Main Page | Philoman's Question Archive | Philoman's Theorems |
Suggested Sites | Cool Facts | Cool Words |
Jokes | Quotes | Tips for Internet & Windows |
***WINDOWS*** (Click here for Internet Tips)
Easy Access to Game Controller
Panel
Tired of plowing through the Control Panel to see if your joystick is connected or
calibrated? There's an easy solution: Create a Game Controllers shortcut on your Desktop.
To do this, open Control Panel, right-click the Game Controllers icon, and hold down the
right mouse button. Drag the "ghost" of the icon onto your Desktop and release
the mouse-button. Select "Create Shortcut(s) Here" to create the shortcut, and
voilá instant access to the Game Controllers control panel. This is especially handy for
gamers who like to use different controllers for different games.
Back to Top
Using Less Space for Windows Me
If at later date you need the hard disk space, you can delete the WinMe folder on your
hard drive. You'll then need to configure Windows Me to look to the CD-ROM for the
installation source by editing the Registry. This is actually easy to do, but you must be
very careful. To begin, you'll access the Registry key
HKEY_LOCAL_MACHINE\software\Microsoft\Windows \CurrentVersion\Setup. Then, locate the
SourcePath value and change the Value Data setting to point to the Windows Me folder on
the CD.
Back to Top
Securing Your Compressed
Folders in Windows 98
Keep in mind that while you actually apply the encryption to a compressed folder, only the
files themselves are password protected and you can open the folder without being prompted
for the password. This means that while an intruder couldn't open the files, he could
still see the names of the files. If you consider this a security breach, you might want
to explore other security measures for your confidential data.
Back to Top
Get Rid of Logon Screen
In Windows 98, it is possible to eliminate the Windows Logon screen if you have not set a
password. If you don't have multiple users, then you can try this to get rid of the Logon
screen:
In the Control Panel, select the Network Icon. Now, from the list option "Primary
Network Logon," choose Windows Logon and click OK.
If you have multiple users, then do this: Using REGEDIT.EXE, edit your registry (back it
up first). Find HKEY_LOCAL_MACHINE\ Network\ Logon and change the data from 00 00 00 00 to
00 00 00 01.
Back to Top
Working with MS-DOS names
As you may know, Windows 98 uses MS-DOS names to remain backward compatible with older
16-bit Windows and DOS applications that don't understand long filenames. MS-DOS names
aren't difficult to work with, but they can be tricky. The typical pattern for an MS-DOS
name is the first six letters in the filename, followed by the tilde character (~) and the
number 1. For example, the MS-DOS name for the Program Files folder is Progra~1.
However, some MS-DOS names use other numbers when there are other folders with the same
first six characters. For instance, the folders named Microsoft Office and Microsoft Games
might have the MS-DOS names Micros~1 and Micros~2.
If you're unsure of the MS-DOS name for a particular item, you can track it down easily.
All you need to do is right-click on the item and select the Properties command from the
shortcut menu. You'll find the MS-DOS name in the center of the Properties dialog box.
Back to Top
The other Windows 95 text
editor
Did you know that Windows 95 comes with another text editor besides Notepad? This other
text editor has features similar to those in Notepad, yet it offers other features the
Notepad doesn't have--such as the ability to work with multiple text files and to change
the background and text colors. Of course, the text editor that we're talking about is the
MS-DOS Editor, which is commonly referred to simply as Edit.
While Edit is a DOS-based application, you can easily configure it to work just like a
Windows application. To do so, use My Computer or Windows Explorer to locate the Edit.com
file in the \Windows\Command folder. When you do, right-click on the file, drag it to your
desktop, and select the Create Shortcut(s) Here command from the context menu. Once
Windows 95 creates the shortcut, right-click on the shortcut icon and select the
Properties command from the context menu. When, the Properties dialog box appears, select
the Program tab and choose the Close On Exit check box. To finish, click OK. Now, you can
simply double-click on the shortcut to launch Edit and when you're done using it, you can
close it simply by clicking the close button in the upper-right corner or by using the
Exit command on the File menu.
Back to Top
Customizing the taskbar
Have you noticed that you can add other toolbars to your Windows 2000 taskbar? For
example, you can add your Internet Explorer Links toolbar to the taskbar for faster access
to these sites. One toolbar you'll find especially convenient is the Address toolbar. This
toolbar enables you to not only access Internet Web sites, but also to run other Windows
2000 commands. For example, you can type the command "cmd" in the Address
toolbar to open a Command Prompt window. To add other toolbars to your taskbar,
right-click on the taskbar and choose Toolbars. You'll see options for adding the Address,
Links, and Desktop toolbars to your taskbar. In addition, you can create your own custom
toolbar to further customize your taskbar.
Back to Top
Enabling strong passwords in
Windows NT
As you've probably already heard, there are many software programs available now that can
guess your users' passwords if they're using words that are in the English dictionary.
Beginning with Service Pack 2, Microsoft introduced a DLL file (passfilt.dll) that enables
you to protect your systems against such programs. This DLL forces users to use passwords
that meet the following criteria:
1. Passwords must be at least six characters.
2. Passwords must contain three of the following four types of characters:
- Uppercase letters
- Lowercase letters
- Numbers
- Non-alphabetic characters such as punctuation marks
3. Passwords can't contain your user name or any part of your full name.
Even though passfilt.dll is included in Service Pack 2 and later, it isn't active until
you install it. You install it by completing the following steps:
1. Install the latest Service Pack.
2. Copy passfilt.dll to \%systemroot%\system32.
3. Open Registry Editor and access the key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
4. If necessary, add the value "Notification Packages" with a data type of
REG_MULTI_SZ under the LSA key.
5. Double-click the value "Notification Packages" and add the value PASSFILT.
(Note: If you see the value FPNWCLNT already, add PASSFILT below it.)
6. Close Registry Editor and restart your computer.
Back to Top
Using the Right-Click Option on
a Compressed Folder in Windows 98
Even though you can work with the files in a compressed folder using drag-and-drop
techniques, there's another way to do so. You can right-click on a compressed folder and
select the Extract command from the shortcut menu. When you do, you'll see the Extract
Wizard, which prompts you to select a folder into which you want to copy the files.
Back to Top
Windows Update
Microsoft Windows updates are a great way of keeping up with the latest and greatest
updates from the Microsoft Web site. One problem you may encounter is the slow connection
that seems to plague everyone at one time or another. Faster cable modems and ISDN lines
have made downloading easier, but for those still confined to the old telephone modems,
large downloads are an annoyance.
Microsoft has a Web site that has all of the downloads in file format. Now you can pick
and choose the files you want for later download, or if you must reinstall Windows, you
don't have to re-download everything.
Click here to link:
http://www.microsoft.com/windows98/downloads/corporate.asp
Back to Top
Storing and Running Executable
Files From Compressed Folders in Windows 98
While you'll typically use compressed folders to store your data files, you can also store
executable files in compressed folders. If the executable file is self sufficient, you can
run it from a compressed folder. However, if the executable file relies on other files
also stored in the compressed folder, it won't be able to run. For example, you can run
WordPad from a compressed folder, but you can't run Word from a compressed folder.
Back to Top
NumLock Controls
NumLock is a nice button to have on your keyboard, especially if you do a lot of
spreadsheet work with numbers. Sometimes, it's nice to have the NumLock automatically come
on (as if one button was difficult) or not come on, depending upon need. You have a couple
of options: The first is to take a look at your CMOS to see if there is a switch that you
can toggle to turn the Num_lock on or off. I do not recommend this, because if the Windows
setting is the opposite, it will just flip it the other way. Also, messing with the CMOS
is dangerous if you don't know what you are doing. The second is setting the NUMLOCK = ON
or NUMLOCK = OFF in your CONSIG.SYS file. You can also change your registry to toggle the
NumLock, but I don't recommend this.
Back to Top
Compressed Folders and ZIP
Files in Windows 98
Compressed folders are compatible with ZIP files. This means that when you download
a ZIP file from the Internet, the file automatically behaves just like a compressed
folder.
Back to Top
Trash It!
The Recycle Bin (how politically correct) is a nice feature to have if you
accidentally delete a file and want to recover it. Sometimes, however, it is a nuisance to
have to go over to the recycle bin when you KNOW you want files killed at the time you
delete them. Fortunately, you can change the way the recycle bin behaves either globally,
or with a specific drive.
Right-click the Recycle Bin icon and bring up the menu, Select Properties. This brings up
a dialogue box with several options. One is the 'Global' option. This option allows
control of all drives, if you wish. There is a 'Do not move files to recycle bin' option
that prevents deleted files from being kept in the recycle bin. You can also control this
option for each drive. The toggle for this is 'Configure Drives Independently.' Now you
can have one drive that recycles, and another that instantly deletes.
Back to Top
Find That Find!
When searching for files, it's not uncommon to run the same 'Find' over and over.
Wouldn't it be nice to save a complex 'FIND' somewhere so you did not have to click all
those boxes again and again? You can! Next time you run your find, click on File and
select 'Save Find.' Now, do a search on the file with extension .FND. This file is
actually your saved find. Right-click and drag the file to your desktop and create a
shortcut. Now when you double click the shortcut, your 'Find' will be found!
Back to Top
Problem Free Downloads in
Windows 2000
To ensure a problem-free download and installation, I recommend that you avoid using your
system until the entire process is complete. This is a good time to take a break. Once the
installation is complete, you'll see a success screen, which tells you that the updates
were successfully downloaded and installed.
Back to Top
Using the Right-Click in
Windows 95 and 98's Device Manager
As you're exploring a device's Properties dialog box, as well as Device Manager
itself, you can get more specific information about any setting by right-clicking on it
and selecting What's This? from the pop-up menu. You can also access the What's This?
feature by clicking the help button to the left of the close button and then clicking the
setting you want more information about.
Back to Top
Changing text size in Internet
Explorer with the wheel
If you have a wheel mouse and are using Internet Explorer, you can use the wheel to
alter the size of the text on most Web sites. To do so, just hold down the [Ctrl] key as
you spin the button up and down. As you do the text will either increase or decrease
depending on which way your move the wheel.
Back to Top
Quickly saving files to the
Desktop from the Save As dialog box
When you create and save a file that you only intend to keep temporarily, chances
are that you save it to the Desktop so that you can quickly and easily delete it when
you're finished with it. You can expedite this procedure by using the View Desktop button
in the Save As dialog box. Once you create the file and click the Save button, you'll see
the Save As dialog box. At this point, simply click the View Desktop button, name the file
and click the Save button.
Back to Top
Adjusting the Start menu speed
While it isn't a huge amount of time, you might have noticed that there's a slight
hesitation before Windows 2000 displays your Start menu (and any of its sub-menus).
Windows 2000 has a built-in 0.4 second hesitation before it will display these menus. If
you want to speed up your menus, you can reduce this delay by adjusting a registry value.
Begin by running Registry Editor. Next, access the key HKEY_CURRENT_USER\Control
Panel\Desktop. In the right pane, double-click on the MenuShowDelay value. By default,
Windows 2000 sets this value to 400 (0.4 seconds). Enter a lower value to reduce the
delay. You'll need to restart your computer before this setting will take effect.
Back to Top
Adding TCP/IP Security to your
Windows NT server
While not as powerful as a full-featured firewall, Windows NT does enable you to
configure security on the TCP/IP protocol by specifying the incoming TCP and UDP ports
your computer can accept. To do so, begin by double-clicking on Network in your computer's
Control Panel. Select the Protocols tab, and then select the TCP/IP Protocol. Click
Properties to display the Microsoft TCP/IP Properties dialog box. You use this dialog box
to configure all of your computer's TCP/IP parameters, including its IP address, subnet
mask, DNS server addresses, and so on.
To configure security, click Advanced on the IP Address page of the dialog box. Next,
check Enable Security and click Configure. You'll now see the TCP/IP Security dialog box
shown in Figure F. You can use the Security dialog box to specify on which TCP and UDP
ports your computer will accept incoming connections, as well as which protocols it will
accept. If you have multiple network cards in your server, you can configure these
settings per card. By default, Windows NT's Setup configures your computer to accept all
ports and IP protocols on all network cards.
Back to Top
The Computer Icon in Windows 95
and 98's Device Manager
While the Computer icon at the top of the tree appears to be just a placeholder, it
actually contains a fountain of information about your computer. When you double-click the
Computer icon, you'll see the Computer Properties dialog box and can view the system's IRQ
settings, Input/Output memory locations, DMA settings, and locations being used by the
various devices.
Back to Top
Bad Icons!
Occasionally, the Icons on a desktop can become corrupted. They start taking
bribes, soft money... you know. Sorry, a little humor. Anyway, corrupted icons can be a
big mess and cause the casual computer user to want to reinstall Windows 98 to solve the
problem. Well, there is an easier way. Reboot your computer into DOS mode and find a
hidden file called ShellIconCache located in the Windows directory. Delete it. Now,
restart Windows and the cache will be reset.
Back to Top
Making a Shortcut of the Device
Manager in Windows 95 and 98
You can make the Device Manager much more accessible by creating a specialized
shortcut. To do so, right-click anywhere on the desktop and select New > Shortcut from
the shortcut menu. Once the Create Shortcut Wizard launches, type:
C:\Windows\Control.exe Sysdm.cpl, System,1
in the Command line text box. Then, name the shortcut Device Manager and change the icon
to something more suitable. You can then move the Device Manager shortcut to your Start
menu for easy accessibility.
Back to Top
Extension Display
You can display extensions of your files, a feature that can come in handy since many
files have the same name. Go to 'My Computer' and select 'Folder Options' from the View
menu. Now, click the View tab and deselect the 'Hide MS-DOS file extensions for known file
types.' Doing so will allow extensions to be displayed.
Back to Top
How Fast?
Want to know how fast your connection to the Internet is going? Or how much CPU
processing is taking place? Windows 98 has a neat, seldom used tool in the
Accessories/System Tools menu with the Programs menu. The utility is called 'System
Monitor.' Open it, then select the edit menu. This allows you to add and delete items. Now
you can have a real-time display of how fast your modem is actually bringing down
information.
Back to Top
Fixing lost file associations
If you accidentally associate a particular file extension with the wrong
application, don't try to fix it with Windows Explorer's File Types tab in the Folder
Options dialog box - there's no way to remove a single extension from a registered file
type without deleting the entire entry and starting over. Instead, use Windows 98's
version of the Windows 3.x File Manager, which you can launch from the Run dialog box by
typing winfile and pressing [Enter]. Once File Manager opens, pull down the File menu and
select the Associate command. When the Associate dialog box appears, type the extension
that you want to get rid of in the Files With Extension text box. When you do, you'll see
the errant file association appear in the Associate With text box. To remove the file
association, scroll to the top of the list of file types, select (None), and then click
OK.
Back to Top
Displaying and updating DNS
information
Windows 2000 has added two new options to the ipconfig command for supporting
dynamic DNS. First of all, you can use the command ipconfig /registerdns to update your
computer's information in the DNS database. You might use this command if you've changed
your computer's IP address, or if you've just leased a new IP address from a DHCP server.
You can use the ipconfig | displaydns | more command to view all of the names your DNS
server has in its resolver cache. This information enables you to see the results of your
DNS server's name resolution queries; you can use this information to help you
troubleshoot name resolution problems.
Back to Top
Disable Windows Key
If you don't like the Windows key on your Windows PC, you'll love this tip. The
Windows key launches the start menu so you can click through it with your arrow keys. To
get rid of this key, you can do a long and possible dangerous stroll through the Windows
Registry. A better choice is to download a utility called WinKeyKiller. It doesn't cost a
thing, and it's easy to use. Run it to disable the Windows key, along with the right-click
menu key on the right side of the keyboard. Run the application again to turn the Windows
key back on. It comes with documentation.
Back to Top
Third Mouse Button
If you use a Logitech mouse, you may have noticed that you can lean on that middle
mouse button and not get so much as a beep. Why? Windows 98 does not use the third button
for anything. But with some tweaking, you can make that third button earn its place on the
mouse. Using REGEDT.EXE, go to your registry. After backing it up, do the following: Open
HKEY_LOCAL_MACHINE\ SOFTWARE\ Logitech\ Mouseware\CurrentVersion\SerialV\. Now open the
Edit menu and performa find on the value (not key) Double Click. When you find it,
double-click it and change the 0000 to 0010. You will now need to restart Windows. That's
it!
Back to Top
Hiding a Windows NT Computer
from the Network Neighborhood
There are a couple of solid reasons why it could be a good idea to hide a Windows
NT computer from the Network Neighborhood. First, building and maintaining the list of
computers you see in Network Neighborhood takes lots of network traffic, and reduces the
overall performance of your network. If you have systems that don't share anything (such
as computers running Windows NT Workstation), you might want to prevent them from being
listed in Network Neighborhood. In this scenario, you can prevent the computer from
showing up by stopping the Server service. In Control Panel, double-click Services. From
the list of Services, choose Server, then select Startup. Choose "Manual" as the
Startup type, then click OK. Now select Stop to stop the Server service. The other
rationalization for hiding a computer from the Network Neighborhood is to make it
inaccessible to users who are simply browsing the network. Run the following command in a
Command Prompt window:
net config server /hidden:yes
This command hides the system from the Network Neighborhood, but leaves the Server service
running. As a result, you can still connect to the computer by mapping a drive to a shared
folder. Note: It will take several minutes for your system to drop out of the Network
Neighborhood.
Back to Top
Use the Windows Task Manager in
Windows 2000
To determine the amount of RAM you'll regain by disabling unnecessary system
services, use the Windows Task Manager. Here's how:
Before you disable any system services, reboot your system and don't launch any
applications. If you have applications that automatically load when you start Windows,
hold down the [Shift] key to bypass the Startup folder.
Then, right click on the task bar and select Task Manager from the shortcut menu. When you
see the Windows Task Manager dialog box, select the Performance tab. Now take note of the
Available value in the Physical Memory panel.
After you disable those system services you deem unnecessary, reboot your system in the
same manner and compare the Available value in the Physical Memory panel to the one that
you noted earlier.
Back to Top
CD-ROM Auto-run
The nice little trick that Windows can do by automatically running a CD that you
insert can be helpful. Sometimes -- actually most of the time -- this feature is REALLY
annoying. Fortunately, you can toggle this option on and off. Go to 'My Computers,'
right-click, and select properties. Then select the Device Manager tab. Next click the +
symbol next to the CD ROM picture and right-click the CD ROM driver and select Properties.
Now you can select the 'Settings' tab and change the Auto-run.
Back to Top
Windows 98 From Windows 95
Many software manufacturers bombard the neophyte hoping that s/he will purchase the
"bigger and better" version of their software, which has been upgraded from
Windows 95 to Windows 98. Don't be so quick to whip out your wallet. Windows 95 and 98
both are capable of 32-bit processing.
There were some changes from 95 to 98, but many of the changes will not provide software
manufacturers a reason to change their software. However, they are hoping YOU don't know
that. Check with the manufacturer of the software. Ask them point blank: "Is the 95
version of your software capable of running on the 98 version? If so, what benefits does
the 98 version of your software provide that the 95 does not?"
If the benefits are scarce, or nonexistent, then put your wallet back in your pocket.
Back to Top
Ellipse
Ever notice the "..." next to some commands? This is not random. Whenever
you see the ellipsis, it means if the command is to be executed, Windows will need
additional information and will generally bring up a dialogue box for your approval.
Back to Top
Using Microsoft's Windows 2000
Readiness Analyzer
To see if your hardware and applications are both compatible with Windows 2000, you
probably have examined the Hardware Compatibility List (HCL), and quizzed your software
vendors. You may have even looked through Web sites. If you're still not sure, or if you'd
like an easy way to begin to upgrade, Microsoft has a useful tool for you: Windows 2000
Readiness Analyzer.
Go to Microsoft's Web site and search for "readiness analyzer." When you locate
the tool, download it to your local hard drive. From there you can copy it to any machine
that you're considering upgrading to Windows 2000 Professional or Windows 2000 Server. The
Windows 2000 Readiness Analyzer can run on the Windows 9x, Windows NT 3.51, and Windows NT
4.0 platforms. All that is needed is to put the Chkupgrd.exe file on the system you want
to analyze, and double-click on the file to run it. The Readiness Analyzer will issue a
report, which you can save and print, detailing known conflicts. It will also suggest
potential solutions based on tests conducted by Microsoft and independent software vendors
and hardware manufacturers.
Although the Windows 2000 Readiness Analyzer is a useful tool, you should still contact
your hardware and software vendors directly to determine compatibility before you start
upgrading or migrating to Windows 2000. Also, the Windows 2000 Readiness Analyzer will run
automatically during Windows 2000 Setup, but the free download from Microsoft's Web site
will enable you to start determining compatibility before you even buy the Windows 2000
operating system.
Back to Top
***INTERNET*** (Click here for Windows Tips)
Enabling and Disabling
AutoComplete in Internet Explorer 5
If you'll notice the middle of the AutoComplete dialog box, you'll see that there is a
check box titled "Don't offer to remember any more passwords." Selecting this
check box completely disables the AutoComplete feature for user names and passwords on all
forms. If you selected this check box the first time you saw it and now want to take
advantage of the AutoComplete feature, you just need to enable the appropriate check boxes
in the AutoComplete Settings dialog box.
Back to Top
Making the Most of Instant
Messaging
E-mail was once the standard for near-instantaneous communication. But waiting
several minutes for a PC to retrieve your e-mail from a server can seem like an eternity
when you're expecting critical info. Instant Messaging (IM), on the other hand, keeps you
in real-time communication with coworkers whether they're two cubicles over or three time
zones away. Are you getting the most from your IM software? Check out these tips and see
for yourself.
Use the Status Messages
Many people use IM to check if a coworker is available for a phone call. So it's important
to update your IM software with your whereabouts. If you're busy or leaving for lunch,
update the status message so others can see you're not around. This tactic can also come
in handy if you're swamped and can't afford to be interrupted with even an instant
message. Just raise the I'm Busy flag until you're done.
Conference
Instant messages are great for keeping in touch with a coworker, but what if you need to
chat with two or more people at once? Almost all IM software includes a conference
feature. Use it to make a quick decision that would otherwise get bogged down in e-mail.
AOL Instant Messenger supports conferencing, though it's not obvious. Control-click on
each person you want to conference with and then double-click on the last invitee.
Keep the Riffraff Out
By joining an IM service, you risk getting an annoying string of chat requests from total
strangers. To stay focused on work and avoid a lot of "wrong numbers," configure
your IM profile to hide your personal information from strangers. Most IM software also
lets you specify who is allowed to contact you. You can configure Yahoo Messenger to
restrict IMs to people on your Friends List by choosing that option from your Preferences
window.
Use Offline Messaging
AOL Instant Messenger is popular, but it's missing a key feature: off line messaging.
Suppose you're on your way to lunch and you shut off your IM software. When you return and
restart the program, no messages appear --even though your boss sent you an IM saying:
"Need to talk. Send me a message when you get in." With Yahoo Messenger and ICQ
you'd have gotten that message because they support offline messaging.
Back to Top
Digital Certificates
Digital certificates are like smart cookies. "Cookies" are small pieces
of software that identify your computer to another computer, typically an Internet server,
when you return. They're a matter of convenience, but some people don't like them on
privacy grounds. Digital certificates are cookies you have to sign up for. They do more
than identify your computer -- they verify your identity and thus your credit rating,
address, etc. They prove who you are in a convenient and secure manner, saving you time
and possibly trouble. Verisign is the biggest digital certificate provider just now, but
there are others. They're usually free, though you may be asked to provide credit card
info for verification.
Back to Top
Accommodate single quotes in
SQL Server text
In any data-driven Web page, chances are you're going to need to manipulate SQL
statements in your server-side script. If you use SQL Server, keep in mind that it expects
character (string) data to be enclosed in single quotes and it has a tendency to fall
apart on you if the data itself contains single quotes, or apostrophes.
Fortunately, SQL Server will accept interior single quotes if you double them up. In other
words, within the data, you need to use a pair of single quotes together in every place
where you actually want just one, like this:
INSERT People (Name, Age)
VALUES ('Patty O''Furniture', 19)
Of course, it would be nice to leverage VBScript's string manipulation functions to do
this for you automatically, and it's actually quite simple to do so. The easiest approach
is to use VBScript's Replace function. Simply pass the data through a user-defined
function, like so:
function ToSQL(strSource)
ToSQL = Replace(strSource, "'", "''")
end function
Note that the second parameter above is a single quote enclosed in double quotes, while
the third parameter above is two single quotes enclosed in double quotes. You could use
this function in a SQL statement, like this:
dim strSQL, strName
strName = "Patty O'Furniture"
strSQL = "INSERT People (Name, Age) VALUES ('" & ToSQL(strName) _
& "', 19)"
cn.execute strSQL
Back to Top
Title your pages as you save
them in FrontPage
Every HTML page has two names: a filename and a title. The title, of course,
appears in the browser's title bar, in search results when you use the Search Form
component and in some search engines' directories. Unfortunately, many Web developers
forget to give their pages descriptive titles.
The solution, of course, is to title your pages as you save them. In FrontPage 98, the
process is quite simple: the Save As dialog box includes a text box for the filename and a
second text box for the title. In FrontPage 2000, you must click the Change button in the
Save As dialog box to reach the Change Title dialog box.
If you forget to title a page, don't worry. You can change its name in the Page Properties
dialog box or in FrontPage 2000's Folders view. (FrontPage 98's Folders view doesn't give
you that ability.)
Back to Top
Weather Radar
Have you ever wanted to see if it was going to rain or snow, but you didn't have
the time to wait for the Weather Channel update or your local forecast? Weather radar is
but a click away.
There are lots of weather sites offering radar. Weather.com, the Weather Channel's own
site, is a good one. A personal favorite is Intellicast. They offer national,
international and local weather maps displaying precipitation, cloud cover, and satellite
views, but they also offer numerous radar summaries, including local radar and Nexrad.
Best are the loops, which let you view the movement of rain, snow or clouds over time. Is
that big blob of ugly storms headed your way, or will it give you a miss? Now you can find
out for yourself, any time you want.
Back to Top
Multiple Email Accounts
You probably have an email account with your ISP, and it's probably your primary
account. You're not limited to that one email account, however. Chances are your ISP will
let you set up several more email accounts, perhaps five or more. These can be for other
family members, or for work, or just for the fun of having multiple email handles. You may
be able to set up a home account to access your work email, and vice versa -- very handy
for telecommuting. Multiple email accounts are easier to have than multiple phone lines,
and cheaper, too.
You're not limited to your ISP's email offerings by a long shot, though. There seems to be
an endless number of sites offering free email accounts. You are only limited by the
creativity of your user names and your ability to keep up with them. Lots of people sign
up for free accounts and then forget about them, or forget their password. Don't leave
someone hanging because you can't keep track of your lines of communication!
Back to Top
What Does The Term
"Hardening" Mean?
The term "hardening" refers to the process of configuring software so as to
minimize potential security risks. This process begins with the application of any and all
available patches to fix known bugs. For operating system software and most applications,
the remainder of the process consists primarily of limiting or disabling unused or risky
functionality, but can include enabling security-enhancing features, removing default
accounts and passwords, and removing or encrypting sensitive files.
Hardening security-specific applications like firewalls, intrusion detection systems, and
antiviral tools on the other hand, generally involves turning on features and setting
restrictive access rules, allowing the applications to detect and respond to as many
different attacks as possible.
Back to Top
Add a Print Preview Button to
Internet Explorer 5.5's Toolbar
If you find yourself regularly printing Web pages, you may want to add a Print Preview
button to Internet Explorer 5.5's toolbar. To do so, pull down the View menu and select
the Toolbars > Customize command. When you see the Customize Toolbar dialog box, simply
locate the Print Preview button in the Available Toolbar Buttons list and add it to the
Current Toolbar Buttons list. Then, click OK.
Back to Top
Search Engines
In the early days of the Internet, search engines were like manna from heaven. They made
finding your way around the many thousands of Web sites simple. Now there are many
millions of sites, and search engines are falling behind. A recent study found that few
index more than 10% of Web pages, and the gap grows bigger every day. Some search engines
are trying to do a better job, but dead links and bad matches remain problems.
What can you do? Try making your search as specific as possible. Lots of search engines
offer options for refining and narrowing a search. Learn to use them and you'll spend less
time searching through your searches!
Back to Top
Locating contact information
for domain name owners
When you're starting up your own Web site, it can be difficult to find a meaningful
domain name that isn't already in use by another site owner. If your ideal domain name is
already in use, what can you do? Well, if the owner is willing to part with it, you can
purchase their domain name from them. Sounds simple enough, but how do you hunt the owner
down? At WebReference.com's WhoIs Gateway, located at
http://webreference.com/services/dns/whois.html
you can locate contact information for any domain name owner in the Internic database.
Back to Top
Drag and drop files between
FrontPage 2000 Webs
If you have a file (HTML page, graphic, etc.) in one FrontPage Web, you can easily
copy it into another Web. To do so, first open both Webs in FrontPage 2000. Since
FrontPage uses the Single Document Interface model, you'll have two FrontPage icons on
your taskbar and two FrontPage windows open.
Maximize (or restore) the FrontPage window that contains the source Web. (It doesn't
matter whether the other window is maximized or not, but it should be in Folders view).
Now, drag the file's icon down to the other FrontPage icon on the taskbar. Keep holding
down the mouse button, and the second window pops up, allowing you to drag the file to its
new destination. When you release the mouse button, FrontPage copies the file into the new
Web.
Back to Top
How Napster Works
Napster is more than just a dirty word to music copyright holders - it's a novel
way to trade files on the Internet. Unlike the Web or a local area network, which stores
data on a host server, Napster is decentralized. The MP3 files on Napster move directly
from one desktop PC to another. The company eventually plans to allow people to share
photos, videos, and other files the same way. Whatever else you think about Napster, it's
expanding the definition of computer democracy. Here's how.
Setup. Before you log onto Napster, you decide which MP3 files on your PC to make
available for download. These files become your Napster library.
Sharing. When you log onto a Napster server, your PC sends the server a list of MP3 files
in your library. The Napster server posts your file list in an online database. Only the
file list is posted. The songs remain on your PC.
Search. You - and other Napster users - enter a search term in Napster. The search term
can be a song title, an artist's name, or a phrase you'd expect to find in the MP3
filename.
Results. Napster searches all the file lists on the server and sends the search results to
your PC. A search result includes the filename, the type of Internet on-ramp, the Internet
address where the file can be found, and the handle or nickname of the file's owner.
Transfer. When you select a file for transfer, your PC sends a request to the file owner's
PC. Your PC identifies itself by its IP address. The transfer bypasses the Napster server.
Instead, the original owner's PC sends the file directly to your PC.
Payback. While you are connected to the Napster network, other Napster users can download
MP3 files from your hard drive. Uploads and downloads can run simultaneously by sharing
the Net connection.
Back to Top
AOL
I haven't been to AOL in quite a while, but like many Web surfers I started out on
AOL. It really is the easiest place for newbies to join the fun. AOL simplifies getting on
the Web, setting up email, and other tasks that become second nature once you've been on
the Internet for a while. In fact, that's one of the biggest gripes experienced users have
about AOL, and one of the biggest reasons people leave it. It does too much for users who
have developed certain preferences, such as using a browser or email program different
from AOL's. I can't speak from recent experience as to whether or not AOL still does this,
but the things that most annoyed me about AOL was the way it would periodically seize
control of your system for "updates" that you're going to get whether you want
them or not, and the way they used to log you off for "no activity," even when
you were in the middle of a download! That got real old real fast.
The other side is AOL's vast and unique content and its huge "community" of
users. I know some Old Net Hands who maintain an AOL account just for the chat and other
AOL services, and to keep their AOL email account and user name. AOL regularly mails out
CD-ROMs offering hundreds of hours of free service, and they've been known to offer free
months to users who want to leave AOL. It's also a great choice for parents because of its
kid-safe areas and controls and its monitored chat rooms.
Back to Top
Winamp Keyboard Shortcuts
Control Winamp with these shortcuts:
Alt + F or Right Clicking: Main Menu
Ctrl + Eject or Ctrl + Play: Load Locations
Shift + Play: Loads a File
Ctrl + Previous: Rewinds to First Song on Playlist
Shift + Stop: Stops Music with a Fade Out
Double Clicking Titlebar: Toggles Windows Shade Mode
Z, X, C, V, and B: Correspond to the Five Control Buttons
Up, Down Arrows: Volume
Left, Right Arrows: Rewind, Fast Forward Song 5 Seconds
Ctrl + Tab: Cycles Open Winamp Windows
Ctrl + P: Preferences
Back to Top
Safe Shopping Online
No one doubts the power of e-commerce anymore. It's become one of the biggest
drivers of the economy, so big that the knock on it isn't "when will it get
here?" but "it's overrated." This Christmas, however, will see new online
shopping records, just like last year. If you've wanted to buy online but have been leery
of giving out your credit card number, or if you've only stuck a toe in the deep waters of
e-commerce but are thinking of more of a swan dive, then take heart -- online shopping is
pretty much as safe as shopping by telephone. Both use the phone lines, one by voice and
the other by data. The same technology that lets bad guys intercept one also works on the
other. If the Web site has a secure server, it's actually safer since the "call"
is digitally encoded. If there's no secure server, as is often the case with smaller shops
and individual sellers, you can simply send your credit card number in two emails. The
odds of any one person intercepting two emails and putting them together are pretty low.
Of course, you have no control over the ethics of the online merchant, but that applies
even in the brick-and-mortar world.
Back to Top
All The News
Used to be that "Webnews" was synonymous with "unreliable,"
"biased" and "what planet are they on???" Things got better once the
major news organizations got into the game, but there's still a lot of loopiness,
particularly among sites with an avowed political slant. Political conservatives have long
charged that the mainstream media have a "liberal bias," and many have turned to
the 'Net as an alternative -- as have their counterparts on the far Left. Trouble is, one
bias doesn't justify another, and most of the "news" sites on the fringe should
be approached with caution and skepticism (good advice for any news source). Critical news
consumers should be alert for biased coverage no matter where it comes from. If you go
looking for news from the choir, however, you'll certainly find it. Today the Internet is
the premier source for the latest news, stealing TV's thunder much like TV did to the
newspapers. All the big networks and newspapers have Web sites, so you've got a wide
choice.
Back to Top
Temporarily unsubscribe from
LISTSERV lists
If you're going on vacation and won't be checking your email for a while, you can
temporarily unsubscribe from LISTSERV lists to cut down on the messages you'll need to
wade through when you get back. To do so, send an email to listserv@address, where
"address" is the address of the list you'd like to postpone. Leave the subject
line blank, and type
SET listname NOMAIL
in the message area, where "listname" is the name of the list you'd like to put
on hold. Send the message to prevent incoming list mail while you're gone. When you get
back, you can turn your incoming list mail back on by sending a message containing the
line
SET listname MAIL
where "listname" is the name of the list you'd like to reinstate, to the same
address. This technique should work with most LISTSERV accounts, but keep in mind that
other mailing lists might require a different technique to accomplish the same task.
Back to Top
Active Desktop Makes
Wallpapering Easy
To save a picture for future use as a Wallpaper, you can either save it to Windows
(in your C drive) as a bitmap (.bmp) file, which will make it part of your regular
Wallpaper stash, or, if you have turned on your "active desktop," just save it
as a JPEG or GIF in any old file. The active desktop feature in Windows lets you use most
any picture in your files as Wallpaper. Just click "browse" in the Background
tab under Properties, and navigate to the folder holding the image you want. This neat
feature lets you keep lots of pictures for wallpaper without messing around in the Windows
folder, which rightly gives some users the heebie-jeebies. To activate your active
desktop, right-click on the desktop, just like you do to access your wallpaper and other
display properties. Click "active desktop" and choose the appropriate setting.
Back to Top
Specifying Cross-Browser Border
Colors in FrontPage
When you access the Cell Properties or Table Properties dialog box in FrontPage,
you find three options for setting the border color: Border, Light Border, and Dark
Border.
Why so many choices? Because different browsers recognize different options. Netscape
Navigator 4 and later will only recognize the Border setting, which affects the whole
border. Internet Explorer 4 and later recognize the Border setting and the settings on the
Light Border and Dark Border dropdown menus. (The Light Border setting affects the top and
left edges, while the Dark Border setting affects the bottom and right edges.) If you
specify light and dark colors, IE will ignore the catchall setting.
Older browsers, meanwhile, will ignore ALL the border-color selections you make.
Back to Top
Browsing for Wallpaper
If you see a neat picture on the Web you'd like to install as "wallpaper"
for your desktop, it's easy to do. Both Internet Explorer and Netscape let you do this
with a right-click. In IE or Netscape, just right-click on the image and select "Set
As Wallpaper." The image will appear on your desktop. If it's not there, make sure
your Wallpaper is set as "Internet Explorer Wallpaper" or "Netscape
Wallpaper." Right-click on the desktop, and then choose Properties. This is Command
Central for your desktop's appearance. Click on the Background tab. Make sure the
Wallpaper box is set to the browser wallpaper you want.
Back to Top
Use the Winamp Clutterbar for
More Control
Look for the Winamp Clutterbar running down the top left side of the time display.
It vertically displays the letters O, A, I, D, and V.
O Options Menu
A Make Winamp stay on top of Desktop
D Make Winamp and its Graphical Equalizer window become double the size
I Pulls up information on the current song playing
V Visualization Menu
Back to Top
Break the Chain-mail Myth
Want an Ericsson WAP-enabled phone? How about a copy of the latest digital dialer
from Nokia? All you need to do is re-send this chain-letter e-mail to 20 friends and
Shazaam! You'll have one.
Sorry, It just doesn't work that way. The sad truth is that while we are sometimes greedy,
sometimes gullible, we are most often willing to believe the most unbelievable things.
Such as someone actually knowing if you've sent those 20 e-mails so you can be rewarded
with whatever the prize is when you do, or punished with some unspeakable retribution if
you don't.
Like most Urban Legends and Myths, this one has a ring of truth because it is possible but
only under very specific conditions. For example, if you're on a workstation on a network,
your network administrator can monitor your incoming and outgoing e-mail with relative
ease. And because there's not really much difference between workstations attached to a
network server and PCs attached to an ISP, your ISP could also monitor your e-mail. But
that's just about where Big Brother ends.
In order for an individual to do the same, that person would need to bypass any anti-virus
protection you might have, inject a worm into your computer, use the worm to monitor your
e-mail, and send copies of all outgoing messages to him- or herself either as blind copies
(Bcc) or by deleting them from your Sent folder so you won't be aware that any of this was
happening. Someone would have to be very savvy, or very persistent, or else, it would have
to be your mother, who always seemed to know everything you were doing anyway.
Back to Top
Throw Out IE's AutoComplete for
Better Privacy
Internet Explorer 5's AutoComplete feature can recall and retrieve commonly
accessed Web address, username, form and password information that you type as you surf.
These feature may be problematic when you're sharing a PC. If you've configured
AutoComplete to save this information, other users could possibly take advantage of it to
gain access to your coveted personal data. To protect yourself, disable the AutoComplete
feature's username, form, and password options. Choose Tools/Internet Options from the
menu bar, and then select on the Content tab. In the Personal Information area, choose
AutoComplete. Clear the Usernames And Passwords On Forms check box; you may also need to
clear the Forms check box for added anonymity. Lastly, to get rid of any saved information
that you don't want other users to use, select the Clear Forms and the Clear Passwords
buttons. When you've done, click OK.
Back to Top
Adding a background image in
FrontPage
A good way to spice up your FrontPage Web is to add an image to the page's
background (assuming you haven't applied a theme to the Web). To do so, choose Background
from the Format menu. The Page Properties dialog box with the Background property sheet
selected.
Enable the Background Picture checkbox (Background Image in FrontPage 98). Then, click the
Browse button and navigate to the background image you want to use. Select the image and
click OK; then click OK again to close the Page Properties dialog box.
Note that FrontPage tiles the image (repeats it across and down the page). If you want
space between each repetition, you'll need to build that in when you create the image.
Back to Top
Click n' Sniff
Several companies are vying to bring your nose into the Web experience. They are
developing gadgets that will create and emit a wide range of smells when told to.
Eventually they hope you'll have a small device on your desktop that emits a close copy of
whatever odor is called for -- lilacs, for instance; or pizza, or perfume, or that
"new car smell." Advertisers think it's a great idea. I'm not so sure I'm ready
to invite a wide world of smells into my home, however. There seems to be a great
potential for abuse. I don't want advertisers trying to make me hungry with mouthwatering
aromas, nor do I want a blast of every new perfume on the market. And how long would it be
before "fartmail" shows up? This technology has a lot of potential uses. I'm not
sure I'm ready for them, though!
Back to Top