand Letter
Another option you have for resolving infringements is to
contact the infringer yourself. You may request payment
for the infringement and/or ask that the infringer cease use
of the image. It’s best to do this in writing – a letter by
surface mail seems to have more clout than email
correspondence.
If the website would provide a marketing outlet for you,
you may only want the infringer to give you proper credit.
If so, make a written agreement with the infringer that you
will provide a license for the image (be sure to designate
the parameters of the use, such as who, what, why, when
and where – see my blog entry on the subject (http:/
/www.photoattorney.com/?p=130) for more
information), on the condition that the infringer posts your
photo credit / copyright notice on or adjacent to the image,
along with a hyperlink to your website. You may get
additional work from the infringer or others.
Photographers sometimes send an infringer an invoice
NVPCUG Computer News, Sept 2011, Page 18
for three times their normal license fee as an offer to
resolve the infringement claim. While the 3x fee may be an
industry standard, is not a legal right given by any court of
law or statute. Instead, U.S. law states that you are entitled
to actual or statutory damages for infringement as provided
by 17 U.S.C. Chapter 5 (h t t p : / / w w w .
copyright.gov/title17/92chap5.
html), specifically section 504. The damages that you
can receive from infringement - especially if you timely
register your photographs - sometimes can amount to a lot
more than three times your normal license fee. So you may
want to think 2x before you send the 3x letter.
Your demand for payment may be admissible against
you in an infringement case, which can limit your ultimate
recovery. To avoid this possibility, include in your demand
letter that “these discussions and offer to settle are an
attempt to compromise this dispute.”
When the copyright to a photo is not registered with the
U.S. Copyright Office prior to the infringement (or within
three months of the first publication of the photo), a
copyright owner may recover only “actual damages” for
the infringement (pursuant to 17 U.S.C. 504 (b)), instead
of statutory damages. Courts usually calculate actual
damages based on your normal license fees and/or industry
standard licensing fees. You also may recover the profits
the infringer made from the infringement if they aren’t too
speculative. If you have registered your copyrights, then
you are eligible for statutory damages of up to $150,000 for
willful infringement of each photograph. “Willfulness”
means that the infringer either had actual knowledge that
it was infringing the owner’s copyrights or acted in reckless
disregard of those rights. Evidence that the infringed
works bore prominent copyright notices supports a finding
of willfulness.
Option #4 – Hire a Lawyer to Send a
Demand Letter
Additional Claim for Removal of
Copyright Management Information
When an attorney gets involved, the matter is escalated
and tensions rise. While the infringer may be more defensive,
the weight of your demand letter is dramatically increased
if it comes from an attorney and the infringer generally
takes the matter more seriously. Some attorneys charge a
flat fee to send a letter; others may charge a contingency
fee that is based on the percentage of recovery; or the fee
may be a combination of both.
If you or your attorney send a demand letter, then there
is some risk that the infringer will preempt your infringement
lawsuit by filing a request for declaratory judgment that the
use is authorized. This may involve you in a legal action for
which you may need legal counsel in a jurisdiction (court
location) where you don’t want to litigate.
While many photographers place their name, copyright
notice, and/or contact information, constituting “copyright
management information,” on their images as “watermarks”
or in the metadata of the image file, it’s fairly easy to crop
or clone over the watermark or to remove the metadata.
Fortunately, the DMCA section of the Copyright Act
provides a remedy in addition to your infringement claim
when the infringer removes your CMI to hide the
infringement. More information is available on my blog
(http://www.photoattorney.com/?p=163.).
Option #5 – File a Copyright
Infringement Lawsuit
Your most aggressive option is to pursue your legal remedies
by filing suit. You first must register your copyright with the
U.S. Copyright Office, hopefully before but at least after
the infringement. (If you created the photo in a country that
is a signatory to the Berne Convention for the Protection
of Literary and Artistic Works (h t t p : / / e n .
wikipedia.org/wiki/Berne_Convention_
for_the_Protection_of_Literary_and_
Artistic_Works), you do not have to register in the
U.S. to protect your copyright or to file an infringement
lawsuit in the U.S.)
You must file your infringement claim (http://
www.uscourts.gov/districtcourts.html) in
a federal district court. It’s best to hire an attorney to help
you with your suit because the legal procedures are
complicated. Note that you have three years from the date
of infringement to sue for copyright infringement.
Conclusion
Infringements are rampant these days, both because it’s
easier for the infringers to find and copy your images and
because too many people think that they have a right to use
your photos or they won’t be caught. Fortunately, there are
many tools to battle copyright infringement. It’s up to you
to use them.
Carolyn E. Wright is a licensed attorney dedicated to the legal needs
for photographers. Get the latest in legal information at Carolyn’s
website, www.photoattorney.com. These and other legal tips
for photographers are available in Carolyn’s book, The
Photographer’s Legal Guide, available on her website.
NOTE:
The information provided here is for educational
purposes only. If you have legal concerns or need legal advice, be
sure to consult with an attorney.
Term from Smart Computing : underflow
A mathematical calculation that results in a number so
close to zero that a computer cannot represent it using
binary digits. Some systems will give the user an error
message if this occurs, while other computers will
guess at the number and go on.
Reprinted with permission from Smart Computing. Visit
www.SmartComputing.com/Groups to learn what Smart
Computing can do for you and your user group!ser group!
NVPCUG Computer News, Sept 2011, Page 19
Malware, Viruses, Trojans Defined
By Ira Wilsker, Member, Golden Triangle PC Club, TX; Columnist, The
Examiner, Beaumont, TX; Radio Show Host, Mondays, 6-7pm CT, KLVI.com,
[email protected]
This article has been obtained from APCUG with the author’s in circulation, believing that they are
permission for publication by APCUG member groups; all other
generically all viruses, but, as I saw in this
uses require the permission of the author (see e-mail address above).
case, this blissful ignorance may lead to a
In the past week, I was called upon four
computing nightmare.
more times to clean malware off of
While not necessary to use a computer, it would likely be
infected computers. One user had a
beneficial
for computer users to be aware of the different
major name brand antivirus program
threat
groups
that can impact our computing. According to
installed, running, and updated and could
Wikipedia,
“A
computer virus is a computer program that
not understand how the malware had
can
copy
itself
and infect a computer.” Many viruses
penetrated his antivirus software and contaminated his
attach
themselves
to legitimate programs or data files on
computer. He had purchased the antivirus software last fall
from a big box electronics store based on the recommendations the infected computer. The fact that a computer virus can
of a salesperson. He had been told that this particular brand copy itself to infect other computers is what makes it
of security software was the best as it was their top seller, and different from other types of malware, for which viruses
that antivirus software was all that he really needed. Based are commonly confused. Viruses can be spread through
on that recommendation he plopped his hard earned money on digital media (USB drives, CD or DVD discs, and floppy
the counter, went home, installed it, updated it, and blissfully discs) or through network connections that the virus can
surfed the internet, opened email attachments, downloaded use to copy itself to other attached computers. Once a
software and music, and had just a jolly good time online until virus has infected a computer it may perform a variety of
his computer gradually slowed to a crawl, and friends informed tasks as programmed by its author. Viruses may damage
him that they were receiving spam emails from him. This user the data on a hard drive or degrade the performance of the
was perplexed, as his antivirus software was running, and computer. Some of the viruses are stealthy and their effect
indicated that it was updating several times a day. He just may not be noticeable by the user, as the viruses do their
could not understand how 90 different malware programs had damage in the background. Some viruses are functionally
infected his computer. His problem started when he purchased benign, other than they reproduce themselves countless
inadequate security software; while the product he bought times on the infected hard drive, until they consume all of
was excellent at protecting his computer from viruses, and the free space on the hard drive.
Computer worms are a malicious computer program
some Trojans and spyware, it did not offer the all-inclusive
that
wriggles through computer networks sending copies
protection of the comprehensive security suite offered by that
of itself to other computers attached to the
publisher (and others as well) that would
network. Most worms are free standing
have only cost him a few dollars more.
programs, and are commonly programmed
There is a common misconception in
to spread themselves through the network
user circles that viruses are the primary
without any action by the user. Most
computing threat, as users have had heard
worms have an explicit nefarious function
about viruses for several years. Today,
such as deleting files on the infected
viruses are present, but a relatively minor
computer, or encrypting critical files, only
threat in terms of prevalence. I did a quick
releasing them after an extortion payment
analysis of the most common new threats
is made to the cyber criminal. Some worms
recently listed by TrendMicro, and found
open a backdoor into the computer that
that viruses only made up 4% of the new
will enable the creator of the worm to take
significant threats to our computing security. On the other
remote
control
of
the computer, converting the computer
end of the spectrum, Trojans made up 42% of the commonly
into
a
“zombie”
under
his control, which can be used to
seen new threats, worms were at 14%, backdoors at 14%,
generate
revenue
for
the
originator of the worm by sending
web based threats were at 6%, java script malware was at
spam
mail
from
the
infected
computer, with the spam fees
6%, 4% were hacking utilities, 2% adware, and about 8%
collected
going
to
the
author
of the worm. Some worms
other threats. It is obvious that protective software that
are
used
to
create
a
zombie
network
of computers, also
protects the computer primarily from viruses is failing to
protect the user from the majority of contemporary threats; called a “botnet”, where the compromised computers can
it is precisely this fact that led to this user’s infected be used to launch directed cyber attacks on other computers
computer, despite his premium quality antivirus software. A or networks, in an act of cyber terrorism.
lot of users have a misconception about the common threats
NVPCUG Computer News, Sept 2011, Page 20
For those who are aware
of the epic “Helen of Troy”
of Greek mythology, the term
“Trojan Horse” means an
object looks like it serves
one purpose, but really has
an unobvious, usually
nefarious, purpose. Cisco, the networking company,
describes a Trojan as, “It is a harmful piece of software
that looks legitimate. Users are typically tricked into
loading and executing it on their systems”. In cyber speak,
a Trojan Horse, typically shortened to the simple moniker
“Trojan” is a program that appears to have a useful
function, but after being installed by the user, the Trojan
may be used to perform other undesirable functions. Some
Trojans are money makers for their authors because they
place paid (and usually unwanted) pop up advertisements
(Adware) on the infected computer, redirect web searches,
or shift online purchases to a seller not of the buyer’s
choice without his knowledge. Some Trojans are keyloggers,
which are commonly used for identity theft, or to give
unauthorized users access to a computer system. Trojans
are often spread through intentionally downloaded software,
surreptitiously bundled with another often legitimate
program, from email attachments, and purloined websites
with executable contact (ActiveX is sometimes used for
this). Some Trojans can be installed on the target computer
by way of code written in Java, or a Java script, that when
executed, implants the harmful content on the victim
computer.
One of the more recent and costly types of malware to
attack our computers is generically referred to as “Rogue
Antivirus Software”, which is usually implanted on the
victim’s computer by a Trojan. There are thousands of
these rogue programs in current circulation, infecting
millions of computers at any given time. Rogue antivirus is
sometimes installed by the user using “social engineering”
tactics, which tricks the user into clicking on something
that installs the rogue software. Some of the common lures
to ensnare the user into loading rogue software on the
computer are offers for free screen savers, toolbars,
utilities to play specific video formats (often attached to an
email), sham online security scanners, contaminated PDF
files, insecure web browsers, and other vectors. The
common thread of this rogue software is an authentic
looking popup that informs the user that his computer is
(falsely) infected with hundreds of viruses and Trojans,
and for a fee it will clean the computer. These popups
which will not permanently close will typically hijack the
computer, destroy the installed legitimate security software,
prevent access to online services that can kill it, prevent
cleaning utilities from executing, and otherwise take control
of the computer until the user pays a fee, typically $30 to
$70. This fee is to be paid by credit card or other online
payment service to a website that looks legitimate, but is
really a complete scam. Not just will the rogue software
not clean the computer of the pseudo infections after the
fee is paid, but now a cyber criminal, often in Russia, has
the user’s credit card information. it is not uncommon for
that same credit card information to promptly be sold on
illicit websites, and to have substantial unauthorized charges
appear on the compromised credit card account.
While there are many other
cyber threats out there, those
listed above are among the
most commonly encountered
by users. The traditional
antivirus software will protect
from some of the threats listed, but not all of them; this
enhanced security capability is in the purview of the
comprehensive security suite, or a combination of different
types of individual security utilities, and not the free
standing antivirus program. this is explicitly why I currently
recommend a high quality integrated security suite, rather
than an antivirus program. There are several good
commercial security suites available, as well as a few
free security suites. Just be aware that antivirus software
by itself is inadequate to protect against today’s
contemporary cyber security threats.
*
Two Great Speakers Beat Six Mediocre Ones
We all want the full surround-sound experience, but if
you have to make a financial choice between buying a
low-priced full 5.1 surround sound setup or a single pair
of high-quality stereo speakers for the same price, in
practically every case the high-quality pair will give you
better sound. Read the dynamic range specs for each
of the speakers in both systems and pay attention to
the amount of power that goes to each speaker (not just
the entire system). Distortion ratings also matter,
especially if you’re using your TV instead of an external
amplifier to power the speakers. Listen to all the
choices, by all means, but listen to crisp, clear, full,
undistorted sound to guide your decision.
Think Green
Keeping your electronic equipment clean can help
extend the usability of those items in the short run, but
keeping your electronics from heading to your local
landfill can help everyone in the long run. The EPA’s
Plug-In To eCycling Web page (www.epa.gov/
epaoswer/osw/conserve/plugin) provides
information about how to properly dispose of, donate,
and recycle computers, monitors, TVs, and other
electronic equipment. Click the Resources link for
Questions To Ask A Recycler and Guidelines For
Materials Management documents.
Reprinted with permission from Smart Computing. Visit
www.SmartComputing.com/Groups to learn what Smart
Computing can do for you and your user group!
NVPCUG Computer News, Sept 2011, Page 21
Corel Paint It
By Lynn Page, Newsletter Editor/Webmaster, Crystal River Users Group, FL, March 2011
issue, CRUG newsletter, www.crug.com, [email protected]
Overview
Corel’s latest photo painting application, Paint It, is based
on Painter, their professional natural media painting
application. Painter provides a very wide range of brushes
and textures for the artist. It is the standard for professional
art programs and as such requires a high degree of skill and
talent to use effectively. Corel Painter Essentials is a step
down in difficulty and versatility so is easier to use but still
requires some time to learn. Corel’s Paint It is their newest
and easiest painting program.
Paint It has a selection of brushes, such as an airbrush,
pen, pencil, sponge, and smudge tool, to make photos into
a painting, charcoal sketch or pencil drawing. The primary
purpose of Paint It is the automated photo painter but the
brushes let you add your own special effects to the
painting. I tried out a lot of the brushes on the finished photo
paintings and used a couple of the brush tools on a photo
prior to photo painting. For ease of use and simplicity the
tools and interface are limited.
Paint It opens with a welcome screen in front of the
workspace. This allows you to easily select a photo for
photo painting, resume working on an already opened
photo or open the Quick Start Guide.
Clicking “Create a photo-painting” or “Open a Saved Image”
opens a dialog box to browse to and open the photo to be painted.
As an example I chose a picture I took of the children’s pool at
the FACUG Technology Conference/Cruise.
Workspace
The Paint It workspace is very clean and simple. The
Toolbar across the top over the working image has obvious
access to undo and redo commands, save, brushes and
brush controls, view option, and program help. Less obvious
are the Get Started link (asterisk like button) and the
controls for transforming the open image (star like button).
I think the transform image controls are important enough
that I would like to see a grouping of smaller icons
representing them on the toolbar. However mousing over
any of the buttons on the Toolbar or in the Toolbox gives
a tooltip so all tools and commands are still easy to find.
The Toolbox down the left edge of the workspace
contains icons for important tools. Remember that the
brush icon selects the brush as it has been defined in the
brush drop down menu on the toolbar. The color palette is
located below the working image. The Photo Painting pane
runs down the right edge of the workspace.
The heart of Paint It is the photo painter. You choose from
among the 10 styles, such as Oil Painting, Impressionist
Painting, Detailed Watercolor or Pen & Ink Drawing that
are displayed in the Photo Painting panel down the right
side of the workspace. After selecting a painting style click
the Start Photo Painting button, and watch the program
create the painting in the selected style. The automatic
photo painting is based on the colors and composition of the
photograph. Let the photo painting run to completion or
stop it at any time by clicking the Stop Photo Painting
button. When a painting is complete some of the
photographic detail can be added back with the Restore
detail brush, located in the photo painting pane below the
start and stop photo painting buttons. This brush is especially
useful when painting photographs of people. Select the
Restore detail brush and the brush area on the Toolbar
becomes visible again. The brush tools are not available
NVPCUG Computer News, Sept 2011, Page 22
during photo painting or afterwards until the restore detail
brush or a brush tool in the Toolbox is selected. Set the
brush opacity and size and then brush over areas where
you want the detail brought back.
After photo painting Paint It allows you to add
finishing touches to the project. Add a signature,
embellishments or smudge or soften the image with
the brushes. A pressure sensitive tablet provides better
use of the brushes but a mouse or laptop touchpad can
also be used.
Brushes
Paint It contains 15 brushes plus the restore detail brush,
many with control over color, size and opacity. The brushes
can be used on the finished photo painting or the original
photo. The specialty Fire, Fairy Dust, Leaf, and Pattern
brushes have limited or no control over color. The other
brushes either work with the color in the underlying image
or with a user selected color.
to reselect a color. So if it is important for you to use exactly
the same color it is better to use one from the palette.
Printing
Paint It’s print command is located in the Image destination
drop down menu that looks like a save button on the
Toolbar. It opens the Windows print dialog box. So I would
print the finished image as any other saved photograph.
Conclusion
I found Corel Paint It is a fun, easy-to-use program. It is
ideal for novices who enjoy working with their pictures and
want simple way to convert a photo into a basic painting or
drawing. For more control to create art that is finely tuned
Corel Painter Essentials is still my choice. And I am looking
forward to working with Corel Painter which I won at the
FACUG conference.
Photo Paintings
As previously noted my first Paint It painting was of the
children’s pool on our cruise. I selected it because it is a
simple picture with bright colors.
With the image to paint open, look at and select a painting
style from the thumbnails on the photo painting pane. I
missed being able to see the thumbnail of the selected
image as on Painter Essentials but the thumbnail still gives
you an idea of how the painting will look. Mousing over the
thumbnail displays the painting style. I choose impressionist.
Click the thumbnail to select it and click the start photo
painting button to start automatic photo painting.
Color Palette
The Color Palette on the bottom of Paint’s workspace
offers a selection of colors to be used with the color
controlled brushes. I like to use the eyedropper tool, from
the Toolbox on the left, to pick a color from the photo. Once
a color is selected, it can be further refined with the Color
dialog box. Click the color swatch of the selected color to
open the Color dialog box. The dialog box lets you choose
a basic color or any color in the color spectrum associated
with that color.
As Paint It is painting the image watch the brush strokes.
The paint colors and brush stroke directions follow the
photo colors and lines as they would when actually painting.
The brush strokes get smaller and shorter as painting
finishes. You can click the stop photo painting button at any
time in the painting process or let Paint It run to completion.
The Color Palette doesn’t change so personally selected
colors aren’t available after you have selected another color.
This is not too inconvenient as it is simple to use the eyedropper
NVPCUG Computer News, Sept 2011, Page 23
Corel Paint It cont. on page 24
Corel Paint It cont. from page 23
This is how the impressionist painting looks at an
intermediate point in the painting process and as the
finished painting.
I used the restore detail brush to bring out the eye. To
save the finished painting click the Image Destination
button in the toolbar and select save image as. I use save
as to have the most control but there is also a save button.
Adding Embellishments
For embellishments I selected the furry brush and with the
eye dropper tool set the color to one from the fish and
painted in an extended tail.
Oil painting with the Dissolve brush giving a
pebbly look to the water.
Illustration
Illustration with red spray
painting in the water and
airbrush of the yellow on
the slide.
Modern Painting
Modern painting with
colors in the pool
blended with the
Smudge brush.
Other Photo Painting Styles
Modern Painting
Oil Painting
Modern Painting with
Smudge brush to blend
the colors in the pool.
Oil Painting with Pattern
open on walls and
columns of the oil
painting, the Fire brush in
water, the Fairy dust to
add random color
sparkles and the Leaf
brush to paint in green
leaves for the
embellishments.
The automatic photo painting is based on the colors and
composition of the photograph. With all of these painting
styles the paint colors and brush stroke directions follow
the photo colors and lines as they would when actually
painting. The brush strokes get smaller and shorter as
painting finishes. Pencil drawings are different in the
direction of the strokes. The pencil strokes are all parallel
strokes. The Watercolor Sketch is a combination of painting
strokes like the watercolor style embellished with pen or
pencil strokes.
Colored Pencil Drawing
Detailed Watercolor
Painting
Detailed Watercolor
Painting embellished
with the Sponge brush
using colors selected
from the painting.
Pencil Drawing
Paint It also has two sketching styles pen and ink and
watercolor sketching.
NVPCUG Computer News, Sept 2011, Page 24

Pen and Ink Sketch
Watercolor Sketch
Before doing another painting I used Corel Paint Shop
Photo Pro X3 to remove the hand rail on the original photo.
Then I used the Oil painting style in Paint It. After the photo
painting I used the Distortion brush to drastically thin down
the fish and elongate the tail and dorsal fin. Place brush in
area to move and drag it to paint into another area
stretching or pushing the color from the original area.
Finally I used the wave brush along the water.
Pastel
Detailed Watercolor
Paint It lists for about $40 but I found it available online
for under $20. For such a reasonable price it is
incredibly versatile and amazingly easy to use photo
painting application. This makes it an ideal way to step
into something new with digital photos. It is even
suitable for children to get a taste of expressing their
artistic likes and dislikes.
*
Tables In Word
Oil Painting
Oil Painting with
Distortion brush to blend
the colors in the pool.
The brushes can be used on the original photograph as well
as on the finished photo painting. So here I used the
Distortion brush and Wave brush before running the Oil
and Impressionist photo painting styles.
Tools such as Microsoft Word 2003 offer a variety of
standard formats that can be applied to tables. Just click
anywhere in your table and then click Table and Table
AutoFormat. A formatting dialog box will appear, so you
can select from a variety of established format styles.
Examples are shown for each format, so you can
experiment with different looks until you find the one that
suits the situation best. When you decide on a format,
click Apply to reformat your table. If you make a mistake
or change your mind, click Undo and repeat this process
to apply another table format.
Laptop Batteries
Oil Painting
Impressionist Painting
I chose the photograph of the pool because of its simplicity
so that the painting styles would be very evident. To show
Paint It with a more complicated photograph I chose a
sample of a stream with cascades and varied foliage.
The main battery in a notebook PC does not last forever
and will eventually start to fail after several hundred
charge/discharge cycles. If you rarely use the battery
(for example, if the laptop is running from the AC
adapter), the battery should last for the life of the
laptop. But if you’re frequently working on the road,
expect to replace the battery after about two to three
years of regular use. You can tell the battery is failing
when its running time becomes unusually short. For
example, if you normally get four hours from a full
charge, getting only two hours from a full charge might
signal battery problems. You can sometimes extend
the battery’s working life by periodically draining the
battery completely and providing a full recharge.
Scanner Lights
Original
Modern Painting
Oil Painting
Illustration
Some scanners don’t have an on/off switch; as long as
power is being supplied to the scanner, the light source
remains on. One school of thought says that leaving the
light source on for a long time results in better scanner
performance and more stable output; another says the
manufacturer was too cheap to include an on/off switch.
Whatever the reason, you can usually safely disconnect
the power from your scanner when you’re not using it.
Reprinted with permission from Smart Computing. Visit
www.SmartComputing.com/Groups to learn what Smart
Computing can do for you and your user group!
NVPCUG Computer News, Sept 2011, Page 25
Offering Financial Services throughout the
Napa Valley; with offices in American
Canyon, Calistoga,
Napa, St. Helena
and Yountville
947 Lincoln Avenue
Napa, CA 94559-5066
800-869-3557 www.wellsfargo.com
(707) 299-1000
www.napanet.net • [email protected]
Napa Valley Personal Computer Users Group
Membership Application/Renewal *
 New
 Renewal
 Information Update
Please Print
Full Name: _____________________________
Nickname: _____________________________________________
Street/PO Box: ___________________________________________________________________________________
City: _______________________________ State: ____________ ZIP Code: ________________ - _______________
Phone (check preferred):
 Home: ____________ ( ____________ ) __________________________________
 Work: _____________ ( ____________ ) __________________________________
E-mail (check preferred):

Home: ________________________________________

 Work: _________________________________________
Ocupation/Profession ______________________________________________________ Retired? _____________
Do you want to be added to the following NVPCUG e-mail lists?
 Yes  No
News and announcements:
General discussion of computer-related topics:  Yes  No
If you do not want your preferred phone number and/or e-mail address published in the NVPCUG Directory,
which is for the exclusive use of NVPCUG members, check the appropriate box(es):

Do not list phone number

Do not list e-mail address
Family members whom you want to sponsor as Associate Members:
(Associate Members have the same membership rights as their sponsors,
except for receiving newsletters)
Full Name
E-mail Address
______________________________________________
_____________________________________________
______________________________________________
_____________________________________________
Annual Dues:
 $30
Regular Member - an individual who is not a full-time student
 $20
Student Member - a full-time student who is not eligible for Associate membership.
 $10
Associate Member - a family member of a Regular or Student member. Associate memberships run concurrently
with sponsors’ memberships.
Make check payable to:
Napa Valley Personal Computer Users Group
Mail application/renewal to:
Napa Valley Personal Computer Users Group
Attn.: Membership Director, P.O. Box 2866
Napa, CA 94558-0286.
The NVPCUG is an accredited IRC 501(c)(3) nonprofit organization. Your dues payment may be tax-deductible as a
charitable contribution.
* To request a Corporate Membership Application / Renewal form, e-mail:
[email protected]
NVPCUG Computer News, Sept 2011, Page 26
Revised 2-14-2010
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement