Jan 2005
WINdows usERS
In This Issue
GMail . . . . . . . . . . . . . 1
NewYears Resolutions . . . . 1
President’s Message. . . . . . 3
Ergonomics . . . . . . . . . . 3
Review: Streets & Trips . . . 6
Review: Diskeeper 9 . . . . . 8
Hard Drive Housekeeping . . 9
General Meeting . . . . . . 11
By Dr. Herbert A. Goldstein
Editor, Sarasota PC Monitor
Sarasota FL PC Users Group
Gmail is a new, free, web-based
email service from Google, the
people who brought us that
remarkable search engine. Gmail, as
offered today, is an experiment in a
new kind of email. Similar to
Hotmail, it has some important
differences. Its foundation is the
concept that emails need never be
deleted, and you should always be
able to find any message at any time
by searching for it.
There are several major reasons
why Google’s concept of how email
should work is suspect. You get one
gigabyte of storage space for your
Gmails. No other Internet Service
Provider offers even one-tenth of this
amount. With this quantity of space
available, deleting mail seems less
Continued on page 4
New Year’s
for Computer Users
By Ira Wilsker
APCUG Board of Directors
his is the season when we are
often asked about our New Year’s
resolutions. We may want to lose
weight, be a better worker, better
family member, or other virtuous
improvements, but we should also
resolve to be better cybercitizens and
practice “Safe HEX.”
Here are some suggested
1. Update antivirus software at
least daily – new viruses, worms,
and Trojans are appearing at a rapid
pace, with an estimated 12,000 new
ones appearing in 2004 alone. New
viruses can spread around the world
literally in minutes, so antivirus
software that has not been updated at
least daily may be worse than no
antivirus software at all. We may
have a false sense of security using
non-updated software, believing that
we are protected from the current
crop of viruses, so we click on any
interesting email attachments, and
insert that questionable floppy in our
computers, a dangerous practice.
Considering that there are a variety
of free antivirus products available,
and commercial antivirus software is
reasonably priced (especially after
rebates), there is absolutely no reason
why not to have current antivirus
software that is updated at least daily.
2. Spam mail – Delete them
without opening them, period. As
2004 came to a close, estimates are
that up to 80% of all email is spam.
Never purchase anything that is
advertised by spam email. Never
click on a link in spam email, as
many links may load Trojans on your
computer, or result in identity theft.
Never disclose any personal
information such as account
numbers, passwords, social security
numbers, PIN numbers, etc. in
response to an email, even if it says
that your account will be threatened
if you do not click on the link. This
illicit and criminal practice is a
method of identity theft called
“phishing.” Many who market via
spam mail are scammers and thieves
who make unverifiable claims about
Continued on page 5
Telephone Help Line
CorelDraw & Ventura
& PhotoPaint
Novell, NT & Networking
Quicken & Quickbooks
Windows 95,98,Me,Xp
Word for Windows
WordPerfect Windows
Sunny Lockie
Jonathan Means
Cathy Grammer-Margolin
Jonathan Means
Max Lockie
Siles Bazerman
Cathy Grammar-Margolin
Sunny Lockie
6-10 p.m. weekdays
9 a.m.-10 p.m. weekends
6-9 p.m.
6-10 p.m. & weekends
6-9 p.m.
6-10 p.m. & weekends
9 a.m.-8 p.m.
6-10 p.m. & weekends
6-10 p.m. weekdays
9 a.m.-10 p.m. weekends
Steve Dela
Vice President
Terry Currier
[email protected]
Gerry Bretts
[email protected]
Rudy Wolf
General Meeting
January 8
Orange Coast College
9:00 a.m.-12:00 noon
in Science Room #149
[email protected]
[email protected]
Louise McCain
[email protected]
Terry Currier
[email protected]
Max Lockie
[email protected]
Steve Dela
WINNERS Notepad is published
monthly by WINNERS, PO Box
9804, Newport Beach, CA, 92658. A
subscription is included with all paid
memberships in WINNERS. Other
non-profit user groups may reprint
WINNERS Notepad articles without
prior permission, provided proper author, title and publication credits are
WINNERS, contributors and editors of Notepad do not assume liability for damages arising from the
publication or non-publication of any
advertisement, article, editorial, or
other item in this newsletter. All
opinions expressed are those of the
individual authors only and do not
necessarily represent the opinions of
WINNERS, its Board of Directors,
the WINNERS Notepad, or its editors.
Page 2
WINNERS, a computer association, is a volunteer organization
providing a forum for sharing information and experiences related to
Windows-based software, encouraging ethical use of computers and software, and offering service to our
Annual membership is $20.00 for
individuals; $5.00 each additional
family member.
WINNERS generally meets the
second Saturday of each month from
9:00 a.m. to 12 noon at Orange Coast
College in the Science Building,
Room #149, 2701 Fairview, Costa
Sunny Lockie
[email protected]
Board Members
Ken Kamber
[email protected]
Ed Koran
[email protected]
Charles Schreiber
[email protected]
Info/Message Line
Website: http://windowsusers.org
January 8
February 12
March 12
April 9
President’s Message
By Steven Dela
t December meeting of Winners, we had a very knowledgeable and
informative speaker talking about how the Internet is being used to spread
hate and propaganda. The Internet is now the preferred medium for
spreading their message to a larger audience than before. Several sites were
viewed and shown how new technology has enabled these groups to spread
their message by taking advantage of the latest in software and content
It’s a sad fact that such a powerful forum has been hijacked by those who
continue to spread their word and seek recruits to perpetuate their hate and
deceit. When so much good can be done through education and the sharing
of knowledge, it’s too bad that such a wonderful technology is being
The beginning of the Consumer Electronics Show (CES) in Las Vegas
highlights early January. This five-day event showcases the latest in
electronics. Many new products are introduced at the show. Emphasis this
year is on portability, capability, and enhanced features. Look for new
products in high-definition TV, portable audio, and video devices and very
affordable prices. Terry Currier is attending the show, and will have
highlights in the next newsletter and a discussion at the February meeting.
Some of the hot new technology that has hit consumer stores already are
items such as the iPod from Apple computer. There was such a demand for
this audio recording device that units were being offered on the eBay for
above list price. Creative Labs and iRiver are offering similar devices.
Another interesting technology is satellite media broadcasting. The most
popular are XM Radio and Sirius satellite radio. This technology has been
offered in automobiles with radios capable of receiving the satellite
broadcasts anywhere in the country. No worry about having to find local
stations as you travel. With this technology, you can stay tuned on one
channel wherever you travel. Both units also deliver high quality digital
XM Radio recently introduced a portable unit for consumers. Called
My-Fi, this unit can be carried by a person just like regular radio can be.
What sets it apart is that it can record up to five hours of content for
listening to later. There’s a small 5GB hard drive embedded in the device
that delivers is capability.
There are rumors that satellite broadcast technology will be offering
streaming video content in the very near future. Children and grandchildren
could be easily entertained while traveling by car. What happened to the
days of looking out the window and watching all the interesting sites pass
Watch for new and exciting technology like this to continue to emerge in
2005. See you at this month’s meeting!
for the
By Dr. Herbert A. Goldstein Editor,
Sarasota PC Monitor, Sarasota FL PC
Users Group
As baby boomers reach
retirement age, the ratio of
employees to retirees will equalize
over the next twenty years.
Considering that the foundation of
Social Security benefits is generated
from the workers, it is evident that
benefits will be inadequate for
future retirees. In order to endure,
the elderly will be forced to keep
working beyond the current
retirement age.
As our increasing knowledge of
the aging process brings about
breakthroughs in life extension
technologies, the elderly will come
to play a greater role in the
productivity of our economy.
Upcoming ergonomic developments
will be critical in order to
accommodate the elderly as viable
and productive members of the
With the physical restrictions
that naturally come with age, we
can expect that many elderly would
be regarded as having disabilities
and the ones who are not
technically disabled could be
considered physically and mentally
compromised to some degree.
Therefore, any workplace
modifications that serve to
overcome limitations in strength,
coordination, endurance, sight,
hearing and shift adaptability will
accommodate the elderly into the
Visual restrictions can be
overcome with a greater
dependence on verbal
communication with regard to
continued on page 7
Page 3
Continued from page 1
In Outlook, when you delete an
email message, it really isn’t
deleted. You’re simply transferring
it to another folder. Deleting it
permanently from that folder
requires confirmation on your part.
Outlook doesn’t make you go to the
Recycle Bin to finish the job, but
some Internet Service Providers
aren’t so considerate.
With Gmail, it seems much easier
to let the messages accumulate and
use the search feature to find what
you want when you need it. Even if
you decide to delete the message, it
may not be gone. Google says that
deleted messages will remain on the
system, and they will be accessible
at the company’s web site for as
long as Google cares to keep the
Because of a new law in
California, Google was forced to
admit that the company will be
pooling any information you give
them from any of their services.
They will keep this information not
only as long as they wish, but they
reserve the right to give it to
whomever they wish. Don’t worry,
however. Google probably has
confidence that its intentions are
good. Its corporate motto is “Don’t
be evil.” It says so in their
corporate IPO filing to the
Securities and Exchange
Upon close examination,
Google’s privacy policies aren’t any
different from Amazon, Microsoft,
and others. Their good-guy image
derives from their unconventional
corporate culture coupled with their
astonishingly successful search
Most people have no idea what’s
in the Electronic Communications
Privacy Act and why should they?
Most people aren’t legal scholars.
One of the Act’s provisions says
that after 180 days, emails are no
longer protected. Their status
Page 4
reverts to just another record in a
database. Any level of government,
from local to national, can force
Google to release your records
armed with nothing more than a
Google has never issued any
statements about its relationships
with other countries and this should
give you cause for concern. Check
out the language in the agreement
you have to make with Google
when you sign up for Gmail. You
are giving permission for Google to
release your Gmail records to any
official from any government, U.S.
or otherwise, who requests it for any
reason. Would you even want to
send an email to someone who has a
Gmail account, knowing that your
email may be examined by a foreign
Google has also stated that your
email will be scanned so that you
can receive advertising and links to
relevant web sites. This applies to
both incoming and outgoing email.
Nothing in any of Google’s policies
or public statements applies to those
of us who don’t have Gmail
accounts. There is nothing in
Google’s privacy policy that would
prevent them from storing a list of
keywords scanned from incoming
email, and associating these
keywords with the incoming email
address in their database. Google
has promised their advertisers won’t
receive any information that would
allow personal identification but
what’s to stop Google from keeping
this information for some other
future use? No one except Google
knows if the company has deleted
any of the data they’ve collected
since going online. The cookie they
dropped on your hard drive doesn’t
expire until 2038 and it’s kept track
of every search term you’ve ever
used. How’s that for scary?
We don’t know for certain if
Google will build a colossal
database derived from keywords
associated with email addresses. If
that does turn out to be the case,
however, there is incredible
potential for abuse. The RIAA has
sent out thousands of “John Doe”
and “Jane Doe” subpoenas to
universities and internet service
providers to identify people who
download MP3 files illegally. If the
RIAA can force AOL to comply,
they can do it with Google.
Would an intelligence agency
make anything sinister of keywords
like “Send us the secret, Martha; it’s
only a recipe, not a nuclear launch
code”? Much more ominous would
be combinations like jihad coupled
with assassination. All kinds of
patterns can be generated from
keyword combinations. We’re
beginning to sound like paranoid
conspiracy theorists but the
potential for abuse is real and
should not be ignored. What makes
Gmail appear so suspicious, sinister
and frightening is the enormous
storage capacity that Google offers,
combined with its super efficient
search engine.
There is also the problem of
inappropriate ad matching. Stories
abound about online merchants who
send themselves email for testing,
and discover that something in their
emails generates ads for their
competitors. The “Backspace”
section of the October 5, 2004 issue
of PC Magazine shows a
juxtaposition of an advertisement
for an all-inclusive vacation in the
Caribbean along with an ad that
says “Just say no to all-inclusive.”
Gmail was launched presumably
as a response from Google users
complaining about the poor quality
of their current email services. Be
careful what you wish for.
There is no restriction against any
non-profit group using this article as
long as it is kept in context with
proper credit given the author. The
Editorial Committee of the
Association of Personal Computer
User Groups (APCUG), an
international organization of which
this group is a member, brings this
article to you.
Continued from page 1
their products, sell pirated software,
or who will take your hard earned
money and send nothing useful back
in return.
3. Never click on a popup ad.
While many are legitimate sellers,
many are also scams. As long as we
click on them, and sometimes make
purchases, the popup purveyors will
continue to plague us with their
4. Practice good email etiquette,
also called “netiquette” – If
forwarding emails to others, do not
simply hit “forward” and enter names
from your address book. Having a lot
of headers, those lines of others’
email addresses and routing
information, as well as a lot of “>”
(greater-than) symbols makes email
difficult to read. Strip off any useless
header by highlighting and deleting
them, and delete the “>”.
Another beneficial piece of
netiquette is to be sure that
attachments are reasonable in size.
Since many newer digital cameras
can take poster-sized images, users
should reduce the size of emailed
images to a reasonable size such that
they can be easily viewed. It would
also be a good idea to save the image
in the universal JPG or GIF formats,
rather than the sometimes-default
BMP format, as the JPG and GIF
formats greatly compress the file,
making it a much smaller download. I
sometimes resent receiving a digital
photo taken at 2560x1720 or larger
when trying to view it. Recently,
someone proudly sent me a 4
megapixel photo of his new
grandchild to view on my 800x600
monitor. When I first loaded the
image, all I saw was a huge eye, and
with red-eye at that. Not just was the
file size huge and slow to download,
but the image was several times the
size of my screen, requiring me to
scroll to see the image.
5. Do not forward Hoaxes and
Urban Legends – These may be
cute, or we may feel that we are
really warning others about some
perceived threat, but please check out
any email which says “forward this to
everyone you know” as it will most
likely be a hoax or urban legend.
Sites such as
are excellent resources to debunk
hoaxes and urban legends. Be aware
that you cannot get rich or get gift
certificates by forwarding emails, and
that the poor, dying kid in Georgia
wanting postcards has long since recovered. Save yourself some potential
embarrassment and email bandwidth
and refuse to forward these messages
without first verifying their authenticity. Smart people can be duped too, so
do not automatically trust the sender.
6. Kill Spyware – According to
many cyber security experts,
spyware, software that can gather and
send information of the users’
activities, may be a greater threat
than computer viruses. Spyware is
used to steal passwords, account
numbers, and other personal
information, as well as generate
obscene popup ads, redirect
purchases and searches, and several
other undesirable acts. Also referred
to as “malware” spyware is
Microsoft, never first on the
bandwagon, is now in the process of
attempting to purchase one of the
anti-spyware software companies.
While there are several decent
commercial anti-spyware products on
the market, there are also some
excellent free ones, such as Spybot
Search and Destroy
and Ad-Aware SE
Never respond to the scam popup
ads that tell you that your computer is
infested and click here … many of
those supposed anti-spyware products
are scams themselves. Install
legitimate anti spyware software,
update it and run it at least weekly.
7. Participate in National Cyber
Security Awareness Month October 2005. Put it on your
calendar and go to
to find out how you and your User
Group can participate in this important event.
All of the resolutions above are
necessary, and easier to keep than
losing weight.
There is no restriction against any
non-profit group using this article as
long as it is kept in context with
proper credit given the author. The
Editorial Committee of the
Association of Personal Computer
User Groups (APCUG), an
international organization of which
this group is a member, brings this
article to you.
Page 5
Microsoft Streets & Trips 2005
By Terry Currier
was actually going to buy the
Microsoft Streets & Trips 2005
during my after-Thanksgiving
shopping. They had a good price but
I knew it would not have the street
my son just brought a home on since
it was new. That worked out pretty
well since my son brought me the
Microsoft Streets & Trips 2005 with
GPS Locator for Christmas. I bought
him some socks. (Stop laughing.
They are very good socks.)
It installed with no problems. It
gives the option to fully install so
you don’t need the CD in the drive
all the time. The GPS hooks up
through a USB port—which it
changes to a com port. It worked
very well. I hooked it up and we
drove around Stockton to test it. The
two best features was showing on
the map (screen) exactly where we
Page 6
were, and changing the orientation
of the map to show the direction in
which we were going. This really
come in handy. When looking at a
ordinary map, you
have to cock your
head to figure out
which way to go.
There is a limitation
to this—it does not
give audio
directions to you.
You have to look at
the screen to make
sure you are going
in the right
direction. It’s so
cool, it even adjusts
with me just turning
into a parking space
in a different
Remember, safety
first. Don’t look at
the screen while
driving. You can
also use it with
Pocket PC,
Smartphones, and Tablet PCs.
The interface has not changed
over the years. The only difference
between it and my 2003 Streets &
Trips is the addition of the GPS
Task pane icon. There are, of course,
more streets and places added on
with the 2005 S&T. There are now
more than 5.4 million miles of
routable local, city, state, and
highway roads in the United States
and Canada. It has information on
the map for more than 550,000
restaurants, 90,700 gas stations,
117,000 ATM locations, 7,950 golf
courses, and much more. I do miss
the pre-2001 S&T when they had
the Zagat Survey ratings.
Route Planner lets you view, add,
delete, and rearrange destinations.
Route Planner also lets you set fuel
costs, driving speed, and preferred
routes. It will also, if you want,
check road and construction
conditions of your route. I checked
the road conditions going from
home to Las Vegas and it listed the
road widening work being done.
Continued from page 3
instructions and assistive technology
such as audio recorders. Labels
should be in large, clear print with
large, high-resolution computer
monitors. Voice recognition software
is also helpful. Other modifications
include paper holders and bookstands
that allow for optimal positioning of
written materials, voice mail systems
for messages and raised edges along
the sides of work surfaces to prevent
objects from falling off.
In personnel with hearing
limitations any audible information
should be supplemented with some
form of visual presentation. Whole
body vibration transmitted to chairs
should be minimized by utilizing
anti-vibration seating surface.
Ambient noise should be minimized
through workstation design, isolating
noisy printers, sound dampening etc.
Workers should have vibrating
pagers, visual call indicators and
sound amplifiers on telephones.
Search capabilities are very good. I
can look up an address or place by
clicking the Find button on the tool
bar. In the Street Address field, type
the number and street name of the
place you want to locate. You can
also look up by street intersection
(i.e. Harbor & Merrimac in Costa
Mesa). You can look up a place in a
city OR even a business such as a
hotel or restaurant. Looking up
Hilton Hotel, Las Vegas, NV, took me
right there (even though I can’t afford
to stay there).
Printing is better since it now
has a feature to extend view to fit
the page. But it still lacks a print
preview. It makes good use of
color, but I at least would like to
choose a white background to
improve printing speed and
paper saturation. When printing,
you do have a choice of map or
directions (if you ask it to do so).
S&T will also put an overview
map on the printout if you
request it to do so.
Checking the internet-based
maps is really for those who
have never tried a map program.
The pictures are much clearer
and printouts are a world of
difference with a map program.
The elderly should have their work
environment arranged in such a way
as to avoid unnecessary reaching,
lifting and carrying. Storage systems
with pull out shelves and workstation
carousels help to keep frequently
used materials within 18 inches of the
body. Containers should be provided
to break loads into manageable units
and the employee should have the
means to slide any materials over two
pounds. Mechanical reaching devices
should be available for accessing
supplies beyond the reach of the
With the preservation of their
mental faculties and the advent of
ergonomic innovations for staff, the
elderly will find themselves
continuing to play a dynamic and
productive role in society into the
later years.
The Editorial Committee of the
Association of Personal Computer User
Groups (APCUG), an international
organization of which this group is a
member, brings this article to you.
Page 7
Executive Software Diskeeper 9
By Terry Currier
f you believe that “time is money,”
then this is money well spent.
Remember those long periods of time
while you waited for your defragging
to get done? Even worse, you had to
boot into safe mode so it would
complete. Microsoft provides
Windows users with a defragging
utility for free. So why spend money
for the same thing? Because, it’s not
the same thing. Executive Software
Diskeeper is faster—way
faster—than the defrag from
Microsoft (which is why it is free).
The point of defragging is to get
all your files together. It helps the
computer by taking a shorter time to
find all of the files it needs to work
with. The program will even show
you how much faster (percentage) it
would be after defragging the
fragmented files.
Even better, you don’t have to sit
on your hands while it defrags. It
uses a patented, high-speed,
Page 8
multi-pass engine that runs
300-500% faster than the Windows
free defragmenter. Yet, it can use so
little resources that you are able to
still do work on the computer while
it runs in the background. In fact,
with new 9.0 comes
I/O Smart that
keeps scheduled
Diskeeper jobs
from slowing down
your system by
backing off when
any user activity
takes place.
I have been
copying my old
vinyl records onto
my computer. It
takes a lot of time
to do so, and a
whole lot of disk
space. Each song
will take up about
35Kb hard disk
space. Then. after
going through them
to edit or even
deleting some songs causes a lot of
fragmentation. In fact, when I
checked my temp folder, I had over
2,000 tmp files that I had to
manually delete. Fragmentation of
large files can cause big slowdowns.
Believe me, defragging with
Microsoft defrag will work, but it
will take a large part of the day.
With Diskeeper, I was able to do the
defrag and start doing other things
If I wanted to, I could use their
“Set It and Forget It” scheduling
mode, allowing up to two schedules
per volume, including Screen Saver
and SmartScheduling™ modes.
SmartScheduling automatically
schedules background
defragmentation based on individual
usage patterns. You can also set
exclusion times when the Smart
Scheduling option will be prevented
from scheduling a defragmentation
run. The new File Performance
defragmentation mode will actually
defragment areas of the disk that are
causing the biggest slowdowns.
Their new FragShield help keeps
your Master File Table (MFT) and
Page File optimized. Frag Shield is
comprised of two components: the
MFT configuration tool and the
paging file configuration tool. These
tools allow you to set up your paging
file(s) and MFT(s) such that
fragmentation will be unlikely to
occur in the future. After running
Frag Shield once, data gathered by
Diskeeper during future analysis and
defragmentation jobs, as well as data
gathered periodically on paging file
usage, is used to determine if either
configuration tool should be run
again. In most cases, once these tools
are run they will not be needed again.
The paging file is an area of a disk
set aside to temporarily hold data
needed. This is known as “paging” or
“swapping.” The Frag Shield paging
file configuration tool helps you set
defragmentation while the laptop is
running on battery power.
Okay...it’s not free but it does give
you more free time, and what is that
worth to you?
You can check out a 30 trial
version at
intended to reside in computer
memory. As the operating system
needs physical memory (RAM), it
temporarily moves less-used data
from the RAM to the hard disk. Data
is copied back and forth between the
paging file and the system memory as
the paging file size correctly and
handles any fragmentation incurred
during the process.
For laptop users, Diskeeper 9 has
an improved Power Saving mode that
suspends background
Diskeeper Home Edition ($29.50) and
Professional Edition System ($49.50)
For use on any single computer running Windows XP (Home Edition and
Professional), 2000 Professional, ME,
98 and 95.
Diskeeper Professional Edition also
supports Windows NT 4.0 Workstation.
File Systems Supported: FAT16,
Page 9
Hard Drive HouseKeeping Is Vital
By Dennis Schulman
Tampa Bay Computer Society
or those of you who surf the net
on a regular basis—and that includes
those who use dialup access as well
as cable or DSL—it is absolutely
crucial that you take your hard drive
housekeeping more seriously than
you ever thought necessary. Many
users think that by having a suite of
utilities, such as Norton or McAfee,
that you are protected. You might be,
but I seriously doubt it for so many
reasons I won’t go into it now except
for three:
You use auto update and auto
scan. This requires that your
computer be online at the time to
run the auto update. In the case of
cable or DSL, that is possible, but
the computer has to be on at the
time also. In the case of dialup, the
computer won’t go online unless
your password is saved and used
automatically. That, of course,
defeats keeping friends and
annoying children from messing up
the computer without your
knowledge. So, you might want to
run your antivirus update manually,
just to make certain it worked and
there were no errors.
The second reason is based on the
fact that if you did not clean house
before scanning, you risk the
possibility of the antivirus finding a
virus it could not delete or
quarantine and you did not know it.
You also risk the possibility of not
knowing if the auto update was not
run successfully for one of many
reasons (and time and space won’t
permit that discussion at this time)
and consequently your subsequent
full system auto scan may not be
able to recognize the latest nasties
you have managed to acquire.
Page 10
There is a third, more obtuse,
reason. If you don’t really know if
your system is truly clean and clear
of all the bad stuff, how will you
know what to do when you get a
message that says something to the
effect: “It has been determined that
your computer has been sending
messages infected with the ______
trojan horse virus to what appears to
be the email listing of your address
book. If you do not take appropriate
action immediately, your email
service will be discontinued. If your
anti virus program has failed to
protect you, please download the
following trojan horse removal tool
and run it immediately.
So, here is a housekeeping
procedure I use—which is
manual—because then I am more
certain that I know the status of my
files than most of the “suite”
programs. And it doesn’t use
much—if any—of my system
resources except when I use it. Just
in case you think you have all the
utilities you need, let me comment
that I am not an expert on your
system, but I spend more time now
than ever before on systems that
have too many over-burdensome
utilities that are truly unnecessary
and in some cases more dangerous
than what they claimed to be
designed to do. What I am
proposing is basically using 3 little
free utilities that only work when
invoked, along with utilities that
already come with your computer.
Run Disk Cleanup (under System
Tools under Accessories on the
Programs menu) and process all
options (don’t worry about
compressed files, but do them at a
later time when you have nothing
else to do, since it could take quite a
while if you haven’t done it the first
Clear your browser cache (In
Internet Explorer go to Tools,
Internet Options. Delete cookies and
delete all offline files.) In Netscape
Communicator go to Edit,
Preferences, Advanced, Clear
Memory Cache and Clear Disk
Open Windows Explorer
(right-click on My Computer, select
Explore), Select the folders/View
option and select show all files
except system files (You can leave it
this way.) Find any folders called
tmp, temp, or cookies. Unless you
have a good working knowledge of
what cookies you need or do not
need, you probably don’t need the
contents of any of the temp,
cookies, or temporary internet
folders except the index.dat file
(you might want to save the
contents of the History folder)
Empty the Recycle Bin
Update and run the latest core
version of Adaware SE Personal
Edition (currently version 1.05).
Once the scan is complete, click on
an object found, right-click a lined
item and select all, click next and
remove all.
Update and run the latest version
of Spybot (currently version 1.3.)
Before running the scan, run
immunize. Then run Look for
Problems. Once problems are found,
select them all and click on Fix
Note: Some spyware may be
associated with programs you want
to use, so read the help section for a
further understanding of the features
and options on both of these
programs. These spyware objects
detector utilities can be downloaded
There is a third utility, called a
hijack remover. There are many
available, but I like CWShredder.exe
(current version 2.00). Use
to find the program. Just make certain
you are not online and that your
browser is not open when you run it.
You may be surprised and pleased if it
finds something and fixes it (generally really bad stuff).
Now you should be able to update
and run your antivirus more
successfully than ever before. The
only catch is that it takes time. Once
you figure out about how much time
each step takes, you can determine
whether you can walk away and
come back later when it is done.
I recommend running
HouseKeeping at the end of every
day you go online—if you can
manage it. (cough! cough!)
Otherwise, run it every 3 days for
Now, if you know your computer
is clean and pure, then this is the only
condition to justify running the
defragmentation utility (once a week
or twice a month). Defrag does not
“fix” anything. It enhances the
performance of a healthy
environment. If you attempt to
defrag a “sick” system, you could
make it worse to the extent that the
computer will fail to boot or run. If
you have Windows 2000 or Windows
XP, you can run defrag directly. If
you have Windows Me, 98, or 95,
run it in Safe Mode. I prefer running
Defrag in Safe Mode as I have a UPS
and the computer can complete the
defrag, even if the lights go out in the
Now that you have successfully
learned the housekeeping routine and
understand its importance without the
need for complex and sometimes
dangerous free software utilities that
can cause conflicts, you can set up
the program scheduler to run your
housekeeping routine for you and just
check up on it from time to time to
see that it is accomplishing your
Feel free to email me for further
details and other fine, free utilities
available for keeping your hard drive
and system performing at its best.
Dennis Schulman, known as the
PC Miracle Man, has been a
practicing field consultant in Largo,
Florida for over 22 years. He has
been a member of the Tampa Bay
Computer Society for over 15 years
and was the editor of its sometimes
40-page newsletter for 5 years. He
can be contacted at
[email protected]
The Editorial Committee of the
Association of Personal Computer User
Groups (APCUG), an international
organization of which this group is a
member, brings this article to you.
General Meeting Info
Steve Dela will show you some tools that are on the Windows CD which you may not even know about. Some of
you may have even installed them and never looked to see what it will do. For instance
Acldiag.exe: ACL Diagnostics
This command-line tool helps diagnose and troubleshoot problems with permissions on Active Directory objects. It
reads security attributes from access control lists (ACLs) and writes information in either readable or tab-delimited
format. The latter can be uploaded into a text file for searches on particular permissions, users, or groups, or into a
spreadsheet or database for reporting. The tool also provides some simple cleanup functionality.
apimon.exe APIMON
Application Monitor. It monitors a running application for all Application Programming Interface (API) calls.
APIMON counts and times all API calls. It will also, optionally, monitor page faults caused by the monitored
application and report them by API call.
APIMON is used as a performance monitor to help tune your application. The data can be used to determine where
the hot spots are in your application by examining the APIs with the largest times and/or counts.
Depends.exe: Dependency Walker
This GUI tool scans any Windows module (including .exe, .dll, .ocx, and .sys, among others) and builds a
hierarchical tree diagram of all dependent modules. For each module found, it lists all the functions that are exported
by that module, and identifies which of those functions are actually being called by other modules. Another view
displays the minimum set of required files, along with detailed information about each file, including a full path to the
file, base address, version numbers, computer type, debug information, and more.
Page 11
January 8 9 a.m. to 12 noon
Orange Coast College
Science Building #149
See page 11 for details
PO Box 9804
Newport Beach, CA 92658
Room #149
Science Bldg
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF