Compare Media Players p.
nFax Pro vs. SnappyFax
lb. I
Bfl ^0R ^ smartcomputing.com
ffiiTflii ComDutina
HSMMtWMMWW I In Plain Fnnlkh *J
In Plain English
Solve The
External
DVD Writers p.
PCFim
i-Fighting
Computer p.44
Online Mapping
Services:
Which Is The Best?
PC Project:
MinllffiK
' A 5iit)diillb
ftjiilkditou
To Your PC p.80
Use Bluetooth Headsets &Mher Devices
ll 25274 ll 77294 ,
Hamu To Avoid & Deal With
Identity The
Great theater deserves a great setting
Plasma TVs are really making waves. So how do you choose a mount worthy of the splendor of a plasma TV? Easy. Choose a
VisionMount™ flat panel TV wall mount from Sanus. Its simple elegance gives you one of the strongest, most durable mounts.. .with
installation completed in just minutes. And the Virtual Axis™ mechanism allows you to adjust the tilt with an effortless fingertip
touch. ..even if your TV weighs 175 pounds. So wherever your plasma TV is destined to be, VisionMount can easily handle your
installation and positioning needs, and you can spend your time reflecting on the real beauty of your home theater.
ANU
Y
IV1
VisionMount™ model VMPLb
shown. Fits virtually any flat panel
TV from 32" up to 60". Available
in black and silver.
THE UNION OF FORM AND FUNCTION
800.359.5520 www.sanus.com
Great theater deserves a great setting.
*m
___
^
^pHL
i
:
n
1
1
£3
1
i
s
i
s
9^R0p
- ■
1
.^Bfcw**
Iggp
The sleek, free-flowing lines of Sanus Platinum furniture reflect the beauty of today's digital televisions.
And the newest addition, model PFFP flat panel TV stand, opens up possibilities to mount a flat panel
television anywhere. An extruded aluminum column extends rigid strength from the steel-framed base
to handle flat panel TVs up to 50". The Virtual Axis™ tilting system provides smooth motion with the touch
of a fingertip. And features like a hidden cable channel, an adjustable glass shelf and a custom blended
silver finish provide the perfect finishing touches to this innovative flat panel TV stand. So if your
home theater is short on wall space, your options are now wide open.
ANU
Y!
I\/I
THE UNION DF FORM AND FUNCTION
800.359.5520 www.sanus.com
^■P — smartcomputing.ee
Computing
I In Plain Fnnlkh *J
®
In Plain English
Volume 1 6 . November 2005 . Issue 1 1
This Month's Cover Story:
The Wireless Puzzle
Make Sure All The Pieces Fit
62 The Wireless Wave
The Present Perspective & Beyond
66 Free From Wires
Install 8c Configure A Wireless Network
70 Hotspot Heaven
Find & Use Free 8c For-Fee
Wireless Access Points
72 Wireless Network Security
Protect Your Air From Freeloaders 8c Intruders
75 The Bluetooth Buzz
Put Wireless In The Palm Of Your Hand
78 Communications Convergence
The Technologies Behind Treo,
BlackBerry 8c Other Mobile Devices
Reviews
16 TechMates
Paint The Town Red
Each month, Sandy Berger pairs
up a couple of products to show
you how to make the most of
what's on the market.
17 Tech Diaries
Our Smart Computing colum-
nists spent some quality time
with computers and computer-
related hardware to get beyond
the benchmark scores, statistics,
and marketing hype. Find out
what they liked and disliked
about their choices.
22 Let The Music Play
We compare a few of the best
media players to see which one
is best at handling the audio and
video needs of the average con-
sumer. Considering that all
three of the players we reviewed
are free applications, we must
say we were impressed with
the results.
26 Software Reviews
Multimedia:
iView MediaPro2
26
Security:
Vanquish Anti-Spam 3.1
27
Writing: AbiWord 2.2.9
27
28 Side-By-Side Review
WinFax Pro vs. SnappyFax
See which of these PC-based
faxing apps will work best for
you.
30 Impulse Items
Each month, we take a look at
several useful gadgets and pro-
grams you can get for $25 or less.
GrapeBerry
Organizer/Phone
Copyright 2005 by Sandhills Publishing Company. Smart Computing is a
registered trademark of Sandhills Publishing Company. All rights reserved. Reproduction
of material appearing in Smart Computing is strictly prohibited without written permission.
Printed in the U.S.A. GST # 123482788RT0001 Smart Computing USPS 005-665 (ISSN
1093-4170) is published monthly for $29 per year by Sandhills Publishing Company, 131
West Grand Drive, P.O. Box 85380, Lincoln, NE 68501. Subscriber Services: (800) 424-
7900. Periodicals postage paid at Lincoln, NE. POSTMASTER: Send address c
to Smart Computing, P.O. Box 85380, Lincoln, NE 68501.
TABLE OF CONTENTS NOVEMBER 2005
Windows Tips & Tricks
#/
Tech Support
32 Windows XP: Alternative Browsers
Internet Explorer isn't necessarily the be-all and end-all; perhaps there's a
different browser that'll better suit your needs.
35 Windows 98: Windows 98's Windows Report Tool
This handy little applet can help tech support techs help you.
36 Windows 2000: Adjust Windows 2000 Mouse Properties
Get your unruly mouse back on the straight and narrow with these quick tips.
General Computing
38 How Did They Do That?
Eagle Eyes Of The Law
Learn how license plate scanners can help police catch drivers with infrac-
tions on their records.
40 No Tools Required
External DVD burners can add a lot of functionality to your PC.
44 Silicon Superheroes
As with most everything else, fighting crime has gotten a boost from digital
technology.
Plugged In
46 Mr. Modem's Desktop: Yes, It's Another Turkey
In which Mr. Modem, author of several books — none of which has won the
Pulitzer Prize — and co-host of the weekly "PC Chat" radio show, gives
thanks for readers' tips.
48 Sally Forth
Finding your way is all the easier with mapping and driving directions from
Web sites.
52 A Tale Of Two Thefts
Having your identity stolen or compromised is a harrowing experience:
Learn how to protect yourself.
56 Site Guide: View Creation From The Inside
Chicago's Museum Of Science And Industry is home to exhibits sure to
satisfy engineering enthusiasts, science fanatics, history buffs, and the
generally curious.
58 Web Tips
59 Find It Online
PC Project
80 Faster Than A Speeding Bullet
Adding Fire Wire ports to your older PC can help speed along your com-
puting experience.
Each Month
97 What To Do When . . .
Your Computer Continuously Reboots
Learn how to fix this irritating problem.
98 Examining Errors
100 Fast Fixes
102 Q&A/FAQs
You have questions. We have answers.
The Smart Computing staff responds to
your queries.
107 Action Editor
Can't seem to get a response from a
vendor or manufacturer? If you need
help, we're here for you.
Quick Studies
82 Browsers
Add A Spell Checker To Firefox
& Internet Explorer
83 Microsoft Excel 2002
Using Templates
84 Intuit Quicken 2005 Premier
Benefits Of A Balanced Budget
85 Online
Bring Online Info To Your Desktop
With Widgets
86 Jasc Paint Shop Pro 8
The Histogram
87 Microsoft PowerPoint 2002
Using Diagrams
88 Quick Tips
SmartComputing.com
90 SmartComputing.com:
Looking For Help? Look
Here First
When you have a computer-related
problem, don't panic. Check out the
Solutions Knowledgebase at
SmartComputing.com.
7 Technology News & Notes
82 Quick Studies
97
108
Tech Support
Editorial License
Tidbits
94 Backup Devices
Protect your computer and its data by
backing everything up. These new de-
vices make it fast and easy, so you just
lost your last excuse.
Editor's Note: We started working on this issue in 1896.
Well, OK, so technically that's not true. But 1896 is the year in which Guglielmo Marconi demon-
strated wireless telegraphy to a group of skeptical folks at the English telegraph office. From
Marconi's invention to today's PC-related wireless connectivity (in the form of smartphones, PDAs,
Bluetooth, Wi-Fi, and the rest) is really only a short hop, and things started . . . well, hopping, right away:
Only two years after Marconi amazed the English telegraph office, a wireless telegraphic connection be-
tween England and France was established. And three years after that, Marconi successfully transmitted a
signal across the Atlantic Ocean. Eight years later, Marconi was awarded the Nobel Prize for physics.
Then came radio, television, and on and on. And the ball that Marconi started rolling hasn't stopped yet.
All of which brings us to you, dear reader. Here you are reading a computer magazine, so you're obviously
interested in bytes and gigabytes, floppy and hard drives, CPUs, PSUs, RAM, ROM, URLs, and a host of
other arcane abbreviations and acronyms. You've pretty much got that stuff down: You're a whiz with
Word, expert at Excel, competent at Quicken, adept at Adobe. No one has to tell you to back up your data,
defrag your hard drive, and keep the family cat off of your keyboard. In short, you're capable, proficient
users of computing technology; even the novices among you know more than they think they know.
So here's our theory You were starting to get too comfortable with computers. That would never do,
so the Powers That Be got together late one night and someone among them came up with a brilliant idea:
"Hey," said he (or she — some Powers That Be are female, as it happens), "let's throw a whole bunch of
wireless technology at them! New abbreviations, acronyms, technologies to try to master It'll drive
them crazy!"
And so they did, and now there's all kinds of new stuff to learn. It maybe frustrating, but there are also ad-
vantages to be gained by having learned it. This issue will help you foil the Powers That Be by explaining in
plain English how the new wireless technologies work and how you can use them to your advantage.
That'll show 'em.
&^A~8X—
Rod Scher, Publication Editor
Now Available On Newsstands
Computer Power User * Massive Utility Guide
Hardware is all well and good, but it's software that makes your PC all it can
be. Toward that goal, we present more than 100 programs that will let your
PC do more than you ever imagined. Did we mention that several of these
apps are free?
PC Today * Stop Mobile Tech Headaches
The November PC Todays cover story articles discuss how to protect your note-
book when connecting to a wireless network, how companies and users can
combat notebook theft, and how to keep your data intact when you're on the road.
You'll also find a guide to hassle-free air travel.
CE Lifestyles * Digital Cameras
When it comes to CE favorites, digital cameras are at the top of the list. What other
device can let you get so creative with your special memories? And with profes-
sional-level technology and lower prices, a high-quality camera is within almost
everyone's reach. This month, we'll tell you what to look for in a digital camera,
and we'll also give you tips on how to buy one for a friend or family member.
Reference Series * Guide To Using Google
Lots of folks know about Google's excellent search engine; it's the most popular
search site on the Web today. And you've probably heard about the company's
Gmail Web email service, as well. But did you know that Google has a mapping
service, photo organization and editing tools, and an instant messaging program,
and they're all free? Find out about these features and more in this special guide to
one of the Web's most popular destinations.
llJfe
ED
Sandhills
Publishing-
Customer Service
(For questions about your
subscription or to place an
order or change an address.)
customer.service
@smartcomputing.com
(800) 733-3809
Fax:(402)479-2193
Smart Computing
P.O. Box 85380
Lincoln, NE 68501-5380
Hours
Mon. - Fri.: 7 a.m. to 8 p.m. (CST)
Sat.: 8 a.m. to 4 p.m. (CST)
Online Customer Service and
Subscription Center
www.smartcomputing.com
Web Services
(For questions about our Web site.)
webhelp@smartcomputing.com
(800) 368-8304
Authorization For Reprints
REPRINT MANAGEMENT SERVICES
Toll Free: (800) 290-5460
(717) 399-1900 ext. 100
Fax:(717)399-8900
Email: SmartComputing@
reprintbuyer.com
www.reprintbuyer.com
Editorial Staff
editor@smartcomputing.com
FAX: (402) 479-2104
131 W.Grand Drive
Lincoln, NE 68521
Subscription Renewals
(800) 424-7900
FAX: (402) 479-2193
www.smartcomputing.com
Advertising Staff
(800)848-1478
FAX: (402) 479-2104
131 W.Grand Drive
Lincoln, NE 68521
ft
The
Audit
Bureau
y$$m.
/3fte)0©@(? tym? 00@QW®Q$i)
TM
Idfffil Lomputinq I
Spy Catcher
Spyware silently tracks you online,
allowing hackers and thieves to access
your financial information, and even your
passwords. SpyCatcher 3.5 provides
comprehensive protection:
©Auto-updated database detects and
disables thousands of spyware, and more
Spyware att
Reinstali Shield prevents aggressive
spyware from reinstalling after deletion
©
Tiebri
icorpor
Patent-pending anti-phishing technology
prevents online identity theft
tenebrH.com/spycatcher
SpyCatcher™
SpyCatcher Enterprise adds a state-of-
the-art management console, enabling
you to protect your network from one
central location. Its simple interface and
advanced features allow you to:
Jpk Schedule scans and updates for specific
\^) workgroups or entire networks
Q
Create custom fingerprints that detect and
shut down unwanted programs remotely
Q Generate reports and view real-time
statistics on network vulnerabilities
TABLE OF CONTENTS NOVEMBER 200.
November Web-Only Articles
Smart Computing subscribers may read the following articles at SmartComputing.com.
Hardware
For all the latest product reviews, visit the Hardware Reviews & Comparison Charts
area at SmartComputing.com (www.smartcomputing.com).
PC Operating Instructions
Linux: Track Your Accounts With KMyMoney
Keep tabs on your money and investments with Linux.
Quick Studies
Microsoft Access 2002
Transfer Access Data
To Word Processing Files
Adobe PageMaker 7
Export Text & Graphics
Security
Squash Spam
Microsoft Word 2002
Identify Pages With Headers & Footers
Broderbund Print Shop 20 Deluxe
Hot Shots Viewer Is Hot New Feature
Corel WordPerfect 11
Go Grammatik
Adobe Photoshop 6.0
Extract An Object From A Photo
Email
Diagnose Email Relay Errors
Roxio PhotoSuite 7 Platinum
The Label Creator, Revisted
Microsoft Works 2005
Plan Your Route
HTML
Create Complex Tables The Easy Way
. — 3^ HQ .
NEWSLETTER —
L-^^H .^m
p<— ■■■ I *- I
ZZlm ~^i
« m» 1
Adobe PageMaker 7
■ ■ ." :. ' ■. ■ ■■■■■. ■■'■''
FTurn on Norton AntiSpam
'■: ■ ' •' ■'■■ ::: ' ■ '• -'-:.
• ■ ■:.,':': !:!■. : '. :. ■'..:::'..
_ ; M -! ■
::r^
| Default Level |
r^i
Security
Adobe Photoshop 6.0
Sandhills
Publishing-
Editorial Staff.
Ronald D. Kobler / Rod Scher / Kimberly
Fitzke / Sally Curran / Sam it Gupta
Choudhuri / Corey Russman /
Christopher Trumble / Calvin Clinchard
/ Katie Sommer / Katie Dolan / Blaine
Flamig / Raejean Brooks / Rebecca
Christensen / Michael Sweet / Nate
Hoppe / Jennifer Suggitt / Trista Kunce /
Sheila Allen / Linne Ourada / Liz Dixon /
Joy Martin / Brian Weed / Marty Sems /
Chad Denton / Nathan Chandler / Kylee
Dickey /Josh Gulick / Andrew Leibman /
Vince Cogley / Sam Evans / Jennifer
Johnson
Web Staff:
Dorene Krausnick / Laura Curry
Customer Service:
Becky Rezabek / Lana Matic / Lindsay
Albers
Subscription Renewals:
Liz Kohout / Connie
Beatty / Matt Boiling / Patrick Kean /
Charmaine Vondra / Miden Ebert / Kathy
DeCoito / Stephanie Contreras
/ Nicole Buckendahl
Art & Design:
Lesa Call / Fred Schneider / Carrie Benes /
Ginger Falldorf / Sonja Warner / Aaron
Weston / Aaron Clark / Kelli Lambertsen
/ Lori Garris /Jason Codr / Andria Schultz
/ Erin Rodriguez / Lindsay Anker
Newsstand:
Garth Lienemann / Kelly Richardson
/JeffSchnittker
Advertising Sales:
Grant Ossenkop / Cindy Pieper / Brooke
Wolzen / Eric Cobb
Marketing:
Mark Peery / Marcy Gunn /Jen Clausen /
Luke Vavricek / Ashley Hannant / Scot
Banks
Technology News & Notes
Compiled by Christian Perry
Illustrated by Lori Garris
DESKTOPS & LAPTOPS
Notebook Sales Up, Prices Down
As notebook computers continue
to shrink in size, weight, and
price, and yet increase their level
of performance, their popularity is
skyrocketing. In fact, according to
Current Analysis, notebooks recently
outsold desktop computers for the
first time over the course of an entire
month, notching 53.3% of the entire
PC retail market in May, up from
45.9% in May 2004. The research
firm attributes several factors to the
recent success of notebooks.
"The past few months have seen
an increase in the number of retail
notebook players, with lesser
known players Acer and
Medion
gaining shelf space at major retailers
such as Best Buy, Circuit City, and
CompUSA," says Sam Bhavnani,
Current Analysis' Senior Analyst of
Mobile Computing. "Moreover,
Wi-Fi is no longer considered a
luxury, but rather a necessity for
today's mobile users. One year ago,
over 20% of retail notebooks did
not include wireless. Today, that
number is less than 5%."
Bhavnani also points to a contin-
uing trend toward rock-bottom
prices, with several vendors and re-
tailers now selling low-end note-
books for less than
$500. Acer, in partic-
ular, is pushing hard
to become a major
player in the note-
book realm, recently
claiming it expects to sell 10 mil-
lion units in 2006. But even though
Acer touts a wide selection of low-
cost notebooks, the company isn't
alone, as other notebook behe-
moths such as Dell and HP are also
selling ultra- affordable models.
Perhaps surprisingly, these cheap
notebooks aren't bad, spec-wise. If
you spend about $500 with Dell,
you'll get an Inspiron notebook with
a 1.3GHz processor, 258MB of
RAM, a 14.1 -inch display, a 30GB
hard drive, and a 24X DVD/CD-RW
drive. Although a model like this
isn't exactly a desktop replacement
(or anywhere close), it can still de-
liver the basic computing necessities.
If you're considering jumping on
the low- cost notebook bandwagon,
beware of a few catches. Retailers
often advertise notebooks with
amazing low prices, but that's the
cost after several rebates. Even if you
plan on taking advantage of those
rebates, be sure to read the fine
print and submit them exactly as
requested because even a slight di-
version from the instructions and
deadlines can disqualify your rebate.
Also, don't be fooled by adver-
tising terms such as "widescreen"
because a notebook is what it is, re-
gardless of any buzzwords used to
sell it. For example, a certain retailer
sells Toshiba "widescreen" note-
books that actually have 14-inch
displays. If you see this note-
book in person, you
might notice that its
case size is similar to
those of notebooks with
larger screens, but the plastic
bezel around the screen is larger. I
TECH NEWS
STORAG E
Sideways Storage
We've been hearing about perpendicular drives for
months, but now the hype is finally a reality, as
Toshiba recently began shipping a 1.8-inch, 40GB per-
pendicular drive, which will appear in Toshiba's new
Gigabeat F41 MP3 player.
Most of today's hard drives use longitudinal recording,
which aligns data bits horizontally. PMR (perpendicular
magnetic recording) technology aligns data bits vertically,
allowing for more data to fit on the disk. To envision how
these technologies differ, imagine taking a pumpkin pie and
pushing a quarter into the side of the crust so that the flat
side of the coin is parallel with the table on which the pie
sits. If you followed that quarter with more quarters until
the original quarter poked out the other end of the crust,
you might fit 10 to 12 quarters into the pie. Consider this
longitudinal recording.
If you grabbed another pie from the windowsill, ducked
to avoid Grandma's broom handle, and stuck the quarters
vertically into the pie from the same crust edge (used to
demonstrate our longitudinal recording example) to the
opposite side of the pie, you could fit far more quarters into
the pie. This is the concept that will allow companies such
as Toshiba, Hitachi, and Seagate to create tiny physical hard
drives that boast huge storage capacities.
Other PMR products on deck include a 2.5-inch, 160GB
notebook drive from Seagate and 1TB desktop drives from
Hitachi, though those massive desktop drives may not see
store shelves until 2007. I
(•* gigabeat
~\c
Future models of Toshiba's Gigabeat
media player will feature the
company's new perpendicular
hard drive, which integrates more
storage than traditional drives.
DISPLAYS
Plasma On The Upswing
Got plasma? If you're in the market for a widescreen tele-
vision, the stats say you might get plasma soon.
According to DisplaySearch's Quarterly Global TV Shipment
And Forecast Report, plasma TV shipments reached 1.13
million units in Q2 2005, up 24% over the previous quarter
and up a whopping 89% over the same quarter last year.
That puts plasma televisions at a 2.9% unit share world-
wide. The news isn't as good for RPTVs (rear-projection
televisions), whose unit share dropped from 2.9% to 2.5%.
But even though plasma televisions now sell higher than
RPTVs everywhere outside North America, RPTVs still
sell more here, thanks to their lower prices. However,
DisplaySearch indicates that a majority of consumers who
replaced their RPTVs in Q2 did so by buying a plasma TV.
With more money flowing into the plasma market, manu-
facturers certainly aren't shying away from high-end models.
Samsung recently revealed three models geared for specialty
A/V retailers that feature 549 billion displayable colors, built-
in HD (high-definition) tuners, and CableCARD- compatible
technology. Also included is Samsung's DNIea (Digital
Naturallmage engine), which analyzes signal elements to
produce a higher- quality image. The new 42-, 50-, and 63-
inch displays carry bank account-draining price tags of
$4,199, $5,699, and $12,999, respectively. I
Even while cheaper
RPTVs (rear-projection
televisions) still
outpace plasma
televisions sold in
the United States,
companies such as
Samsung are
bringing high-end,
high-dollar plasma
sets to the market.
8 November 2005 / www.smartcomputing.com
Lutron @ : personalize
one-touch dimming
for your entire home
Integrate all your lighting into
one-touch keypads that are as
personalized as your home w
a HomeWorks® total lighting
control system.
You can also integrate Sivoia QED TM
quiet, electronic shade control to
bring electric and natural light into
one seamless system.
For over 40 years Lutron has been
the brand preferred by lighting
designers and contractors.
Discover more about HomeWorks and
the full array of lighting control options
at www.lutron.com or call us
toll free at 866.546.4556.
[«
C*£i*>
«
/
\
A Cooking
•
^Dining
jj 1 -a+ci Minht
•|
4 .,
^ •
J
Actual size:
LUTRON
Lutron controls your light..
TECH NEWS
PRINTERS & PERIPHERALS
A Smarter Keyboard
Logitech appears determined to push keyboards to the
next level of usefulness. In 2003, the company released
the diNovo Media Desktop, which featured a keyboard with
a detachable keypad complete with an LCD (liquid-crystal
display). Now Logitech has integrated a similar display di-
rectly into a keyboard to deliver a streamlined approach to
information management.
Logitech's new Cordless Desktop MX 5000 Laser ($149.99;
www.logitech.com) aims to clear not only the wires from
your desk but also the clutter from your monitor's screen.
The integrated LCD can provide in
stant notification of new email and
instant messages, along with the
current state of your Yahoo! Mes-
senger or MSN Messenger ac-
count. Bundled software even
lets you specify which contacts
you'd like to receive notifica-
tions for on the display.
But that's not all. The LCD
can display smart key assignments,
playlists, radio stations, the volume level, and the view per-
centage when you zoom in or out of an image or document.
An integrated calculator lets you crunch numbers com-
pletely on the keyboard, and if you need the results, you'll
find them saved in the Windows Clipboard.
The default LCD shows the battery level, the room tem-
perature, the account name of the current Windows XP
user, and other information. The MX 5000 also includes a
cordless, rechargeable laser mouse and a Bluetooth hub. I
The keyboard included with
Logitech's new Cordless
Desktop MX 5000 supplies
a wide range of useful
information directly to
an integrated display.
CPUs, CHIPS & CARDS
Intel Ramps Down Power
When you see the words "less power" and "CPU" in
the same sentence, there's not usually cause for
wild celebration. But that didn't stop Intel from
announcing at its Developer Forum in
August that less power will be joining
higher performance to form a future
line of chips that cut electricity costs
and deliver longer battery life.
Intel CEO Paul Otellini says the
company will be redesigning the
architecture of its chips, focusing
more on multicore componentry in-
stead of high clock speeds. With a
shift away from the intense heat gener-
ated by single-core chips running at high
speeds, the new multicore design will help
manufacturers create smaller computers that still
feature high performance. Intel plans to implement the new
architecture in mobile, desktop, and server platforms.
Although Intel currently markets dual-core chips, the
new generation of Intel CPUs should take far more ad-
vantage of the dual-core design, sharing infor-
mation efficiently between the two cores
(something that current Intel dual- core
chips don't do). However, because
most applications and games still can
use only a single thread, or process,
at one time, dual-core processors
remain largely unnecessary for
many computing tasks. That should
change in the future as more appli-
cations are programmed to accom-
modate multiple threads.
According to Otellini, the new chips
will cut the power consumption of desktops
to 65 W (watts), servers to 80W, and notebooks
to about 5W. Intel expects to release the chips in the second
half of 2006. I
10 November 2005 / www.smartcomputing.com
TECH NEWS
DIG ITAL M ISCELLAN EA
Glitches Due To Revamped Daylight-Saving Time?
As you probably already know, an energy bill
passed earlier this year will extend day-
light-saving time by four weeks starting
in 2007. But how will this affect our
computers and other devices?
For starters, let's get one thing
out of the way: This change
doesn't have the potential to
be as severe as the year 2000
glitches, which weren't even
that severe, thanks to the tire-
less work of programmers
who fixed outdated code. But
you can expect a wide variety
of irritations, almost all of
which will be fixable by simply
changing the time.
Most predicted irritations may not
even crop up, as long as you're diligent
about addressing them before the time changes
arrive. Developers of major software products will
provide patches for their programs so that they
continue working correctly, but like most
patches, you'll probably need to down-
load and install some of them your-
self. Other devices with clocks, such
as VCRs, ovens, and watches, also
will need manual adjusting, un-
less you're the type who leaves
the default "12:00" on display,
regardless of the actual time.
We'll also have to hope
that service and utility com-
panies, such as mobile phone
service providers, set their
clocks properly, too. If they
don't, we might get bashed with
peak hour rates when we're not
actually using peak hours. But even
scenarios like these are unlikely because
everyone — including service and utility com-
panies — has plenty of fair warning. I
COOL TOOLS
Easily Code Features Into Apps
Ever wanted Windows Explorer-like file browsing
within your applications but didn't want to deal with
the monumental hassle of coding it? Sky Software has a
solution for you.
Using the company's Shell MegaPack, you can easily
create a Windows Explorer clone to insert directly into GUI
(graphical user interface) forms and dialog boxes, and the
best part is that it requires only two lines of code. With ver-
sions supporting both ActiveX and .NET, this suite of GUI
components supplies every feature that you'll find in
Windows Explorer.
For example, you can integrate views such as Thumbnail,
Details, and Group. You also can implement such features as
drag and drop, context menus, virtual items, and infotips. In
fact, you can go beyond Windows Explorer-like features and
add item filtering, item checkboxes, customized columns,
customized context menus, overlay icons, and more.
Controls included in the MegaPack include FolderView,
File View, ShComboBox, and ShellObjects, and each control
includes samples in various programming languages. These
controls are available separately, but by buying the MegaPack,
you'll save $125 over the price of purchasing the controls in-
dividually. The price for Shell MegaPack starts at $295, and
users can download the package from www.ssware.com. I
Q My Documents
• My Computer
+ .54 3^ Floppy (A:)
1 !^> WinXPsfC:)
wslFree Space: 538 MB
Total Size: 5.72 GB
i & MEDIA (R)
+ t^)MEW(G:)
t Ci)NEW(H:)
+ O Control Panel
+ t-i Shared Documents
Vj My Network Places
sj Recycle Bin
_J New Folder
With Sky Software's Shell
MegaPack, you can create
a Windows Explorer-like
environment that provides
all the same browsing
features (and more) in
your applications.
Smart Computing / November 2005 11
TECH NEWS
THE TECH GRAPEVINE
Here are some of the rumors making the rounds in the tech world:
^^% ^^k — ^^ ^^V I ^^k O nce a blip on the
^al I J ^^k^Jm^J technology news
radar, Google now
spawns legions of speculators who try to predict the com-
pany's next move. One of the more interesting rumors is that
Google is making a major move toward the wireless space.
Of course, part of this story is fact, as Google recently pur-
chased Android, a secretive California-based company that
apparently develops software for mobile phones. According
to BusinessWeek, the company might have been working on a
mobile phone OS (operating system) at one time or another,
but another source claims that a venture capitalist researched
Android as a possible investment and saw a presentation on
an OS for digital cameras. The OS design would converge
cameras with popular media software such as iTunes and
hardware similar to iPods.
Although Google isn't revealing anything about the
Android acquisition, it's possible that the company is going
to pare down its powerful search engine for use on mobile
phones. Another possibility is that the company will use
Android's technology to improve Picasa's compatibility with
mobile devices and software.
Microsoft
According to Transmeta
CEO Arthur Swift, 30
Transmeta engineers are
working with Microsoft
on a secret project, possibly to create a portable media
player or even a portable Xbox. Other speculation points to
Microsoft actually teaming with Transmeta to release chips.
Transmeta has struggled to compete in the processor
world with AMD and Intel, even though it redesigned its
chip architecture to deliver more performance. Linux icon
Linus Torvalds left Transmeta in 2003, a move that some
insiders felt left the company ripe for a takeover by AMD
or Microsoft. We haven't seen that yet, but who knows
what the future holds?
BfiA-rayOfsc
Blu-ray, the next-gen-
eration disc storage
technology that fea-
tures storage capacities
up to 54GB, is on the way, and it's going to cost you
dearly. Insiders say the first Blu-ray recorders on the U.S.
market will run about $1,500, and PC drives will be
roughly $500.
Google has been
looking into pub-
lic Wi-Fi networks,
prompting some to
speculate that the
search giant is plan-
ning to unveil a national Wi-Fi network. Business 2.0
states that it "has learned from telecom insiders that
Google is already building such a network, though osten-
sibly for many reasons. For the past year, it has quietly
been shopping for miles and miles of 'dark,' or unused,
fiber-optic cable across the country from wholesalers such
as New York's AboveNet. It's also acquiring superfast
connections from Cogent Communications and WilTel,
among others, between East Coast cities including
Atlanta, Miami, and New York."
DULY QUOTED
"Wow, you're a smooth talker."
-This message indicates you're truly engaged in your phone conversation and appears in
Jerk-O-Meter, software that analyzes phone speech patterns and voice tones.
Other messages include: "Don't be a jerk!" and "Be a little nicer now."
(Source: Associated Press)
12 November 2005 / www.smartcomputing.com
Don't let misfortune take you down.
Stay safe with Casper XP.
Recovering from a hard disk disaster doesn't get any easier!
Use Casper XP to maintain a bootable backup hard disk and
you'll never have to worry when disaster strikes!
C Creates a fully bootable backup of your
Windows XP hard disk! When disaster strikes,
simply use the backup as a complete and
immediate replacement for your original hard
disk. It's that easy!
C Runs entirely within Windows! No need to
reboot! No need for special rescue media!
C Easy-to-use wizards quickly guide you through
the process step by step!
New Version 3.0! Faster and more convenient than everl
New! Exclusive SmartClone™ technology dramatically
reduces backup times
New! 1-Click Cloning™ and enhanced scheduling make
anytime the right time for a backup
Purchase CASPER XP 3.0 before November 30th and SAVE $5.00*
Use coupon code SC1 1 for Instant savings at www.casper-xp.com
Backup Solution
©2005 Future Systems Solutions, Inc. All Rights Reserved. Casper XP, the Casper XP
logo, SmartClone and 1 -Click Cloning are either registered trademarks or trademarks of
Future Systems Solutions, Inc. Other product and company names may be trademarks
or registered trademarks of their respective holders. * Offer expires November 30, 2005.
Future Systems Solutions, Inc.
0420 S 500 East
Bluffton, IN 46714
U.S.A.
Visit us at www.fssdev.com
With Wi-Fi
phones, such as
this Siemens
GigasetS35,you
can use VoIP
(Voice over
Internet Protocol)
over a wireless
connection to
avoid expensive
long-distance
calling rates.
TECH NEWS
CONVERGENT TECH: PDAs & SMARTPHONES
Wi-Fi, VoIP Phones Prepare Invasion
Even though only 2% of VoIP
(Voice over Internet Protocol)
subscribers worldwide currently use
dual-mode smartphones, In-Stat
predicts that number will jump to
73% by 2009.
In a recent report, the research
firm indicated that dual-mode
smartphones, which support
both cellular and Wi-Fi sig-
nals, will be the catalyst
for mass VoIP adoption
among consumers. The
firm also estimated that
more than 66 million such
phones will be in operation by 2009
and that Europe will be the largest
initial market. According to an In-Stat
survey, more than 80% of businesses
are interested in the technology, even
though mass production isn't ex-
pected until 2007.
Wi-Fi phones operate using stan-
dard Wi-Fi signals to transmit voice
data using the VoIP protocol. Dual-
mode smartphones can be a highly
attractive option for most mobile
phone users because current (and
presumably, future) VoIP calling
plans cost far less than cellular calling
New Products Hardware
Quick takes on the latest hardware and software to hit the market at press time. Manufacturers 1
and publishers' release dates are subject to change, so some products may not be available when
you read this. (Logos indicate products compatible with either Windows or Macintosh only.)
512MB microSD
SanDisk
$69.99
(866) 726-3475
(408) 542-0500
www.sandisk.com
TransFlash-compatible flash memory
with an SD adapter
flu Cordless Desktop
S 510 Media Remote
Logitech • $99.99
(800)231-7717
(510)795-8500
www.logitech.com
Wireless keyboard and mouse combo
that comes with a media remote control
for your PC
Global Executive
Deluxe Case
(#TET005US)
Targus- $109.99
(877) 482-7487
(714)765-5555
www.targus.com
Notebook case with a removable disc
sleeve, retractable blue light, water-
bottle holder, airline-ticket holder, and
file compartment
TransPod for
iPod shuffle
DLO (Digital
Lifestyle Outfitters)
$59.99
(866) 800-4763
'.
miniCase
difusi
$129
(816)361-4054
www.difusi.tv
A case with reinforced gel-foam padding
for a Mac mini or 12-inch PowerBook
Mixx 256MB
Iomega • $59.95
(800) 697-8833
(412)690-2100
www.iomega.com
A small flash-based MP3 player with FM
radio and voice-recordingfunctions
My Little Genius
MyLittleGenius.Net
$39.95
(202) 362-3605
www.mylittlegenius.net
A kids' keyboard and mouse set
designed for tiny hands
www.dlodirect.com
Snap your iPod shuffle into this com-
pact FM transmitter for playback in
your vehicle
Wireless G Travel
Router (#F5D7233)
Belkin • $79.99
(800) 223-5546
(310)898-1100
www.belkin.com
A portable router for creating a wireless
network when you travel
jjiJ Wireless Optical
Desktop
Microsoft -$104.95
(800) 426-9400
(425) 882-8080
www.m icrosoft.com
Wireless keyboard and mouse that
come with PhotoCenter, which adds
image-editing tools to the keyboard
14 November 2005 / www.smartcomputing.com
TECH NEWS
plans. Thanks to the architecture of
IP, long-distance calls don't cost any
more than short-distance calls. For
example, Vonage offers a premium
monthly calling plan for $24.99 that
allows for unlimited calls anywhere in
the United States and Canada, and the
service includes a wealth of free fea-
tures such as voicemail, caller ID, call
waiting, call forwarding, and others.
The biggest stumbling block for Wi-
Fi phones at the moment is the lack of
Wi-Fi saturation around the country.
To use the Wi-Fi mode on a dual-
mode phone, you need to be within
range of a wireless hotspot, which for
the most part limits users to homes
and businesses that have Wi-Fi in-
stalled. Herein lies the beauty of two
modes because users can theoretically
use a cellular signal wherever a Wi-Fi
signal isn't available.
A bright spot for Wi-Fi phones and
VoIP is the continuing talk of munic-
ipal Wi-Fi. Several towns and cities
across the nation are currently con-
ducting experiments to provide city-
wide wireless access to residents. As
this technology matures and delivers
a more pervasive Wi-Fi presence in
areas other than homes, businesses,
and coffee shops, the prospect of
ditching expensive landline phone ser-
vice will grow ever more viable.
Nonetheless, we don't expect tradi-
tional phone companies to sit idly by
as VoIP makes major inroads into
their business. Although there are al-
ready several carriers that provide Wi-
Fi calling plans, companies such as
Verizon, Qwest, and BellSouth have
the capital (and likely, the expertise)
to develop their own technologies that
can help revolutionize the communi-
cations industry even further. I
New Products Software
88
AJC Directory
Synchronizer 2.1
AJC Software
$29
sales@ajcsoft.com
www.ajcsoft.com
Sync your notebook and desktop
computer
®
CodedColor
PhotoStudio 4.2
1 STEIN
$39
info@codedcolor.com
www.codedcolor.com
Image editor with one-click photo
correction, organizational tools, and
batch processing
Sg
Easy Website Pro 2.0
Photon FX Software
$69.95
www.photonfx.net/form
.php?todo=other
www.photonfx.net
Use templates to design your own Web
page, even if you don't know any HTML
Sg
Fax4Word
Addins40ffice.com
$39.95
info@addins4office.com
www.addi ns4office.com
A plug- in that lets you send faxes
through Microsoft Word
sg
HDDIifePro2.5
BinarySense
$29
info@hddlife.com
www.hddlife.com
Monitor your hard drive's status,
including information about individual
partitions
MixBrowser (My
internet experience
Browser) 1.7
Intemalsoft • $29
support@internalsoft.com
www.internalsoft.com
View Web pages, flash animations, and
other online content when you're not
connected to the Internet
Sg
Mylnfo 3
Milenix Software
$49.95
www.milenix.com/contact.php www.milenix.com
PIM to organize projects, documents,
and other reference material
ZsDuplicateHunter
2.2 Professional
Zizasoft
$39.95
(303) 638-9235
i_ — "" ~:::~ "
www.zizasoft.com
Locate and remove duplicate files from
your computer
,
Smart Computing / November 2005 15
TechMates
Paint The Town Red
Most children enjoy ex-
pressing themselves
with pencils, crayons,
and finger paints. Growth and
lack of talent made most of us
relegate that pleasure to the back
burner as adults, but now your
PC and the latest digital tools can
restore that youthful delight.
Drawing, painting, and editing
digital photos can be great fun
with the Wacom Graphire3, an
electronic tablet. While the tradi-
tional mouse is a great input tool,
it is very restrictive for some tasks
such as drawing and painting. The
Wacom tablet solves that problem.
It comes with a pen-like stylus that
is used on the tablet. The elec-
tronic pen is pressure- sensitive, so
when working with a compatible
drawing program, pressing harder
gives you a wider paintbrush or a
darker stroke. It allows you to go
from thin and light to dark and
heavy smoothly and easily. The
pen is so realistic that it even has a
pressure- sensitive eraser on top.
Setup is easy. Install the software
drivers, plug the tablet into a USB
port, and draw. A tutorial walks you through the basics. You
can configure the Graphire3 to your own preferences. Not
only is this way of working intuitive, but it also makes many
tasks such as drawing, painting, and editing photos easy.
The pen stylus is only slightly thicker than an ordinary
pen, and it is ultra light. You can tap the stylus on the pad to
simulate a mouse click. Tap twice for a double- click. The
rocker button on the side can also be used for clicking, or it
can be reassigned for your personal use. I don't want to give
the impression that I make a lot of mistakes, but I have pro-
grammed mine to be an undo button. Besides the stylus, the
Graphire3 also comes with a wireless mouse.
The Graphire3's pen excels when working in drawing pro-
grams, but you can use it in just about any program. The pen
puts no stress on the wrist, so it's a nice mouse substitute for
those with wrist problems.
Happy Little Trees
Wacom hits the bull's-eye with its included software: Adobe
Photoshop Elements 2, Corel Painter Essentials 2, and nik
Graphire3
4-x5-inch, $99.95;6x8, $199.95; 6x8 with Bluetooth, $249.95
Wacom
(800)922-9348
www.wacom.com
Painter Essentials
Only available with purchase of tablet
Corel
(800)772-6735
www.corel.com
Color Efex Pro 2 GE. Photoshop
Elements has good photo tools,
and the Color Efex program has
excellent photo enhancements.
Corel Painter, however, is the
most fun to use with the tablet. It
includes more than 50 pressure-
sensitive brushes and myriad pa-
pers, nozzles, and patterns. You can
use it to edit your photos or create
your own works of art. When I first
tried the Painter program with the
Wacom tablet, I felt like a kid with
the largest ever box of crayons. I was
truly excited to try out the large va-
riety of textures, colors, and special
effects. There were even brushes
that simulated palette knives, air-
brushes, acrylics, chalk, and oils.
The tablet takes some getting used
to. The hardest part was learning to
deal with the tablet's positioning.
Wherever you place the pen on the
tablet, the pointer jumps to the cor-
responding point on the screen.
Also, as with any drawing software,
there is a lot to learn about the pens,
brushes, and drawing tools. It took
me a few weeks of practice before I
created my first masterpiece. Al-
though it will never hang in an art gallery, it is on display in the
transparent photo frame that covers my Wacom tablet. I am
proud of my Picasso-like creation and hope to find more time
to play.
Painter Essentials can also be used for serious photo and
graphics work. Although the Essentials program will keep me
busy for quite awhile, more advanced users may want to up-
grade to the full version, Corel Painter IX ($299, full version;
$199, upgrade), for even more tools and special effects.
The Wacom tablet and pen and the Painter Essentials pro-
gram make digital art fun. They may be just the high-tech tools
you need to recapture the artistic zest of your childhood. II
by Sandy Berger
Sandy Berger is a nationally respected technology author and
computing expert. Sandy's aim is to convey to others in easy-ti
understand language what they need to know to take advanta t
today's technology. Visit her fltwww.compukiss.com or ema\
at SandyB@smartcomputing.com.
16 November 2005 / www.smartcomputing.com
Tech Diaries
No Ordinary Keyboard
Joshua Gulick
Send your comments to
joshua@smartcomputing.com
Cordless Desktop MX 3100
$149.95
Logitech
(800)231-7717
(510)795-8500
www.logitech.com
The MX 3100 Oozes Luxury
Until recently, my wife's keyboard was a
sturdy-but-ancient slab that migrated
from her office to our house when the com-
pany gave its older computers and acces-
sories to employees. We were planning to
build her a computer, so the keyboard was a
welcome gift — at first. The board didn't look
particularly dirty (I cleaned each and every
key with disinfectant — you never know what
lurks on a keyboard), but I was surprised
that she wanted to stick with this fossil (the
keyboard, that is) when she picked out the
rest of the PC's components at a
local shop. She pointed out
that aside from lacking
media buttons (which con-
trol your media player soft-
ware), it was just as good as
any other keyboard.
And for several years, it was. But
when the keyboard finally died and my wife
bought a new, feature-laden keyboard, she
couldn't believe she'd missed so much. For
one thing, she loved being able to change
the computer's volume without reaching
for the mouse. But she also noticed that the
keys offered less resistance than the pre-
vious board's sticky keys. Her new key-
board (a Microsoft Multimedia Keyboard)
proved that higher- end keyboards don't
simply jack up the price; they really do
(usually) offer a better experience. With
that in mind, I reviewed one of the more
expensive keyboard/mouse packages
around: the $149.95 Logitech MX 3100.
Button Madness
If you insist on a steering wheel that
boasts volume control buttons when you
shop for a car, you'll love the MX 3100's
wireless keyboard. I counted 28 extra but-
tons, and that's not including the F keys,
each of which offers a second function
when you press the F MODE key. Despite
the slew of features, I found my way around
the keyboard easily; Logitech groups the
buttons by category. The section that han-
dles communication features, for example,
includes an oversized E-Mail button, which
opens your email program. It also has a
button that activates a Webcam (assuming
you have one) and two IM (instant message)
buttons. I wasn't surprised to see that one of
the buttons starts your IM application, but
the other button caught me off guard: It
changes your online IM status to Away.
I also like the scroll wheel on the left side
of the board, which lets you browse Web
pages without using the mouse. The key-
board's keys don't stick, but they don't
drop to the keyboard when you touch
them, either. Although each user has his
own key- resistance preferences, I doubt
that any typist would complain about the
MX 3100's keys. My only gripe about the
keys is that the CAPS LOCK key is smaller
than the TAB key above it. My finger
missed it a few times before I got used to it.
Super Mouse
The wireless MX Laser mouse uses
Logitech's latest laser technology to move
your pointer with great accuracy. Web
surfers probably won't appreciate the
mouse's pinpoint accuracy as much as
gamers and 3D developers, but anyone who
likes buttons will love this mouse. In par-
ticular, I like the mouse wheel, which tilts
side to side. The mouse wheel also has two
buttons that let you scroll quickly without
dragging your finger across the wheel. The
mouse also has small LEDs (light- emitting
diodes) that indicate battery strength.
Too Cool For Casual
Without a doubt, the MX 3100 is a better
keyboard/mouse combo than many inex-
pensive alternatives. But although feature fa-
natics will love the MX 3100's quality extras,
casual users don't require this souped-up
mouse and might get lost among the extra
buttons. Customers who are unwilling to
spend more than $100 on a keyboard/mouse
combo, but don't want to miss out on this
board's special features, should take a look
at Logitech's MX 3000 Laser. This $99.95
package includes a similar keyboard and
not-quite-as-fancy mouse. II
Smart Computing / November 2005 17
Tech Diaries
Put Data In The Spotlight
LaCie's silverscreen External Hard Drive
Chad Denton
Send Chad your opinions at
chad@smartcomputing.com
silverscreen
$279
LaCie
(503) 844-4500
www.lacie.com
I may have too many computers. Between
the notebook and desktop I have at work
and the notebook and desktop I have at
home, it's not unusual for me to interact
with four computers a day. Perhaps that ex-
plains my infatuation with external hard
drives. I love being able to access important
data regardless of which PC I'm using.
LaCie has a reputation for making sharp -
looking external drives, and LaCie's silver-
screen is a particularly interesting external
drive because it lets you play back stored
media files on a television.
First Impressions
LaCie's silverscreen is remi-
niscent of a PDA (personal digital
assistant), only thicker and a bit
heavier. It's not going to fit into a
jacket pocket, but it's easy enough to carry
around in a notebook case. The drive is
wrapped in silver casing protected by a clear
plastic coat.
Over a USB 2.0 connection, the silver-
screen's 5,400rpm hard drive managed to
transfer 4.48GB of data in about three min-
utes. LaCie ships the drive preformatted
with Microsoft's FAT32 (file allocation
table, 32-bit) file system (which Mac OS X
can access, as well). FAT32 is also compat-
ible with Windows 98SE, but Win98 users
will need to load the drivers from the in-
cluded CD-ROM before using the drive.
The drive can power itself from the com-
puter's USB port. If for some reason the
drive can't draw enough power, you'll need
to use the included USB Power Boost
Adapter. The adapter plugs into the comput-
er's USB port and lets you power the drive
using the included AC adapter. Obviously,
this is less than ideal for a portable drive, but
I had no problems with any of the systems I
used. In fact, the instructions claim that
Windows XP users running Service Pack 2
need to use the Power Boost Adapter, but I
didn't find this to be true.
Data On The Move
I loaded up the 80GB drive with pictures,
music, and a few videos (being sure to place
each file into its proper folder). Although
you can store any file on the drive, it will
only playback supported files. For instance,
all pictures need to be in JPEG format and
must be smaller than 8 megapixels. Audio
files must be in WAV, MP3, MPEG-4 (also
known as ACC, although Apple's protected
ACC music files are not compatible with
this drive), and ACE (Dolby Digital).
Supported video types include MPEG-1,
MPEG-2 (in AVI, VOB, or ISO formats),
and MPEG-4 (in AVI, DiVX 3.11, 4.x, and
5.x, and XviD formats).
We downloaded a number of DiVX video
files to test our drive and had no problems
playing them back. Some clips, however, are
not available in a supported format. You
can either play these videos back on a PC or
use third- party applications to convert
video to a supported format. (I was disap-
pointed that video -conversion software
wasn't included on the CD-ROM.)
Our silverscreen came with a composite
A/V cable that included the standard RCA
jacks. The cable also included an S -Video
connector you can use in place of the yellow
RCA jack. A coaxial SPDIF cable lets you
connect the drive to your home theater
system. LaCie offers other cables, as well, in-
cluding a high- end component video cable.
The interface is easy to navigate, but make
sure you give your files recognizable file
names. The included remote control lets you
navigate the menu from across the room and
select files to play back (although you can't
move any files using the interface).
I liked the speed of the drive, and it was
nice to be able to connect the drive to my
home stereo and play back MP3 files. The
video feature wasn't as cool as I had hoped
because there just isn't a lot of good content
available for download online. If you work a
lot with digital video, however, you'll love
the ability to save the video on the drive and
connect the drive to a television to preview
your work. These features, however, do
come at a price. The $279 price tag is more
than $100 more than the company's stan-
dard USB 2.0 Mobile Hard Drive (which is
also smaller and lighter). II
18 November 2005 / www.smartcomputing.com
Tech Diaries
When You Get A Lemon
The Internet's Vast Vehicle Resources
Kylee Dickey
Send your comments to
kylee@smartcomputing.com
This past year, I discovered that my car
hated me. With less than 35,000 miles on
it, my car turned into a rattling, cash-
consuming, tow- truck- reliant beast. After
spending four months towing my car, dri-
ving rental cars, and paying for costly re-
pairs, it was obvious that something was
horribly wrong. I'll spare you the long,
drawn-out saga. Suffice it to say that it was
one bizarre problem after another. As one
of my editors put it, "Kylee, your car's
problems sound like they came from an
episode of 'Seinfeld.'"
I decided it was time to trade in my
car. Last time, I bought a new car, but
this time, I wanted to buy a used car. I
knew very little about buying a used ve-
hicle, but luckily, today there are many
online resources for car buyers, sellers,
and owners.
Before you sell a car or buy a used car,
research the value of the vehicle. Some of
the most popular sites for value estimates
are Kelley Blue Book (www.kbb.com) and
Edmunds (www.edmunds.com). I found
these sites very useful because I wanted to
buy a car that held its resale value well. It
was also important to me that my next car
be safe. My last car felt like a tiny death trap
and had only one-star side-impact ratings.
By searching the IIHS (Insurance Institute
for Highway Safety) site (www.iihs.org
/ve hicle_ratings/ratings.htm) and the
NHTSA's (National Highway Traffic Safety
Administration's) Safercar.gov site
(www.safercar.gov), I identified vehicles
that had crash ratings of four and five stars,
a huge improvement over my previous
car's ratings.
Finally, I browsed Samarin's.com
(www.samarins.com), a site that has infor-
mation about buying and owning a vehicle.
You'll find tips for selecting a car, haggling
for a price, researching a car's history, and
troubleshooting problems. My favorite fea-
ture of Samarin's.com was a checklist of
things to do while test- driving a used car.
Tricks Of The Trade
The first thing I wanted to know was
how to get a good deal on a car. My
previous car-buying experience was an
embarrassment. I didn't know what I was
doing, and the price I paid for my car re-
flected that.
You can find many Web sites with tips
for buying cars by typing buying a used
car or buying a new car in a search engine
such as Google (www.google.com) or
Yahoo! (www.yahoo.com). You may find
the FTC's (Federal Trade Commission's)
tips at www.ftc.gov/bcp/conline/pubs/autos
/usedcar.htm and www.ftc.gov/bcp/con
line/pubs/autos/newcar.htm useful. The
BBB (Better Business Bureau) also has tips
atwww.bbb.org/alerts/article.asp?ID=432
andwww.bbb.org/alerts/article.asp?
ID=433. Finally, at www.carbuyingtips
.com, you'll find information about
common tricks and techniques sellers may
use during negotiations. You'll also find
strategies you can use to haggle for the
best price.
Fuel Your Knowledge
Even if you aren't buying a new car, you
can find many useful vehicle resources on-
line. Before I traded in my old car, I spent a
lot of time searching Car Talk (www.cartalk
.com) to troubleshoot my various car prob-
lems. This is indeed the same Car Talk that
you may listen to on NPR (National Public
Radio). The site has answers to car prob-
lems and links to general information
about owning and, more importantly,
maintaining a car. Best of all, the informa-
tion on Car Talk is in plain English and
easy for even a nonmechanic to under-
stand. If you have a little more automobile
knowledge, you may want to use a search
engine to find a variety of car- enthusiast
sites and forums, many of which are brand-
or model-specific.
The information I found online helped
me find a car that was perfect for me. I also
learned enough about haggling to easily ne-
gotiate the price I wanted for both my new
car and my trade-in. Now if only the Web
could help with the rising price of gas II
Smart Computing / November 2005 19
Tech Diaries
Digitized Digits
Biometric Security On Your Keyboard
Nathan Chandler
Send insights and insults
to Nathan at
nathan@smartcomputing.com
K4000Verifi Keyboard
$159
Zvetco Biometric
(407)681-0111
www.everifi.com
Microsoft Optical Desktop
With Fingerprint Reader
(bundled with wireless
optical mouse)
$84.95
Microsoft
(800) 426-9400
(425) 882-8080
www.m icrosoft.com
The more we rely on our PCs for day- to-
day activities, from online banking to
email, the more important security be-
comes. That's why biometrics products
continue to garner a lot of interest.
With biometrics -based security, a hard-
ware device uses part of your body as a clue
to your identity. The most commonly
scanned features are, of course, fingerprints,
and a number of consumer keyboards and
mice now integrate fingerprint scanners.
Fingers Are Handy
I tested two products:
Microsoft's Optical Desktop with
Fingerprint Reader and Zvetco
Biometrics' K4000 Verifi Keyboard.
Though these keyboards both have
fingerprint readers, they have little else
in common.
The Optical Desktop has smooth lines, an
elegant black- and- gray color scheme, and
oodles of special functions buttons, and it's
bundled with a wireless optical mouse.
With its bland aesthetic appeal, the K4000
projects a no-nonsense aura of efficiency
and function; fitting, because Zvetco con-
structed this keyboard for business use.
Microsoft's version includes Digital-
Persona Password Manager software
that helps set up the fingerprint
scanner. With this program, I pro-
grammed a logon routine for my
Gmail account. To do so, I loaded the
Web page in Internet Explorer,
pressed the finger sensor, and entered my
login name and password. From then on,
every time I wanted to access my Gmail ac-
count, all I had to do was touch my finger to
the sensor.
You can use this keyboard to log in to just
about any program that requires a username
and password. One problem is that for Web
site logins, you'll have to use IE, as the soft-
ware doesn't work with alternative browsers
such as Netscape or Firefox.
Serious Business
The K4000 integrates AuthenTec's well-
regarded AES4000 sensor, which uses e-
field scanning technology. In short, these
kinds of sensors project a magnetic field
onto your finger to read the sublayer of fin-
gerprint skin, a technique that's supposed
to be more secure and more accurate than
older optical sensor technology.
I installed the Verifi ID Manager soft-
ware (sold separately for $34.95) and con-
nected the K4000 without any difficulty. I
proceeded to register my fingerprints. Or I
tried. This process was more difficult than I
anticipated, requiring me to press and re-
press my finger to the sensor.
Once I set up the software, I tried to log
on to my PC using my print and a password.
Again, the sensor rejected my print multiple
times before it recognized me, a problem
that persisted throughout my tests.
On the other hand, the Verifi ID Manager
software is more powerful than the program
included with the Optical Desktop. Like the
Microsoft product, you can use ID Manager
to consolidate your slew of passwords and use
just a fingerprint (or a combination of your
fingerprint and another factor) to log in to
Web sites, certain areas of your hard drive, or
just about any program. The software is easy
to use, although security novices might be
confused by some of technical lingo.
End Around
The software I used with both products
prevented mischievous users from discon-
necting the keyboard and replacing it. Of
course, if your fingerprint- activated key-
board breaks, it would be hard to access
protected files, a reason both companies
guide you through a setup process that re-
quires either a fingerprint or a password so
you can still access your PC without of-
fering your print.
I liked the the K4000's software and
promises of tight security. But its finger-
print sensor frustrated me to no end.
Microsoft's product is much simpler and
not as secure, but it's also much more con-
venient, and if it's convenience you're
looking for, the Optical Desktop is a hands-
down winner. II
20 November 2005 / www.smartcomputing.com
Because the way your environment looks is often more important than the way it
sounds, music and movie lovers often sacrifice performance for aesthetics.
Problem solved!
ARTCOUSTIC brings both high performance sound and style together in one
harmonious and elegant solution.
ARTCOUSTIC loudspeakers and subwoofers are THIN - as slim as 2.5 inches
- and hang on the wall like pictures.
Interchangeable, acoustically transparent front screens are covered in a choice
of elegant fabrics, or can also be printed with artwork or photography to com-
plement any decor. The cabinet frames come in a choice of finishes, as well.
Explore the world of ARTCOUSTIC - 14 different speaker & subwoofer models, plus
thousands of screen choices - and discover what interior designers, architects, and
audio lovers have in common - www.ArtcousticUSA.com
GROUP Exclusive North American Distributor - 8 77-588-00 75
Tec hno I ogq far Designed Environments www.stjohngroup.com | info@stjohngroup.com
AS! D
industry
partner
Software
Head-To-Head
Media Players
— »—«" -■—'-— /I— >- _J
-
r
^
Let The Music Play
Top Media Players For Audio & Video
You've done most of the work. You
downloaded and/or transferred those
awesome tunes and treasured home
movies onto your PC, so you have just one
more task to complete before
you can click Play: Choose the
best media player for your
needs. Media players are essen-
tial to playing and organizing
your audio files, and finding the
right media player is the final
but crucial step to fully enjoying
them. And getting just the right
software won't cost you a thing
because there are several free,
well- designed, and robust appli-
cations to choose from.
Buying Tips
Sure, the best things
in life may be free, but true
audio and video enthusiasts
may want to skip right over
the free versions we mention
here and invest in paid pro-
grams for access to enhanced
content and features. But be-
fore you do, we recommend
that you try out the free
version first to make sure the
interface and features suit
your personal style and needs.
RealPlayer 10
RealNetworks was one of the pioneers in
Internet audio (the company was the first
one to popularize streaming audio over the
Web), so you might suppose that the latest
version of its media player, RealPlayer 10,
has all-inclusive audio capabilities. Well,
you'd be right. The player supports practi-
cally any audio file type you can think of,
including MP3, WAV (Wave audio file, a
standard PC audio file format Microsoft
developed), and WMA (Windows Media
Audio), and copying these files from your
PC's hard drive into the player is as simple
as clicking a couple of buttons and waiting a
few moments for thousands of clips to load
into the RealPlayer library. Once you finish,
you can instruct the player to watch for new
clips arriving on your hard drive and auto-
matically import them into the library.
The player plays other audio clips, as
well. Play audio CDs — even burn them to
discs if you'd like — or sync up your iPod or
other portable media player to hear those
songs. Listen to a variety of rock, classical,
blues, and news radio stations from within
the player. Or, preview thousands of songs
in the music store and download them
for 99 cents each (or $9.99 per album).
Playback quality features 5 -channel audio,
high bit-rate encoding for copying CDs,
and RealNetworks' TurboPlay technology
for speedy audio streaming over a variety
of Internet connection speeds.
The high-quality and near-universal
playback extends to video, as well. Playback
is crisp and clear, and the player can read
QuickTime, MPEG, and DVD files, among
others. When viewing streaming video, the
LivePause feature lets you pause, rewind,
and fast- forward through a clip while you
play it. Put RealPlayer into Theater Mode
to view a full- screen display, adjust audio
controls such as equalizer or crossfade as
you watch a video, or surf the Web at the
same time with the built-in browser.
The software is all wrapped in an inter-
face that makes it relatively easy to find
what you want. We were slightly confused
when we first tested the software until we
realized that the full player is composed of
two windows, one called RealPlayer and the
other called Media Browser, but once we
understood how the two work together, it
was easy to organize files, listen to music,
and watch DVDs (provided you have a
DVD drive) and other video. And if you
don't like the appearance of the default in-
terface, simply change it by downloading
the House Of Flying Daggers skin or any of
the hundreds of other skins.
If you're willing to spend a little money
on your media player, you might want to
take advantage of RealPlayer's premium
services. Upgrade to RealPlayer Plus
($19.99) for features such as advanced
video controls; SuperPass ($12.99 per
month) for games, ad-free radio, and short
films from iFilm; and Rhapsody Unlimited
($9.99 per month) for unlimited access to
more than a million songs.
Winamp 5.09
If media players were rated solely on a
hipness scale, Winamp 5.09 would be at the
top of the list. This media player has atti-
tude — and lots of it. From the aristocratic,
headphone-wearing llama on the home
page to the 1950s All- American family
gracing other pages throughout the site, the
22 November 2005 / www.smartcomputing.com
Reviews
Buying Tips
In our ever-increasingly
portable world, it's critical to
make sure the media player
you select for your PC interacts
with your portable music de-
vice. You may love the ease of
use of Windows Media Player,
for instance, but if you own
an iPod, you'll probably be
frustrated when the software
won't allow you to download
songs from your library onto
your portable device. Check
the device manufacturer's site
for compatibility listings.
Winamp site lets you know
that you've arrived at the
home of, in its words,
"super-hot-uber-geeks."
That attitude is backed up
by a media player with a
cool feature set. This player's
strength lies in its audio ca-
pabilities. Once you've
copied songs from the hard
drive into the player's li-
brary, you can sort accord-
ing to a number of tags, including artist,
title, album, length, genre, year, and when
you last played a song. If you don't know
some of that data, click a Search button to
search online for additional information
from such sources as news articles, fan sites,
and biographical data. In addition, you can
perform a search of your hard drive to look
for tracks to add to your library.
Another key component of the Winamp
player is the playlist feature. Drag and drop
songs from either the library or Windows
Explorer into a playlist, and move a song
within the list with just a couple of clicks.
Other management tools include the ability
to import or export playlists, sort playlists by
title and file name, and send playlists to a
CD burner. Not only can you burn CDs at
speeds up to five times the speed of play-
back, but you also can use the software to rip
CD tracks onto your hard drive (keeping in
mind the legalities surrounding owning and
copying songs, of course). And when you
need a change from your own music, tune in
to any of the more than 4,000 Internet radio
stations you can access via the software.
Internet "TV" stations also are available
to users. Sure, you can watch movie
trailers, but the most interesting content, in
our opinion, is the music video clips.
Nullsoft, the makers of Winamp, claims to
possess the world's largest music video
archive. At last count the archive numbered
10,922 items, and updates are added each
day. If you have a hankering to watch
Aerosmith perform "Dude Looks Like A
Lady" or check out videos from alternative
groups such as Collective Soul and the
Deftones, this is the place to be.
And when you watch those videos, be
sure to look through all the different skins
that can surround them. The Winamp site
presents 18 categories of downloadable,
free skins, and you can download themes
from Super Mario World to Dukes Of
Hazzard to Old Mac-OS, the latter of which
is reminiscent of bygone computing days.
Winamp also comes in a Pro version.
For $19.95 you can upgrade the player to
include such features as MP3 encoding,
which lets you rip your music CDs to create
MP3 files; unrestricted CD burning, which
lets you burn your CDs at up to five times
the speed that's available in the free
Software Information
Price
Company Contact Information
URL
RealPlayer 10 Free
Winamp 5.09 Free
Windows Free
Media Player 10
RealNetworks (800) 444-801 1
(206) 674-2700
Nullsoft N/A
Microsoft (800) 642-7676
(425) 882-8080
www.real.com
www.winamp.com
www.microsoft.com
Scorecard
Performance
Ease Of Use Installation Documentation
Price
Overall Score
RealPlayer 10 5
Winamp 5.09 4
Windows 4.5
Media Player 10
4.5 5 5
4.5 5 4
4.5 5 4.5
5
5
5
4.9/5
4.5/5
4.7/5
Smart Computing / November 2005 23
Reviews
Buying Tips
Do you rely on your media
player solely for audio
purposes? If so, don't limit
your options to the three
media players profiled here.
There are several free,
high-quality applications
on the market that focus
only on audio playback,
including Sonique 1.96
(sonique.lycos.com).
V- ,
version; and unrestricted CD ripping,
which lets you quickly take your CD music
files and convert them into digital files.
Windows Media Player 10
More than 10 years ago, we wrote an ar-
ticle in Smart Computing about how you
could join the "multimedia revolution" by
playing audio and video files on your PC,
thanks to Media Player. Windows 3.1 users
with a sound card could take advantage of
their computer's ability to play MIDI
(Musical Instrument Digital Interface) files,
WAV files, and audio CDs, with a little bit
of knowledge and work.
How times have changed.
Yes, Microsoft still pro-
vides a built-in media
player, but its latest ver-
sion, Windows Media
Player 10, is much, much
easier to use.
Yes, you can use the player to listen to
your favorite audio CDs, but Windows
Media Player 10 handles more file types, in-
cluding, of course, MP3 files. Copy audio
files into the library, where you can sort by
title, artist, album, rating, genre, and more.
And not only can you listen to the files, but
you also can organize them into playlists,
copy them to CDs, create them by ripping
CDs, or download them to portable media
devices. Windows Media Player currently
supports more than 70 portable players,
and you can sync your files manually or au-
tomatically. (If you aren't sure if Windows
Media Player is compatible with your
portable media device, you can find out by
visiting www.playsforsure.com.)
One of our favorite features is the library's
organizational tools. You can configure the
player so that it monitors your hard drive
and automatically updates the library's con-
tents accordingly. You can quickly search
media files and rate songs as favorites,
making them easy to find. The Advanced
Tag Editor lets you manually add all sorts of
information to incomplete files, including
artist names, lyrics, pictures, and comments,
and the player will automatically gather
whatever missing information it can from
the Internet via the Auto Info option.
Windows Media Player also offers third-
party audio content. The Radio button
features more than 3,000 radio stations.
You can rate the music you hear, and
Microsoft will take those ratings and create
recommendations that you like. (This
feature requires an MSN [The Microsoft
Network] account.) Or, click the Music
button to check out the music store, which
carries what Microsoft calls the world's
largest music collection. Here, you can
preview songs or purchase them to down-
load at 99 cents apiece.
Windows Media Player offers significant
video-related features, as well. The Guide
button links to a Web site that presents
video clips — watch a comet or view zany
antics from StupidVideos.com — and the
Video button lets you watch nearly 900
music videos. Another plus is Windows
Media Player's ability to act as a DVD
player; with a DVD drive on your PC, you
can view full-screen movies. Plus, all of
these video and audio features are placed
into a simple, streamlined interface.
And The Grammy Goes To . . .
Even though all three of the media players
we reviewed for this article are high-quality
applications, we were particularly impressed
with RealPlayer 10's crisp playback, rich fea-
ture set, and widespread portable device
support. Therefore, we're awarding it this
month's Smart Choice award. II
by Heidi V.Anderson
November 2005
Smart Choice
RealPlayer 10
24 November 2005 / www.smartcomputing.com
Getting sir I us 1k ? Going ™ :: t .:s li " ?
Do It Times 3!
Three Doors Dow
playing here
SRX-3
XM-3000
Looking at adding satellite radio? With the huge variety of professionally programmed
music, sports and entertainment channels, there's a lot to choose from. The real challenge becomes
ref ereeing the battle of who gets to listen to what. Only now you don 't have to !
Introducing TripIePlay, the only satellite radio receivers to offer XM or SIRIUS listeners the
option of playing three radio stations simultaneously. So whatever your families listening tastes,
now you can have up to three different radio stations playing to different rooms over your whole-
home audio system at the same time.
So whether Jr. wants to listen to his favorite sports team, you want to listen to your favorite
classic rock-n-roll, or your daughter wants to hear the latest from Ashley Simpson, nobody has to
compromise. TripIePlay is the solution you've been looking for.
To find out where you can get a TripIePlay near you, call Antex at 1-800-338-4231
or look us up at www.antex.com
>— ANTEX
yi5 ELECTRONICS
1125 West 190th Street, Gardena, CA 90248
ph 310.532.3092 • fax 310.217.8479
Software Reviews
Multimedia
iView MediaPro 2
iViewMediaPro2
$199.99 ($49.99
for standard version)
iView Multimedia
info@iview-multimedia.com
www.iview-multimedia.com
i
- iView Media Pro
Media management made easy
Scorecard
Performance 5
Ease Of Use 4
Installation 4
Documentation 3
Price 3
Overall Score 3.8 / 5
f you are a digital media buff with a
rapidly growing library of poorly orga-
nized files, you are a prime candidate for a
media organizer. iView MediaPro 2 and its
lighter-weight cousin, iView Media 2, give
you a lot of muscle to flex.
With iView Media or iView MediaPro,
you can quickly import and catalog an array
of file formats, including images, audio,
and video, from digital cameras, hard drives,
CDs and DVDs, or even Web sites. Import-
ed files display in a grid format similar to
what you'll find with the thumbnail display
mode in Windows XP. A second tabbed op-
tion lets you switch to List view, which lists
cataloged files by name with pertinent infor-
mation such as file size and pixel height and
width (images) or duration (audio or
video). A third tab switches you to Media
view, which generates a large display (for file
types with a visual component) of the cur-
rently selected file.
iView's import feature is much faster
than those of some competitors. In our
tests it imported more than 300 high-reso-
lution files from a CD (nearly 300MB total)
in less than two minutes. iView owes its
import speed to the fact that it doesn't
physically copy or move the files in folders
you import. Rather,
it creates a single file
that holds information
about the entire im-
ported collection.
Users with large li-
braries of files on CD or DVD will love this
feature, as it lets you catalog those media
without consuming precious storage space
on your hard drive. You can open any cat-
alog — including those created from media
no longer present on the system — and scroll
through the file list or view any available
thumbnails. (To view or edit an individual
image, you must have access to the original
storage medium.) With a few clicks, you can
also copy a group of cataloged files to a new
location, and iView will give you the option
of deleting or saving the originals and of
changing the catalog pointer (from the orig-
inals to the new copies) or leaving it intact.
Both iView Media and iView MediaPro let
you automate the creation of PDF (Portable
Document Format) files, slideshows, movies,
Web galleries, and other presentations from
your files. You can also batch rename or resize
files (handy for sharing images over email or
on the Web), play back audio or video files
from within iView, and perform advanced
searches based on default or custom criteria.
iView has a few quirks that are irritating
at first, but not insurmountable. When you
import a folder, iView automatically im-
ports files from subfolders, as well, but
without maintaining the organizational
structure. For example, if you import a
folder called IMAGES containing 10 sub-
folders with files categorized by event, iView
will automatically dump all the files from
every subfolder into a single catalog, leaving
you to reorganize them.
Additionally, iView imports files into any
currently open catalog rather than asking
you where you want the new thumbnails
stored. To keep your images properly cate-
gorized, it's best to close open catalogs be-
fore you start a new Import session. A final
issue is that the Help utility is Web-based
and not very helpful. You'll get more benefit
by downloading the User Manual (PDF
format) from the Support area.
The differences between iView Media and
iView MediaPro may be negligible to the av-
erage user. Power users, however, may see a
benefit with Pro. It supports import of a wider
array of files than does iView Media. These in-
clude RAW (uncompressed), Adobe Acrobat,
postscript, and font files. It also offers a batch
file-format conversion tool. Furthermore,
iView MediaPro lets users filter the import
function by criteria (such as file type, size, or
creation date) to restrict the import process.
A final advantage of Pro is the inclusion of
a limited-function image editor. However,
users interested in Pro will likely have a more
robust image-editing program already. Both
versions offer a free, limited trial version, so
give Pro a spin before you decide which ver-
sion is right for you. II
by Jennifer Farwell
26 November 2005 / www.smartcomputing.com
Software Reviews
Vanquish Anti-Spam 3.1
$24.95 (one-year subscription)
Vanquish
(508) 486-9040
www.vanquish.com
iff WV M
TOO HAVE TO k 1
WOHaTABOOT.r
SPAM
IS HO LONGER
ONE OP
THEM*
*
2i\
mm?\Z
j
BMAte^J
Security
Vanquish Anti-Spam 3.1
With spam at an all-time high, PC users'
desire to tame this beast is reaching the
point of desperation. One company that takes
an unconventional but effective approach to
spam control is Vanquish Labs.
At its core, Vanquish Anti-Spam is a chal-
lenge-based solution, whereby an unknown
sender must respond to a reply challenge be-
fore you will receive his email. Vanquish adds
a twist called Bonded Email. If a Vanquish
user sends a message to another Vanquish
user, he puts up a 5 -cent bond asserting the
message is legitimate. (Vanquish gives new ac-
counts a small balance.) If the recipient deter-
mines the message is not legitimate, he keeps
the nickel. If he accepts the message, the
sender receives a Trust Bond and pays no
more. The concept is intriguing, but one won-
ders how many spammers would sign up for a
service that may cost them.
Even without Bonded Email, Vanquish
Anti-Spam can be highly effective. To protect
your accounts, you configure the email client
to forward all mail to Vanquish. (Alternately,
you can provide your server information to
Vanquish, but it prefers the former option.)
Vanquish uses your Address Book to create
an Allowed List of senders that will get
through to you without challenge. If someone
not on your Allowed List sends you a mes-
sage, Vanquish blocks the message and sends
a challenge. If the sender replies to the
challenge, Vanquish delivers the message.
Vanquish can expand your Allowed List with
the address of anyone to whom you send mail
as well as anyone who responds to challenges.
If a sender doesn't respond to a challenge,
you never see the original message. To reduce
the incidence of erroneously blocked mes-
sages, Vanquish allows through emails that
match the subject matter of your most recent
sent messages, as well as any coming from se-
cure Web sites you visited. The stringent ap-
proach of Vanquish may be overkill for some
users. Take advantage of the 15-day free trial
to decide if it is right for you. II
by Jennifer Farwell
Writing
AbiWord 2.2.9 AWWOfd 2.2.9
Free
N/A
abiword-user@abisource.com
www.abisource.com
QfeHaS^xrft/ie SIG](P «Ql= 3fl>
AbiWord 2-0-ThflNaxt Step
New feature* in 2,0
•**•*«*■• •"'"-a— •
'— 1 b^*d*-
*,.„,:
-,......,,•... 1
Ufa* 1
Scorecard
Performance 4
Ease Of Use 5
Installation 5
Documentation 2
Price 5
Overall Score 4.2 / 5
Do you chafe at the hold Microsoft has on
the office productivity market? If so,
you join a growing core of users who want
an alternate option. A large group of
programmers have banded together to
create AbiWord, a free word processor.
Before you jump with joy, consider
the limitations of such a product.
AbiWord is a GNU Free Software pro-
ject, which means volunteers developed
it. Anyone can download and use it
and even customize and redistribute it.
However, there is no company to which
you can appeal for support.
AbiWord has garnered a lot of posi-
tive press and has an enthusiastic user
community, so we're not suggesting you will
have problems. Rather, we want you to un-
derstand the rules before you play the game.
AbiWord is comparable to Microsoft Word
in functionality and even includes advanced
features such as Mail Merge, footnoting, ta-
bles, and more. It also has a built-in spell
checker, although some users have reported
that it is not as accurate as Word's. It is com-
patible with numerous word processing for-
mats, including Word, WordPerfect, and
OpenOffice, as well as rich text and HTML
(Hypertext Markup Language) formats.
Another benefit of AbiWord, especially for
users with older systems, is its minimal system
requirements (Windows 95 or later; 486 or
later processor; 16MB of RAM, and 20MB
hard drive space). Yet, you can customize and
expand it with a variety of add-ins.
AbiWord has an interface that is similar to
Word, so it won't confuse Microsoft users.
Unlike many open-source programs, it installs
from a wizard-driven EXE (executable) file.
The biggest drawback is the lack of a struc-
tured support system. However, you can
download a User Manual, peruse the FAQ
and Knowledge Base, and join a helpful user
group at www.abisource.com/support. II
by Jennifer Farwell
Smart Computing / November 2005 27
Software
Reviews
The Fax Of Life
Snappy Fax 2000 vs. WinFax Pro 10.0
If you're not quite ready to give up faxing documents,
but would really love to gain desk space by getting rid of
a device, consider using PC-faxing software. Snappy Fax
2000 ($19.99; www.snappysoftware.com) comes at a
very reasonable price, and you can try it free for 30 days.
Its user interface is a bit cluttered, but you can access
nearly all of its functions from any screen using small
icons near the top of the screen. WinFax Pro 10.0
($99.95; www.symantec.com), on the other hand, has a
cleaner user interface Outlook users will find familiar.
Snappy Fax 2000
Home Screen & View Previously Sent
Manage your Snappy Fax address book by adding or removing contacts.
You can also import or export your contacts to keep this address book in
sync with your address book from Outlook or another program.
Regardless of which view you are in, you can initiate a manual send or
manual receive of a fax.
In addition to creating new documents to fax, Snappy Fax lets you scan
existing documents (using a compatible scanner) and fax them.
Design and edit custom cover pages with the Cover Page Designer tool.
View a list of all previously sent faxes, along with information on whether
they were successfully sent.
View a previously sent document one page at a time. Double-click a doc-
ument to edit and/or resend it.
Compose & Send A Fax
j» m & IS D l^mS Capture Models Off & ?. SJ - % - App
ication Files "2W -
fi£ H & Q Receive Mode i S Off % ?
§g Sent(Fl) |3g Received ( F2 ) [■§[ Virtual Faxes ( F4 )
Bring up the Send dialog box and enter the recipient's information or
choose a recipient from an address book.
Add pages to your fax from documents on your computer.
Easily switch among composing a fax, viewing previously sent faxes, re-
ceived faxes, or virtual faxes.
View a large picture of the fax you are about to send.
Use these buttons to insert edit marks on your fax. You can highlight text,
include notes, stamp a document, remove speckles, and much more.
Recognize the text in an image using OCR (optical character recogni-
tion), so you can edit it as regular text.
See ordered thumbnail pictures of each page of the fax you are composing.
28 November 2005 / www.smartcomputing.com
Both programs can send faxes to email, but WinFax
Pro can also double faxing capabilities by using two
modems and two phone lines to send or receive faxes.
by Jennifer Johnson
WinFax Pro 10.0
Home Screen & View Previously Sent Faxes
^Outbo*
& Receive Log (1
V
^N
Fax: 4792104
Details:
0of4page( S ) 5 ent
min 10 sec at
Call cancelled on last attempt
: :■
S3»e(s), unread
H|| Mault
|lO:44AM
Switch among your Outbox, Receive Log, Send Log, Cover Pages,
Phonebooks, and attachment list using this static navigation bar.
Create a new fax in this screen.
Open the highlighted message in its own window or run OCR on the
text.
The View status lets you see which faxes were successfully sent.
Sort and view a list of all faxes you've previously sent.
View and create various cover pages to match the tone of your fax.
Glean additional information about a particular fax via three views:
Details, Fax View, and Thumbnails. The Details view gives you a
quick text summary of when the fax was sent, its recipient, and the
number of pages associated with that fax. Fax view lets you see the
fax in full size. The Thumbnails view presents small thumbnail pic-
tures of each page.
Compose & Send A Fax
Send, preview, or email your fax or attach additional documents to
the fax you are preparing.
Select a recipient from one of your phonebooks, including phone-
books that are shared across the network.
Enter the name, number, and company of your recipient here or se-
lect an existing contact from a phonebook.
Edit and preview the fax you are preparing to send.
Choose from numerous cover pages to find one that fits your fax.
View thumbnails of your fax and reorder the pages by dragging and
dropping the pages.
Smart Computing / November 2005 29
IMPULSE/ v ITEMS
Compiled by Joshua Gulick
See it, like it, buy it.
Impulse Items are
products that
quicken your pulse
and capture your
attention but won't
make you dig too
deep into your
wallet. Check these
pages each month
for the latest
interesting and
inexpensive
computing items
we've run across.
Absolut
BEGiNNER's
Guide
Microsoft
Windows XP
Second Edition
Cool Stuff For $25 Or Less
m
Circuit T-shirt
We love motherboards. We test
them by the dozen for our sister
publication PC Modder, and we
even devoted an entire Reference
Series issue to motherboards (or
mobos, as we affectionately call them)
last year. So it's no surprise that we couldn't
take our eyes off Computer Gear's brand-new
Circuit T-shirt (www.computergear.com),
which features a circuit design. If you've seen
the dark- and light-green pathways that can-
vas a green, silicone motherboard, you'll rec-
ognize this pattern right away when you see
the tee. The shirt is available in medium,
large, and XL for $24.95 and XXL for $26.95.
Find the Circuit T-shirt in Computer Gear's Techie T-Shirts section.
GrapeBerry Organizer/Phone
We rarely get excited about PDAs (personal digital assistants) for
are toys rather than functional devices. But Sakar's GrapeBerry
Organizer/Phone (www.sakar.com) is unusual; it works.
The device has a (tiny) keyboard and a small screen
that displays text. Kids can keep a schedule and
store their friends' phone numbers and email
addresses in the GrapeBerry, but we doubt they'll
like this feature as much as the built-in phone.
That's right; the GrapeBerry connects to a phone
wall plug via an included telephone cord. Kids
can use the phone by attaching the device's ear-
piece/microphone. Sakar doesn't sell the GrapeBerry from
its Web site, but it's available at KB Toys and Wal-Mart for about
children because most
$20.
Absolute Beginner's Guide
This book isn't nearly as wordy as its title. "Absolute Beginner's Guide To Microsoft Windows XP
Second Edition" ($19.99; www.quepublishing.com) has tons of screen shots that let users see rel-
evant dialog boxes and icons as they read about basic computing tasks. As the title of her book
implies, Shelley O'Hara assumes her readers have never used Windows XP (or any other
Windows operating system). She starts by identifying the Desktop's basic features and then
shows how to start programs. The book steadily guides readers through the simple activities,
such as protecting a PC from viruses and working with pictures. Experienced PC users won't
enjoy this book (unless they want a quick confidence boost), but newbies will keep it next to
the keyboard, right next to the latest issue of Smart Computing. Find it by clicking the Bookstore
tab and then clicking Series and Absolute Beginner's Guide.
30 November 2005 / www.smartcomputing.com
CD/DVD Repair & Clean
CDs and DVDs are pretty tough: If you drop one, it probably won't break and may not even
scratch. But they're not completely scratch resistant, which means that sooner or later, you're going
to find that your favorite music CD skips. You can fix many of these scratches with TDK's CD/DVD
Repair & Clean (www.tdk.com), a kit that includes special disc-friendly polishes and a cleaning
cloth. We like the DVD-case that stores the polishes; you can slip it into your DVD collection, so
you don't lose track of it. TDK doesn't sell the cleaning package from its Web site, but you can find
it at online electronics retailers, such as B&H (www.bhphotovideo.com), for about $8.95.
o
TuneJuice
Every once in awhile, we
find a product
name that is more
interesting than
the actual product. TuneJuice
($1 9.99; www.griffintechnology.com)
could be (should be) a band or an exotic
drink served during a concert. But the
TuneJuice handles a very mundane (if not
unimportant) task: providing backup power to iPods.
The iPod, by the way, is the little, portable, digital music
player that gave the Walkman a firm kick out the door.
It comes in various sizes (including the iPod mini), but
all iPods can store hundreds, if not thousands, of songs.
Not surprisingly, users run out of battery power long
before they can listen to their entire music collection.
According to the whizzes at Griffin Technology, the
TuneJuice (which uses a 9-volt battery) connects to the
iPod and the iPod mini and adds four to eight hours of
battery power.
Electronics Pouch
Mobile phones, cameras, portable
digital music players, video games,
PDAs — kids carry more gadgets
today than they used to. If your
favorite techie loses those expen-
sive gizmos too often, take a look
at Bytes n' Grins' Electronic Pouches
($8.95; stores.yahoo.com/bytesngrins). '
bags feature a plush animal head and soft I
that won't scratch sensitive electronics. Each bag
has a drawstring top and adjustable backpack straps, but don't
mistake this for a full-sized book bag; this satchel won't hold many
textbooks. Bytes n' Grins offers the bag in three styles: Cheetah,
Puppy, and Tiger. You can find the bags in the site's Computer
Theme & Novelty Wearables section.
CD Holders
Never lose your favorite music or data CD again. Bytes n' Grins
(stores.yahoo.com/bytesngrins) offers a variety of CD and
DVD holders that can handle as many as 10 CD or DVD
jewel cases (the flat, plastic containers that shield discs
from minor scratches). Some stand vertically, such as
the Ladybug Princess Fairy, while others carry your
precious cargo horizontally on their backs. You can buy
any holder for $13.95. Find these funny little CD hold-
ers in the Desk & Office Stuff section of the Web site.
If you don't see the model you want on the Web site
(the girl CD holder instead of the boy CD holder, for
example), call Bytes n' Grins at (800) 594-1369.
Smart Computing / November 2005 31
^/jWindows ™
*
& TRICKS
WinXP & Alternative Browsers
SIjc jXrtu JJork Sunt*
It's common to find freeware
that adds functionality to
Windows XP. It's a lot less com-
mon to find even one freeware
app that improves upon one of
Windows' built-in applications.
So it's truly serendipitous
that there are three excellent,
even preferable, freeware alter-
natives to Microsoft Internet
Explorer, the built-in browser
most WinXP users opt for.
Each of the alternative brows-
ers we'll cover — Firefox 1.0.6,
Netscape 8.0, and Opera 8 — in-
cludes convenient features you
can't get in IE without upgrading
to WinXP Service Pack 2 or
downloading specialized freeware plug-ins. Each offers
tabbed browsing that lets you open and easily switch
among multiple Web sites within the same browser
window (instead of opening separate instances of the
browser for each new site, as IE requires). Each will let you
download free upgrades, at least for the foreseeable future,
whereas you won't be able to get the next version of IE
without purchasing the next version of Windows, Vista,
scheduled to be released sometime late next year. And
each offers the significant advantage of not being IE and
therefore not the primary target of malware authors and
online poachers.
Mozilla Firefox 1.0.6: Basic, Secure Browsing
Don't let the release number fool you: Firefox has
been around for a while. It began in 1998 when Net-
scape launched Mozilla.org, an open-source software
project. Mozilla. org's first browser engine, Gecko,
powered Netscape until AOL Time Warner purchased
Netscape and cut Mozilla.org loose. Since then,
Mozilla.org evolved Gecko into Firefox, which powers
Firefox and the current version of Netscape.
At first glance, Firefox looks like IE with different but-
tons; the only obvious visual difference is the Google
search tool built directly into Firefox's toolbar. Once you
start surfing, you'll notice the convenience of Firefox's
tabbed browsing. The pop-ups you get will probably
have decreased, thanks to the rock-solid pop-up blocker.
Firefox, the most secure but barest of the freeware
browsers, includes tabbed browsing and pop-up
blocking but can't display ActiveX components
(such as the missing Markets graph in the top-right
corner of The New York Times home page).
But it's an intangible fea-
ture — security — that has users
flocking to Firefox. The brows-
er blocks all ActiveX or VB
(Visual Basic) scripts, which
are spyware and virus writers'
two favorite mechanisms for
infiltrating your computer. The
only drawback to this script
blocking, which you cannot
override, is that you won't
be able to see or use legiti-
mate ActiveX features. In most
sites that utilize such features,
though, ActiveX is limited to
graphics or drop-down nav-
igational menus, which are
rarely essential.
It's no surprise, then, that corporations, which have
had about all the malware they can stand, are pushing
users toward Firefox — one big reason that Firefox is
currently the alternative browser making the biggest
dent in IE's market share. Of course, the more popular
Firefox becomes, the more likely it is that malware au-
thors and online scammers will start devising ways to
attack it. Even as we went to press, Mozilla.org had just
identified a potential security hole and issued a patch.
But by eliminating the two biggest weapons from these
miscreants' arsenals, Firefox figures to remain the safest
browser for some time to come. You can download
Firefox at www.mozilla.org.
Netscape 8.0: More Bells & Whistles
Netscape, as you may have guessed from the histor-
ical synopsis above, is a much more polished version of
Firefox, packed with toolbars, buttons, and other fea-
tures that can save you time. Take, for example,
Netscape's My Sidebar feature: It gives you access to
the key capabilities in sites such as WeatherBug
(www.weatherbug.com) and MapQuest (www.map
quest.com) without having to actually visit those sites.
And if you're concerned about privacy, you'll love
Netscape's eraser button, which lets you clear your
Address Bar, cache (temporary Internet files), cookies,
or all of the above with two clicks. (And without bur-
rowing through a multitabbed Options dialog box.)
32 November 2005 / www.smartcomputing.com
Netscape's interface is packed with timesaving
features, including a sidebar with shortcuts to
Web features such as MapQuest and single-click
buttons for clearing your Web tracks.
Netscape isn't as inflexible
about security as Firefox; it
doesn't block ActiveX and VB
scripts by default. Instead, like
IE, it strives for the best pos-
sible mix of browsing fidelity
and security, so you can see
sites as they were intended to be
seen, while minimizing your se-
curity risk.
The good news is that Net-
scape does a much better job
than IE. Rather than forcing you
to configure a Restricted zone
and manually assign suspicious
sites to it, Netscape maintains
and continually updates its own
blacklist of sites known to dis-
tribute spyware or viruses or to
phish (trickery used to glean
vital information from users for
nefarious purposes) for Social
Security or credit card numbers.
Surf to one of these sites, and
Netscape blocks it by default. If
you override the block, Net-
scape refuses to let you live dan-
gerously, blocking any ActiveX
or VB scripts or cookies the site
has to offer. Even better, when
Netscape encounters a site de-
signed primarily for IE, it will
actually use the IE engine to open the site — but only if
the site is on Netscape's built-in, automatically updated
whitelist of approved sites. The result is simpler security,
and the simpler security is, the less likely you are to
make mistakes that leave you vulnerable.
About the only thing Netscape doesn't have is a built-
in RSS (Really Simple Syndication) feeder. (IE doesn't
have one either, but Opera, covered in the next para-
graphs, does.) But you can download an RSS reader easily
enough (a quick Google search will provide a multitude
of download options). You can download Netscape at
browser.netscape.com/ns8/download/default.jsp.
■39
She Mrtii JJotjk Sunt?
I. ill. -:i '_ > ••!
-., ..I! ■-!., lilj
:■ y.:-.:::-i: olackm^ .-.■:--■=-
r««Hi«, tattf f hM(P nil hf id»riji n p*rr, A l*M M™- in K,.™
*K-"" "■■—•■' n-.n,, i .
!'.■■.!.■; -V; .•■■,,!- •■ ,. ■■,-
_j!rwp
^||a lirauUl t>k lt t 1 ..._ J n^u^uji,... j
a
Links - * *
«■-«-.-. CI «n» ■ -
*
a^Qs-.-
££? glje Jfrtu Jlo rk Eimes f
■mMi
w«
£££
sl nHH ~" ,'^zr m ""^ ian i
W
**"
.mm B115I1 Appoint; mm^ ™- ™*. iu*,ti
Q]^^H Bullcn as 1 ".N. 1 1 .« vxm .- jMa ,
Ufa
!£h«hjh
•■it- ■-":■ Bypassing LnKcHL ^fci 1 "■*- — **
r! . .. ' ' L^kBk ^N ^^^*^P
ma
iiiffiju ^^BF- uK 1 ^™ ia " , ' : ^^
pros
HlliS™ Tn-F»r-« W^JI^B |H 'JMHtWlWSa.
i, ■-F-n-in.n- monJu-taB! t| '^jafc al ?«"!"
(DnOPUALSfWED
■„,." mdUcnUc OiulU; »f H.ird work
1 Denwcrill. S»fta;.i:t.i:it:.i-.:-!v'i.i **■■■■■
TVftttfon,
HB^.,
Opera's Fit To Window can save scrolling; it can
scale the page to fit in the available window, a
real plus for users with small screens.
But Opera's ads are hardly in-
trusive: The graphical ads barely
stand out from the rest of the
ads on a typical Web page, and
you have the option to replace
them with Google text ads. As
for the support, most people
don't need support for browsers
very often.
Opera can improve your on-
line experience. It's the only
browser that has a zoom view
of Web pages, reducing or mag-
nifying text and pictures and
everything else from 20% to
1,000% of their actual size.
Opera also has a Fit To Window
feature that reduces the size of a
page so you can view all of it in
any size window.
Opera has its own RSS reader,
and it's neatly integrated into the
browser. If a site offers RSS feeds,
an RSS button appears next to the
site's name in the Address bar.
Another unique convenience is
the Links sidebar, which lists
every link on the current Web
page and is a fast way to navigate
home pages of newspapers and
other publications that tend to
have an abundance of links.
Opera is the only browser we know of that has a notepad
so you can type notes. And only Opera lets you search,
look up, or translate any word on a Web page by double-
clicking it and choosing an operation.
Opera's Web site claims the browser will keep you free
from viruses and spyware, but doesn't explain how
(though the program's Help file gives some tips).
Opera's main security advantage is that it's not popular
enough yet to be a malware target. But don't try Opera
for its security: Try it because it's a truly different
browsing experience. Download the free version of
Opera at www.opera.com.
Opera 8: Like No Other In Many Ways
Opera gets an undeserved short shrift in head-to-head
comparisons of freeware browsers because the free ver-
sion of Opera includes an advertising bar (which disap-
pears when you pay $39 for the full version) and offers no
technical support.
Try Them All
These browsers represent a rare plenitude of freeware
riches. Try them all: You should be able to run all of
them, as well as IE, without any adverse effects. II
by Mark Scapicchio
Smart Computing / November 2005 33
Let the music find *
Anywhere in your home, indoors or out, there can be music. Or sports. Or news.
A Russound multiroom audio system is affordable, easy to use and easy to DO.
It's the kind of home improvement that brings you pleasure every day.
Just ask your Russound design specialist for a solution that meets your needs and budget.
All you need to know is Russound.
"INET 9
RNET is a proprietary platform that allows
Russound components to communicate with each other.
Founded in 1967, Russound is a global leader in A/V solutions that set
the standard for performance and ease of use, ©2005 Russound, Inc.
www.russound.com I tel 800.638.8055
URussound
W?T
inaows
W
TIPS & TRICKS
Windows 98's Windows Report Tool
The follo'A'ing files and mf
•■ ' ;.i-- :i '
, . ::
,b ■ In ;-h
0PERSYSVER=4.1 0.2222
OPERSYSTEM=Wirdows:
CPUTYPE=15
COMPSPEED=2347MHz
MEMRAM=512Mb
J
Over two dozen system files are included
with report data.
When trying to diagnose a
technical issue in Windows
98, or any other operating system,
the person providing support can
never ask enough questions or
have enough information to trou-
bleshoot and fix the problem.
However, Win98 includes a util-
ity called the Windows Report
Tool that can help streamline the
information-gathering process.
The Windows Report Tool as-
sists support personnel by col-
lecting data about a system and
the problems it's having. It does
this in two ways: One is by taking snapshots of various
system files, and the other is by prompting the user to
provide a detailed narrative of the circumstances sur-
rounding the problem.
The Windows Report Tool was designed to automati-
cally submit the information it gathered to the vendor in
question via that company's Web site. By using an
ActiveX control and scripting functions, a vendor can
start up the Windows Report Tool on a user's PC and
have the diagnostic data sent back.
Although we tried to determine whether Microsoft or
any other vendor utilizes this particular automation ca-
pability, Microsoft wouldn't provide any information re-
garding this feature. Therefore, chances are slim you'll be
able to access the Windows Report Tool from a vendor's
support site.
In spite of this, you can still launch the utility and
send the results to a vendor via email. To manually
launch the Windows Report Tool, click Start and Run,
type winrep, and press ENTER.
Once you've started the Windows Report Tool,
you'll need to provide specific information concerning
your problem. The utility provides three fields to do
this: Problem Description, Expected Results, and Steps
To Reproduce The Problem. In each of these areas, it's
important that the descriptions you provide be as spe-
cific and detailed as possible. Also include the content
of any error messages you received.
After entering data, you can modify the amount
of data the Windows Report Tool will include in
the report. When you click Options and Collected Infor-
mation, you'll see a list of about two dozen system files the
r
r
r
City:
7 ■ ' '
!*;.: : :
'■■:''. '77-./
.".; 7" r. ' ::
I ' .!■■!.
Cancel |
So techs working on your problem have a
way to reach you, add contact information
to the report.
Windows Report Tool will include. All of the files are in-
cluded by default, though you can omit any of them from
the list by clearing the checkbox next to it. Conversely, if
there's a file you want to include that isn't on the list, you
can make sure it gets sent by clicking the Add button and
then selecting the file. (Due to its size, the Registry isn't
part of the data the Windows Report Tool collects.)
Below the file selection area you'll also see a list of
system settings that will also be included in the report.
This information can help support personnel under-
stand the hardware environment of your system and
reproduce it if necessary.
None of the files or settings the Windows Report
Tool deals with contains any identifiable information,
and that's usually a good thing. But it can present an
obstacle if you're expecting someone to get in touch to
resolve your problem. Therefore, you have the ability to
include contact information. Click Options and User
Information. Entering this information into the Win-
dows Report Tool ensures it stays paired with your diag-
nostic data, so anyone on a support team who's working
on your problem has the means to contact you.
After you've written your descriptions, selected
system files, and provided contact information, click
Next. You'll be prompted to save the file. Windows will
name the file and save it in C:\WINDOWS\HELPDESK
\WINREP, but you can change the default file name
and location. The Windows Report Tool saves all the
data within a Windows CAB file, which you can email
to tech support. II
by Joseph Moran
Smart Computing / November 2005 35
^Windows*
*
TIPS & TRICKS
Adjust Windows 2000 Mouse Properties
Buttons | Pointers | Motion) Hardware |
^figuration
:■• I'RightTi'andedi ■ U- , ■ _
Left Button:
- Normal Select
- Normal Drag
Double-click sfieed —
y-
A one-time marvel, the modern
mouse has almost become an
afterthought. You move the mouse;
the pointer follows. But even the
most mature technologies sometimes
need a helping hand. If your mouse
starts acting up, Windows 2000 can
help get it back on track.
Though we'll explore a variety of
potential problems, many mouse ad-
justments happen in one place. In
the Control Panel, double-click the
Mouse option. If your mouse isn't
working at all, press the Windows
logo key (or CTRL-ESC) on your key-
board, navigate to the Control Panel
option (under Settings) in your Start menu using the
arrow keys, press ENTER, navigate with the arrow keys to
the Mouse entry, and press ENTER again. Either method
will launch the Mouse Properties dialog box.
Pointer Problems
The most serious mouse malady is an on-screen
pointer that's missing or immobile. Without a moveable
pointer, you can't use the mouse at all. Disconnect and
reconnect the mouse cable, checking for a firm fit into
the appropriate port. If you have a wireless mouse,
make sure the receiver is firmly connected to the appro-
priate port and that the mouse has a good battery.
Wireless mice often have a button on the bottom for re-
establishing the connection between mouse and re-
ceiver — press it. Nonoptical mice with the little rubber
ball in the bottom need cleaning every once in awhile:
Twist open the cap and clean both the ball and the
mouse's internal rollers. Clean with a pencil eraser
and/or a cotton swab dipped in a little rubbing alcohol.
Be sure to let everything dry thoroughly before putting
the mouse back together.
If that doesn't solve the problem, reboot your system.
Access the Mouse Properties dialog box and use the
TAB key with the Right and Left arrow keys to view the
Hardware tab and make sure Windows recognizes your
mouse. If not, reinstall the software that came with your
mouse. (You did keep the disc, right? If not, you may be
able to download the software from the manufacturer's
Web site.) If all else fails, the mouse itself has probably
called it quits and needs to be replaced.
«D
Right Button:
- Context Menu
- Special Drag
■
■-■ ;,•:. !■■■;.■■ " : '' : . :.
L-!^J P Double-click to open an
t to select]
click to select)
Motion Sickness
The Windows 2000 Mouse Properties
dialog box is key for adjusting settings,
If your pointer is moving too
quickly or slowly, or jumps around
randomly, head to the Mouse Prop-
erties dialog box. For pointer speed,
navigate to the Motion tab and adjust
the slider in the Speed section to a
more appropriate level.
If you're experiencing erratic point-
er motion, clean the undercarriage
mechanism (for nonoptical mice) or
check your underlying surface. Also,
look at the Move Pointer To The
Default Button In Dialog Boxes op-
tion under the Motion tab in the
Mouse Properties dialog box. The "feature" moves your
pointer to the default button in any dialog box, which can
be quite disorienting. Uncheck the box to return pointer
action to normal.
Not Clicking On All Cylinders
If you're having trouble double- clicking, go to the
Buttons tab in the Mouse Properties dialog box and ad-
just the slider in the Double- Click Speed section to re-
quire faster or slower click sequences.
If your left- and right-click options are backward, check
the appropriate Right-Handed or Left-Handed box in the
Button Configuration section under the Buttons tab.
Style Pointers
You may find that your pointer's color makes it diffi-
cult to view, or you may just want to experiment with
other pointer options. Open the Mouse Properties dialog
box and navigate to the Pointers tab. Scroll through the
various default schemes and find a scheme that works for
you. You can also replace each action's pointer in a
scheme by selecting either the Use Default button or
using the Browse option to find a cursor more in keeping
with your style.
Depending on your mouse model, your Mouse
Properties dialog box might display additional tabs and
settings options. Explore these for options related to
pointer motion, click behavior, or pointer style. II
by Gregory Anderson
36 November 2005 / www.smartcomputing.com
For the most authentic
movie experience...
:
put your speakers
behind ClearPix™
Thx
John Dahl thx Ltd.
No screen we've tested to date
matches the acoustical transparency
of the Screen Research ClearPix2
fabric. Now more home theater
enthusiasts will be able to enjoy the
benefits of proper behind-the-screen
placement of the center loudspeak-
er, with no degradation of audio or
video performance.
S3"
Joel Silver isf
We welcome Screen Research to
an elite group of color scientists
who boldly engineer screens with a
focus on Home Theater! The folks
at Screen Research should be com-
plimented for supplying a screen
that has not compromised acoustic
transparency or sacrificed
visual accuracy for gain - something
that is increasingly rare these days.
Exclusive No. American Distributor:
Sri '
www.stjohngroup.com
Do you know that most movie sound - and
not just dialogue - plays through the center
speaker?
Thanks to ClearPix™ by Screen Research, now you can
put this most critical speaker in the right place - behind
the screen and at the same height as the left and right
speakers.
Although common "perforated" screens allow sound
through, they cause audio problems (comb filtering) and
suffer from visual distortions (moire) when used with to-
day's digital projectors. As a result, installers resort to solid
screens and reluctantly place the center speaker above or
below the screen - a fundamental no-no.
Problem solved: The revolutionary ClearPix screen
passes full-frequency sound and does not cause moire.
Screen Research offers a complete line of fixed and motor-
ized screens as well as professional-grade masking sys-
tems. When you want the most out of your home theater
system, insist on ClearPix by Screen Research.
in
Home Theater Systems
RESEARCH
www.screenresearch.com | toll-free 877.588.0075
©2004-05 St John Group, Inc. Alt rights reserved, ClearPix is a trademark of Screen Research, Inc.
St John Group is a member of CEDIA and an ASID Industry Partner,
How Did Thev Do That?
General Coi\
Compiled by Kyle Schui
iphics & Design by Jason Codr
Eagle Eyes Of The Law
The Ins & Outs Of License Plate Recognition
Automated license plate recog-
nition systems are giving po-
lice and other governmental
entities the ability to find vehicles be-
longing to those who have broken the
law or failed to pay fines and taxes,
all with very little human interaction
... at least until the system discovers
an offender's license plate.
In this theoretic look at how a li-
cense plate recognition system works
(on the whole, the systems are still
being tested), we've combined some
of the features of two of the main
systems currently in use, GLAVID
and Mobile Plate Hunter 900. This
graphic isn't exactly reflective of ei-
ther system, but shows some of the
key components each system can
offer (or will offer in the future).
o
As a law enforcement officer patrols, the license plate recognition system scans for license plates. The officer doesn't
have to be an active participant in this process; he's free to perform other job duties.
38 November 2005 / www.smartcomputing.com
Cameras mounted on the police car capture the
image. The camera has built-in features that can
suppress headlights and deal with low-light situa-
tions to enhance the image. When capturing the image,
the camera can increase or decrease the contrast as neces-
sary to create as clear an image as possible.
©
©
A license plate database, which is regularly up-
dated a control desk's main computer, is also
stored on the in-car computer. (A GSM [Global
System For Mobile Communications] modem is some-
times used to make emergency updates to the license plate
database. Officers can also use their radios to contact their
station for more information if need be.) The recognition
system uses it to match license plate numbers to drivers
with warrants, unpaid tickets, and other infractions.
<>«&■
The recognition system's in-car computer contains the
OCR (optical character recognition) software necessary
to identify the letters and numbers on the license plate.
When a match is found, the system alerts the officer
so he can pursue the matter in an appropriate fashion.
Privacy Concerns
If the license plate recognition systems become more commonly used, they might receive greater scrutiny from privacy
protection groups.
However, initial reaction from a couple of groups indicates little opposition to the systems, as long as they're used for the
intended purpose. When asked about the system in use in Arlington, Va., representatives from both the American Civil
Liberties Union in Virginia and the Electronic Privacy Information Center told The Washington Post that the initial plans for
the devices don't worry them. Officers are simply using the devices to check plates that appear in public places, such as on
roadways and in parking lots.
In addition, police already are able to run license plate checks manually, so privacy advocates don't see the license plate
recognition systems as additionally infringing on peoples' freedoms.
Those who steal cars for a living, though, might see it differently. I
Smart Computing / November 2005 39
General Computing
No Tools
Required
Burn DVDs With External DVD Writers
One of the benefits of the
personal computer is its ex-
pandability. As new tech-
nology and devices are introduced,
computer users can usually upgrade
their systems to accommodate the
latest and greatest equipment. With
the advent of external DVD writers, a
user doesn't even have to crack open
his PC's case to install the new drives.
We'll help guide you through the
array of available drives, so you can
shop with authority.
Why A DVD Writer?
Most computers sold today arrive
with a CD-ROM drive. Higher-end
models may come with a CD drive
that can burn CDs or a DVD-ROM
drive that can play DVDs. Some even
come with the pinnacle of optical disc
technology, the DVD writer.
DVD writers give users the ability
to record vast amounts of data on a
single DVD. CD-ROMs are con-
strained to approximately 640MB. As
more users record digital video and
capture digital stills, the need for
larger storage capacities arises. These
vendors responded with DVD drives
that can store up to 4.38GB of data on
a disc. Since their initial introduction,
this capacity has been pushed as high
as 8.5GB. Combine this storage ca-
pacity with the ability to reuse discs,
and you have a cost- efficient way to
store vast quantities of data.
Benefits Of External DVD Writers
External DVD writers differ from
their case-mounted brethren in sev-
eral ways. They usually connect to
your computer via USB or FireWire
connections and often rely on a
power adapter for electricity. Exter-
nal DVD writers are also a bit bulkier
than the internal models. This is usu-
ally the result of having to enclose
the drive with a protective casing
containing both the drive and a
power supply.
Despite the extra bulk of external
DVD writers, the advantages they
possess more than make up for the
lost desk space. If your computer
doesn't have space for any more
drives, you can easily add an external
DVD writer without any problem. If
you have multiple computers in your
house, you can share an external
DVD writer with ease.
External DVD writers are also per-
fect for those who have a phobia
about working on their computer's
innards. Because plugging them in is
all that's required, there's no need to
break out screwdrivers, manuals, or
your local PC guru. DVD writers can
also replace your old CD burner, as
most models support writing to both
CD-R (CD-recordable) and CD-RW
(CD-rewriteable) formats.
Key Features
When you shop for an external
DVD writer, you'll be barraged with a
variety of specifications that can be
overwhelming. However, there are
only three elements that really mat-
ter: media compatibility, drive speed,
and the type of interface the drive
supports.
Media. DVD drives support a wide
array of formats, typically denoted by
"DVD" followed by an extension of
either R or RW, separated by a + or -
symbol, or both. The most common
media formats are DVD±RW and
DVD±R. Some drives support mul-
tiple formats, while others are re-
stricted to just one. The latest format
is DVD±R DL (for dual layer). We'll
talk about the new dual-layer tech-
nology in our "Dual-Layer Wonders"
sidebar.
One format we recommend avoid-
ing is DVD -RAM. This format uses a
cartridge-encased disc that can store
over 9GB of data. Unfortunately, it's
incompatible with all of the other
DVD drives on the market and will
40 November 2005 / www.smartcomputing.com
General Computing
likely be supplanted by dual-layer
DVD drives.
Choosing a media format depends
on whether you have to maintain
compatibility with an existing DVD
burner and whether you wish to
rewrite data on the same discs. If you
plan to just create one-time copies
(write once) of your data, a DVD±R
drive would suffice. If you want to
continually backup (rewrite) your
data on a single disc, you'll need to
purchase a DVD±RW drive. Our rec-
ommendation is to purchase a drive
that supports DVD±RW, as well as
DVD±R. Drive prices have plum-
meted recently, and there's no reason
to limit yourself to one format.
Prices for discs vary depending on
the format you select. Typically,
DVD±Rs are cheaper than rewrite-
able discs. We recommend using the
cheaper DVD±Rs for one-time copies
whenever possible and saving the
more expensive DVD±RWs for use in
daily backups or other instances when
you'll need to rewrite data.
Speed. DVD vendors love to tout
the speed of their drives. The speed of
a given drive is usually expressed as
4X, 8X, or 16X. Purchase the fastest
drive you can afford. With the vast
amount of data you can store on a
DVD, you'll appreciate the time the
faster drives save.
Interface. External drives usually
use either USB 2.0 or FireWire cables
for connecting to your computer.
Hi-Speed USB 2.0 can transfer
data at rates approaching 480MBps
Dual-layer drives
can store up to
8.5GB of data on
a single disc.
(megabytes per
second), and Fire-
Wire 800 can transfer
data at up to 800MBps.
FireWire devices don't require
any CPU power, whereas USB re-
quires your computer to handle all
the data transfer. The end result is
that FireWire devices don't tax your
system as much as USB devices.
If your computer has a FireWire
interface, go with that. However,
most computers sold in the last few
years include USB interfaces. In our
experience, the difference in perfor-
mance between the two interface ar-
chitectures isn't worth adding a
FireWire port to your computer.
Bonus Features
In addition to the aforementioned
features, several other features may
push you toward a particular ven-
dor. These vary from LightScribe
support to case design and soft-
ware bundles.
LightScribe. LightScribe is a tech-
nology developed by HP and li-
censed to various DVD vendors.
With a LightScribe-enabled drive,
you can create monochromatic
labels directly on your DVDs. In-
stead of using messy stick-on labels,
or writing on your discs with a
marker, you can create professional-
looking discs.
LightScribe drives work by
using a special laser that
activates a dye coating on your disc.
Because it uses a precise laser, the
LightScribe drive can create silk-
screen-quality graphics. And unlike
ink or paper labels, you won't have to
worry about your text and images
smearing, peeling, or fading over
time. You simply burn your data onto
the disc and flip it over to print.
LightScribe does have several dis-
advantages, however. You'll need to
use LightScribe compatible disks that
cost more than traditional media.
You can expect to pay approximately
$1 per disc for LightScribe compat-
ible media compared to 25 cents per
disc for DVD±R. In addition, you're
limited to either black-and-white or
grayscale images for printing. Finally,
LightScribe printing isn't very fast.
Our experience has been that a
simple text label can easily take 20
minutes to print.
Software. Most DVD drive vendors
bundle a copy of Nero (www.nero
.com) or Roxio's Easy Media Creator
(www.roxio.com). However, these
are often 30-day trial versions. Our
experience has been that you can't go
wrong with Nero. Nero is an intuitive
yet powerful application that makes
the most complicated disc-burning
tasks simple. If you can find a full
version of Nero 6 bundled with your
drive, you've got a winner on your
hands. However, don't pay too much
of a premium for this package. Nero
6 currently retails for $79.99.
Style. It's a fact: Some compu-
ter hardware is designed by clever, ar-
tistically inclined folks. And some
Plextor's top-of-the-line
PX-716UFwasthe
fastest at burning
dual-layer discs.
Smart Computing / November 2005 41
General Computing
hardware is designed with sheer func-
tionality in mind. With most com-
puter components, the aesthetic
design is of minimal importance, but
with a DVD burner, you don't want
something that looks like it was pulled
out of a junkyard sitting on top of
your computer. Your burner will usu-
ally sit in a prominent location on
your desk, and having an eyesore in-
stead of an art piece will be annoying.
But you don't have to settle for an
ugly burner. There are many vendors
that specialize in designs that are
beautiful in their own right. One of
our favorites is LaCie (www.lacie
.com). LaCie prides itself on its
drives designed by F.A. Porsche.
However, as with most things, there's
no such thing as a free lunch: The
best-looking drives tend to cost more
than spartan designs.
Our Roundup
To help you sort through the wide
array of drives that are currently on
the market, we've gathered three
that are typical of what you'll find
online or at your local electro-
nics superstore.
Dual-Layer Wonders
The bargain-priced
dvd640e lacks a
software bundle,
but boasts
LightScribe support.
Sony DRX-800UL. Sony's flagship
DRX-800UL ($199.99; www.sony
.com) is stylish, affordable, and fast.
The DRX-800UL supports DVD±RW
and DVD±R, as well as dual-layer ca-
pability. In addition to its broad
media support, the DRX-800UL fea-
tures both FireWire and USB 2.0
interfaces. The DRX-800UL can burn
DVD±Rs at 16X and dual-layer DVD-
Rs at 4X. With Nero 6 included,
the DRX-800UL is a bargain.
Plextor PX-716UF. Plextor ($239;
www.plextor.com) has a well-earned
reputation for excellent optical
drives, and the PX-716UF continues
in this tradition. Like the Sony DRX-
800UL, the PX-716UF supports both
DVD±R and DVD±RW, as well as
dual-layer discs. The PX-716UF has
Although 4.7GB
seems like a huge
amount of data to store
on a single disc, it didn't
take long before users
were chafing at size con-
straints of single-layer
DVD burners. However,
there's hope with the
new dual-layer format
that's becoming the
new standard for
DVD burners.
How Does It Work?
Traditional DVDs
have a single layer of
organic dye held as a
substrate between two
pieces of polycarbonate.
When struck by a laser,
this dye changes phase
and can be read by a
second laser. This is the
basis of both CD and
DVD writing. A single-
layer DVD can hold ap-
proximately 4.7GB of
data, roughly two hours
of video.
Dubbed DVD+RDL
(for dual layer) as the
name implies, dual-layer
discs use two layers of
sensitive dye embedded
into the plastic of a
DVD. This additional
layer effectively doubles
the capacity of the disc
up to 8.5GB. When the
first layer is completely
full, the drive's laser ad-
justs its intensity.
Currently the
format is only
write-once,
but it should
eventually
support
rewriteable
discs, as well.
And although the
current write speeds are
capped at 6X, there's no
reason that future drives
won't be able to support
faster speeds. I
both FireWire and USB interfaces,
as well as four optional colors to
choose from. Bundled with the PX-
716UF is Roxio's Easy Media Cre-
ator 7. Where the Plextor separates
itself from the competition is in
dual-layer burning speeds. With up
to 16X speeds, the PX-716UF was
the fastest DVD writer we reviewed.
HP DVD Writer dvd640e. If you
are looking for a LightScribe DVD
writer, HP's DVD640e ($159.99;
www.hp.com) is just the ticket.
Combining dual-layer support with
LightScribe labeling, you'll be set for
high capacity storage with stunning
graphics. The DVD640e supports all
of the major disc formats, but is the
slowest of the drives for burning
dual-layer discs. At 2.4X, you'll want
to be sure that you have plenty of
time when starting a burning ses-
sion. Although its retail price is the
lowest of all three drives, it lacks any
bundled software with the exception
of HP's own utilities.
Professional Results
For Personal Projects
The ability to burn DVDs
is within the reach of
anyone with a reasonably
modern computer. And
with today's external DVD
drives, there's no need to
worry about opening your
computer's case. Simply connect
the drive, and you're ready to burn
DVDs with aplomb. II
by Chris Jackson
42 November 2005 / www.smartcomputing.com
The New Faux-Croc
Portfolio Collection™
Available now in all the
hot fashion colors! These
semi-rigid, compression-
molded Portfolios will carry
laptops up to 1 5.4" to the boardroom
or classroom in style!
Free Ground Shipping on Portfolios! Use coupon code ' CEL95" when ordering.
Mobile Edge leads the pack in the combination of form and function, style and
practicality. Our goal is to offer premium computer protection and mobility
combined with a sense of fashion and style.
Our Exclusive Women's line offers an attractive alternative to the standard "black
case" and our backpacks, briefcases and messengers offer an upscale style sure
to compliment anyone's individual taste.
Visitwww.mobileedge.com or call 866-577-7774
for more information.
Laptop Backpacks / Briefcases /Messenger Bags / Totes
MOBILE3DGE
Bring It On.
General Computing
Silicon
Superheroes
Crime Fighters Solve Cases Using Digital Tech
Popular TV shows such as "CSI:
Crime Scene Investigation" il-
lustrate for millions of viewers
the kind of high-tech work law en-
forcement agents perform. In real life,
some technology-powered police work
is glamorous and edgy — a lot more of
it isn't television-worthy. But there's
no question that computer technology
has completely altered the way cops
pursue criminals and gather the evi-
dence that puts them behind bars.
Computers and other digitally pow-
ered tools help authorities find perpe-
trators and bring them to justice for
crimes that would've been unsolvable
just a few years ago. Thus, today's
crime fighters don't need a super-
hero's cape and boots. Instead, they
need massive, searchable databases;
computer-aided dispatching; digitized
crime scene tools; and other high-tech
equipment.
Faster Communication
To see just how much technology
has altered the landscape of crime
fighters, it helps to see the world
through the eyes of a 24-year veteran.
Wes Sossamon is chief deputy sheriff
in Clark County, Ark., and he recalls
pre-PC advances in the office.
"I can remember when we got our
first IBM Selectric electric typewriter.
I thought then we had reached the
zenith of technology," said Sossamon.
"Then, technological
evolution brought us
a word processor —
again, sheer amaze-
ment. As computer
technology began to
become the norm
rather than the rare
exception, we started
to realize the great po-
tential it had to assist
us in just about every
facet of our business."
When PCs became
standard equipment
in law enforcement
agencies around the
country, more and
more information
wound up on hard
drives and in databases. That digitized
information includes criminal inves-
tigative files, arrest and detention
files, offense reports, and much more.
searches to find the information they
need in a matter of seconds or min-
utes instead of waiting hours or days.
In addition to databases, police also
need efficient communication tech-
nologies. Sossamon said the officers
in his department are so busy that
they have to budget their work time,
so the faster they communicate, the
better. His officers use email and in-
stant messaging programs to quickly
exchange text and images, which
means they can immediately send in-
formation instead of waiting for the
comparatively sluggish process of de-
livery via courier or mail.
For officers in the field, communi-
cations centers use computer- assisted
dispatching to increase efficiency and
cut down on radio traffic. Some of
these systems are so sophisticated that
when they're combined with GPS
(global positioning system) capabili-
ties, they can track every patrol car on
the street, pinpoint each unit on a dis-
patcher's digital map, and recom-
mend a specific unit to send to a call,
among dozens of other capabilities.
Digitized
Investigations
Digital technology
has revamped the way
investigators perform
crime scene analysis,
too. Sossamon said
that one of the most
important benefits of
the computer age is
the ability to instantly
view photographs at
the crime scene. Inves-
tigators use the color
monitors on digital
cameras to make sure
each photo is properly
exposed, and they
transfer those images
to notebook computers at the scene.
Using a notebook PC, investigators
verify that each photo is clear and ana-
lyze these images to determine if they
Because of this, officers now run a few I should take additional shots. Getting
Tiny PDAs (personal digital
assistants) are valuable at crime
scenes. Investigators can log
evidence and even create
diagrams of the scene to better
preserve crucial information.
44 November 2005 / www.smartcomputing.com
General Computing
all the right photos is critical because it
helps officers capture the crime scene
before other workers alter it.
Many investigators also pack a PDA
(personal digital assistant) to log evi-
dence data or create 3D models of the
scene. To create a model, the officer
may use a tape measure or laser device
to determine room and window sizes,
as well as the distance between various
objects in the scene. With the right
software, a PDA can analyze these
kinds of data and immediately conjure
a basic reproduction of the scene.
At the crime lab. Digital cameras
and their resulting images are also
very helpful back at the office. For ex-
ample, Sossamon said, "[Digital cam-
eras] allow us to furnish crime scene
photos to the forensic pathologist for
review at autopsy in death cases."
Armed with all pertinent photos on a
CD, the pathologist can repeatedly re-
view photos during an examination
and create more effective reports.
Other imaging technologies in the
lab enhance and clarify fingerprints,
footprints, and bite marks. Using ad-
vanced imaging software, investigators
can render crash and crime scenes in
2D or 3D, and they can map bullet
trajectory, too. Other programs help
crime lab technicians examine rifling
marks on a spent shell and then match
that shell to the gun that fired it.
"In some of the specialty disciplines,
such as bloodstain-pattern analysis
and shooting reconstruction, innova-
tive experts have developed programs
that greatly cut down on the time it
takes to make complicated mathemat-
ical calculations," said Sossamon.
Those programs produce detailed
graphics from those calculations, and
they're often so detailed that an experi-
enced investigator can completely re-
construct a 3D crime scene on a PC.
These digital reconstructions come in
handy during investigations, as well as
during a trial when an attorney wants
to provide visual representation of a
complex scene to a jury.
And, of course, crime investigators
still pursue fingerprints for the valuable
clues they provide. As a matter of rou-
tine, investigators take random latent
prints from crime scenes and use the
print to search records, looking for the
person who left the print behind.
"The advent and technological evo-
lution of the capabilities of the AFIS
(Automated Fingerprint Identification
Systems) have greatly impacted the
searching of previously unsearchable
huge image databases," said Sossamon.
"It has revolutionized the criminal
identification process." And in a testa-
ment to ever-evolving investigative
processes, police investigations now
also use DNA databases that work in
the same manner.
Crimes Of The Times
Although PCs are
indispensable, author-
ities recognize that
many criminals use
technology to their ad-
vantage. So many law
enforcement agencies
have computer crimes
divisions staffed with
officers versed in ways
to combat digital de-
pravities.
"The majority of computer crimes
that we investigate involve illegally
possessed visual images of child
pornography," said Sossamon. "More
often than not, these are collateral
materials uncovered during the
course of an assault investigation."
Sossamon recounted one case in
which a specially trained investigator
recovered illegal materials from one
offender's hard drive by restoring im-
ages that the perpetrator deleted.
Those images corroborated the testi-
mony of a young victim and created a
much stronger case for prosecutors.
As other computer-related crimes,
such as those involving fraud and iden-
tity theft, continue to rise, more investi-
gators will learn to counter the tactics of
criminals who commit sins via silicon.
With better computer forensics, the po-
lice will be able to catch more high-tech
criminals and deter such crimes.
Digital Detectives
Police forces never rest. They track
perpetrators, create criminal histories
and suspect evaluations, log evidence,
and keep tabs on information re-
garding vehicles and stolen and recov-
ered property. Investigators have to
find correlation among various pieces
of evidence, develop leads, organize
and analyze data, and prepare critical
documents for court. If that sounds
like a lot of work, it is, but digital tech-
nology helps with these tasks and more.
"My detectives and I were holding a
discussion the other day about a new
computer program that we got," said
Sossamon. "And the general consensus
was: 'How did we ever get anything
done before we had all this stuff?'" The
good news for law-abiding citizens is
that police have these tools and that
they're always fine-tuning them, har-
nessing digital power to track down
criminals and keep us safe. II
by Nathan Chandler
In his 20-plus years as a police officer, Wes Sossamon has witnessed firsthand the
crime fighting power of many digital technologies.
Smart Computing / November 2005 45
Mr. Modem's Desktop
Yes, It's Another Turkey
Time to wake the kids and call the neighbors! No, it's
not time for the Smart Computing Swimsuit Edition.
It's time for Mr. Modem's "It's Another Turkey"
Thanksgiving column, in which I give thanks for a few of my
favorite tips submitted by beloved readers throughout the
year. Readers whose submissions were selected for publica-
tion by our distinguished panel of judge (OK, so it's just me)
received a nutritious, high-protein, low-carb Mr. Modem
mouse pad. A similar treat awaits you, so if you have a fa-
vorite computing tip or Web site, I want to hear about it.
Send Email By Keystroke
Instead of clicking the Send button, keep both hands
safely on the keyboard and use one of the following key-
stroke combinations: In Outlook Express, press ALT-S; in
Eudora, press CTRL-E; in Netscape, press ALT-D; and in
Firefox, press CTRL-ENTER.
Windows XP Tour
Step right up and discover XP features if^
you never knew existed! Your personal es ' '
cort is standing by, so to begin the tour,
click Start, Programs, Accessories, and
Tour Windows XP. A dialog box will
appear that asks if you would like the ani-
mated or nonanimated tour. Nonanimated?
Puleeeze! Pour yourself a cold one, select
the animated tour, and then sit back and
enjoy the show.
Power Surfing
If you have several Web sites you
want to visit quickly, enter the Web site
address for the first one and let your
browser begin loading it. While it's busy
doing that, open a new browser window (click
File and New Window or CTRL-N) and enter the URL for
your second site, and so on. When all the pages have down-
loaded, you can jump from one to another quickly by
switching between windows, each of which will appear as a
Taskbar button.
One-Screen Scrolling
When you're looking at a document or Web page that
spans more than one screen, you can move through the text
by clicking the Up arrow or Down arrow, or by sliding the
scroll bar that appears on the right side of the screen. But if
you want to scroll one screen at a time, click above or below
the sliding scroll bar to scroll in either direction, precisely one
screen at a time. This applies to any Windows application.
Icons Be Gone!
A favorite photo or graphic can be fun to use as your
Desktop wallpaper, but isn't it a shame to have it covered
with icons? Of course it is. If you're using Windows XP, you
can hide unsightly icons by right- clicking a blank area of
your Desktop, pointing to Arrange Icons By, then clicking
the Show Desktop Icons option to remove the check mark.
Presto! No more icons.
Outing XP's Clipboard Viewer
The Windows Clipboard is a short-term storage area
where data resides between the time you cut or copy and the
time you paste. The Clipboard Viewer is useful if you want
to know what data is currently saved on the Clipboard.
XP has an integrated Clipboard Viewer, but unlike previous
versions of Windows, it's in hiding, so for ease of access, let's
create a Desktop shortcut to it. Right- click a blank area of
your Desktop, click New and Shortcut. In the Location field,
type C: WINDOWS\system32\clipbrd.exe\. (Bonus Tip: To
create a similar shortcut, Win98 users can type C:\WIN
DOWS\clipbrd.exe; In Win2k, use C:\WINNT
\SYSTEM32\clipbrd.exe.) Click Next and
give the new shortcut a name. I went
crazy and named mine Clipboard
Viewer. I don't know what I was
thinking, but you only live once,
so why not? After naming the
shortcut, click Finish. Any time you
want to see what's on the oP Clip-
board, just double-click your new
Desktop shortcut.
Coming next month: I'm
hearing sleigh bells again, which
means it's either holiday time or
time to increase my meds. Assum-
ing the former, I like to close out every
year by presenting my personal list of favorite Web sites of
the past year. Until next month, from Mrs. Modem and
our furry, feline family, we wish you a safe, happy, and
healthy holiday season. II
by Mr. Modem
Mr. Modem (Richard Sherman) is an author, syndicated
columnist, radio host, and publisher. "Mr. Modem's Weekl
Newsletter" provides personal responses to subscribers' com}
and Internet questions, plus weekly computing tips, Web sit
recommendations, virus alerts, hoax warnings, and more.
For additional information, visit www.MrModem.com.
46 November 2005 / www.smartcomputing.com
« ^VTDTA
High Tech should Not
Always Mean High Price!
y Motherboards
GIGABYTE SL 1
AMD I |AMD I I AMD
^Du^Co^m Ql j
K8 Triton™ series
GA-K8N PrO-SLI NVIDIA nForce4SLI Chipset
■
K8 Triton™ s....
GA-K8N-SLI
NVIDIA nForce4 SLI Chipset
% fff=M
r*--n>
GV-NX66256DP
NVIDIA GeForce 6600 VPU
bo Force Edition
nction and HDTV
Available Through:
liiWMMtMiil ':::
\>AS,
ITT3T1 °^.dandh.com ITeADErHH!! 1
| '^\ i || Phone:800-340-1001 |__^J|jj|| F
For other regional distributors, please contact GIGA-BYTE TECHNOLOGY (U.S.A.)
IGABYTE
Plugged In
Sally Forth
Online Mapping Services Guide The Way
If your car is filled with a mess of
unfolded maps each time you
take a road trip, consider
switching to an online service
to get point-to-point driving di-
rections instead. But with so many
choices out there, it's sometimes diffi-
cult to know which one to use. Each
service has its own niche, so different
services are better for different users.
We obtained directions to five loca-
tions using five free mapping services
to see how they stacked up.
Google Maps
Google is notorious for leaving its
new services in beta (a prerelease ver-
sion) for a while, and Google Maps
(maps.google.com) is no exception.
Although it's still in beta, Google
Maps operates well and has a few fea-
tures that set it apart.
Google Maps can display a Map,
Satellite, or Hybrid view of any loca-
tion you've mapped. The Hybrid view
combines a satellite image with street
names for ease of use in finding a par-
ticular location. For more detailed
satellite views along with additional
local information and driving direc-
tions, users can install the free version
of Google Earth (earth.google.com).
When printing a map from Google,
you'll notice that the directions are
concise — many will print on just one
piece of paper. Part of the reason the
map and directions fit on just one page
is because Google does not display
small maps showing the start and end
points. Instead, you get one big map
showing an overview of your route. If
you'd like to see small maps of any
stage of your trip, click a step.
In our tests, Google Maps didn't al-
ways provide the shortest route, but it
did guide us to our destination. Google
furnished a slightly longer route in two
of the five tests. In one of our five tests,
Google Maps could not find the actual
destination address, though it could
find the street in a rural town.
It's helpful to know if there are mul-
tiple names for a road you'll be trav-
eling on. With Google Maps, we were
only given one street name and no
aliases. When a road name changes,
Google Maps calls attention to it by
noting Continue On To. Although
we'd like to see alternative names listed
with each street, this is still helpful
when navigating, especially when a
road changes names midway through
your trip. To make its maps easier to
read in the car, Google formats street
names and turn directions in bold.
MapQuest
MapQuest (www.mapquest.com)
has become one of the more recog-
nized names in online mapping ser-
vices, probably because it's been a
long-time player. A MapQuest user can
send a map to his phone, download it
to a PDA (personal digital assistant), or
email it for easy viewing later. To send
a map to a phone, you'll need to have a
compatible phone and service pro-
vider. The first time you send a map to
your cell phone, you'll need to install
the application software on your phone
and register your phone number with
MapQuest. To download a map to
your PDA, you'll need the free Avant-
Go service.
One handy feature of MapQuest is
that it remembers previously viewed
addresses (provided you're using the
same computer) without any registra-
tion or sign-in process. When getting
directions for print, you're sure to no-
tice the handy icons that MapQuest
includes on its maps. These icons tell
you which direction to turn and in-
clude signs to show road and exit
information. This is an especially
helpful feature for anyone reading a
map while en route because you're
not always required to read the full
text of the directions. None of the
other services we compared had a fea-
ture quite as nice as this.
The default print layout of maps
from MapQuest includes a pictorial
view of the full route and smaller
maps of the start and destination
points. Also, it's possible to get turn-
by-turn directional maps by clicking
the appropriate link in each step.
MapQuest provided accurate re-
sults in each of our five tests, though
one route used a road that may not
have been the fastest due to traffic
and stop lights. MapQuest alerts you
Google ^. - i^nr
is? si ea .,- ™ (ft- » "*". EMM—-
Google stuck with what works — simplicity—
in its easy-to-use Google Maps.
48 November 2005 / www.smartcomputing.com
Plugged In
limi'llfl.iv
E ;. E ,, : :, ,.•
a-
(J ea y.^ H-.- ^'^^'(iasl!.^ Angelas
, .. ■ -■ .-
„ : [ "EtfS..
■•■ ■ - ■■ ■ - ■ ■
Send directions to a PDA (personal digital
assistant) or a Web-enabled cell phone using the
links near the top of the MapQuest interface.
MSN Maps & Directions features a LineDrive
feature that lets you view only the route
you've mapped.
With Yahoo! Maps you can use your Yahoo!
username and password to save location
information for future maps.
when a road changes names with
language such as Superior St Be-
comes NW 1st St.
MSN Maps & Directions
MSN Maps & Directions (mappoint
.msn.com) has been around for a little
while now, but MSN recently launched
its newest mapping service called
Virtual Earth (virtualearth.msn
.com). Although Virtual Earth is cur-
rently a separate system from MSN
Maps & Directions, it still offers some
fun services for single-point mapping
information. Whereas MSN Maps &
Directions does not include satellite
imagery, Virtual Earth can display a
satellite or hybrid image of a specific
location. Once you've found a specific
location, get directions to or from that
location using a shortcut to MSN Maps
& Directions.
Although the features and satellite
imagery at Virtual Earth are impres-
sive, anyone looking for point-to-
point driving directions will want to
use MSN Maps & Directions. While
MSN Maps & Directions doesn't have
all of the bells and whistles some of
the other sites have, it does have the
ability to send a map to a PocketPC.
In addition, a feature unique to MSN
Maps & Directions is the LineDrive
feature that displays a map with only
the information about your particular
route. (To access this feature, click
the LineDrive radio button on the
Directions tab.) This is helpful if you
just want to see a route without the
clutter of other roads.
In our tests, MSN Maps & Direc-
tions wasn't able to find the actual lo-
cation of one of our destinations,
though it could find the street.
Additionally, three of the five tests
didn't always take the most direct
route, though routes were still accu-
rate. One of the nice features of MSN
Maps & Directions is that it clearly
notes both which direction to turn, as
well as which cardinal direction.
RandMcNally
When it comes to maps and direc-
tions, Rand McNally (www.randmc
nally.com) has been a familiar name
since its first maps were printed in
1872. In fact, Rand McNally has inte-
grated its online driving directions
with its print Road Atlas by including
2005 Road Atlas page and grid infor-
mation with each online map.
Like MapQuest, one of the handiest
features of Rand McNally's driving di-
rections is its ability to remember your
previously viewed addresses without
having to sign in or register with the
site (on the same PC, of course).
If you have a Rand McNally Road
Atlas, register at Rand McNally's Web
site to receive additional benefits, in-
cluding exclusive access to road con-
struction information and the ability to
save maps, directions, and personalized
trip plans.
An additional service available at
Rand McNally's Web site is the ability
to plan a road trip from start to finish,
even including stops and places to see
along the way. Registered users gain
the ability to create and print a cus-
tomized trip guide with in-depth city
profiles, road construction informa-
tion, and city and transit maps.
Although Rand McNally doesn't in-
clude pictures to denote which way to
turn at each step of the directions, you
can get printable mini maps for each
step. The default printout shows a map
of the full route and a large destination
map along with textual directions.
In one of our five tests, Rand
McNally took a slightly longer, though
still accurate, route. This alternative
route was six miles longer (increasing
the trip from 128 miles to 134 miles)
and kept the driver on the interstate for
a longer stretch of road.
Yahoo! Maps
Yahoo! offers a smorgasbord of
options. One of these services is Yahoo!
Smart Computing / November 2005 49
Plugged In
Maps (maps.yahoo.com). While any-
one can use Yahoo! Maps sans regis-
tering or signing in, users will want
to sign in to access additional fea-
tures, such as the ability to name and
save locations.
With Yahoo! Maps, you can send a
map to certain Web-enabled cell
phones. Should you choose to print a
map, you'll receive directions that in-
clude a circled L or R denoting what di-
rection to turn at each step. You'll also
notice that street names are printed in
bold text. Yahoo! includes an overview
map and a smaller map of your desti-
nation on each printout.
One helpful Yahoo! Maps feature is
that it tells you which side of the road
you'll find your destination on. In ad-
dition, Yahoo! Maps alerts you when a
road changes names with a phrase such
as Superior St Becomes NW 1st St.
With regard to accuracy, Yahoo!
Maps fared well against the competi-
tion. It was able to find all of our test
destinations, and while one route was
slightly longer, it was still accurate.
In our tests we noticed that Yahoo!
Maps doesn't always give directions as
to how to navigate from your current
location to the first road where direc-
tions start. While this may be a minor
detail, it's still helpful know whether
you're supposed to be heading north
or south to begin your trip.
Are We There Yet?
Although each mapping service has
its own unique features, we particularly
liked the icons denoting turns and
roads with MapQuest. We also liked
the satellite imagery views available
with Google and MSN Virtual Earth.
Judging solely by length of route,
Yahoo! Maps won by just a few miles.
It's important to note, however, that
the total difference between Yahoo!
Maps and MSN Maps & Directions
(the service with the highest mileage)
was only 6.2 miles. No service was per-
fect either: Each one provided at least
one route that wasn't the most effi-
cient. If you're looking for a map
without the added features of satellite
imagery, go with MapQuest — you'll
appreciate the icons that paint a pic-
ture as to where to go. II
by Jennifer Johnson
Google
Maps (Beta)
MapQuest
MSN Maps & Directions/
Virtual Earth
Rand
McNally
Yahoo! Maps
Efficiency
Ranking
(considers
total miles
and directness
of routes)
4
2
5
3
1
Maps Shown
In Default View
Large overview
Large overview,
medium starting point,
medium destination
Large overview,
small destination
Large overview,
large destination
Large overview,
small destination
Ability To
Recall Previous
Addresses
None
Yes
None
Yes
Only if you
register
and sign in
Ability To
Search For
Nearby Hotels,
Restaurants, Etc.
A local search
feature is
available, but
it doesn't integrate
with the driving
directions feature
Yes
A City Guide for
the destination is
available, but users
can't map hotels
alongside driving
directions
Yes
Yes. Also
includes traffic
information for
certain cities
Availability
Of Turn-By-
Turn Mini Maps
Yes. Can only
show one mini
map at a time
Yes
Yes
Yes
Yes
Satellite Imagery
Map, Satellite,
and Hybrid
views are available
None
Available only through
MSN Virtual Earth with
Satellite and Hybrid views
None
None
Ability To Send
Directions To
A Cell Phone
None
Yes. Must install
software and
register phone
None
None
Yes. Not available
with Verizon
Wireless service
Ability To Send
Directions
To A PDA
None
Yes, via AvantGo
Yes, PocketPC only
None
None
Ability To Send
Directions
Via Email
Yes
Yes
Yes
Yes
Yes
Additional
Features
Map scrolling using
the mouse
Arrows and road
signs walk you
through directions
LineDrive feature
Gives page and
grid information
to find location
in 2005 Road Atlas
Denotes which
side of the road
you'll find your
destination on
50 November 2005 / www.smartcomputing.com
Speakers should be heard, not seen.
Thaf s why we put them in the screen.
Introducing the
Da-Lite Acoustical Imager
Designed for your decor and engineered for your senses. This
revolutionary home theater system combines the clarity of a fixed
Da-Lite screen with the harmony of a JBL 5. 1 audio surround sound
system. The Da-Lite Acoustical Imager is simple to set up. The left,
right and center speakers are integrated into the screen's frame.
The compact surround sound speakers bring up the rear while the
subwoofer delivers the bass for a truly remarkable home theater
experience. Choose between a Video or an HDTV screen.
Available in eight projection surfaces. Or have Da-Lite custom build
a screen for your home theater.
Three speakers integrated into the frame,
two surround sound speakers and a
subwoofer complete the system.
DA-LITE
HOME THEATER SCREENS
*
£
^
Us!
For a free Home Theater Catalog and screen
recommendations, call toll free or visit us online.
1-800-622-3737
www.da-lite.com • ©2005 da-lite screen company, inc.
Plugged In
Thomas Jefferson said the price of
freedom is eternal vigilance. So,
too, apparently, is the price of
protecting your identity and good
credit rating.
Ellen, a teacher (and recent college
grad), applied for her first apartment.
The leasing agency resurrected a bad
debt Ellen thought she'd resolved years
ago. In 1997, Ellen left a Gap dressing
room for mere minutes, and someone
stole her wallet from the back pocket of
the jeans she'd briefly left. She says, "I
thought I'd lost only $15 and my dri-
ver's license — an inconvenience but
not a big deal." Unfortunately, Social
Security numbers appeared on Illinois
drivers' licenses at that time. Armed
with Ellen's name, SSN, and date of
birth, a thief opened at least six credit
cards in her name in 2000, and they're
still causing problems for her today,
eight years later.
The End Of Innocence
In 2002, she had her first inkling that
something was wrong when her par-
ents received a letter from a collection
agency saying she'd failed to pay her
Fingerhut account. Ellen didn't know
what Fingerhut was, but there was a
$500 balance in her name.
Although Fingerhut was then out
of business, the bank that managed its
credit accounts held open the out-
standing account in Ellen's name. The
collection agency gave Ellen the ac-
count number, date opened, and
other information, so she could dis-
pute the account with the bank and
the three credit reporting agencies
(Experian, Equifax, and TransUnion).
Ellen says "I spent hours upon hours
upon hours during the middle of the
day — probably for a week straight —
contacting companies and credit re-
porting agencies. As a college student, I
missed about a week of classes to
pursue this."
She received copies of her credit re-
ports showing the activity, most of
which she hadn't initiated. A family
friend, who is a lawyer, helped her
write letters to the banks, companies,
and credit agencies. By November 2002
all of the bogus accounts were removed
from her credit reports, and she got a
letter from Fingerhut absolving her of
responsibility for the $500.
Then, in November 2004, Ellen got
a letter from a second collection
agency for the Fingerhut account.
Despite the letter from Fingerhut, the
first collection agency had sold her
name to a second collection agency,
which was attempting to collect. She
went through the entire process again,
once again removing the debt from
her credit reports.
This year, when Ellen applied for
her apartment, her Experian credit re-
port listed the $500 Fingerhut debt be-
cause a third collection agency bought
the list with that old debt and sub-
mitted it to the credit reporting agen-
cies again. At about the same time, out
of the blue, a collection agency for
Dell called to let Ellen know the
$2,000 computer she supposedly
bought in December 2000 had never
been paid for. Ellen never bought a
computer, so she began contacting
credit reporting agencies again.
Susan Henson of Experian says that
should not be happening; all of the
debts should appear as paid on Ellen's
credit report. Henson explains that
sometimes it's a fluke because with 215
million consumers, situations occasion-
ally arise where someone needs a little
more attention. Typically, says Henson,
after a consumer has filed a dispute,
Experian has 30 days to contact the
creditor to find out if the account
owner can be verified. The creditor has
to produce proof documents, which
will show whether the customer's claim
is accurate or inaccurate. If documents
prove the customer did not open the
account, it's removed from report and
should not ever reappear.
Many Happy Returns
ID theft tends to be a crime of op-
portunity. If a thief can get his hands
on your SSN, bank statement, or an-
other form of ID, he'll probably use it.
What about a copy of cancelled check
from an online account? Can a thief
use that to open accounts in your
name? And what's a law-abiding cit-
izen to do in that situation?
Jean, a law-enforcement officer, re-
cently submitted a request for an
image of a check from her online ac-
count at Wells Fargo. The bank sent
her an email, instructing her to click a
link to see her check. Jean clicked the
link, but the check wasn't hers. It be-
longed to a woman whose name bore
no similarity to Jean's and who lived
in a different city; the check numbers
52 November 2005 / www.smartcomputing.com
Plugged In
and account numbers were com-
pletely different from Jean's.
Although it was early evening, Jean
called the online banking customer ser-
vice to let it know about the error and
find out what happened to her check.
Jean asked to speak to a manager, who
was completely unconcerned during
their 45-minute phone call. He said
he'd get back to her within 24 hours to
let her know what happened to her
check, but he didn't offer to change her
account numbers.
To demonstrate why she was con-
cerned, Jean told the manager that
using the information from that wom-
an's check, she had gone online to the
local county assessor's office and was
looking at pictures of that woman's
house. The manager said it wasn't his
fault the assessor's office posted that
kind of information. He then asked her
to fax a copy of the woman's
check to an 800 number, which
probably meant several more sets
of eyes would see it. Jean refused.
Jean asked if the bank planned
to notify the woman whose
check she'd inadvertently re-
ceived, and the manager said no,
the bank would not notify her.
So, Jean called the woman,
which she says was a somewhat
awkward phone call. But she
wanted this woman to know what
had happened, so she could
change her account number if she
wanted to.
The next day, Jean took the copy of
the woman's check and went into a local
Wells Fargo branch. The manager there
was far more receptive and helpful. She
explained to Jean that the bank has an
"escalation team" that looks into prob-
lems with online banking. She herself
wasn't familiar with how the process
worked, but she promised to find out
what happened to Jean's check.
She also explained Wells Fargo's
Lost Or Stolen Program, where it rolls
compromised accounts to new num-
bers. It took minutes on the bank's part
to change Jean's numbers, but it took
hours to sort everything out on her
end. She pays bills online, and she had
to notify all of the creditors that she
had changed her account numbers.
Jean also had to fill out forms notifying
her employer because her checks are set
up for automatic deposit.
And the experience cost her finan-
cially: Jean had just bought four boxes of
new custom checks, which she could no
longer use and had to shred. The bank
gave her only one free box of generic
checks in compensation. In addition,
because the bank immediately changed
her account numbers, her original re-
quest for a copy of her check was de-
nied. She had to call again and talk to a
customer service representative, who
walked her through requesting the
check again. This time, Jean says, there
were additional security steps.
In the meantime, the bank manager
has assured Jean her check didn't go
expenaii*
Q 3 Bureau Online
Credit Report
:. .in- -
Free Experian credit
report and score
. Get a free credit report and store*
..■'.' ... ;. "■ • •
" ■'.'.' ■ • ' ' • • ■■;■; ■.■!•: . .
- ■■ .. -:■'.'
m f--.nl inur riji .. :
i. ":..'•'-'■ e*'ywy:«-J ].'■■:■;>[■• ' -;.• •,-.: ■,-, ■■■■:-i,
■ ' ■• '• ' ■ '":":"• ' ' " ' • ■':•:
■■■:■■■■. .
^
Preventing fraud
» Steps to take if yoi
Consumer alerts
; .:- •
65 tl
account numbers. Experian's Henson
says if Jean's check had gone to another
consumer, that person would have the
routing number of her checking ac-
count, name, address, and phone num-
ber. In spite of that, Henson doesn't
think anyone could perpetrate identity
theft without backup ID. And trying to
withdraw funds directly from Jean's ac-
count would be impossible now that
she's changed her account number.
Henson adds, "Now that point-of-sale
technology scans checks immediately,
any attempted transaction would be de-
nied because the account is closed."
Be Vigilant
To protect yourself, keep track of
the information on your credit re-
ports. Obtain free copies from each of
the three consumer reporting agencies
once a year. Go to Annual
CreditReport.com (www. annual
reditreport.com). You may call
(877) 322-8228, but you'll give
the same detailed personal in-
formation over a phone that
you would have over a secured
Web site.
.
3 Bureau Credit Re|>oiT SM with fiee a
_ See your credit files from all 3 bureaus.
. . . ■ ' • ' • .'
i E:<( i I i
On the Experian home page, scroll along the right side for
information on preventing fraud.
anywhere, but Jean's not confident this
is true. Jean was also told the bank
couldn't tell her who received her
check because of security reasons!
Although her experience was less than
satisfactory, Jean says, "I honestly think
that the fact I mentioned I'm in law en-
forcement opened a few doors a little
faster. I know to ask questions and con-
tinue asking until I get some answers."
Although it's a hassle and an added
expense, if you know or suspect
someone has your bank account and
bank routing numbers, change the ac-
count numbers as soon as possible.
The potential threat to Jean's iden-
tity is small now that she's changed her
Act Immediately
If you see accounts you didn't
open or charges you didn't
make, the FTC (Federal Trade
Commission) recommends tak-
ing the following steps immediately.
i
Contact any of the three credit
agencies to place an Initial Fraud
Alert on your record. The agency you
contact must notify the other two. An
Initial Fraud Alert places a warning on
your accounts and prevents anyone
from opening new credit accounts
using your name and personal informa-
tion for 90 days. During this time, cred-
itors will have to verify your identity,
too, in order to protect you, and you
may experience delays when applying
for credit. For longer protection, file an
Extended Fraud Victim Alert, which
helps protect you for seven years.
Smart Computing / November 2005 53
Plugged In
ID theft tends to be a crime of opportunity.
If a thief can get his hands on your SSN, bank statement,
or another form of ID, he'll probably use it.
2 Contact your local police, make a
report, and obtain copies of the re-
port to file with the ID Theft Affidavit
(next step).
3 Close all accounts you didn't open
(and any you suspect someone's
made unauthorized charges to) and
dispute the accounts/charges. To dis-
pute them you must file an ID Theft
Affidavit, and you'll find the form at
the FTC's ID Theft page (www.con
sumer.gov/idtheft). Scroll down to the
Hot Links box and click the link for
ID Theft Affidavit. The form is seven
pages long, and you'll need detailed
personal information to complete it.
Print the form and send copies of it to
all banks, retail stores, and utilities
you believe have opened accounts
with stolen information or allowed
charges you did not authorize.
4 File a separate complaint with the
FTC. Do not send the FTC a copy
of the affidavit. Instead, fill out and
submit the detailed, online complaint
form. The form is on an SSL (Secure
Sockets Layer) -encrypted site, so your
information won't be compromised.
Your Rights
What happens if someone gets his
hands on your debit card and PIN
and uses your card to withdraw or
transfer money from your account or
charge purchases in person, over the
phone, or online to your account?
Regulation E, a set of regulations es-
tablished by the Federal Reserve that
cover electronic transactions, says if
you notify your bank within two busi-
ness days of the loss of your card or
PIN (or the unauthorized use of ei-
ther), your liability is $50.
If you're like most people, it takes
more than two days to notice the ac-
tivity and notify your bank. As long as
you do so within 60 days, you may be
liable for up to $500. After 60 days,
however, you're responsible for any
charges, and you probably won't be
able to recover any of the spent funds.
The best way to protect yourself is
to call your bank (get a name and
note the date and time you called)
and send a certified letter, so you have
proof of the date you notified your
bank in case it challenges your claim
of loss. Obviously, act immediately
upon noticing any unauthorized ac-
tivity on your account.
Your bank must look into your
claims within 10 days, and if it hasn't
settled the problem within that time, it
has to issue provisional credit to your
account to cover the disputed amount,
less the $50 you're responsible for.
Once you've filed the necessary pa-
perwork (the ID Theft Affidavits, po-
lice report, etc.), you have a right to
quite a bit of information. In addition
to everything in your files at the credit
reporting agencies, you have a right to
the documents (bad checks, forged
credit card applications, etc.) that
businesses have regarding the fraudu-
lent transactions. You'll have to prove
your identity and provide a police re-
port and an ID Theft Affidavit. Debt
collectors have to give you the name
of the creditor and the amount of the
debt. And in certain instances, you
may ask a consumer credit reporting
agency to block the information re-
garding the bad debts (as you're
sorting them out), so the debt may not
be sold, transferred, or sent to collec-
tions. Finally, you may ask businesses
not to report the bad debt (the debt
from the fraudulent transactions) to
the consumer reporting credit agen-
cies, assuming you spot the fraud be-
fore it appears on your credit report.
Customer Service
Banks offer their own guarantees
and protections, so read the fine print
in your bank's online security section.
For instance, Vice President of Wells
Fargo Online Michele Scott says,
"Wells Fargo stands behind our 100%
security guarantee (it's free) even in the
case of phishing, key logging, and
pharming, as long as customers pro-
vide notification within 60 days." This
is far longer than the Regulation E
guarantees, so be sure to check with
your bank.
Also, most banks warn their cus-
tomers that they will never send emails
requesting information or updates
concerning their usernames, pass-
words, PINs, accounts, or personal in-
formation. Further, they warn cus-
tomers not to click the links or call the
phone numbers in those emails and
definitely don't reply to them.
To help protect yourself, keep track
of your bank accounts, order copies of
your credit reports, and quickly dispute
any suspicious activity you see on your
bank statements or credit reports. II
by Kathryn Dolan
Contact Info
For The Big Three
If your identity has been compro-
mised in any way, contact one of
the credit reporting agencies (it will
notify the other two) to put an
Initial Fraud Alert on your credit re-
port. Call or visit one of the Web
sites. Susan Henson of Experian says
you waste valuable time by writing
to one of the agencies; you need to
act immediately, and the phone or
Web site is the fastest way to do so.
Equifax
(800) 525-6285
www.equifax.com
Experian
(888) 397-3742
www.experian.com
TransUnion
(800) 680-7289
www.transunion.com
Fraud Victim Assistance Division
54 November 2005 / www.smartcomputing.com
j 1
z/teuicv
In the Mood?
Entertaining? Relaxing? Romancing? Whatever life brings,
Vantage automation is the solution to set the mood!
v
VANTAGE
Your in Automation & Lighting Control
800.555.9891 e www.vantagecontrolsxom
Nearly a century ago, Julius
Rosenwald, then chairman of
Sears, Roebuck, and Co., vis-
ited an interactive science museum in
Germany and decided that his home-
town, Chicago, would benefit from a
similar institution. He garnered sup-
port from city officials and residents,
and in 1933, the Museum of Science
and Industry opened its doors, housed
in the only remaining building from
the 1893 Columbian Exposition.
The museum's Web site, www.msi
chicago.org, reflects this history — it's
chock-full of exhibits past and present
and gives visitors a chance to virtually
experience some of its riches. And
when you've absorbed all the site has to
offer, it'll help you prepare for a per-
sonal visit to one gem of a museum.
The Main Attraction
The highlight of any museum is its
exhibits, of course, and the Museum of
Science and Industry doesn't disap-
point — nor does its Web site. Arguably
the most engaging section of the site is
the Exhibits page. From here, you can
access much of what the museum has
to offer. Click the Exhibits link at the
top of any page to start your tour.
The page is broken into five main sec-
tions: What's New; Favorites; On-Line
Exhibits; Museum Exhibits; and
Exhibit Archives.
What's New. As you've probably
gathered, this section is composed of
new exhibits. For example, at press
time, this site section featured the
BODY WORLDS exhibition, which in-
cludes more than 200 human speci-
mens preserved through plasination, a
process that replaces fluids and fat.
(However, BODY WORLDS' run at
the museum was nearly complete.)
Also included in this area is the World
War II-era U-505 submarine. Although
the museum has had this specimen in
its collection since 1954, the sub re-
cently was moved underground to new
climate-controlled digs. Let's click U-
505 Submarine for a closer look.
Along the top of the U-505 Sub-
marine page are several links. If you
click History, you'll be presented with
three sections about the craft and how
Allied forces captured it and used it to
unlock some of the Nazis' secrets. Click
The Exhibit link, and you can learn
about how U-505 was restored and
some of its artifacts, as well as how a
submarine works. The Virtual Tour
link allows you to hop onboard with
the assistance of an abundance of pic-
tures and QuickTime clips.
Favorites. Back on the main
Exhibits page (click Exhibits in the
upper-right corner), under the Fav-
orites category, are four of the muse-
um's most popular exhibits. For
example, the Fairy Castle link will
whisk you to every little girl's dream
come true: a 9-square-foot castle built
in the late 1920s and early 1930s,
complete with electricity and running
water. And we can't forget the silver
bathtub (the spigots are dolphins that
spit water) or platinum chairs set with
diamonds and emeralds. Click the
Room Tour and Castle Map links for
a closer look. The History link leads
to more details about the actress who
commissioned the castle.
On-Line Exhibits. Every exhibit in
this category gives you a more in-
depth look than some of the exhibits
in other categories — you'll be treated
to more of a firsthand view.
All Aboard The Silver Streak details
an exhibit about the Pioneer Zephyr,
a streamlined passenger train con-
structed of stainless steel dating from
the mid- 1930s. Its trip from Denver
The Museum of Science and Industry is
home to one of only five remaining U-boats
in the world. Learn about the sub and its
role in World War II.
56 November 2005 / www.smartcomputing.com
Plugged In
SITE GUIDE
Learn what keeps your heart pumping with
a trip through a model of a human heart —
a person would have to be 28 stories tall to
need a heart this big.
to Chicago in 1934, which took a
mere 13 hours, was a highlight of that
year's Century Of Progress world's
fair. Learn about how it was built and
why, as well as take a QuickTime vir-
tual tour and send an ecard from the
Railway Post Office.
Genetics: Decoding Life is an in-
depth look at a wide array of issues, in-
cluding cloning, genetic engineering,
and mutation. If you click Exhibit
Tour, the Tour link in the bottom-
right corner, and then See Chicks
Tips For Using
The Museum
Of Science And
Industry Web Site
• Get to know the neighbors. The
museum is nestled in Chicago's
Hyde Park, one of the city's most
historic neighborhoods. Click the
Sitemap link at the top of any
page and then click Hyde Park
Neighborhood under General
Information to catch a glimpse of
all that this area— which covers
the grounds of the Columbian
Exposition of 1893— has to offer.
• Fly me to the moon. Several
crafts from Apollo missions are
on display at the museum, in-
eluding a Lunar Module trainer
that astronauts used in prepara-
tion for moon landings. Climb
inside the module for a 360-
degree view (you'll need
QuickTime to view it) by clicking
Exhibits, Apollo 8 Command
Module, and Lunar Module.
Hatch, you'll have a bird's-eye view of
the Chick Hatchery, where baby chicks
break out of their shells and spend
their first few days of life. Click Exhibit
Tour to see the rest of the display.
Museum Exhibits. On the whole, the
links in this category provide only brief
overviews of exhibits. Nonetheless,
you'll still get a good idea of what each
has to offer.
Body Slices are sections of one
man and one woman (both died of
natural causes in the 1930s) that give
visitors an inside view of the human
body. It may be a bit creepy, but it
certainly makes you think about
anatomy in a whole new light.
Out To Lunch is a collection of 500
toys from fast-food children's meals
dating from the late 1970s. And it's
even educational: You can learn how
these toys are made. Then, when
you're finished thinking about fast
food, go back to Museum Exhibits and
click the Walk-Through Heart link for
information on a giant heart that visi-
tors can walk through to learn how,
among other things, the human heart
pumps blood through our bodies.
Exhibit Archives. In order to make
room for new, timely exhibits, some
displays have to be removed, but that's
where the Exhibit Archives come into
play. Take a peek at exhibits from the
past, including Titanic: The New
Exhibition, where you can learn about
the Titanic's ill-fated journey, and
Under The Big Top, in which you'll
learn, among other things, all sorts of
superstitions about circus life.
One final note about the Exhibits
page: On the left side is a link to the
Personal Planner that can help you
plan a visit to the museum. Input your
interests, where you're visiting from,
and how you plan to get to the mu-
seum, and you'll get recommendations
on exhibits suited to your interests and
directions to the museum.
It's Great To Learn
One aim of every museum is to ed-
ucate its visitors, and the Education
section does just that. When you click
the Education link at the top of the
home page, you'll land on a page with
three buttons: Teachers, Parents, and
Students. The Teachers button takes
you to a form that's designed to help
educators find resources for their
classrooms. The Parents and Students
sections are similar; each has links to
various activities and programs avail-
able both online and at the museum.
Along the left side of the Educa-
tion page are links for educators and
the public, such as Exhibit Guides and
information for Girl Scouts.
No Cobwebs Here
There's much more to discover at
the Museum of Science and Industry's
Web site, including details about its
Omnimax theater and show times,
museum membership, and visitor in-
formation. This site serves as a good re-
minder that not all museums — or the
sites they're affiliated with — are filled
with (virtual) dusty cases visitors can't
touch. Head to Chicago's Museum of
Science and Industry's site and get your
hands dirty. II
by Sally Marek Curran
Use the site's Personal Planner to plan
a trip to the museum.
Smart Computing / November 2005 57
Plugged In
WEB TIPS
Enhance Your Time Online
Put Your Pounds
In Perspective
Problem: With Thanks-
giving coming up, I've been
thinking about my weight.
I'm not as slim as I could be,
but I don't feel horribly
overweight. Where can I go
online to get perspective on
how healthy/unhealthy my
body size is?
Solution: We all know that
obesity is a growing con-
cern. This focus on fat has
turned folks on to health
indexes, such as body fat
percentage, water weight
percentage, and body mass
index. Of these three mea-
surements, body mass is
easy to figure out using
one of many online calcula-
tors such as the one at
the National Institute of
Health's site (nhlbisupport
.com/bmi/bmicalc.htm) .
Enter height and weight,
and you'll get your BMI.
It's fairly well recognized
(feet) (inches)
Your
Weight:
(pounds)
( Compute BmT)
Before you stuff yourself with
turkey, take a second to calculate
your body mass index.
that this calculation may
overestimate body fat in
well-built athletes. Still, if
you're concerned that your
holiday pounds might be
pushing things into the un-
healthy zone, this is a great
first check.
The Great American
(Speed) Novel
Problem: I'm an aspiring
writer and know I have a
novel in me. But I just can't
seem to finish one. I feel I
need some help or some
guidance — perhaps some
kind of challenge?
Solution: If you want to
be a novelist and are
looking for a challenge,
then November is your
month, because it also hap-
pens to be National Novel
Writing Month (humor-
ously NaNoWriMo for
short). The concept is
simple: Write 50,000 words
(approximately 175 pages)
in 30 days. Sign up on the
site (www.nanowrimo.org)
after Oct. 1 for moral sup-
port from other speed nov-
elists. Last year, over 42,000
people signed up, but fewer
than 6,000 actually crossed
the finish line. A book
written that quickly prob-
ably won't be all that great,
but getting your ideas on
paper is a good first step.
Tags, You're It
Problem: Bloggers are be-
come more and more nu-
merous. Is there a way to
keep on top of all these
various voices in the so-
called blogosphere without
reading thousands of indi-
vidual posts?
Currently tracking 14.4 million sites and 1.3 billion links.
Sign Up! Already a member? Sign In.
12 Technorati
Technorati brings you what's happening on the web right now.
What are people talking about right now?
Opinions, events, reviews, your company, you! Search
for it, it's there. Learn more.
Personalize Technorati. Tell us what's on your n
- we'll search around the clock and report back t<
you with a Watchlist. Sign up!
Search 14.4 million blogs for the latest on:
Top searches This
Hour
1. Novak
2. "Sigur Ros"
3. "Robert Novak
4. Hiroshima
5. Novak Video
6. "John Roberts"
7. Ipod
8. Baidu
9. "Air America"
10. "Current Tv"
Find out what the bloggers are blogging about.
Solution: Technorati
(www.technorati.com) is
doing specifically for blogs
what Google, Yahoo!, and
other search engines did
for the Internet in general.
However, simply thinking
of Technorati as a search
engine for blogs misses its
greater power. By moni-
toring content tags, this
site shines an interesting
spotlight on what's hot
among bloggers.
An Alternative To RSS
Problem: With blogs, news-
groups, and subscription
emails, I have way too
many places to click around
every morning. I need
something simpler.
Solution: RSS (Really
Simple Syndication) feeds
make the process of
checking multiple blogs
much easier. But if your
daily fix includes more than
blogs, you might want to
sign up for a free account at
Bloglines (bloglines.com).
More than a great aggre-
gator service for RSS,
Bloglines also tackles
email-based services such
as DailyCandy.com or
SingleShot.net. And by
using Bloglines to sign up
for email subscriptions, you
help protect your personal
email address from spam.
Your Birthday Is Special
Problem: I already believe
that my birthday is my
special day, but I'm
looking for more statistics
to make my case.
Solution: In preparation of
your birthday, even if it's
months away, make a quick
visit to Paul Sadowski's site
(www.paulsadowski.com
/birthday.asp). His delight-
fully wacky birthday calcu-
lator will tell you everything
from how old you are (in
years, months, weeks, days,
minutes, and seconds) to
other assorted trivia such
as your astrological sign,
birthstone, birth tree, the
moon's phase on the day
you were born, and how
many BTUs the candles on
your cake will produce.
58 November 2005 / www.smartcomputing.com
Plugged In
Compiled by Joshua Gulick
Illustrated by Lindsay Anker
Set Your Sights
a, A New House
On
123 Movers.com
www.1 23movers.com
Thanks to the Internet, many
phone books have become permanent
booster seats for young children and
vertically challenged drivers. We
don't blame users for favoring the
£ Net — it's one of the best tools
around for finding local services and
collecting quotes. 123 Movers.com
is a great example of Internet-as-
digital-negotiator: If you're planning
to move, you can collect quotes from
local movers without having to hunt
down and contact the individual
companies. Once you enter your ZIP
code and select the state to which
you're moving, the site displays local
moving companies and a Get Free
Quotes button. You'll need to enter
your contact information to get the
quotes, so be sure to check the Pri-
vacy Statement you can access via
the link that sits at the bottom of
every page.
FCIC
www.pueblo.gsa.gov
The Federal Citizen Information
Center puts U.S. citizens in touch
with government Web sites and pro-
grams and provides a variety of arti-
cles about consumer-related topics,
such as cars, computers, health,
housing, and money. Although many
Web sites require users to buy sub-
scriptions before reading articles, we
rarely see sites that charge the reader
per article, as the FCIC's site does.
However, many of the articles are
free. Some articles let you choose
between HTML (Hypertext Mark-
up Language) and PDF (Portable
Document Format) documents. The
HTML versions display well in your
Web browser, but PDFs let you print
the information in a brochure format
(on standard 8.5- x 11-inch paper),
provided you have Adobe Reader or
Acrobat on your system.
Homestore.com
www.homestore.com
This site has plenty of digital treats
for fixer-uppers, prospective home-
buyers, renters, and backyard gar-
deners. Visitors can skip over topics
that don't interest them by clicking
the band of tabs at the top of the
main page, but home buyers will find
great information as soon as they ar-
rive. The page has links to articles
about selling and buying homes, as
well as tips for people who plan to
move without professional movers.
The left side of the page has tons of
tools, including a mortgage calcu-
lator, which removes some of the
guesswork from creating a home-
buying budget by giving you ballpark
figures. If you don't know where you
want to move but absolutely have to
get out of whatever town you're
in, take a look at the City Match-
maker tool.
HUD
www.hud.gov
The U.S. Department Of Housing
And Urban Development doesn't
waste much space on eye candy; this
site is jam-packed with articles that
cover the ins and outs of buying or
selling a house. You can learn about
HUD's goals, lodge complaints,
or read about landlord and tenant
rights. If you're looking for informa-
tion specific to your state, be sure to
select it from the drop -down menu at
the top of the main page. The site
also hosts live Web casts on tax and
other topics.
PrivateForSale.com
www.privateforsale.com
Although the site has a section
that helps visitors find agents, Pri-
vateForSale.com devotes most of its
corner of the Web to for-sale-by-
owner listings. You can control your
listing's information when you put
your house up for sale, and when you
plan to buy a new house, you can flip
through listings for more than 37,500
homes. Listings often display multiple
pictures of homes and have in-depth
descriptions that offer much more in-
formation than the tiny descriptions
that crowd so many listings. If you're
looking for books, check out the
Buyer and Seller Resources areas.
RealEstate ABC
www.realestateabc.com
If you're looking for a housing
agent and haven't picked up any
leads from friends or billboards, surf
your way over to this online agent di-
rectory. The site lets you search for
real estate agents by state and offers
an ABC's Of Real Estate section that
includes articles, a real estate glos-
sary, and tips. Some of the articles
cover the site's take on real estate
news, while other articles offer advice
on buying and selling. The site also
offers online calculators that help you
determine what kind of pay to expect
when you move to a new position
in a different city. If you're a renter
thinking about buying a house, take a
look at the Rent vs. Own Calculator.
This site also has information for real
estate agents.
Smart Computing / November 2005 59
That's
News
To You
Finding the appropriate Usenet discus-
sion group to match your interests
can be a monumental task. So each
month, we scour tens of thousands of
newsgroups and highlight ones that
delve into popular topics. If your ISP
(Internet service provider) doesn't carry
these groups, ask it to add the groups
to its list. This month we ask friends
and strangers for home-buying advice.
chi.forsale
Users here sell and buy all kinds
of merchandise, so don't expect
to see house listings right away.
That said, if you keep an eye on
this group, you'll find occasional
advertisements for homes and
users who need roommates in
the Chicago area.
misc.consumers.house
Need advice about fixing your
bathroom floor before you sell?
Check out this group, which
covers house buying, selling, and
fixing questions on a daily basis.
Users discuss housing codes and
offer advice about finding and
working with contractors.
seattle.forsale.housing
Some users here trade moving
tips and tricks, but many simply
post ads for Seattle-area housing.
If you're looking to rent or buy a
house or condo, check out these
for-sale-by-owner ads. As always,
approach any online seller with
caution. Moves sometimes
lead to awkward situa-
tions: As the cat that
was offered free (via
this group) will tell
you, those moving
trucks fill up fast.
Some of the best apples in the online orchard are the free (or free to try)
programs available for download. Each month we feature highlights from
our pickings. This month, we grab our favorite apartment-hunting gadget
and rustle up some deals.
PDA Home Buying Guide
www.apthand.com
If you've shopped for a house before, you probably already know that
a buyer's agent can help you navigate the complex world of home
buying. Although your agent will meet you to handle bids, closings, and
the occasional walk-through, she probably won't follow as you search
house after house every weekend. That's where the AptHand.com PDA
(personal digital assistant) Home Buying Guide comes in. This tiny pro-
gram, which loads onto your Palm OS-based PDA, offers a slew of fea-
tures for home buyers.
You can ditch the awkward notepad on your next house-hunting trip;
PDA Home Buying Guide's House List lets you keep track of a number of
home details, including asking price, address, and names of local schools. We
like this list because it creates a database of the homes you've seen and lets
you quickly compare benefits when you're trying to weed out homes that
don't have important features. You won't need to devote much time to
note taking, as most of the list's fields have drop-down menus that let you
select the number of bathrooms or foundation type with just a few taps.
The House List feature organizes its list by price, which lets users quickly
spot the houses that fit within (or blow past) their budget limits.
The Mortgage Calculator is straightforward but handy, particularly if
you're standing in a house that would stretch the limits of your budget.
Simply enter the home's price, the length and amount of your loan, and a
few other factors; then click the Recalculate button. If you're stuck in
traffic, you can brush up on the ins and outs of home buying by reading
the Backgrounder. This section, which resembles an ebook, offers very brief
and basic information, but if you're buying for the first time, you may learn
some things you didn't know before. You'll find articles about hiring an in-
spector and negotiating a home's price, as well as a glossary. The Apt Info
section lets users flip through four house buying tips. If you like a tip and
want to know more about the topic, you can tap Background at the
bottom of the page to view the related Backgrounder section.
Download PDA Home Buying Guide and try it free for 10 days or buy it
for $19.95. Keep in mind
that this software supports
only PDAs that run Palm
OS; PDAs that run Micro-
soft Windows Mobile won't
support the program.
60 November 2005 / www.smartcomputing.com
Comments:
Kitchen Cnd:
Carpet Cnd:
List Note:
Fireplaces:
Island:
Brkfst Bar:
Hdwd Firs:
Wet Bar:
Basement:
Laundry:
Done
▼ Unfiled
mountain view in back 'r
bask
new carpet
▼ 2:
▼ Yes: 1
▼ Yes:
▼ Yes: I
▼ Unknown:
▼ Unfinished:
"*■ Downstairs:
□ 3:43 P g #i<]")OfcixYx^
Purchase Price: 250000
Down Payment: 50000]
Loan Amount: 200000
Interest Rate: 7.000
Loan Length: 30
Monthly P/l: 1 330.60
Insurance: 300
Taxes: 3000
Monthly Pmnt: 1605.60
~l v-"i
Calculate mortgage payments on the fly and
compare features when you house-hunt with the
PDA Home Buying Guide.
Demand the Best in High Performance, Custom Built Computer Systems for:
High Performance Gaming • Digital Home Media Centers • Digital Enterprise Computing
We Custom Build the Best High Performance Computers featuring:
SLi - NVIDIA® Dual GPUs • Dual Core Processors • 64-Bit Computing
EXPERIENCE FULL THROTTLE HIGH PERFORMANCE COMPUTING AT
WVIDIA.
COMPUTERS
http://www.planetcomputers.com/CPU
Toll Free: (866) 486-4959
ighl © 2005. PlanetComputers.com, Inc. All trademarks and images are Ihe properly ol their respective owners. I
cover story Wireless
Contents
Free From Wires
p. 66
Hotspot Heaven
p. 70
Network Security
Bluetooth Buzz
Communications Convergence
The Present Perspective
& Beyond
62 November 2005 / www.smartcomputing.com
WIRELESS
The widespread availability of inexpensive Wi-Fi
networking products, such as Belkin's High-Speed Mode
Wireless G Router ($89.99; www.belkin.com), makes
setting up a wireless network a more viable option.
he phrase "go wireless" means
different things to different
people. For a home-based bus-
iness owner, it means laying
out a LAN (local- area network)
without drilling holes in the
walls. For a student, it repre-
sents an easy way to upload data files
from a PDA (personal digital assis-
tant) to a portable printer. And for a
traveling executive, it's all about
downloading sports scores and stock
quotes to a cellular phone.
The fact is that the wireless revolu-
tion has had an impact on many
fronts, each of which is represented
by a particular technology, including
wireless Ethernet, Bluetooth, and mo-
bile wireless. Recognizing the differ-
ences among these technologies is a
necessary part of understanding what
it really means to go wireless.
Wireless Ethernet
Also referred to as Wi-Fi, wireless
Ethernet refers generically to any device
that conforms to the family of 802.11
wireless networking specifications
developed by the IEEE (Institute of
Electrical and Electronics Engineers).
The most popular 802.11 specifica-
tions today are 802.11a, 802.11b, and
802. llg. These specifications operate
via radio waves on either the 2.4GHz or
5GHz band and support data through-
put at rates of 1 1 to 54Mbps (mega-
bits per second) over distances of more
than 150 feet.
Such capabilities accommodate the
typical demands placed on a tradi-
tional LAN and explain why Wi-Fi has
become the de facto standard for
computer-based wireless data net-
works found in numerous homes,
small businesses, and departments
within larger organizations. For more
information about securing your wire-
less corner of the world, see "Wireless
Network Security" on page 72.
But Wi-Fi has at least one significant
benefit that extends beyond the LAN:
Wireless users can share Internet ac-
cess with relative ease. Because Wi-Fi
certification ensures compatibility
among devices produced by a variety
of manufacturers, all that's needed for
shared access is a centrally located
wireless router hooked up to a broad-
band Internet connection. Anyone
who operates a Wi-Fi-compliant de-
vice within the hotspot (the viable
range of a wireless access point) can
surf the Web, check email, and access
public data files on an open network.
Many cities, businesses, libraries,
and universities have implemented
Wi-Fi hotspots as a free service to their
constituents, patrons, and students.
See "Hotspot Heaven" on page 70 for
more information about how you can
find and access a wireless hotspot.
Bluetooth
Developed by Ericsson and named
after a Danish king, Bluetooth relies
on shortwave radio frequencies in the
2.4GHz spectrum to transmit data at
rates of 1Mbps over distances of ap-
proximately 30 feet (though greater
distances are supported in some
cases). Its throughput and range may
seem weak in contrast to Wi-Fi, but
Bluetooth proves hardy enough when
put to use carrying small bits of in-
formation among personal electronic
devices. Indeed, the technology has
become a common fixture on the
latest generation of cell phones, plus
it's built in to PDAs, portable printers,
headsets, PCs, and other equipment.
There are good reasons for its pop-
ularity as a PAN (personal-area net-
work) technology. For one thing, you
don't have to configure Bluetooth de-
vices each time you want to share data
between them. Each device emits a
steady low- voltage radio signal that
enables it to recognize other Bluetooth
devices and automatically establish
communication with these devices as
Smart Computing / November 2005 63
WIRELESS
soon as they come within range of one
another. Moreover, the technology
can be built into a small form factor,
consumes very little power, and is in-
expensive to produce. Bluetooth also
is significantly faster than the wired al-
ternatives, such as serial and parallel
cables. For more information, see
"The Bluetooth Buzz" on page 75.
Mobile Wireless
The wireless trend really began
with mobile telephony. Those first
cell phones proved that it was both
technically possible and economically
feasible to transmit individual streams
of data to handheld devices. Today,
mobile communications devices are
ubiquitous; Gartner predicts global
sales of 779 million mobile phones in
2005 alone. That's a new phone for
one out of every eight people cur-
rently walking the planet.
One factor driving the popularity
of mobile devices is the development
of 2G (second-generation) and 3G
(third-generation) data communica-
tions services that support relatively
high throughput rates and digital data
delivery. These services, which typically
operate over radio waves at frequencies
between 800 and 1,900MHz and at dis-
tances measured in the tens of miles, let
users transmit Web content and data
files among digital devices, including
mobile phones, smartphones, PDAs,
and messaging appliances. Unfor-
tunately, the various competing and
largely incompatible technologies make
for a chaotic marketplace, which is
why services are usually identified by
brand — such as Sprint, Verizon, or T-
Mobile — rather than technology —
such as GPRS (General Packet Radio
Service), EDGE (Enhanced Data Rates
for Global Evolution), CDMA2000
(Code Division Multiple Access 2000),
and UMTS (Universal Mobile Tele-
communications System).
At the present time, consumers who
want to get the most from mobile wire-
less technology should focus their ef-
forts on understanding the differences
among the physical devices and not the
intangible acronyms. For more infor-
mation, see "Communications Con-
vergence" on page 78.
Everything Else
Wireless Ethernet, Bluetooth, and
mobile wireless garner most of the
attention these days, but they're
certainly not the only wireless tech-
nologies on the scene. Several wireless
alternatives have been proposed to fill
unique niches in today's tech-heavy
environment. Some have succeeded,
others have not.
Infrared. Infrared is an old wireless
standby that has been standardized by
the IrDA (Infrared Data Association) to
carry data at rates as fast as 16Mbps
across bands of invisible light. Despite
its required line-of-sight visibility and a
range that extends no further than an
o m
Q2|3l4|
3
Documents
m
Photos & Videos
®
Music
Versa M nil
Web
Bluetooth
t? J
QuickTour
ll '1 1 11
Palm's Tungsten T5 device
($349; www.palm.com)
boasts built-in Bluetooth
technology for effortlessly
sharing data files with
other Bluetooth-enabled
hardware.
arm's reach, the IrDA protocol has
proven quite popular as a communica-
tions channel because it is both inexpen-
sive to manufacture and very secure.
HomeRF. A wireless networking
technology that Proxim developed,
HomeRF (home radio frequency)
promised throughput rates of 1.6Mbps
over distances of 150 feet. The stan-
dard was dealt a death blow when
Microsoft built support for Bluetooth
into Windows XP. It was essentially
abandoned in 2003.
BPL. The concept of transmitting
data over standard electrical powerlines
has long been promoted as a potential
alternative to wireless communica-
tions. BPL (broadband-over-power-
line) technologies can carry data at
rates up to 200Mbps, but throughput
declines significantly when the wires
enter a home or a business. Complaints
that the technology interferes with
radio waves have limited its acceptance.
Now, after years of hype, it appears that
powerline communications most likely
will be limited to home automation
applications such as XI 0.
WiMAX. Representing the future
of wireless in the United States,
WiMAX (Worldwide Interoperability
for Microwave Access) represents the
next-generation standard for broad-
band wireless networking capabilities.
Also known as IEEE 802.16, WiMAX
employs the 2 to 66GHz frequency to
deliver a throughput of more than
70Mbps over a range of more than 30
miles. The protocol won't replace Wi-
Fi, but it will supplement it as an op-
tion for delivering fast Internet access
to remote users. Consumers should
not confuse WiMAX with HiperMAN
(High Performance Radio Metro-
politan Area Network), which is a
similar wireless broadband technol-
ogy under development in Europe.
The Future Of Wireless
Considering everything we've cov-
ered, one thing is for certain: Wireless
technology remains in its infancy,
so consumers can expect significant
developments in wireless network-
ing and mobile wireless technologies.
The demand is there, and it's only a
matter of time until developers are
able to meet that demand. II
by Jeff Dodd
64 November 2005 / www.smartcomputing.com
On such a nice day,
don't you want to go outside and play?
Boston Acoustics Voyager® Speakers and Subwoofers —
designed to bring The Boston Sound™ to the great outdoors.
www.BostonAcoustics.com
Boston
Boston Acoustics
Your Sound Solution™
: -2005 Boston Acoustics, Inc. All rights reserved. Boston, Boston Acoustics, the Boston Acoustics logo, Voyager, are registered trademarks,
and The Boston Sound is a trademark of Boston Acoustics, Inc.
EE
Install & Configure A Wireless Network
If you're starting to dream of
pencil-thin, light-blue anacondas
slithering through your front
door and filling all the rooms in
your home, it's time to ditch the
wires and build a wireless net-
work. By equipping your home
or office with an access point and a few
wireless cards, you'll have the freedom
to use the Internet and other network
resources anywhere. Want to take your
notebook to the kitchen and browse
stock quotes? Go ahead. Check sports
scores on the porch? No problem.
Freedom from wires means less mess
and less chaos — at a cost that isn't
much more than a wired network.
Installing and configuring a wireless
network isn't difficult, but under-
standing the basic wireless components
and where they fit in the network can
help you determine how to build your
network. In this article, you'll discover
the parts you'll need, how to install
them, and how to get them communi-
cating in a cable-free environment.
Harness The Hardware
The two basic components in a wire-
less network are the access point and
the wireless adapter that communicates
with that access point. The access point
serves as the base station for your net-
work, emitting data signals that other
computers on the network can receive
and return. Each computer connected
to the network needs its own wireless
adapter to connect to the base.
Although we won't delve into the
technical specifics of the different wire-
less standards here (see the "Sifting
Through Standards" sidebar for more
information), keep in mind that de-
vices using different standards gener-
ally won't perform as well as devices
using the same technology.
For example, although 802.11b
adapters will work with 802.1 lg access
points, older 802.11b cards can reduce
the speed of the network. Therefore, if
you have an 802. llg access point, it's
better if you use 802. llg adapters.
Access points come in a variety of
flavors, from plain access points to
gateways to wireless routers. For secu-
rity and flexibility, we recommend a
gateway or a router because plain ac-
cess points won't let you share your
connection and won't provide firewall
features that you'll find in gateways and
routers. (In this article, we use a router
to build our wireless network.)
The wireless adapters you need de-
pend on the devices connected to the
network. A desktop computer requires
a wireless PCI (Peripheral Component
Interconnect) expansion card, whereas
a notebook needs a wireless PC Card —
or you can use a USB wireless adapter
to connect either a desktop or
notebook computer. Thanks to
their more robust antennas,
PCI cards and PC Cards tend
to offer better reception than
small USB adapters, but some
USB adapters include a wire
that lets you move the antenna to a lo-
cation that delivers efficient reception.
Some notebooks and handheld de-
vices include integrated wireless tech-
nology, so check your equipment
before paying for hardware you may
not need. If your handheld device
doesn't include built-in wireless sup-
port, see if the manufacturer offers a
flash memory-based wireless adapter.
Be sure the adapter you're consid-
ering will work with your PC and OS
(operating system); you can check the
adapter's box for its system require-
ments. Keep in mind that mixing and
matching adapters and access points
made by different manufacturers gen-
erally isn't a problem, but you can
avoid potential headaches if you choose
equipment from the same manufac-
turer. Some, such as D-Link, integrate
speed-enhancing technologies and
other features that work only within
their device family. (And if something
does go wrong, life is simpler when you
have only one tech support line to call.)
66 November 2005 / www.smartcomputing.com
In addition to a router (or gateway)
and wireless adapters, you'll also need
an Ethernet cable, a Phillips screw-
driver, and an antistatic wristband
(available at electronics stores). You
also need your username and password
for your Internet connection.
Perfect Placement
The next step is determining where
to place the access point. The ability of
PCs to connect to an access point is di-
rectly affected by several factors, in-
cluding distance, obstructions, elec-
tronic interference, and the strength of
the equipment's antennas. Although
some devices claim to deliver ranges up
to 300 feet or more indoors, your ac-
tual range could be much less, espe-
cially if the signal needs to travel
around or through walls or if your de-
vices are competing with radio signals
from a microwave or cordless phone.
An ideal wireless network features a
centrally located access point that de-
livers an effective signal to all devices.
But placing your access point in a cen-
tral location may not be convenient or
even necessary. If you plan on con-
necting your broadband Internet con-
nection to the network, you'll need to
place your access point and your DSL
(Digital Service Line) or cable modem
(assuming your access point doesn't al-
ready include a built-in modem that
works with your Internet service) near
a phone jack or a cable wall outlet.
Because the lights on a modem are
good indicators of your current DSL or
cable status, it's helpful to keep that
modem near your primary computing
Sifting
Through
Standards
When shopping for
wireless home
networking equipment,
you're likely to encounter
more than one standard
(or set of guidelines) on
which manufacturers base
the design of their equip-
ment. Most of today's
devices use one of the
various flavors based on
the 802.11 standard, but
you should understand
some differences before
you pull out your wallet.
The two most common
standards are 802.1 1 b and
the newer 802.1 1g, both of
which use the 2.4GHz fre-
quency to transmit wire-
less signals. Devices such as
microwaves and cordless
phones also use this fre-
quency, which could lead
to interference with your
wireless network, though
you can decrease this in-
terference by placing your
network equipment far
from these competing
devices. The 802.1 1 b stan-
dard features speeds up
to 1 1Mbps (megabits per
second), and considering
that most broadband con-
nections deliver far lower
speeds, this standard is
more than adequate for
Internet use across your
network. The 802.1 1g
standard is backward-
compatible with 802.1 1 b
and features speeds up to
54Mbps, though actual
speeds can decrease with
the presence of older
802.1 1 b equipment in the
network. Further, interfer-
ence can affect high-speed
802.1 1g transmissions
more easily than slower
802.1 1 b transmissions.
Another standard,
802.1 1a, offers speeds sim-
ilar to 802.1 1g, but it uses
the 5GHz frequency and
has less range than 802.1 1 b
and 802.1 1g. Products
using 802.1 1a aren't com-
patible with products
using these other stan-
dards, plus they are more
expensive and generally
harder to find. Users that
receive too much interfer-
ence from 2.4GHz-based
devices might find 802.1 1a
equipment useful, but
their options are limited.
New to the standard
scene is 802.1 1 n, which
boasts speeds of up to a
whopping 540Mbps and
potentially has a better
range than other existing
standards. Although
802.1 1 n isn't officially cer-
tified as a standard yet,
rival groups currently
working on the tech-
nology recently agreed
to join and submit a final
version of the standard
for certification, possibly
in November. In the
meantime, several "pre-N"
products are available
that use 802.1 1n tech-
nology, but with a certi-
fied standard so close,
it's best that you either
wait for certified pro-
ducts or use equipment
based on a tried-and-true
standard such as 802.1 1 b
or 802.1 1g. I
station. Further, an access point and
modem aren't likely to blend in with
the rest of your home decor, whereas
they will blend in just fine with your
existing computer equipment. If you
plan to connect only stationary desktop
PCs to your wireless network, and
those PCs are relatively close, you don't
need to worry about the range in the
rest of your home. However, a wireless
signal won't magically stay within the
confines of your external walls. The
closer your access point is to your ex-
ternal walls, the better chance someone
outside those walls will have to access
your network (but not necessarily be
November 2005 67
WIRELESS
able to break in; we'll cover security
later in this article).
Choosing a spot that doesn't end up
working well isn't a big deal because
moving your access point after in-
stalling your network isn't that diffi-
cult. Besides, if you're set on obtaining
the best signal possible, it's actually a
good idea to consider such a move.
Get Down To Business
After finding a spot for your access
point, you can configure it. For our ex-
ample, we'll describe the process for
configuring a D-Link wireless router
and a broadband modem, but if you
have a different type of access point or
don't have a modem, follow the in-
structions included with your devices.
For the configuration phase, you'll
need to connect your primary PC di-
rectly to the access point, but you can
connect wirelessly after the configura-
tion is complete, assuming you have a
wireless adapter for that computer.
To begin, shut down your PC and
switch off the power to your broad-
band modem. (The power switch is
usually on the back panel.) Locate the
Ethernet cable connected between the
modem and your PC, disconnect the
end attached to the PC, and attach it to
the router's WAN (wide-area network)
port. Connect another Ethernet cable
to the Ethernet port on the back of
your PC and connect it to a numbered
port on the back of the router.
Next, switch on the power to
your modem and wait a minute or
so for it to initialize. Connect the
router's power adapter to the back
of the router, plug it in, and check
to see that the power light on the
front panel is on. Turn on your PC
and check the router's front panel
to ensure that the WAN light and
the corresponding LAN (local-area
network) port light are both on. (If
you plugged the second Ethernet
cable into LAN port 1, the light for
LAN port 1 should be on.) If either
of these lights isn't on, double-
check your cable connections.
68 November 2005 / www.smartcomputing.com
To install a wireless adapter inside your PC case, find an empty PCI (Peripheral Component
Interconnect) slot on the motherboard and push the expansion card firmly into place.
T
At this point, you'll need to either
install the software that came with your
access point or type an address in your
browser's Address field to access a con-
figuration screen. The D-Link equip-
ment requires the user to perform the
latter option, which displays the
router's configuration page and a setup
wizard. First, the wizard asks the user
to set an administration password,
choose a time zone, and select the
Internet connection type. Most DSL
accounts use PPPoE (Point-to-Point
Protocol over Ethernet), but it's pos-
sible that your connection might use a
dynamic or static IP (Internet Proto-
col) address instead. If you're not sure
what to select, ask your ISP (Internet
service provider). Also, the wizard asks
you to type in the username and pass-
word for your Internet connection, so
in the future it can automatically log in
to your broadband account each time
you turn on your computer.
Another step within the wizard asks
you to enter an SSID (Service Set
Identifier) name and a channel. You
can keep the default channel that the
utility recommends, but you should al-
ways use a unique SSID name to avoid
potential security problems. Also, select
the highest available WEP (Wired
Equivalent Privacy) encryption pro-
tocol your hardware offers — or better
yet, enable WPA (Wi-Fi Protected
Access) encryption if your hardware
includes it. You'll need to enter a string
of characters to enable these encryption
methods and then use that same string
when configuring adapters on other
PCs, so write down the key exactly as
you entered it and save it for later.
These are the basic steps for config-
uring the router, but you can access the
main configuration page to enable
other features. For example, you
can enable DHCP (Dynamic Host
Configuration Protocol) to ease
the configuration of any future IP
address changes in the future.
Wireless routers also include fire-
walls that you can tweak with spe-
cific rules that allow or disallow
certain types of traffic. In addition,
Always check that the antennas on your
access point and wireless adapters are
firmly attached. You can rotate an
antenna to aim it for better reception.
WIRELESS
you can (and should) disable SSID
broadcasting to prevent outsiders from
rinding your network.
Adapters Ahoy
After configuring your access point,
it's time to install the wireless adapters
on whichever computers in your net-
work you don't intend to connect to
the router with Ethernet cables. Just
like access points, wireless adapters
vary in their installation requirements,
so always check the instructions in-
cluded with your device before in-
stalling it. Most adapters require you to
install software, but check whether you
should install the software before or
after physically installing the adapter.
Installing a USB adapter is as simple
as plugging the device into a free USB
port on a PC or a notebook and in-
stalling any drivers, if necessary. The
process is similarly easy for a PC Card:
Just slide the card into a free PC Card
slot on your notebook. Installing a PCI
adapter in a desktop PC is a little more
complicated because you have to open
your PC's case. To do so, shut down
and unplug your PC (as well as any pe-
ripherals), remove the case's cover, and
put on your antistatic wristband (to
prevent static electricity from dam-
aging internal components). Locate an
O Dynamic IP •• ; : ss
O Static IP
® PPPoE
PPTP
BigPond
Channel |e [v]|
empty PCI slot on
your motherboard,
remove the screw
holding the protec-
tive slot plate on the
back of the case, and
pull out the plate.
Slide the card firmly
into the slot, replace
the screw, and prop-
erly close the case.
Turn on your PC.
Your adapter's
software will walk
through the configu-
ration. When you
see the security con-
figuration area, in-
put the WEP or WPA code you prev-
iously wrote down. After installing and
configuring the adapter, you'll be able
to access the Internet and take the
steps needed to configure file and
printer sharing throughout the net-
work to share resources.
No More Snakes
After your network is up and run-
ning, don't be afraid to dig into your
router's configuration menus to see
what options are available. Although
some tools included with routers and
other devices are designed for advanced
Select Internet Connection Type (WAN)
Select the connection type to connect to your ISP. Click Next to con
Choose this option to obtain an IP address
automatically from your ISP. (For most
Cable modem users)
Choose this option to set static IP
information provided to you by your ISP.
Choose this option if your ISP uses PPPoE.
(For most DSL users)
PPTP Client
BigPond Cable
Back Next Exit
Set 802.1 1g Wireless LAN Connection
:.':.'• .'■■'.'■:"::'■:■■■.:...'.•
k Next to continue.
Back Next Exi
In order for the router to
properly configure your
Internet connection, it
needs to know what type
of connection you use.
Check with your ISP
(Internet service provider)
if you're not sure.
Never leave the default
SSID (Service Set Identifier)
name on your access point;
change it immediately to
a name that isn't obvious,
and then change it every
month or two afterward.
users, others are useful for anyone. For
instance, some routers include parental
controls that let you block certain
URLs or domains. You also can find
cable status utilities that tell you what
cables are connected (or not con-
nected) to your device.
But if you're the hands-off type,
rest assured that wireless networks
require no maintenance once you
properly configure them. Day in and
day out, you'll be able to count on a
dependable connection that's sub-
limely wire -free. II
by Christian Perry
Troubleshoot Your Network
Although nightmares of
home networks past
continue to haunt many
users, you'll be pleased to
find that installing and con-
figuring a wireless network is
much easier nowadays. Of
course, even though the
wizards included with most
devices are thorough and in-
tuitive, problems can occa-
sionally crop up. Luckily, it's
not too difficult to find and
fix such problems.
If you encounter trouble,
first check that all of your
cables are secure, both in the
access point and the modem.
Even if a cable looks like it's
attached, it might be jutting
halfway out, so do a push
check on all your cables. Also,
check that your network
adapters are inserted and
functioning on the networked
computers. Most adapters
have lights that shine when
they're functional.
If you're getting a signal,
but it occasionally drops off
or disconnects altogether,
you're probably not receiving
adequate signal strength. This
problem can occur if com-
puters are located too far
from the access point or if
there's interference from
other devices using the same
frequency. First, check that
the antenna on your access
point and on any adapters is
firmly attached, and if so, try
angling the antenna(s) in dif-
ferent directions to obtain a
better signal. If that doesn't
work, consider moving your
access point closer to your
computers, or move your
computers closer to the ac-
cess point. Also, move your
equipment away from things
such as microwave ovens and
cordless phones.
Relocating equipment isn't
always an option for everyone,
and for those users, a stronger
antenna can help solve poor
signal problems. See if your
equipment has removable an-
tennas; if this is the case, check
online for high-gain antennas
that have a higher decibel
rating than the antennas in-
cluded with your equipment. I
Smart Computing / November 2005 69
HERUI
Finding & Using Free &
For-Fee Wireless Access Points
It's official: Wi-Fi (wireless fi-
delity) is everywhere. Wi-Fi, of
course, refers to the 802.11b
standard that's become so pop-
ular for setting up wireless net-
working in homes, offices, and
businesses — from fast food
joints to hipster coffee shops. To find
Wi-Fi near you, all you have to do is
look for hotspots.
Hotspots are locations where you'll
find wireless access points, and
hotspots blanket even some of the
smallest towns in America. To some
people finding hotspots is something
of an art form. There are online guides
that list some hotspots, but we'll point
you to some of the less obvious ways
you can find and use both fee-based
and free hotspots. And because not all
wireless networks are perfectly secure,
we'll also warn you about some poten-
tial hazards you'll face while using
public wireless networks.
White Hot
A few years ago, most public
hotspots sprang up in places like coffee
shops, where the technologically adept
arrived with notebook PCs,
cell phones, and PDAs
(personal digital assistants), gathering
for late-night work sessions. Now
you'll find hotspots at airport termi-
nals, McDonald's and KFC restau-
rants, libraries, and even your local
Laundromat, among many, many
other places.
It's usually easy to find Wi-Fi ac-
cess points. Most businesses that set
up these networks also advertise them
with signs inside and outside their
buildings to attract more customers.
Barnes & Noble, for instance, posts
signs inside its stores so that book
browsers know they can browse on-
line, too; this chain of bookstores has
more than 600 stores with hotspots.
But if obvious sources such as book-
stores and coffee shops don't seem to
have hotspots in your area, you can go
online and use directories such as Wi-
Fi FreeSpot (www.wififreespot.com),
which provide lists of locations with
free Wi-Fi access. Using these types of
online directories, you can pinpoint
free hotspots in airports, hotels, RV
parks, and other locations.
Fire it up. Once you find a hotspot,
it's generally very easy to connect and
begin your surfing session. All you
need is your computer and a wireless
adapter that's compatible with the
If your notebook PC doesn't have a built-in wireless adapter,
you can buy one that will work via a PC Card slot such as
D-Link's DWL-G680 AirPremier ($79.99; www.dlink.com).
802.11b standard. Some notebooks
have built-in adapters; if yours
doesn't, all you have to do is buy a
wireless adapter and slide it into one
of your PC Card slots.
Then start your computer and wait
for it to finish loading all of your
startup programs. Most wireless
adapters load an icon in the System
Tray (the area on the far right end of
the Taskbar). If you aren't sure which
icon represents your wireless adapter,
Windows should provide a descrip-
tion of individual icons as you hover
your mouse pointer over each one.
Once you find the appropriate icon,
double- click it to see a list of connec-
tion options.
The menu or dialog box that ap-
pears will display an option called
Available Wireless Networks or some-
thing similar. Select this option, and
in a few seconds, you'll see one
or more networks in your area.
Sometimes these networks have ob-
vious names, such as "Joe's Coffee
Shack," and sometimes the names
look more like gibberish. Connect to
one of the networks and then launch
your Web browser.
Free or fee? What happens next de-
pends primarily on if you're using a
free or fee-based access point. If you
used a directory such as Wi-Fi Free
Spot, you'll know in advance that you
won't have to pay the provider to use
the wireless connection. However,
70 November 2005 / www.smartcomputing.com
many businesses do charge a nominal
fee before you can use their hotspot.
If your browser loads Web sites
normally after you connect, you're
using a free hotspot. But if your com-
puter indicates that you have to reg-
ister personal information and a
credit card number before you can
surf, you'll have to pay to play. If your
computer says you need a login name
and password before you can log on,
check with the business's customer
service desk for this information.
Most hotspots let you pay per hour;
for example, Barnes & Noble charges
around $4 for a two-hour session.
Depending on the location and access
provider, you also might be able to
buy larger blocks of time, such as un-
limited use for a month. In some
cases it might be worth your money
to pay for access, especially if you use
a system such as SBC FreedomLink
(www.sbc.com/gen/general?pid=59
49). Even though this is the company
that provides Web access at Barnes &
Noble bookstores, SBC FreedomLink
also works at thousands of locations
Wi-Fi
Detectors
Serious Wi-Fi lovers
don't depend solely
on online directories to
help them find hotspots.
Instead, some of them in-
vest in Wi-Fi detectors.
These detectors are cheap
($30 or less) and easy to
obtain from online elec-
tronics retailers. Insert a
couple of batteries, turn
on the detector, and it
will tell you if there are
any wireless networks
nearby, as well as indicate
the strength of the signal.
Why bother? Well, if
you're in an area where
you think there's a public
access point, but you're
not sure, you can use a
detector to confirm a sig-
nal. This process is much
faster than taking the time
to pull out and start up a
notebook PC or PDA (per-
sonal digital assistant) in
order to detect a hotspot.
And, of course, you can
use a detector to find un-
advertised, publicly acces-
sible hotspots — the type
of usage that stirs up con-
troversy. It's not un-
common for enterprising
PC enthusiasts to walk or
drive through neighbor-
hoods "hunting" for
hotspots. If these people
find unsecured wireless
networks, they can use
them for their own
surfing and downloading
purposes, thereby slowing
down network traffic.
Wireless freeloaders also
can try to hack into PCs
connected to a particular
hotspot and steal or
damage data on the
users' hard drives.
Unless you're an ex-
tremely mobile profes-
sional that needs
continuous Internet ac-
cess, you probably don't
need a detector. On the
other hand, if you have an
unsecured wireless net-
work, you should defi-
nitely take steps to
defend it and your data
against mischievous users
who routinely use detec-
tors to find unprotected
hotspots they can use for
nefarious purposes. I
The Wi-Fi FreeSpot Web site lists hundreds of places —
such as airports, hotels, and restaurants — that have free
wireless access points.
across the country. Pay a $19.95
monthly fee, and you'll have unlim-
ited access to all of these hotspots.
Security Concerns
No matter where you tap into a
hotspot, you should always keep in
mind that wireless networks aren't
entirely secure. If you use an access
point at Barnes & Noble, for instance,
you'll immediately see indicators of
wireless network vulnerabilities. Even
the company's information brochure
includes a disclaimer
stating that data secu-
rity is your responsibility
and not the company's.
If you're not careful, a
cracker might damage or
steal data stored on your
PC. So, be sure to take the
proper precautions when
you use public hotspots.
At the very least, you
should use a basic firewall
program to protect your
PC. If you aren't ready
to spend money on this
kind of software, you can
download a fully functional version of
ZoneAlarm (www.zonelabs.com),
which is free and will protect your PC
from many threats. This well- regarded
program is easy to use and takes only a
few minutes to configure.
Just as important, you'll want to
protect your computer by disabling
the Windows file- sharing capability,
which will go a long way toward
preventing unauthorized access to
your hard drive. If you're using
Windows 98 or Windows Me, open
the Control Panel, double-click the
Network icon, click File And Printer
Sharing, and then deselect both of the
checkboxes. Click OK to confirm
your changes. In Windows 2000 and
Windows XP, right-click the My
Network Places icon and click
Properties. Right- click the Local Area
Connection icon, click Properties,
deselect the checkbox next to File
And Printer Sharing For Microsoft
Networks, and click OK.
Wi-Fi Heaven
Wi-Fi hotspots are still multiplying
throughout the country, making it
easier and cheaper for you and mil-
lions of other users to stay connected.
In order to put those hotspots to use,
all you need is some basic know-how
and a willingness to take fundamental
security measures and then you'll be
able to hit the Web no matter where
you roam. II
by Nathan Chandler
Smart Computing / November 2005 71
UIIF3EL
W/A
NETWDRK
How vulnerable is an un-
protected wireless net-
work? Well, open the
window and yell. Any-
one who hears your
voice could access an
unprotected network in
your home with little more than a
wireless adapter and a laptop. The fact
is that wireless network security — or a
lack thereof — is a serious issue users
must address if they want to maintain
privacy and protect their data.
Why It's Vulnerable
Of course, every network has its vul-
nerabilities, but what makes a wireless
network particularly susceptible to in-
trusion is that it has so many points of
entry. Unlike a wired network, which
has a finite number of access points,
a wireless network is built around a
range — typically several thousand
square feet — of unlimited connectivity,
and data thieves have devised a number
of methods for exploiting this range.
Wardriving. Also referred to as
drive-by hacking, wardriving is a
relatively simple maneuver by which
a cracker with a laptop, packet- sniffing
Protect Your Air
From Freeloaders & Intruders
software, and an omnidirectional an-
tenna drives slowly through a neigh-
borhood or business park. When the
car is within range of a wireless net-
work, the antenna detects the presence
of an access point, and a message ap-
pears on the cracker's computer screen.
The driver notes the location and keeps
moving. The driver then may return to
the location to Web surf for free or
poke around the network for poten-
tially valuable information, such as
usernames, passwords, or account
numbers. The driver also may publicize
the network's location so that other
crackers can take advantage of it.
The evil twin. If wardriving is like a
wireless mugging, the evil twin is akin
to full-scale wireless embezzling. This
sophisticated method of network intru-
sion refers to the creation of an unau-
thorized access point (referred to as a
rogue access point) that appears legiti-
mate but is really just within range of a
legitimate wireless network. The rogue
access point not only expands the net-
work range but also provides illegiti-
mate users with around-the-clock
access to login information and net-
work content. An evil twin may be cre-
ated intentionally (such as by a cracker
or a disgruntled employee) or acciden-
tally (by an ignorant employee or a
next-door neighbor).
The Solutions
Short of erecting a steel dome over
your property, there is no single
method for securing your wireless
network. Consequently, your best bet
is to embrace a variety of digital secu-
rity methods, including the following.
Encrypt the data. As the first line of
defense for a wireless network, data
encryption protects your wireless
transmissions by converting mean-
ingful content into secret code. Only
those individuals who possess the
corresponding key can translate the
code back into meaningful content.
The original encryption standard for
wireless communications was the WEP
(Wired Equivalent Privacy) protocol.
WEP delivered 40-bit and 104-bit
encryption and was endorsed by the
IEEE (Institute of Electrical and Elec-
tronics Engineers). Unfortunately, it
also proved to break down quite easily
when challenged by encryption experts
and mischievous crackers. A stronger
system of encryption was needed, and
so the WPA (Wi-Fi Protected Access)
protocol was born. Developed by the
Wi-Fi Alliance, WPA and its successor,
WPA2, employ several advanced en-
cryption technologies to provide a so-
phisticated system of key creation and
management capabilities.
You can protect your system by ac-
tivating the best encryption protocol
72 November 2005 / www.smartcomputing.com
WIRELESS
available for your wireless networking
hardware. Start by configuring your
wireless router or gateway first and
then set up the various network
adapters, one at a time. The process
varies from one device to the next, so
refer to your users manual for de-
tailed instructions. Activate the WPA-
Personal or WPA2-Personal option,
if available. If a device does not have
native support for WPA, visit the
manufacturer's Web site to determine
whether a WPA update is available.
Hopefully, one will be. If your net-
work hardware doesn't support WPA
encryption, at least activate WEP
functionality.
Set up a MAC filter. Another effec-
tive method of preventing unautho-
rized intruders from accessing your
wireless network is to set up a MAC
(Media Access Control) address filter.
A MAC address is a 12-digit hexadec-
imal code (such as 00-01-03-28-A4-
Cl) that identifies each access device
in a wireless network. If your wireless
software supports MAC address fil-
tering, you can configure your wire-
less access point to recognize only
those devices that carry a recognized
MAC address; all other devices will be
refused access to the network.
All you have to do is locate the
MAC address for each device. You're
likely to find it printed on a label
:- | Link Status | Statistics
Site Monitor Diagnostics li
Belkin Wireless LAN Utility
-Hardware Details —
: :
'•:: D7010 Rev 4.5
B CM 4306 /B CM 2050
r : :::: -.:■
::; .!.' . ■ I . 7
Driver Version:
3.10.38.0
Driver Date:
1-20-2003
Provider:
r Corporation
Copyright:
38-21 .2, Belkin Corporatio
Reserved.
n All Rights
I
]_
A MAC (Media Access Control)
address filter lets you specify
which particular devices can access
your wireless network. The MAC
address may be printed on a label
attached to the device or listed in
the network setup program.
attached to the device itself; consult
the users manual for assistance. Write
down the MAC address of each de-
vice, double-checking the addresses
to ensure they're correct, and then
follow the instructions outlined in the
users manual to enable MAC address
filtering for your network. Remember
to update the MAC filter when you
add devices to or remove devices
from the network.
Specify a unique SSID. Whereas
the MAC addresses identify the indi-
vidual components that consti-
tute a wireless network, the SSID
(Service Set Identifier) identifies
the network as a whole. Every
device that is part of your net-
work must be configured to rec-
ognize this unique alphanumeric
code. Most manufacturers con-
figure their wireless devices with
a generic default SSID, such
as "linksys" or "netgear," that
A personal firewall, such as
ZoneAlarm Wireless Security
($19.95; www.zonealarm.com)
from Zone Labs, monitors incoming
and outgoing network traffic for
unauthorized intruders.
provides little protection against
crackers wanting access to the network.
You can optimize security by reset-
ting the SSID, which may be referred
to as BSSID (Basic SSID) or ESSID
(Extended SSID), depending on your
system. Either way, choose a long
name — on most systems, an SSID may
include as many as 32 characters — that
incorporates both letters and numbers.
Refer to the documentation that came
with your wireless router and adapter
cards to configure the SSID for each
device in your network. Make sure
every device is set for the same SSID.
While you're at it, disable the SSID
broadcasting feature if it is activated.
When this feature is activated, a wireless
device will continuously emit a signal
publicizing the SSID name to any other
wireless device that comes within range.
The point of SSID broadcasting is to
facilitate convenient access to a wireless
network, which is fine when you're
connecting a new computer to the net-
work but not so acceptable when you
want to keep unwanted intruders away
from your confidential data. Follow the
instructions provided with your wire-
less hardware to disable the feature.
Deploy a firewall. Any network —
wired or wireless — will benefit from a
firewall. A firewall not only filters out
unwanted incoming traffic but moni-
tors outgoing traffic, as well. Fortun-
ately, most wireless gateways and
routers come bundled with firewall
functionality. Refer to the product
documentation for specific instruc-
tions on activating and configuring
the firewall for your wireless access
point. You can further augment this
protection by running a personal fire-
wall on each networked computer.
Invest in a third-party product, such
as McAfee Personal Firewall Plus
($39.99; www.mcafee.com) or Zone-
Alarm Wireless Security ($19.95;
www.zonealarm.com), or take advan-
tage of the free Windows Firewall
deployed by default in Windows XP
SP2 (Service Pack 2).
In addition to a firewall, make sure
you install an up-to-date antivirus
Smart Computing / November 2005 73
WIRELESS
utility, such as Norton Antivirus
($49.95; www.symantec.com) or
McAfee VirusScan ($39.99; www
.mcafee.com), and antispyware util-
ity, such as Ad-Aware SE Personal
(free; www.lavasoft.com) or eTrust
PestPatrol ($29.95; www.ca.com), on
every computer that is part of your
wireless network. These utilities will
catch the malicious programs that can
infiltrate a system and harm the in-
tegrity of your network.
Be careful. Finally, you can protect
your system by engaging in good oP
fashioned common sense. Position
the wireless access point in the center
of your home or office, for instance.
This ensures optimum connectivity
where you need it and limits access on
your property periphery. Wardrivers
will have a hard time breaking into
your network if its range of connec-
tivity peters out before reaching the
street. You also should get in the habit
of turning off your network devices
when you aren't using them. Doing so
removes any possibility of an unwar-
ranted break-in by after-hour snoops
or overnight intruders.
Another worthy habit is to save
your private data, including financial
account information and medical
Security Soup
Users who want to learn
more about wireless
security must navigate a
veritable alphabet soup of
acronyms. There's WEP and
MAC, WPA and WPA2, SSID
andESSIDandBSSID.And
that's just for starters. Here
are other wireless-related
terms you should know.
8011U The IEEE (Institute
of Electrical and Electronics
Engineers) protocol that dic-
tates stringent security stan-
dards for 802.1 1 wireless
networks. Only those prod-
ucts that claim support for
the WAP2 protocol meet the
ame (SSID):
■■■A -.:. i ':. H-tl: :■ jW "
This network requires a key for the following:
'■■■■' : : ;^^ i sm^5 ; i:n i NA;;' i .t: l ;:^!";iJ|
'. Mf/cwo;k Auii K::-.i!':.::cir;i'i iSh.JiRji! m-.r.i::}
Network key:
Key {ormat:
Key Jength:
■ :.; j ■: ■ . .
S? The key i: |
1 104 bits [2S digits) ^
J.
| Apply
It's important to disable the
ad-hoc networking option before
logging into a hotspot. Wily
crackers can exploit this feature
to tap directly into your computer
and steal your data.
records, in a password-protected
folder that isn't part of a shared drive.
A second hard drive is cheap com-
pared to the cost of recovering from
identity theft or consumer fraud. And
while you're at it, make sure you dis-
able the ad-hoc networking option in
your wireless setup program. Crackers
can exploit this option, which allows
two or more network cards to bypass
the access point and communicate
with one another, to tap directly into
your system. Refer to the documenta-
tion that came with your wireless
hardware for assistance.
It's a good idea to pay attention to
system performance, too. If a for-
merly speedy broadband connection
suddenly starts delivering content like
a dial-up modem, you may have
unauthorized traffic on your network.
Try rebooting the system as an initial
response. If that doesn't work, scan
your system for unwanted guests and
then activate WPA, change the SSID,
and implement a MAC filter. That
ought to resolve the matter.
Set It Up
As you've probably figured out by
now, securing a wireless network is a
rather complicated task that requires
a good deal of technical know-how
and plenty of time spent reading users
manuals. The effort is worth it,
though. Even so, you can make things
easy on yourself by purchasing wire-
less hardware that supports the secu-
rity technologies we described and
then implementing the protective
measures during the setup process. II
by Jeff Dodd
full list of 802.1 1 i require-
ments. In contrast, the WAP
protocol represents a middle
step between the easily
cracked WEP protocol and
the robust security of 802.1 1 i.
AES (Advanced Encryp-
tion Standard). A reliable
encryption technology that
employs the Rijndael algo-
rithm and 1 28-, 192-, or
256-bit keys to encrypt
data in 128-bitblocks.lt
was adopted by NIST (Na-
tional Institute of Standards
and Technology) in 2001 as
the official U.S. government
encryption standard. The
802.1 1 i protocol is based on
the AES encryption standard.
EAP (Extensible Authen-
tication Protocol). A basic
protocol on which network
authentication (the process
of verifying a computer's
identity) is based. The WPA
and WPA2 protocols support
five variations of EAP: EAP-
MD5 (Message Digest
Algorithm 5), EAP-TLS
(Transport Layer Security),
EAP-TTLS (Tunneled TLS),
LEAP (Lightweight EAP),
and PEAP (Protected EAP).
RC4(RivestCipher4).A
popular encryption algorithm
that encrypts data one bit at
a time rather than in blocks.
RC4 (pronounced "arc-four")
is the encryption algorithm
employed by the WEP and
WPA protocols. It lacks the
robust strength of the AES
encryption standard but re-
mains in common usage.
TKIP (Temporal Key
Integrity Protocol). A wire-
less security standard that
protects data transmissions
by mixing encryption keys
within each packet of data.
TKIP augments the RC4 en-
cryption algorithm in the
WPA protocol. I
74 November 2005 / www.smartcomputing.com
I I I
Put Wireless
In The Palm Of Your Hand
Near the end of the
first millennium
A.D., King Harald
Blatand of Denmark
united several war-
ring tribes to briefly
consolidate much of
Scandinavia. So why is this little his-
tory lesson appearing in a computer
magazine? The English translation
of "Blatand" is "Bluetooth," and
when engineers developed a tech-
nology intended to let previously
separate electronics devices such as
cell phones and printers communi-
cate directly with one another, they
branded it with Harald's last name.
If you haven't heard about Blue-
tooth technology yet, you probably
don't use a PDA (personal digital as-
sistant), cell phone, or one of the
numerous other devices that incor-
porates this increasingly popular
wireless standard. This popularity
stems from the fact that Bluetooth
transmitters are extremely cheap and
power-efficient compared to faster,
longer-range wireless standards, and
also from the fact that Bluetooth
works very well for a diversity of data
communications chores. It isn't per-
fect — or even particularly fast (yet) —
but once you know a bit about how
the technology works and what it can
do for you, its benefits become im-
mediately apparent.
Bluetooth Basics
Bluetooth is a protocol, which is a
language that electronic devices can
use to communicate. Protocols work
much like the languages we speak,
where devices must support the same
protocol to be able to "talk" with one
another. The main difference be-
tween Bluetooth and other wireless
protocols is that the others are de-
signed to shout, but Bluetooth is
designed to whisper.
A typical wireless protocol such as
802.11b (also called Wi-Fi) is created
to let users connect to a WAN (wide-
area network) or a LAN (local-area
network), sending data over the
longest possible distances. This re-
quires powerful radio transmitters to
send data (the more powerful, the
stronger the signal), which aren't ideal
for mobile devices because they con-
sume a lot of battery power. Receiving
signals from a long range also requires
bulky antennas that aren't ideal for
small mobile electronics devices, such
as cell phones and PDAs.
Bluetooth is designed around the
concept of a PAN (personal-area net-
work), where devices in relatively close
proximity can share data with one an-
other. Although the theoretical max-
imum range of a standard Bluetooth
transceiver is 100 meters, in practice
most devices can communicate only
when they are within a few meters of
one another. This helps reduce inter-
ference from other Bluetooth devices
in the area, decreases the amount of
energy needed to power the Bluetooth
hardware, and diminishes the need for
a bulky antenna.
A Bluetooth PAN is called a
piconet, which consists of one
master device that connects simulta-
neously to as many as seven other
slave devices. The master device can
only send data to and receive data
from one slave device at a time,
but if multiple slaves are connected
at once, the master device can re-
peatedly cycle through them until
they are all through transmitting.
This means no one transmission
must be complete before another
one is started, but it also means that
data transfer rates become slower as
more actively transmitting devices
are added to the piconet.
Eight devices on a network may not
sound like a lot, but that limitation is
just for active devices. As long as they
are not transmitting or receiving data,
as many as 255 slave devices can be
Smart Computing / November 2005 75
WIRELESS
"parked" on the piconet, lying dor-
mant but still connected, so the
master device can make them active
at a moment's notice.
Arguably, the main benefit Blue-
tooth offers is automatic, configura-
tion-free connectivity between two
or more devices. As long as the de-
vices are set to some type of "Dis-
covery mode," they will immediately
sense any other Bluetooth devices in
range, establish a connection, and
prepare to transfer data. This caused
security concerns in fledgling ver-
sions of Bluetooth, but newer ver-
sions of the technology allow for
encryption to protect data as it is
being transmitted. They also let
users set up their devices so that they
only connect with so-called "trusted
devices," letting users assign pass-
words and only connecting with de-
vices that have the password.
Bluetooth Spotting
Bluetooth uses standards called
profiles to handle many different
types of files. Bluetooth uses A2DP
(Advanced Audio Distribution Pro-
file), for example, to stream digital
stereo audio between Bluetooth de-
vices, whereas it uses BIP (Basic
Several PDAs (personal digital
assistants), including Dell's Axim
X50v, support Bluetooth.
Imaging Profile) to transfer images.
There are dozens of these profiles,
and they make Bluetooth useful for
a number of devices.
You can expect to find Blue-
tooth integrated into several leading
PDAs, including Palm's Tungsten
T5 ($349; www.palm.com/us) and
Dell's Axim X50v ($424 and up;
www.dell.com). If you have an older
PDA, there likely is a Bluetooth
expansion card available such as
Belkin's Bluetooth PDA & PC
Adapter Combo Card ($109.99;
www.belkin.com) .
Most modern mobile phones,
including Nokia's 6670 ($379.99;
www.nokiausa.com), also have inte-
grated Bluetooth that works with such
peripherals as wireless keyboards and
lets the phones communicate with
PCs and printers. Imagine sending
pictures from a camera phone to a
PC or uploading music from the
PC to the phone wirelessly — all
without having to establish any net-
work settings. And while we're at it,
we should mention that the most
popular Bluetooth accessory is wire-
less headsets for phones.
Bluetooth also is appearing in cars,
where HFP (Hands-Free Profile) lets
a mobile phone transmit audio to a
car's stereo system. This feature lets
people talk without taking their hands
off of the wheel — and without even
having to fumble around for their cell
phone — as long as the phone is within
range of the car's receiver and is con-
figured for HFP transfers.
Computer users can benefit from
Bluetooth, as well, because it can be a
great alternative to USB for con-
necting peripherals such as mice, key-
boards, and printers. Microsoft, for
Add Bluetooth To A PC
K A ost ^ s don't come
1 VI with integrated
USB interface. These are easy
www.dlink.com), but we
with attached hardware de-
to install because they don't
chose the adapter that ships
vices), and if you plug the
Bluetooth hardware, but
require opening the comput-
with Microsoft's Optical
USB adapter in before
adding a third-party card or
er's case, and they have the
Desktop Elite For Bluetooth
Windows has the proper
a USB Bluetooth transceiver
added benefit of being able
kit ($104.95; www.micro
driver installed, your PC may
is a snap. Setting up the hard-
to work with both a laptop
soft.com/hardware), which
not recognize the adapter or
ware after installing it is a
and a desktop PC. You can
includes a cordless mouse
regard it as a different type of
little more involved, but this
even install the same adapter
and cordless keyboard that
device. You also run the risk
step-by-step tutorial contains
on both computers and
communicate with the PC
of losing access to certain
all of the information you
simply swap it between them
via Bluetooth.
features if you don't install
need to add Bluetooth con-
whether you are working at
a driver ahead of time, so
nectivity to your computer.
home or on the road.
Step 2: Install the software.
be sure to insert the driver's
There are a number of USB
Before plugging in the USB
disc in your optical drive and
Step 1: Buy the hardware. The
Bluetooth adapters on the
adapter, make sure you
follow the setup instructions.
first order of business is pur-
market, including the D-Link
install the adapter's driver.
chasing an adapter, and we
PersonaLA/'r Wireless USB
Windows uses drivers (soft-
Step 3: Add the hardware.
recommend one that uses a
Bluetooth Adapter ($34.99;
ware used to communicate
Because we opted for a USB
76 November 2005 / www.smartcomputing.com
WIRELESS
example, offers an Optical Desktop
Elite For Bluetooth kit ($104.95;
www.microsoft.com/hardware) that
comes with a wireless keyboard,
mouse, and Bluetooth adapter.
The Evolution Of Bluetooth
As with most wireless protocols,
Bluetooth has adapted in order to
change with the times, and there are
several enhancements on the horizon
that should make this great tech-
nology even better. The newest Blue-
tooth, version 2.0, uses technology
called EDR (Enhanced Data Rate) to
transfer data at speeds up to 2.1Mbps
(megabits per second), which is three
times faster than was possible using
the previous versions.
Bluetooth version 2.0 chips con-
sume more power than the older
chips do, but because they transfer
data so much faster, they can shut
down more often, effectively cutting
power consumption in half when
compared to the previous chips.
Very few products currently use
Bluetooth 2.0 technology, but by
next year, the newer standard should
become more common, and it is
backward-compatible with earlier
versions of the technology.
n^
lenu
1 a
| Messaging
m
Contacts
fl©5P
Camera
(#
i.'vtb
Log
RealPlayer
Calendar
Exit
Gallery
3d
Movie
options
J
1
■ u
2 3lX
def 3 J
A ghl
5 Jki
"■"°6J
_7pqfs
8*u,
wxyz 9j'j
* +
g
! HI 1
5 jkl mno6 / *-j
To keep up with consumer
demand, an increasing number of
cell phones now have Bluetooth
support including the Nokia 6670.
In addition, future Bluetooth
versions promise to support improve-
ments on piconets known as scatter-
nets, which combine two or more
piconets into one by letting some de-
vices simultaneously act as masters
and slaves to bridge the networks.
This has the benefit of letting users
have more than seven active slave de-
vices on the same network.
Although it seems to go against
the original spirit of the technology,
Bluetooth's range also is increasing.
Companies such as Belkin already
have products available that com-
municate with other Bluetooth de-
vices at ranges up to 100 meters, and
some enterprising people have even
created high-powered Bluetooth
radios that can connect with other
Bluetooth devices at ranges ex-
ceeding one-half mile.
Finally, and most importantly, the
Bluetooth SIG (Special Interest
Group), which develops Bluetooth
standards, also announced in May
2005 that it is working to incorporate
ultrawideband data transfer capa-
bilities into a future version of Blue-
tooth, boosting maximum data
transfer speeds from 100Mbps to
200Mbps (or even faster). This
would eliminate Bluetooth's major
shortcoming and allow for quickly
transferring large files, such as video,
across a piconet. So, if it seems like
Bluetooth is turning up everywhere
nowadays, just wait until its potential
is fully realized. II
by Tracy Baker
adapter, installing the hard-
"Discovery mode" (check each
automatic or manual passkey
Devices tab, select a device,
ware is as simple as plugging
device's documentation be-
(which is an 8- to 16-digit
click Properties, and make
the adapter into an available
cause this procedure differs
code), select the appropriate
the necessary adjustments.
USB port. If you properly in-
from device to device) and
radio button and enter the
Choose the Options tab
stalled the driver, Windows
use the adapter to add the de-
passkey (if necessary). You also
to change the USB adapter's
will recognize the device
vices to a piconet (a Bluetooth
can select the Don't Use A
settings. Select the Turn
and automatically install it.
PAN [personal-area net-
Passkey option, but we don't
Discovery On checkbox to let
If your computer didn't
work]). To do this, right-click
recommend this for security
your other Bluetooth devices
come with USB ports, you
the Bluetooth icon that ap-
reasons. Click Next to com-
automatically detect and
can purchase a USB adapter
pears in the System Tray (far
plete the process of adding
connect to the computer.
card — such as the Belkin
right end of the Taskbar) and
the device.
Select the Allow Bluetooth
Hi-Speed USB 2.0 5-Port
click Add A Bluetooth Device.
Devices To Connect To This
PCI (Peripheral Component
When the wizard opens, select
Step 4: Additional configura-
Computer checkbox to allow
Interconnect) card ($44.99;
the My Device Is Set Up And
tion options. To establish
connections and select the
www.belkin.com) — that adds
Ready To Be Found checkbox
new settings or to change
Alert Me When A New
several ports to a computer.
and click Next. Wait for the
existing settings, right-click
Bluetooth Device Wants To
After you install a Blue-
scan to finish, click the device's
the Bluetooth icon in the
Connect checkbox if you
tooth adapter, you can set
name to highlight it, and click
System Tray and click Open
want to grant permission on
your Bluetooth devices to a
Next. If you want to use an
Bluetooth Settings. On the
a device-by-device basis. 1
Smart Computing / November 2005 77
plplOODIOli
^□MMI_IIMia=ITinM!
The Technologies Behind
Treo, BlackBerry
& Other Mobile Devices
ot long ago, the only
thing we demanded
from our cell phones
was the ability to make
a voice call from any-
where. Today things
are different. We want
Internet access. We want ringtones.
We want all manner of digital data
files that those early mobile phones
weren't designed to handle.
Fortunately for all of us, the latest
digital mobile phones allow for the
type of technology that can deliver
data at ever-increasing speeds. Up-
coming 3G (third-generation) mobile
products promise to send and receive
data at speeds comparable to those of
good broadband Internet connec-
tions, but until then, we have tech-
nologies such as GPRS (General
Packet Radio Service) to tide us over.
Although GPRS isn't the only data
transmission technology used in to-
day's cell phones and other Internet-
enabled mobile devices, it is one of
the most supported and widely avail-
able technologies. You are likely to
run into it when comparing devices
such as Palm's Treo 650 ($399 and
up; www.palm.com) and RIM's
BlackBerry 7100 series ($299.99 and
up; www.blackberry.com), so it's im-
portant to understand the pros and
cons of GPRS.
Inside GPRS
Understanding how GPRS works
and how it applies to you requires un-
raveling an alphabet soup of other
acronyms. Using GPRS requires a
GSM (Global System for Mobile
Communications) device, which is an
all-digital cellular phone network tech-
nology. GSM was developed in the early
1980s and is seen as a 2G (second-gen-
eration) mobile phone service, but the
fact that it is digital has helped the stan-
dard evolve over the years to accom-
modate data transmission technologies
that are competitive with the initial
iterations of 3G cellular technologies.
GPRS is one of the standards that a
GSM phone can use to transmit and
receive data, from downloadable ring-
tones to Web pages. Technically,
GPRS qualifies as a 3G data transmis-
sion technology because of the rela-
tively high data transfer rates it
supports, but GPRS is often referred
to as a 2.5G (second-and-a-half-gen-
eration) technology instead because it
operates on a 2G network.
On its own, GSM supports data
transmission speeds of only 9.6Kbps
(kilobits per second) or 14.4Kbps, de-
pending on the network. These speeds
are tremendously slow and good for
little more than sending text messages
or browsing simple Web pages. GPRS,
however, achieves a theoretical max-
imum speed of 171.2Kbps, which is
more than three times as fast as a
standard 56Kbps dial-up modem. Of
course, it's not even close to the
speeds most people can achieve using
broadband access through a cable
or DSL (Digital Subscriber Line)
modem, but it is adequate for trans-
mitting the small pictures, com-
pressed music, and tiny video streams
most cell phones and other small
mobile devices can play and display.
Older, slower GSM data transmis-
sion technologies required a connec-
tion between the sending and re-
ceiving devices before they could
share data. This type of connection is
called circuit switching, and it isn't
ideal for data transmissions because
there's only a single path for the data
to flow through. If that path is
blocked or disconnected, the connec-
tion must be reestablished, and all the
data must be retransmitted.
78 November 2005 / www.smartcomputing.com
GPRS solves most of
these problems using a
technique called packet
switching to transmit data, which
works much like the technology used
to send data back and forth across the
Internet. This method chops trans-
mitted data up into small units called
packets, which are each tagged with
headers containing the unique ad-
dresses of the transmitting device and
the receiving device. The packets then
stream out of your phone and across
the cellular network, with each
node in the network handing off
packets to the next node down the
line — until they all arrive at their
destination. Once there, the pack-
ets are reassembled into the orig-
inal data file, regardless of whether
it's a text message, a picture, or
something else.
Packet switching is superior to
circuit switching for transmitting
data for several reasons. First and
foremost, there is no direct path
that the data must take to arrive at
its destination; it's free to pass
from any node to any other node.
Second, if a packet ends up mis-
sing, the sending device can simply
retransmit the missing packet so
that the device at the other end can
assemble an exact copy of the orig-
inal data file. And third, a GPRS
device is always connected to the
network, so there's no need to dial
up or otherwise establish a con-
nection manually — making it ideal
for receiving email while you're on
the go because you receive all in-
coming data immediately.
Unfortunately, GPRS can't always
access all of the bandwidth it needs to
live up to its potential. All cellular net-
works have a limited number of chan-
nels that all connected users must share,
and GSM uses TDMA (Time Division
Multiple Access) to slice each channel
into eight time slots, allowing up to
eight simultaneous calls per channel.
Therefore, when you make a call, send
data, or receive data, the information
jumps around among channels and
time slots, depending on what portions
of the radio spectrum are available at
any given time, and it is rarely possible
for GPRS to use all eight of the time
slots on a channel to achieve its max-
imum theoretical speed. In many cases,
GPRS runs at one-eighth to one-fourth
of its maximum speed because only one
or two time slots are available.
Because of these limitations, plain-
vanilla GPRS is being supplanted by
more advanced technologies such as
EDGE (Enhanced Data Rates for Global
The Treo 650 combines a cell phone with a PDA
(personal digital assistant) in
one of the sleekest packages
BlackBerry devices
are designed for
exchanging email
on the go, and the
GPRS (General Packet Radio
Service) data-transmission technology gives the 7100
series a serious edge.
Evolution). EDGE enhances the basic
GPRS technology to provide speeds
that are two to three times the real-
world data transfer speeds of GPRS,
plus the original technology still has the
support of a variety of products.
GPRS In Action
Several devices support GPRS, but
the two we mentioned previously —
Palm's Treo 650 and RIM's Black-
Berry 7100 series — are the ones that
really show off what the technology
can do for people on the go.
WIRELESS
The Treo 650 combines a cell
phone, Palm handheld, email client,
Web browser, and organizer into one
incredibly sleek package. The large,
backlit color display is ideal for dis-
playing videos and images captured
using the device's digital camera. If
you live in an area served by a GSM/
GPRS network, you can buy a GSM/
GPRS version of the Treo 650 and
send those images and videos to other
people using the same wireless net-
work you use to make voice calls.
BlackBerry devices are known
for their integrated keyboards
and email-anywhere function-
ality, but the 7100 series adds
even more versatility. The device
has slimmed down to mobile-
phone proportions, and (much
like the Treo) it supports voice
calls, email, organizer software,
as well as wireless data transfers
via GPRS. The device comes in
many different styles, but the
only ones available for use in
the United States are the 7100t
(from T-Mobile) and the 7100g
(from Cellular One, Cincinnati
Bell, Cingular, Dobson, and
SunCom Wireless).
Planning For The Future
You should make sure any GSM/
GPRS equipment you buy supports
your local network's frequency be-
cause GSM can operate at 850MHz,
900MHz, 1, 800MHz, or 1,900MHz,
depending on where you are and what
provider you use. If you already have a
GPRS product and are worried that
you should have saved your money for
a 3G device, don't fret; 3G networks
are rolling out at a slow pace because
of all the required upgrades and stan-
dards that are still being hammered
out. Thus, most people are better off
enjoying the benefits of GSM/GPRS
and GSM/EDGE right now instead of
waiting for something else to materi-
alize down the road. II
by Tracy Baker
Smart Computing / November 2005 79
Most add-on
FireWire cards
require Windows
98SE or later and
a PC with a
266MHz processor
and at least 32MB
of memory.
PC Project:
Faster Than A
Speeding Bullet
Ignite Data Transfer With FireWire
If you have an older PC, trying to transfer digital im-
ages, audio, and video is a frustrating experience at
best. If you have a USB port, it likely complies with the
USB 1.1 specification, which transfers data at a maximum
of 1.5MBps (megabytes per second).
That's not bad for 3MB songs or pic-
tures (two seconds per file), but for a
2GB video, it will seem an eternity. If
you have been relying on a serial con-
nection (the small, 9-pin connector on
the back of your PC), you've been lim-
ited to an even more dismal transfer
rate — about 15KBps. At that rate,
transferring a single 3MB file would
take over three minutes.
You can reduce your wait time by
installing an internal, add-on card that
gives your PC a high-speed FireWire
(also called IEEE 1393 or i.Link) port.
A FireWire port will increase your dig-
ital media transfer speed by 30% to
300%, depending on your current
method. Many newer digital cameras,
MP3 players, and digital camcorders
have FireWire ports. If yours does
(check the documentation to make
sure), you are in luck.
The Belkin card we installed
offers both FireWire |j£ $ r
and USB ports.
>"W
Why Play With Fire?
FireWire is not the only kid on the
high-speed block. Its chief competitor
is USB 2.0, which offers data transfer
rates of 60MBps. The original FireWire
standard (1394a) supports data transfer
at 50MBps; the newest standard,
1394b, can transfer data at lOOMBps.
However, both USB and FireWire con-
nections are limited by the capabilities
of the connected device (camera; MP3
player) and your PC, so you may expe-
rience lower transfer rates (usually 20
to 40MBps), even if you purchase a
1394b card.
USB 2.0 is also backward-compatible
with USB 1.1, so users can connect new
USB devices to their older, USB 1.1-
compliant machines (without gaining
the speed advantage). However, Fire-
Wire offers two advantages over USB
2.0. While both theoretically support
daisy-chaining (connecting multiple
devices like pearls on a necklace), in
practice, USB devices often work best
through hubs.
FireWire devices can also eliminate
the need for power cables by
borrowing power from the
PC. (Some notebooks do not
support this capability, and users of
older computers should limit their use
of nonpowered FireWire devices to
avoid overloading the power supply.)
Like USB, FireWire is hot-pluggable,
so you don't need to restart the PC to
80 November 2005 / www.smartcomputing.com
If you have a notebook,
you can opt for an insertable card
and avoid an internal upgrade.
connect or disconnect. Cable lengths
can be up to 14 feet, about the same as
for USB devices (without a powered
hub extending them).
If you're thinking these specifica-
tions suggest the choice is a wash, you
are correct. Fire Wire and USB 2.0 are
very close in most respects. The main
reason to install FireWire is because
you have a FireWire-compatible de-
vice. In particular, digital camcorders
commonly offer FireWire connectivity.
Examine Your Options
If you don't yet know whether you
will install FireWire or USB, you can
install a card that sports both port
types. The PCI (Peripheral Component
Interconnect) card we install here, the
Belkin Hi-Speed USB 2.0 And FireWire
Card F5U508 ($89.99; www.belkin
.com), offers two FireWire and three
USB 2.0 ports. (The newer version of
this card, which bears the same part
name, provides three of each port.)
We chose the Belkin card because it
is easy to install and users report that it
works well. Several manufacturers, in-
cluding LaCie and Adaptec, also make
FireWire cards. If you have a notebook,
making it difficult to add internal com-
ponents, you can probably install a
FireWire adapter. LaCie's Combo PC
Card ($69; www.lacie.com) adds two
FireWire and two USB 2.0 ports.
Get Down To Business
Most add-on FireWire cards re-
quire Windows 98SE or later and a
PC with a 266MHz processor
and at least 32MB of mem-
ory. You must have an
open PCI slot. PCI is a
high-speed data trans-
fer standard used on
PCs after 1993. Virtually all
PCs manufactured after 1995 have
the second, faster PCI 2.1 standard.
The instructions that follow install
this card on a Windows XP machine
with Internet connectivity. If you are
installing it under an earlier version of
Windows or are installing a different
card, the hardware installation will be
similar. However, you should refer to
the instructions that came with the
card for software installation specifics.
Disassembly. Shut down Windows
and turn off your PC. Unplug all power
cords and device cables and place the
main computer box in a well-lit area.
Remove your computer's case. The en-
tire case may slide off, or your PC may
have a side panel that slides off or pops
out to reveal the internal components.
Touch something metal to dis-
charge the naturally occurring static in
your body. If you leave the immediate
area, do this again, or you risk frying
your system's circuit boards.
Slot identification. Look on the
motherboard (a flat circuit board that
covers the bottom or side panel) for
card slots. You'll see several plastic
cards with circuitry inserted into
shallow (about a half-inch tall) con-
nector slots. A few of these slots
should be empty. PCI slots have
two connectors, placed side by
side, with the first connector much
shorter than the second. They are
approximately 3. 5 -inches long and
are usually white or cream.
It's possible that you may not
have an available slot. Ethernet
cards, older video cards, and a host
of other system upgrades use PCI
connections. If not, see if you have
unused cards installed. You may also
be able to upgrade your video card to
Interior access on our test unit was through
a side panel that slid off; some PCs have
side panels that drop down or case covers
that come completely off.
AGP (Accelerated Graphics Port) to
free a PCI slot. Check the documenta-
tion that came with your PC or any
cards you have installed for assistance
removing or upgrading cards.
Card insertion. Adjacent to each slot
is a metal cover screwed over the case
opening where a card's external con-
nectors appear. Remove both the screw
and the metal cover. Remove the new
PCI card from its packaging, holding it
only by the edges, and match up the
connectors to insert it into the open
slot. Press firmly but gently, rocking the
card slightly if necessary to seat it.
Final steps. Use the screw from the
metal cover to attach the card at the
same spot on the PC's box. Replace
the PC case and tighten the screws.
Return your PC to its original location
and reconnect all peripherals.
Make the connection. Plug in your
PC and start it up. Depending on your
version of WinXP, the OS may detect
the new card and install drivers. If it
does not, connect to the Internet and
initiate the New Hardware Wizard.
(Select Control Panel from the Start
Menu, click Switch To Classic View,
and double click Add Hardware.)
Follow the instructions. Be sure to select
the Install The Software Automatically
(Recommended) option when it is of-
fered. Plug in your FireWire device and
you are ready to go. II
by Jennifer Farwell
|November2005 81
Browsers
Quick Studies
Beginner
Add A Spell Checker To Firefox & Internet Explorer
Firefox &
Internet Explorer
The ieSpell
add-on for
Internet Explorer
checks your
spelling as you
enter information
on Web pages.
For better or for worse, we rely on spell
checkers. We also type a lot of text on various
types of Web pages — Web forms, online forums,
shopping sites, and the like — that don't include
built-in spell- checking capabilities. (OK, you can
surely see where this article is heading.)
Fortunately, you can add spell- checking capabil-
ities to browsers such as Firefox and Internet
Explorer. Then, whenever you finish typing some-
thing on a Web page, you can click an option here
and there to find out whether you're about to post
an embarrassing spelling error or typo.
And even when you're using a Web form that
includes its own spell-check feature, some browser
spell- check tools provide other advantages. First,
they're faster than any Web page spell checkers
we've seen. Second, storing the dictionary on your
own computer means you can add custom words
that the program uses wherever you feel
the need to turn on its spelling prowess.
For Firefox Users
To add a spell checker to Firefox, you'll
need to download a specialized extension
or third-party component that provides
new features for the browser. In this case,
the extension we recommend is Spell-
Bound. The SpellBound extension wasn't
accessible through the standard Firefox ex-
tensions gallery when we checked; instead, go to
spellbound.sourceforge.net/install, choose your
browser version (likely Firefox 1.x), select your OS
(operating system) from the drop-down menu,
and click Install. You'll probably see a security no-
tice at the top of your Firefox window, along with a
special Web page describing how Firefox blocks
potential security threats. Follow the instructions to
assure Firefox that the download is safe. You'll
need to restart Firefox to complete the installation.
Next, load a dictionary for the spell checker to
use. A wide range of languages is available, in-
cluding five varieties of English. Go to diction
aries.mozdev.org/installation.html and click a lan-
guage. If you see a security notice at the top, click
Edit Options and then click Allow. Click OK and
click the language link again to reattempt the in-
stallation. In the Software Installation box, click
Install Now. You soon should see a small dialog
box confirming the installation.
Test out your new spell checker by browsing to a
page that includes a form — even the simple search
field at Google. Type a misspelled word, but before
you submit the form or perform the search, right-
click and choose Check Spelling. A standard spell
check window appears with suggestions for you to
consider when replacing the misspelled word.
For Internet Explorer Users
IE doesn't have the same fancy extension capa-
bility that Firefox boasts, but there are plenty of
extension-like add-ons available. Our favorite in
the spelling realm is ieSpell, which is free for per-
sonal use. Go to www.iespell.com and look for the
download link on the page's left side. After in-
stalling ieSpell, you might need to restart IE.
After typing a few words into a page's field or
form, you can launch ieSpell by selecting ieSpell
from the Tools menu or clicking the ieSpell button
on the main toolbar or right- clicking the field and
choosing the ieSpell command. Like SpellBound,
ieSpell presents a familiar spell check window. You
can choose to replace the word with one of ieSpell's
suggestions, tell the program to ignore the word, or
add the word to your dictionary.
Another Option
The add-ons we described aren't the only ones
available for adding spell- checking capabilities to
your browser. For instance, the Google toolbar
(toolbar.google.com/firefox for Firefox; toolbar
.google.com/index_2 for IE) now includes a spell
check function. Just click the Check button after
typing a word or phrase in a Web page's field or
form, and possible misspelled words will appear
underlined in red. Click a word to see the spelling
suggestions that the Google toolbar displays in a
small drop-down menu. Pick one of the proffered
alternatives, and it automatically takes the place of
the word you typed. The Google toolbar also lets
you add new words to the dictionary or ignore all
instances of a particular word. Even so, Google's
spell checker requires the use of the Google toolbar.
So, if you don't want another toolbar on your
browser window, just remember that SpellBound
and ieSpell stand ready to help. II
by Alan Phelps
82 November 2005 / www.smartcomputing.com
Quick Studies
Spreadsheet
Intermediate
2002 for
Win9x/NT
4.0/2000/XP
Microsoft Excel 2002
Using Templates
Start every
workbook
with settings
customized for
your business
by creating
templates. Save
the templates in
folders to keep
them on tabs in
the Templates
dialog box.
Sometimes getting in a rut isn't all that bad.
When you find a setup that works for your
Excel worksheets, there's nothing wrong with
sticking with it. Don't think of it as being boring as
much as being efficient. If most of the workbooks
you work with tend to be set up in a few common
ways, streamline your work by giving up on man-
ually formatting each workbook. Instead, use a
template to ensure that each workbook starts its
life with all of your preferred settings in place.
The idea of templates is
familiar to Office users,
but you may not have
used them much in Excel.
While most PowerPoint
documents start life as a
template, the typical Excel
user creates everything
from the blank slate of a
plain, unformatted work-
book. Although you may have never used them,
Excel does come with a few built-in templates. To
see them, choose File and New. In the task pane
on the right side of the screen, click General
Templates. The dialog box's Spreadsheet So-
lutions tab includes five templates for common
workbooks such as an expense statement, sales
invoice, and timecard. Double-click one to start a
new document based on the template. (If you've
never used the templates, Excel may tell you to
insert the Office CD so it can install them.)
If you'd like more options in templates, jump
online and download a few. You'll find them
for free download at the official Office website
(office.microsoft.com). Plus, you'll find plenty
more available online with a Google search.
Keep in mind that building a document around
a template doesn't change the template itself.
When you start modifying a new workbook, the
template remains unchanged, so you can repeat-
edly use it to create new files.
Create Your Own
Most of the time, you'll prefer customized work-
books to anything someone else provides. Excel
makes it easy to save your own. Modify a work-
book to reflect the settings you want for details
such as column widths, colors, fonts, formulas,
and text that appears in certain cells.
The secret is in the saving. While your properly
modified workbook is open, choose File and Save
As. Give it a name such as Acme Expense Template
and then click the arrow beside the Save As Type
drop-down list and choose Template (*.xlt). Excel
should automatically switch the active directory to
the Templates folder, which is where you should
save all templates for the easiest access.
Now when you click New and General Tem-
plates, you'll see your Acme Expense Template on
the General tab in the Templates dialog box.
Double-click it to start a new workbook with your
preferred expense report settings in place. When
you save your new workbook for the first time, be
sure to choose the right folder. Excel will probably
try to save it in the Templates folder by default.
You can organize your custom templates by
creating folders within the Templates folder with
names such as Travel and Payroll. When you
choose File and New and click General Templates,
you'll see a tab for each of the subfolders you've
created, along with their corresponding templates.
Any template can be modified at any time.
Remember that modifying the template does not
affect any existing workbooks you built around
the template. The changes will appear only in files
created in the future.
Set A Default Template
Some Excel users perform nearly all their work
in a single kind of workbook. In those situations, it
might be a real time-saver to set up your own tem-
plate as Excel's default. When you do this, every
document you create with a quick click of the New
button on the Standard toolbar will feature all of
the settings you put in the default template.
You can make any template the default. Format
a workbook as you like it and save it in the XLStart
folder as Book.xlt. (You should find XLStart within
your overall Office folder.) Once it's saved there,
you can open and modify this template just as you
would any other Excel workbook. Each time you
save the template, all new workbooks built with it
will show the same changes. If you decide you want
a different template for default documents, save a
new document with the Book.xlt name or delete
BooLxlt to revert to Excel's defaults. II
by Trevor Meers
Smart Computing / November 2005 83
Intuit Quicken 2005 Premier
Quick Studies
Personal Finance
Intermediate
2005 for
Win98/Me/
2000/XP
Benefits Of A Balanced Budget
To make your
budget more
manageable,
try removing
some expense
categories that
you don't use or
need to track.
If unexpected expenses are continually throw-
ing a wrench into your financial plans — such as
when gas prices jump a quarter per gallon over-
night — creating a flexible budget can help you stay
on track.
Quicken 2005 Premier has plenty of budgeting
tools to help you stay on track with even the most
unorthodox budget situation.
Start A Budget
To start the budgeting process, click Planning
and Budget. Quicken will open the Budget
window and help you set up a budget.
Setup (Automatic). In the Setup portion of the
Budget window, you can choose whether to auto-
matically or manually create your budget. If you
have been entering your financial transactions in
Quicken for a couple of months, select Automatic
and click Create Budget. This is the easiest and
fastest way to start working with a budget in
Quicken. The software will use your previously
entered data to set the budget amounts.
After selecting Automatic, Quicken will ask
how you want to set up the
budget's parameters. Click
the Categories button if
you want to remove some
categories from your bud-
get. After making all of
your selections, click OK.
Setup (Manual). If you
have no financial transac-
tions entered elsewhere in
Quicken, you probably
will be better off selecting Manual. (Better yet,
you may want to wait to create a budget until
you've entered at least a couple of months' worth
of financial data into Quicken, which will help
you create a more accurate budget.)
Regardless of which option you choose, you
can always edit the values during or after the
budget-creation process. For the remainder of
this process, we'll assume you're using the
Automatic option. (Special instructions for
Manual budgets will appear in parenthesis.)
Income. The list of income categories will ap-
pear in the main window. (If you are using a
Manual budget, click the Choose Categories
button. Then select the income categories you
want to use and click OK.) To edit the amounts,
highlight an income category and enter the data
on the right side of the window.
Choose the budgeting method you want to use:
Average, Monthly Detail, or Quarterly Detail.
Average will spread the budgeted amount evenly
over 12 months. Monthly detail allows different
amounts each month; quarterly detail allows dif-
ferent amounts each quarter. Then enter the
amount(s) to use and click Apply. (In the main
portion of the window, though, Quicken will al-
ways show the monthly average.)
Expenses. When you've finished with the
Income portion, click the Expenses tab, and the list
of expense categories will appear. (For those using
a Manual budget, click the Choose Categories
button, select the categories you want to use, and
click OK.)
To edit amounts in each category, follow the
same procedure as with the Income portion. The
only difference is you can set an alert when your
actual spending exceeds the budgeted amount in
a particular category.
If you're using an Automatic budget and you
don't want to use some of the categories listed in
the Income or Expenses portions of the Budget
window, click the Choose Categories button to re-
move categories from your budget. (You can add
extra categories using the same procedure.)
Savings. After completing the information in the
Expenses portion, click the Savings tab, where you
can track any money you regularly save or invest.
Click the Choose Accounts button to select savings
or investment accounts from within Quicken to in-
clude in your budget. After clicking OK, highlight
an account and enter the amount you regularly add
to that account. Then click Apply.
Summary. Click the Summary tab to see a table
listing all of your budget data, divided by month.
To see additional detail in one of the months,
highlight the amounts in a particular month and
click Details.
Quicken also will create a pie chart that shows
what percentage of your expenses are devoted to
each category. To change the look of the pie
chart, click the Top Yearly Budget Items menu
and select either Discretionary Spending or
Mandatory Spending. II
by Kyle Schurman
84 November 2005 / www.smartcomputing.com
Online
Quick Studies
Intermediate
Online
Bring Online Info To Your Desktop With Widgets
Konfabulator,
recently acquired
by Yahoo!,
includes widgets
that scrape
sites to bring
current online
information to
your Desktop.
Yahoo! Widgets (widgets.yahoo.com) scrape
and gather Web page information and display
that info in colorful little packages where you're
most likely to see it: on your Windows Desktop.
Widgets are free, shiny, and something new to
fiddle with besides your screen saver. Basically,
these small programs display simple data — the
weather, how many emails you have, traffic condi-
tions, and the like — either on top of or underneath
your other open windows. Once known as Konfab-
ulator, the software that makes widgets possible re-
cently was gobbled up in an acquisition by Yahoo!.
Sure, you can access the same type of info via
your browser; after all, it's not that hard to look up
the weather forecast. If you have the screen space,
though, a little widget or two can turn your boring
Desktop into an always-on readout of useful data.
Widget Basics
Visit the Yahoo! Widgets home page to
download the latest version. Yahoo! in-
cludes a few widgets with the installation
package that will get you started. Some wid-
gets, but not all of them, load by default.
For instance, you'll soon see an analog clock
(complete with a second hand), a weather
forecast, and the Picture Frame, the latter of
which is a small image viewer that cycles
through photos on your Flickr (www.flickr
.com) account or on your hard drive.
To see what other widgets you already have,
open My Documents and My Widgets. Double-
click a widget icon to load it. Any widget you
leave open when you shut down your computer
will automatically load when you restart your PC.
Each widget has its own customizable settings.
To select an individual widget's options, right-click
the widget and choose Widget Preferences.
Although widgets are different, they all have at least
the Window options in common; this is where you
choose whether widgets should float on top of
other windows, always appear below everything
else on-screen, or act like typical windows that can
be in the foreground or the background, de-
pending on what you click. Another control,
Opacity, determines if you can "see through" the
widget when it overlaps another screen element.
Depending on a particular widget's settings, you
might be able to right-click a widget only when in
Konspose mode, which darkens everything on-
screen except widgets. Yahoo! might change this
option's name, but you can probably still toggle it
on or off by pressing F8. When in Konspose mode,
you can move widgets around, select widget op-
tions, or just stare at them for hours on end.
More Shiny Things
After you get started down the widget road,
you'll likely want even more widgets. You can find
them in the widget gallery at www.widgetgallery
.com. (If this Web address doesn't work, check the
Yahoo! Widget home page for a link.) The gallery
includes a list of categories on the left side of the
page and widget descriptions on the right. As of
this writing, the gallery includes more than 600
widgets, and all of them are free for personal use.
If you want to browse through the gallery's wid-
gets, scroll down and click Older to see the widgets
in reverse order of when they were submitted to the
gallery. If that sounds tedious, select a category to
narrow your search. If you come to a widget that
sounds interesting, click Download. When your
browser asks where to save the file, browse to the
My Widgets folder in My Documents. Some wid-
gets are compressed into zipped files, so you'll need
to extract those before you can use those widgets.
When a download is complete, go to My Widgets
and double- click the new widget's icon.
The more widgets you have, the harder it will be
to find space for them all. This is one area where
the Konspose mode can come in handy. You can
set up some widgets so they appear on your
Desktop all of the time; then, you can set up the
other, lesser widgets to appear only when you
toggle into Konspose mode. That way, you don't
need to make room on your Desktop for every-
thing, but your widget collection will be easy to ac-
cess at any time by pressing F8.
The Widget Shuffle
Widgets aren't the end all, be all; you might even
grow tired of them and decide that your former
clean screen has a greater appeal. But with new
widgets continually popping up, you never know
when one will strike your fancy. II
by Alan Phelps
Smart Computing / November 2005 85
Jasc Paint Shop Pro 8
Quick Studies
Image Processing
Advanced
The Histogram
8 for Win98SE/
Me/NT 4.0/
2000/XP
(NOTE: Corel
acquired Jasc
Software, so the
most recent
version, Paint
Shop Pro 9, may
list Corel as
the developer)
The Histogram is
a fun tool you
can use to
correct a photo's
contrast,
brightness, and
color balance.
The Histogram
Adjustment
dialog box makes
it easy to
perform subtle
contrast
modifications.
Whether you're a hobbyist or a professional
image editor, you've likely used Paint Shop
Pro's one-step color and contrast adjustment tools.
If you fall into the latter category, however, you
may have found that the One Step Photo Fix com-
mand and other tools, such as the Automatic
Contrast Enhancement command, don't give you
the exact amount of control over a photo that you
need, especially if your PC's display is less than per-
fect. That's where the Histogram comes in handy.
The Histogram is a graph that displays the dis-
tribution of various image values: red, green, blue,
greyscale, hue, saturation, and lightness. Not only
does it let you see specific values for each compo-
nent, but it also lets you adjust a photo's color and
contrast in precise ways. There's a lot to the tool,
so in the limited space of this article, we had to
narrow our focus and cover only con-
trast and brightness adjustments.
Get Acquainted
Before you begin, it's important to un-
derstand what the graph shows. Launch Paint Shop
Pro, open a photo, and make a selection within it.
(We recommend selecting a small portion of a
photo the first time you use the Histogram to make
it easier to understand what you're seeing.) Then,
open the View menu, select Palettes, and click
Histogram. No matter what photo or selection you
chose, you'll likely see a colorful, confusing chart
with many spikes within it. The chart initially dis-
plays all the selected channels, and a different color
represents each channel. Pick just one — for ex-
ample, Green — and deselect the others.
The horizontal axis shows you the amount of
green ranging from (no color) to 255 (full
strength). The vertical axis shows you the number
of pixels that reside at each color strength. Place
your pointer at any spot along the graph, and you'll
see that color's strength by looking at the values on
the right side of the Histogram window. For in-
stance, in our chart, we see a large spike at the value
of 157, which tells us that in our selection, there are
many pixels with a green value of 157.
Greyscale also ranges from to 255, but rather
than showing the amount of gray, this value repre-
sents a range from black (0) to gray (about 127) to
white (255) and indicates how bright or luminous
a selection is. You can use the Histogram to learn
more about a photo's hue, saturation, and light-
ness, too. If the selection is undersaturated, when
you select the Saturation checkbox, you'll see a ma-
genta spike on the left side of the chart. If the selec-
tion is overly saturated, you'll see more values and
spikes toward the right side of the chart. Another
way of analyzing saturation is to think of it as the
level of gray added to the hue, or the actual color.
In addition, the Histogram can tell you about
hue values, which correspond to the values on a
color wheel. The selection we chose as our ex-
ample has a range of reds and oranges, and not
surprisingly, when we select the Hue channel, we
see a large spike at the value 30, which lies be-
tween red (0) and yellow (43).
Final Adjustments
OK, now that you understand a little bit about
what a Histogram can tell you, what can you actu-
ally do with that data? One key correction you can
make is to adjust a selection's contrast. From the
Adjust menu, choose Brightness And Contrast and
click Histogram Adjustment. In the dialog box,
select the Luminance radio button and then select
Default from the Presets drop- down menu.
If the contrast is a bit "off," the darkest pixels in
the selection aren't black and the lightest pixels in
the selection aren't white. If the data doesn't reach
both ends of the horizontal axis, click and drag the
Low slider to the far left end and then click and drag
the High slider to the far right end. This effectively
stretches out the data, and you can see the differ-
ence this adjustment makes by comparing the two
selections in the preview window. If the overall
image is too dark or too light, move the Gamma
slider to the right or the left, respectively. Click OK.
To use the automated Histogram tools, open the
Adjust menu, select Brightness And Contrast, and
select Histogram Equalize to "spread out" the se-
lection's brightness (distribute the pixels' lightness
values more evenly). Or, for another type of effect,
select Histogram Stretch (from the Brightness And
Contrast submenu of the Adjust menu) to increase
a selection's contrast. Granted, these last two tools
aren't as fun as the Histogram Adjustment tools,
but sometimes a one-step process will do the trick
if you're in a hurry. II
by Heidi V.Anderson
86 November 2005 / www.smartcomputing.com
Microsoft PowerPoint 2002
Quick Studies
Presentation
Advanced
2002 for
Win9x/NT4.0/
Me/2000/XP
Clarify your
abstract ideas
the fast way:
Turn them into a
Pyramid Diagram
or one of the
other diagrams
PowerPoint
helps you create.
Using Diagrams
No good business presentation goes by with-
out a few charts and diagrams. With Power-
Point's Diagram Gallery, you can add preformatted
conceptual illustrations and fill them in with your
specific points.
Types Of Diagrams
Click the Drawing toolbar's Diagram Gallery
button to produce a dialog box with options for
six types of diagrams.
Organization Chart. These charts show who
reports to whom in a company. They're great for
showing new employees how many middle
managers are above them or for explaining
corporate reorganizations.
Cycle Diagram. Maybe you need to teach
a bunch of third-graders about the circle of
life. Or perhaps you just need to show man-
agers how employees revert to a low perfor-
mance level without training and feedback.
Use a cycle diagram whenever you're illus-
trating a continuous or looping process.
Radial Diagram. Like a hub and spokes, this
diagram illustrates how multiple elements all re-
late to a central person, idea, or office.
Pyramid Diagram. When you can't accomplish
step two without solid results from step one, illus-
trate the idea with a pyramid diagram. This shows
relationships built on successive foundations.
Venn Diagram. Who knew there was a name for
these things? Think of all those charts you've seen
where several circles with names such as Market
and Idea touch each other, and the shaded overlap
areas indicate a special area such as Opportunity.
Venn Diagrams help you illustrate how concepts
combine to form special situations.
Target Diagram. This one's universally recog-
nized. Place results on this diagram to instantly
see how close you are to reaching the goal.
Editing Diagrams
In the Diagram Gallery, double- click the type
of diagram you want to add, and PowerPoint
drops a basic version of it onto the active slide.
The Diagram toolbar appears on-screen with
controls for working with your new illustration.
One of your earliest concerns may be sizing the di-
agram to better fit your slide. Click the Layout
button and choose Scale Diagram from the drop-
down menu. Now you can drag the sizing handles
around the diagram to enlarge or reduce it.
Each diagram type comes with text boxes in
different places. Organization charts, for example,
have text boxes on each shape. Venn Diagrams
place the boxes just outside each circle. To add
your own text to any box, just click it and start
typing. Format the text by highlighting it and
using the usual array of buttons and drop -down
menus for items such as font, color, and size.
The individual elements that make up diagrams
are AutoShapes just like those you would manually
insert. That means you can click them and use var-
ious tools on the Drawing toolbar to adjust their
look. To put a red circle in the center of a Target
Diagram, for example, click the center circle, click
the toolbar's Fill Color button, and choose red. If
you want a 3D look for an entire pyramid dia-
gram, hold down the SHIFT key as you click all
the pieces. Then use the Drawing toolbar's 3-D
Style button to get the look you want. (If all the
editing options are grayed out, right- click the dia-
gram and uncheck the Use AutoFormat selection.)
PowerPoint's diagrams often won't have all the
parts you need to tell the story, but you can add
more. Click the element you want the new one next
to and click Insert Shape on the Diagram toolbar.
You can move one element elsewhere in the dia-
gram. Click the element and use the Move Shape
Backward and Move Shape Forward buttons to
slide it through each position in the diagram.
New Looks Fast
PowerPoint offers predesigned styles to help
you create good-looking diagrams. Restyle a dia-
gram by clicking the AutoFormat button on the
Diagram toolbar. The dialog box offers 10 looks.
You can even switch diagram styles in mid-
stream if you decide a Cycle Diagram, for example,
would make your point better than a Radial. Click
the Change To button on the Diagram toolbar and
choose the type of diagram you want to switch to.
PowerPoint moves text into the appropriate boxes
when you convert styles, but you'll lose any special
formatting. If you decide switching styles was a bad
idea, press CTRL-Z to go back. II
by Trevor Meers
Smart Computing / November 2005 87
Quick Tips
Secrets For Succeeding In Common Tasks
by Stephen J. Bigelow
Outlook
I can't spell to save my life, and I'm al-
ways sending emails with embarrassing spelling
errors in the text. Can I check spelling on the fly
without having to do it manually each time?
Answer: Email clients such as Microsoft Outlook
2000 can be configured to automatically check
your spelling before each message is sent. With
Outlook running, click Tools and Options, click
the Spelling tab, and then select the Always Check
Spelling Before Sending box. Now click Apply
and OK to save your changes.
Laser Printers i: Why is there a dark black line all the
way down every page that comes out of my laser
printer, and how can I stop it?
Answer: Laser images are formed when a laser
beam discharges points on an electrically charged
drum. However, the drum must receive a uni-
form electrical charge to begin with, and this is
typically accomplished by applying a high voltage
across a bare wire (called the primary corona) lo-
cated along the drum surface. Sometimes, dust
or other foreign matter can accumulate on the
wire (attracted by the high voltage), preventing
I always forget to request read receipts
(or make timely responses to receipt requests).
Is there any way to automate handling read re-
ceipts for email?
Answer: Email clients such as Microsoft Outlook
2000 allow you to automate receipts. With Outlook
running, click Tools and Options, click the E-mail
Options button on the Preferences tab, and click
the wire from precharging that point on the
drum. As the drum rotates, toner is always at-
tracted to the uncharged spot, resulting in a solid
line that runs the length of each page. You can
usually fix this problem by turning off the
printer, allowing 10 to 15 minutes for the unit to
cool and discharge, and cleaning the primary
corona wire with the little wiper that is usually
included in the development cartridge. Check the
users guide for your printer for specific cleaning
instructions. If you cannot clean the wire (or the
problem persists), replace the electrophoto-
graphic cartridge.
the Tracking Options button. If you routinely need
read receipts for your outgoing mail messages, se-
lect the Request A Read Receipt For All Messages I
Send box. Now each time you send an email, a read
receipt is automatically requested — you won't need
to manually specify a receipt. If you must respond
to regular receipt requests, select the Always Send A
Response button at the bottom of that dialog box.
Be sure to click OK to save your changes.
Outlook can be
configured to
automatically
check spelling
each time you
click the Send
button.
Preferences | Mail Delivery Mail Format Spelling | Security j Other |
General options —
■■ .'. . ... ' •■ •■ . .
•/ Always ched spelling before sending
r Ignore words in UPPERCASE
Ignore words with numbers
17 Ignore ' or forward
im dictionary
ab'gf Add, ch i
Language: | English (U.S.) ~^\
Tracking Options
allow email users to
attach read receipts
and manage read
receipt requests
without manual
intervention.
Tj ::'■. J-JJj.-;. 0' ],' [J'jJj.. ^I^JLJI
Options
00
. ..
7 Process reflue ;es on arrival
•* Process receipts on arrival
After processing, move receipts to
iDeletedltems Bro.se... j
117 Request a read ecr messages I send
Use this option to : ;o respt quests for read
♦ Always send a response
end a response
f Ask me before sending a response
OK | Cancel |
88 November 2005 / www.smartcomputing.com
Quick Tips
I've had a CRT (cathode-ray tube) for
years, and it's recently started to flicker briefly
(accompanied by a slight crackle), but it always
returns to normal. Is the CRT on the way out?
Answer: Your CRT monitor is probably in the
early stages of a high-voltage circuit failure. It
takes up to 30,000 volts to operate a CRT (some-
times a bit more for large CRTs). As the monitor
Scanners Why do my scanned images have dirty
spots on them?
Answer: Chances are good that your glass scan-
ning bed is dirty. Over time, it's almost inevitable
that dust, pet hair, paper fibers, or other debris
may accumulate on the glass bed. This usually ap-
pears in subsequent scans as dirt or splotches.
Embedding Question: I circulate lots of documents among
Fonts my co-workers, but I often find that some folks
can't properly view the documents because
fonts are missing. Does everyone need to install
the same fonts?
Answer. That's certainly one solution, but there
may be an easier alternative: Simply opt to
embed the fonts along with the document. If
you embed the fonts with the document file,
Embedding fonts with your Word document
ensures that recipients can view your document
exactly as prepared.
ages, the high-voltage insulation starts to break
down, allowing for occasional, brief short cir-
cuits that can momentarily darken the monitor.
There's no immediate danger — the monitor
won't explode or catch fire — but you might shop
around for a repair facility that specializes in your
monitor and weigh those repair costs against the
purchase cost of a new CRT or LCD (liquid-
crystal display) monitor.
The best solution is prevention — periodically
dust the glass with a dry, lint-free cloth. Avoid
wetting the cloth unless you're trying to remove a
stubborn stain or mark. If you must apply a
cleaner such as Windex, be sure to dampen the
cloth. Never spray directly onto the glass bed.
Also remember to gently wipe down the white
plastic coating on the scanner bed's lid.
each recipient can view the document exactly as
you prepared it, regardless of the fonts actually in-
stalled on each system. For example, with Word
2000 running, click Tools and Options, select the
Save tab, and then check the Embed TrueType
Fonts box. Now each time the document is saved,
a copy of the fonts represented in the document
will also be included with the document. However,
saving a large number of fonts can make the
overall file significantly larger. If you want to be a
bit more frugal on overall file sizes, you can also se-
lect the Embed Characters In Use Only box, which
will only add data for the font characters that you
actually use (rather than the entire font file).
Program Confrol
Internet i: How can I tell which programs are
communicating across the Internet?
Answer: If you're using a firewall, the firewall
utility will list the executable files that are commu-
nicating between your PC and a remote location
(usually somewhere on the Internet). Open
your firewall's control panel and look for the
Program List. For Norton Internet Security,
the list is accessible via the Programs tab.
Scroll down the list to see every application
Use your firewall as an early warning system to
identify suspicious programs communicating
from your PC.
that is communicating (and the authority that
each application is issued).
This list often provides a handy early warning of
spyware activity. If you notice a program that
you don't recognize, you can opt to block it
(preventing communication) or remove the pro-
gram from the list entirely. The firewall should
warn you if that program attempts to communi-
cate again. Of course, if you later realize that a
particular program is actually something that is
needed, you can always re-enable or repermit
communication. If you find unexpected applica-
tions trying to communicate from your PC, it's
worth running an antispyware utility to scan for
malicious software.
Smart Computing / November 2005 89
SmartComputing.com
Your Computer's
Online Lifeline
SmartComputing.com is not only what you need to keep your computer running smoothly, it's also where you
can go when your computer's in need of a tune-up. We'll help you diagnose the problem, treat it, and get your PC
back up and running. Here are just a few of the benefits of subscribing to Smart Computing:
Article Search By Topic
Visit www.smartcomputing.com and click
Search All Articles. Use the three-step de-
tailed search to find the computing infor-
mation you need, when you need it!
Q&A Board
You've got questions, we've got
answers! Visit www.smartcom
puting.com, select Q&A Board,
and post a question for around-
the-clock, user-to-user computing
help. Plus, you'll be notified via
email every time your question re-
ceives an answer!
Free Technical Support!
Ever seem like your PC's operating system
needs to go to the operating room? Well,
browse through our Tech Support Center at
www.smartcomputing.com to get your PC
functioning the way it should. Or call (800)
368-8304 to talk to a live representative for
free! Phone support is available 7 a.m. to
8 p.m. CST, Monday through Friday.
Were your OHC-Stop Shop for
computer problem-solving.
» Support Center, call us up anJwi'll w? f uu ll.iiu.jh Ihe problem.
Visit our 1 ■; c r'l jLflcor: Ler!6- .
Log on today to take advantage of these and every
thing else Smart Computing has to offer. Your com-
puter will thank you with its performance.
90 November 2005 / www.smartcomputing.com
Find More Online
Find Answers
My Personal Library
We can't possibly fit every helpful tip, tweak, or troubleshooting tidbit in print. That's
why you'll find a wealth of resources at our Web site, www.smartcomputing.com.
Here are some tips for using our Web site to find more information about
the articles in this month's print issue.
Search Articles Online
If you're looking for more information on
wireless technologies, visit SmartComputing
.corn's extensive archive of articles. Simply
click the Search All Articles link in the blue
left-hand side menu. Search the latest issue of
Smart Computing or check out previous is-
sues. For a more detailed search, scroll to the
bottom of the page and enter a term (e.g.,
Bluetooth, Treo, or BlackBerry) and find
even more information!
PC Today.
Your Mobile Authority
Be sure to check out PCToday.com,
SmartComputing.com's sister site, which of-
fers even more information on wireless tech-
nology. PCToday.com provides online
articles, Technology Guides, and other mo-
bile information. Log on to PCToday.com
and scroll the left-hand side blue menu to
find links to all of these great articles!
JComputing.
>IF«.MWJTO^|JffW|M
Search Options
Foi a solution to .1 ipedfk problem, we snomjly smjijest yon visit out r?cfo ^nj-j"
Browse;
Latest Issue af Smart Comoamxf
Biowse All Issn**:
SrrmtGwwfiinqimb ALL Computing ft Consume' Efeelrcmcs Fubkatrons
Blows* All Ankles:
Smart tfompm JfWQply ,
f'E'e;lr°".'t$Pvfrl'Ca1ians
3-Step Detailed Search:
Smart Computing, including
PC Novice Reference Series,
Gwrfe Series, and Lssming
Series
General computing: tips, tutorials,
troubleshooting, hardware, and
software
D
Comfufi » Power Wwr (CPU)
High- end personal computing
□
PC Today
Mobile Phone 4 PDA Tips, W 9 b Site ft
Online Service Guides. Office Software
Tutotisls
□
CG Lifestyles/ CE Tips
Consumer electronics
□
Processor
Business/ Enterprise c ampul ing
Step <2> ** Pick An Aiticte Type:
O Tui oiials on i n stalling . upg lading , rep la c i ng , optimising . etc .
O General information
<5 Search ALL (may return many results)
i 3 ■ » Finally, click ,1 category fioni rlie list !■■■!■ ■■--.■...
Search All Articles
Read Hardware Review
Create Comparison Che
Read Software Reviews
Web-Only Articles
Q&A Board
Computing Chat Room
'irectory Of Web Sites
mputing Dictionary &
ily Tip Archive
Web Log Archive
Subscribe & Shop
User Groups
Advertising
About Us
Extras
SmartComputing / November 2005 91
SmartComputing.com
Solutions Knowledgebase
Can't find answers to your common computer issues and frequently asked questions? Take a look at our Solutions
Knowledgebase in the SmartComputing.com Tech Support Center. Here you will find answers to many Common
Problems and Frequently Asked Questions, all with helpful translations and solutions. Browse or search this useful
knowledgebase and find answers quickly and easily!
IGo to www.smartcomputing.com and click
the link to the Tech Support Center on the
home page. If you're a subscriber, be sure to log in
first on the home page.
2 Once in the SmartComputing.com Tech
Support Center, scroll down and click the links
in the Solutions Knowledgebase area to search or
browse the Common Problems and Frequently
Asked Questions.
/
Tiy 3 Issues of Sm,?rf
Computing, RISK -FREE:
First Name:
Last Name:
Address:
City:
State:
ZIP: I
rech Support Center new! Chi
Were your Olie-StOp Shop for
computer problem-solving.
SmartComputing.com Daily
^ Computing;
TrteMi
Tip:
Worried About
_ Bluetooth
fi:--,.
•gflVPS Discoverable
^■*~~™ Mode
Term:
Wei) Site:
Center for
Photographic Art
OSA:
Fun Facts ;;
TiVo Me!
Next Month's
Articles Online
How:
cameras. Don't includi . blems or malfunction ortype in long phrases.
Use one- or two-won: . e windows
■ ...'. ■ "■."''' • ■ .: i ■■: . . : '■ ■ .
Top Sis
Ente i a subject to seaich by: 1 Seme
2. RedX
3.
4. Hard Drive
5. Startup Menu
L~
[ Search |
Error Messages
If you're gettin age, this is the place to start.
(Try this first.) ^Kj
Search By Eiioi Message Text ^Q
Basic Troubleshooting Articles:
fr , .... . L,.,.. .....
Big. Bad St Blu - Undei n of Death"
- Debuggers Let You Record
Solutions Knowledgebase
Solutions to the issues we hear about the most.
Biowse A List of Common F'loHems & Fie<|nen»
To | > 25
Q
\
mnrmmmm
■■.■■■■■ . . :■: ':'..■
. ■■:<:'. :: . ' -■:.:':■
View ALL B i tfag Anicles
Security & Privacy
Computing,
risk-free:
First Name:
I
Last Name:
ZD
I
City:
State:
Zip:
Email:
I
itate
I
Mdg|ili!il5l:ffir3r>«Miiilfllillgrai
Canadian resident clid< here
AM otherforeian
residents here
Post it to our
reader-response
Q&A Board .
iafure is
s aiiai !e on!}? to paid
subscribers.)
Still Can't Find A Solution?
i j time bet n
and 8 prn, CST, Monday -
Friday at (800) 368-8304 to
- I _i j irt afi ii H
all the
details. (Note: We
t iit I
.' ■
■:•-' e a FREE
Give us your thoughts on
the Tech Suppoit Center
92 November 2005 / www.smartcomputing.com
3 If searching the list, enter the word or phrase to search for and click
Search. If browsing the list, you can click the link at the top to the com-
ponent you are looking for or scroll down the page to view the listings for
each category.
Common Problems and Frequently Asked Questions
Computer
Common Pi-
'.. .:.■■•■■:. •■' '■..:..■■ ■-..■•.:-'.:':■':'
. ; ■ .'-;:■■
Search Common Problems / FAQs
Entei a woid 01 nhi.ise to $e<iich l>y:
<^
O ALL Word- 'photography 1 )
©ANY Words ('digital' OR 'photography)
C'E :act Mat
■
4 Once you find what you're looking for, click the link for the appro-
priate problem, and the resulting page will offer a translation and solu-
tion to your problem! Subscribers, be sure to save these helpful listings
using the Add To My Personal Library link in the upper right of each
common problem or frequently asked question.
General Site Tips
Do it yourself! Troubleshoot your way
through all of your computer problems
with Smart Computing.com's Basic
Troubleshooting Articles. This com-
prehensive list of articles is comprised
of topics from operating systems and
software to security and spyware. Each
article starts at square one and quickly
helps you through all fundamental
checks and tests. Find the entire list of
articles in the Tech Support Center at
SmartComputing.com
Your daily dose of Smart. Start your
day off right with the SmartComputing
.com daily section! Receive fun facts,
news, and general tips on everything
computer related. Don't forget to
check out Next Month's Articles
Online Now and get a sneak peek at
next month's issue. Check it out at
SmartComputing.com today!
Help is on the way! Still having diffi-
culty finding answers to your ques-
tions? At SmartComputing.com, we
can help you renew your subscrip-
tion, solve change of address issues,
offer tech support, and so much
more. Just click the Customer Service
link located at the top-right corner
of the site and find phone numbers,
email addresses, and other useful
information.
SmartComputing / November 2005 93
Compiled by David B. Whittle
Graphics & Design b 1 ** "-• r ^
Backup Device
^ M
Safety Made Simple
Almost everyone understands the importance of
making regular data backups. However, most of us
don t back up our work nearly as often as we know
we should — historically speaking, backing data up has
been inconvenient and intimidating. However, there are
now specialized devices and software that make the task of
maintaining backups simple, fast, and painless. This new
generation of backup devices has been enabled by sophisti-
cated software coupled with the simplicity and speed of
USB 2.0, which lets Windows quickly recognize and
configure an external device.
Maxtor OneTouch II
300GB FireWire/USB 2.0 drive
($279.95; www.maxtor.com)
The OneTouch II is a comprehensive, easy,
and inexpensive backup option. You can
purchase a variety of drive sizes with USB
2.0 interfaces. There's also the option of
adding FireWire. When used with its
accompanying Dantz Retrospect Express
HD software, this handy drive provides one-
touch convenience for full or incremental
backups. You can then restore your entire
system or individual files as necessary.
These devices can turn even the most recalcitrant
procrastinator into a smiling advocate of regular backups.
Consider whether one of the following devices might help
you join the ranks of those who could recover quickly from a
computing calamity.
EZDigiMagicDM-180
20GB USB 2.0 drive with multicard reader (20GB, $349; 40GB, $429; www.expnp-usa.com)
This portable, palm-sized battery-powered backup device is great for keeping backups of individual
files, such as your photos, music files, and documents. It's also perfect for copying or moving photo
files from your digital camera to a small and easily portable storage device.
Because of its relatively small capacity, however, it's not well-suited for backing up entire drives unless
they're smaller than the capacity of the EZ DigiMagic.
94 November 2005 / www.smartcomputing.com
DIY: External Hard Drive
& Software
80GB Western Digital Essential USB
2.0 external drive
($89.99; www.wdc.com)
Acronis True Image 8.0
($49.99; www.acronis.com)
■
One choice is to purchase an external
hard drive and the appropriate
software, such as the ones we mention
above, and simply do it all yourself.
This, however, requires time,
knowledge, research, and patience,
which is the reason a number of
companies have developed products
that make it even easier.
Kanguru PC-Clone Kit
80GB PC Clone Kit ($119.95; www.kanguru.com)
This kit represents a cost-effective approach for those unafraid of getting down
to the bare essentials: It includes an IDE (Integrated Drive Electronics) hard
drive, power supply, and software. Just install the included Acronis Easy Migrate
software, plug the module's two connectors into the hard drive, create a clone
of your system drive, and put it in a safe place. Restoration is as easy as it gets:
Just replace the failed drive with the backup drive, and your computer starts
right up at the same point where you last backed up.
Iomega REV
35GB removable drive system ($399.99; www.iomega.com)
Iomega sports a long tradition of removable, cartridge-based, high-capacity storage
and backup options, so it's no surprise that it offers a system that lets you maintain
multiple backups on relatively inexpensive removable media. With compression, each
disk ($59.99) can hold up to 90GBs of data.
SWISSMEM0RY USB Victorinox
1GB USB 2.0 flash drive with Swiss Army knife ($220; www.victorinox.com)
For the ultimate in file-by-file backup for gadget lovers, there's not
much better than a flash drive combined with a genuine Swiss
Army Knife. It's the ultimate merger of classic convenience and
modern technology. It's very cool, but obviously not
designed for complete system backups.
Smart Computing / November 2005 95
DLA-HD2K 1920 x 1080p Projection System
A stunning performance that's
earning rave reviews.
As one of the world's most
highly acclaimed directors,
Francis Ford Coppola has
truly redefined the art
of moviemaking. That's
why he chose the one
projection system
that is redefining
the art of home cinema performance
from JVC. Here's why:
• Our D-ILA based system
features today's most advanced
LCOS technology
3 patented D-ILA chips
produce stunning, "movie-like"
picture quality
• 1920 x 1080p Native High
Definition delivers razor-
sharp resolution
• Compact, lightweight units allow
for more flexible installation
• No "screen door" or
"rainbow" effect
For a preview of our award-winning
projection systems, .
talk to the Pros
at JVC. Call
1-800-582-5825
for our FREE Home
Cinema Design
software, or visit
us at www.jvc.com/pro/HD2K
JVC
The Perfect Experience
www.jvc.com/pro
/
Tech Support
What To Do When . . .
Your Computer
Continuously Reboots
A PC with bad memory, con-
tinuously rebooting, sounds
like the punch line to a bad
joke. Judging from readers'
calls and emails, though, it's
is no laughing matter. If your com-
puter reboots continuously, you may
have a bad memory module. We'll
help you identify the source and fix the
problem. If only stupid humor were so
easily eliminated.
How can memory, also often known
as RAM, go bad? Most commonly,
memory modules (thin sticks slightly
larger than a piece of gum) can work
loose in their slots. Aging, overheat-
ing, capacity overloads, or electrostatic
shock can also damage the modules in
minor or major ways. Similarly, some-
times other problems (motherboard
defects, CPU or power supply mal-
functions, or corrupted software) can
create system failures in resulting from
the way they use memory.
How can you distinguish memory
problems from other sorts of mechan-
ical maladies? Well, system instability
(especially rebooting repeatedly) is a
telltale sign. And if your PC tends to
crash and reboot during memory- in-
tensive operations, odds are good
you're looking at a memory issue. If
your PC won't start up at all, crashing
and rebooting over and over, put
memory at the top of your suspect list.
To check memory, start by opening
the case of your machine. (Unplug
the power cord first.) Remove and re-
seat each memory module, making
sure you have clear and firm connec-
tions. If you're still having trouble,
use software to verify that your
memory is at fault. Download a free
utility such as memtest86+ (www
.memtest.org) or DocMemory (www
.simmtester.com), read the instruc-
tions, create a startup diskette or CD,
and boot into the utility. Run the
tests, and if you find memory errors,
move on to troubleshooting the mod-
ules themselves. You probably won't
know exactly which memory stick has
gone bad (unless you have just one),
so remove them and test each one to
find the offender. When you have
a bad module, you'll need to get a
replacement — either via a warranty
or by purchasing a new one from a
trusted computer retailer. Be sure to
buy RAM that's compatible with your
motherboard and that matches your
existing memory. (A mismatch will
only cause more trouble.)
Other Possibilities
If memory troubles aren't to blame,
there are several other culprits that
could be causing similar problems.
Use special memory-checking utilities to
identify bad memory modules.
Viruses. Foremost among other
possible problems are viruses or other
forms of malware. Install and run an
antivirus app to make sure you're
system gets clean and stays clean.
WinXP settings. If you're a Win-
dows XP user, the operating system
may be causing part of the problem.
The option to Automatically Restart
on fatal errors doesn't give you a
chance to collect error information on
a BSOD (Blue Screen of Death) crash.
To turn off the feature, right- click My
Computer, select Properties, click the
Advanced tab, choose the Settings
button under Startup And Recovery,
and deselect the Automatically Restart
option. Restart your computer, and at
least you'll be able to troubleshoot
more effectively.
Bad software. Software incompati-
bilities can also cause system instability
and continuous rebooting. If your
problems arise during or immediately
after installing new applications or
drivers, try to roll your system back to
V.,Ti,M„dR M (,-,,
To troubleshoot
»ZZZ,^-:
more effectively,
y.Tr*L>ds0*klI<*epirlUairfllMI: 30 J SKOWh
stop WinXP from
T<>«fe!t>t4«tu><v<l«Kfk.mrailh<fch£dt. | C* |
w***. wi; to 9* sntpn \a)
automatically
rebooting
(BfHimtrHfitaMt
whenever it
feSvMnAKC^Ufeafcn)
encounters a
fatal error.
Sl-^l
a previous state. If that doesn't work,
you may need to reinstall drivers or
use your Windows installation CD's
Repair option.
Bad hardware. Problems with other
components can manifest themselves
in ways that work through (or at least
look like) memory issues. Damaged
motherboard capacitors or memory
caches, overloaded CPUs and power
supplies, and faulty expansion cards
can create chronic system instability. If
memory fixes get you nowhere, work
through each of the other possibilities.
Tighten That Steel Trap
Whatever the source, system insta-
bility and continuous rebooting are no
fun. There's a good chance you're just
suffering from a little bit of faulty mem-
ory. It happens to the best of us (and
our machines) as we age. Thankfully,
the computer version of the problem
has a relatively easy solution. II
by Gregory Anderson
Smart Computing / November 2005 97
Tech Support
Examining Errors
by Jeff Dodd
Problem: A reader wants to
eliminate an error message he
receives each time he boots his
PC running Windows XP.
Error Message: "Generic Host
Process for WIN32 Services has
encountered a problem and
needs to close. We are sorry
for the inconvenience."
Solution: Assuming the reader uses
an up-to-date antivirus utility, this
error most likely indicates a problem
with an HP printer or scanner.
The fastest solution is to
turn off the computer,
disconnect the hardware
in question, reboot the
PC, and reinstall the HP
devices one at a time.
Unfortunately, the reader
didn't indicate whether
he has an HP printer
or scanner, so we can-
not be certain if this
solution will address
his problem.
For that reason, the reader should
attempt one more corrective maneuver.
This solution involves opening the
Control Panel, selecting the Perfor-
mance And Maintenance category,
clicking Administrative Tools,
and double-clicking Compo-
nent Services. In the dialog
box, he should click Services
(Local) and locate the
7WIA (Windows Image
Acquisition) entry in the
resulting list. He then
should right- click the WIA
entry and select Stop. Finally,
rebooting the PC ought to fix
this problem for good. I
Problem: A reader recently began
receiving an error message whenever
he restarts WinXP or tries to install
software. He traced the problem to the
removal of spyware on his system.
Error Message: "16-bit MS-DOS
Subsystem. C:\Windows\
System32\Command.com.
C:\Windows\System32\Autoexec.nt.
The system file is not suitable
for running MS-DOS and Microsoft
Windows applications. Choose
'Close' to terminate the application."
Solution: As this message suggests,
the problem is due to faulty Autoexec.nt
and Command.com files. A spyware
program probably altered these files —
both of which enable WinXP to run
DOS-based programs — while installing
its malicious code on the PC. When the
reader's antispyware utility excised the
spyware, it failed to restore these system
files to their rightful configuration. The
solution is to replace Autoexec.nt and
Command.com, along with Config.nt.
To start, the reader should insert his
WinXP installation disc in the optical
drive and then open the Start menu,
choose All Programs, open the Acces-
sories submenu, and click Command
Prompt. When the Command Prompt
window appears, the reader should type
the following commands (where D: is
the letter representing the optical
drive), pressing ENTER after each line:
expand D:\i386\config.nt_ c:\win
dows\system32\config.nt
expand D:\i386\autoexec.nt_ c:\win
dows\system32\autoexec.nt
expand D:\i386\command.co_ c:\
windows\system32\command.com
exit
After rebooting, he should try rein-
stalling the software he was trying to
add. The error message shouldn't ap-
pear this time, but if it does, the next
step is to replace the Autoexec.nt and
Config.nt files with duplicates that are
already on his system.
The reader can do so by opening My
Computer and navigating to the C:\
WINDOWS\REPAIR folder. He should
find the Autoexec.nt and Config.nt files
and, while holding down the CTRL key,
click each of them. He then should re-
lease CTRL, open the Edit menu, and
select Copy. Next, he should navigate to
the C:\WINDOWS\SYSTEM32 folder,
right- click the white space within this
folder's window, and select Paste. If
prompted, he should verify that he
wants to replace the existing files of the
same name. When healthy copies of
Autoexec.nt and Config.nt are in the
C:\WINDOWS\SYSTEM32 folder, he
should right- click the Autoexec.nt file
and click Properties. From the dialog
box, the reader should select the Read-
only attribute and click OK. He should
repeat this process to enable the Read-
only attribute for the Config.nt file.
The last step is to reboot the PC. I
98 November 2005 / www.smartcomputing.com
Tech Support
Problem: Each time a reader tries to
connect to the Internet in WinXP, she
receives an error message. She can
close the error message, but it imme-
diately appears again. The reader
suspects that the problem lies with
her ISP (Internet service provider).
Error Message: "Rh.exe has encoun-
tered a problem and needs to close.
We are sorry for the inconvenience. If
you were in the middle of something,
the information you were working on
might be lost. For more information
about this error, click here."
Solution:
The reference
to Rh.exe clearly
identifies the source of this problem as a
piece of spyware called DownloadWare.
The best way for the reader to eliminate
the error is to get rid of Download-
Ware. The easiest way to do so is to
install antispyware — such as Spybot
Search & Destroy (free; www.safer-
networking.org) and/or Ad- Aware SE
Personal (free; www.lavasoft.com) —
and see if one or more of these antispy-
ware programs finds and eliminates
DownloadWare.
If antispyware can't do the job, the
reader's next course of action is to man-
ually uninstall the spyware. Her first
step is to open the Control Panel and
click Add Or Remove Programs. The
reader should look for DownloadWare
among the list of installed programs. If
she finds it, she should select it and click
Remove. She also should uninstall any
of these programs from the Add Or
Remove Programs dialog box: Media-
Loads; NetworkEssentials; PAgent;
Vegas Palms, Royal Vegas, KFH, MLH,
or other casino games; and WinEME.
She should reboot after each uninstall.
Next, the reader should edit the
Registry. But before doing so, she needs
to make a backup of her system because
incorrectly modifying any Registry set-
tings could leave her system inoperable.
Then, she can access the Registry by
opening the Start menu, selecting Run,
typing regedit in the Open field, and
clicking OK. In the Registry Editor, the
reader should access HKEY_LOCAL_
MACHINE\SOFTWARE\MICRO-
SOFT\WINDOWS\CURRENTVER-
SION\RUN and scan its contents for
references to DownloadWare, Media-
Loads, PAgent, or SESync. If she finds
any, she should right- click the key or
value and select
f 1 111 1 W^ Delete - Then ' she
' ill It W can open HKEY -
■ilililJ CURRENT.
USER\SOFT-
WARE and delete any keys that refer to
DownloadWare or Weblnstall.
After rebooting, the reader should
choose Run from the Start menu, type
msconfig in the field, and click OK. In
the System Configuration Utility, the
reader should peruse the listings on the
Startup tab and deselect any that refer
to the following programs:
ad-aware.exe
alp2plib.exe
astart.exe
autoupdate.exe
auto_update_install.exe
bpc.exe
bw.exe
cg.exe
counter.exe
dw.exe
dwcg2.exe
dwe.exe
fsg.exe
fsg_4104.exe
getkey.exe
idhost.exe
install.exe
instal~l.exe
logonui.exe
monpop.exe
popsrvl84.exe
rh.exe
scbar.exe
webinstall.exe
After deselecting these programs, the
reader should click OK and reboot.
When the PC restarts, she needs to un-
register any bad DLL (dynamic-link li-
brary) files poisoning her system, so she
should open the Windows Search utility
via the Start menu and search the
Windows drive for Activeinstall2.dll,
Btiein.dll, Cd_clint.dll, Gr03.dll,
Gr0ck03.dll, Im64.dll, and Rh.dll. She
should note which files are on her
system and the full path name (such as
C:\WINDOWS\SYSTEM32\Rh.dll)
where each is located. She then should
close the Search utility open the Com-
mand Prompt window, and type the
following commands, pressing ENTER
after each line:
cd..
cd..
cd windows\system32
At the prompt (which should look
like: C:\WINDOWS\SYSTEM32>), she
should type regsvr32 /u followed by the
location (in quotation marks) of one of
the aforementioned DLL files (such as
regsvr32 /u "windows\system32\rh.dll")
and press ENTER to unregister the file.
She can repeat these steps for each of
the bad DLL files on her system. When
she finishes, she should type exit and
press ENTER to close the window.
Finally, the reader should open My
Computer and scan the C:\PROGRAM
FILES folder for the presence of these
subfolders: DownloadWare, Down-
loadWare Engine, MedCh, Movie-
Networks, Popcorn.net, Real-Tens,
Recommended HotFix, or SED. If she
finds any of these subfolders, she should
delete them and reboot her PC to put
DownloadWare behind her forever. I
Have questions about an error message you've seen? Send us your message (errormessages@smartcomputing.com), and
we'll try to decipher it. Tell us what version of Windows you're using, give the full text of the error message,
and provide as many details in your explanation as possible. Volume prohibits individual replies.
Smart Computing / November 2005 99
Tech Support
Fast Fixes
Security Update For Windows 2000
Problem: Microsoft pinpointed a
problem with the Color Management
Module in Win2000 that could let
a cracker steal or damage data on
your computer.
Solution: Download and install
this 567KB update to prevent a
cracker from exploiting this flaw. To
download the update, type the URL
we listed below in the Address field
of your browser window. After
Microsoft's Download Center page
loads, type KB901214 in the Key-
words text box and click Go. Click
the link named Security Update For
Windows 2000 (KB901214), and on
the next page, click Download. When
the file transfer is complete, double-
click the file (Windows2000-KB901
214-x86-ENU.exe) and then follow
the on-screen prompts to complete
the installation.
www.microsoft.com/downloads
Windows XP Update
Problem: After you install the
MS05-012 security update, you don't
see the file attachment names in
email messages featuring Rich Text,
or you see a "Generic Host Process"
error message.
Solution: Microsoft states that
these problems occur after you install
the MS05-012 security update (listed
as KB87333 at the Download Center)
for WinXP, and you can solve these
problems by installing another up-
date. To download the 2MB update,
type the URL we listed below in
the Address field of your browser
window. After Microsoft's Download
Center page loads, type KB894391
in the Keywords text box and click
Go. Click the link named Update
For Windows XP (KB894391), and
on the next page, click Download.
When the file transfer is complete,
double-click the file (WindowsXP-
KB894391-x86-ENU.exe) and follow
the on-screen prompts to complete
the installation.
www.microsoft.com/downloads
Security Update For Internet Explorer
(For WinXP Service Pack 2)
Problem: Microsoft identified
problems that could let a cracker
manipulate your copy of IE and then
take control of your computer.
Solution: Download and install this
4.1MB update for IE to protect your
computer. To download the file, type
the URL we listed below in the Ad-
dress field of your browser window.
After Microsoft's Download Center
page loads, type KB896727 in the
Keywords text box and click Go. Click
the link named Cumulative Security
Update For Internet Explorer For
Windows XP Service Pack 2 (KB89
6727), and on the next page, click
Download. After the file transfer is
complete, double-click the file (Win
dowsXP-KB896727-x86-ENU.exe)
and follow the on-screen prompts to
complete the installation.
www.microsoft.com/downloads
Another Security Update For
Win2000
Problem: The Plug And Play feature
in Win2000 has a bug that could let
a cracker take control of your PC.
Solution: Download and install
this 504KB update to prevent a
cracker from exploiting this vulnera-
bility. To download the file, type the
URL we listed below in the Address
field of your browser window. After
Microsoft's Download Center page
loads, type KB899588 in the Key-
words text box and click Go. Click
the link named Security Update
For Windows 2000 (KB899588), and
on the next page, click Download.
After the file transfer is complete,
double-click the file (Windows2000-
KB899588-x86-ENU.exe) and follow
the on-screen prompts to complete
the installation. You might have to
restart your computer after you install
this update.
www.m icrosoft.com /down loads
Fix Of The Month
Security Update For WinXP
Problem: Microsoft discovered a
flaw in WinXP's Print Spooler ca-
pability that could let a cracker take
control of your computer.
Solution: You can stop potential
attackers by downloading and in-
stalling a 551KB update from
Microsoft. To download the file,
type the URL we listed below in the
Address field of your browser
window. After Microsoft's Down-
load Center page loads, type
KB896423 in the Keywords text
box and click Go. Click the link
named Security Update For Win-
dows XP (KB896423), and on the
next page, click Download. After
the file transfer is complete,
double -click the file (WindowsXP-
KB896423-x86-ENU.exe) and fol-
low the on-screen prompts to
complete the installation. You
might have to restart your com-
puter after you install this update.
www.microsoft.com/downloads
100 November 2005 / www.smartcomputing.com
am your jwnmvf 4
MTIfPYWARf PROGRAM
TIM TO RIACT.
my o;jj
Anti-virus and anti-spyware providers do
an excellent job of protecting you
against known threats. With new or
unknown threats, however, they need
time to create the antidote. They can't
protect you until they've developed a
new signature file that recognizes the
threat and you've downloaded and
installed the necessary update.
RedWall stops new threats WITHOUT
needing new signature files, so you're
protected even against brand new
threats. RedWall Secure File Viewer is
always one step ahead, giving your
anti-virus and anti -spy ware time to react,
MOACTffi Z£(?0 MYPHOnCTfON
Know your company data is protected
even when the latest virus definition files
have not yet been released.
BLACtt BOX PMffltfM Safely preview
files in a "quarantined" no-risk environment
to ensure they contain legitimate data and
not viruses or other malicious code,
• BOOfT PRODttCTflffTY Instantly preview any file without taking
the extra time necessary to launch the application which created
it. RedWall's previewing is often 300% faster than opening the
same file with its associated program. Even preview multiple
email attachments in one step - no more wasting time launching
multiple applications.
Download your free trial at http://www.novatix.com/OneStepAhead
OV31 IX Novatix Corporation Tel: 303-51 6-1 800 ext 1 04 Email: info@novatix.com www.novatix.com
© 2005 Novatix Corporation. All rights reserved, RedWall is a registered trademark of Novatix Corporation,
Tech Support Q&A
Need help with your hardware or software? Looking for simple
explanations on technical subjects? Send us your questions!
Get straight answers to your technical questions from Smart Computing. Send your questions,
along with a phone and/or fax number, so we can call you if necessary, to: Smart Computing Q&A,
P.O. Box 85380, Lincoln, NE 68501, or email us at q&a@smartcomputing.com. Please include all
version numbers for the software about which you're inquiring, operating system information,
and any relevant information about your system. (Volume prohibits individual replies.)
tin
Windows
Ql am using Windows XP with SP2 (Service
Pack 2), a system that I upgraded from
Windows 98, but there isn't a Backup utility avail-
able in my System Tools submenu (via my Start
menu). Can you tell me why this utility is missing
and how I can get it?
A You don't mention which version of
WinXP you're using, but we're assuming
it's the Home Edition because unlike WinXP
Professional, the Backup utility isn't installed
by default in WinXP Home, nor does it ap-
pear on the Add Or Remove Programs list for
WinXP Home. However, you will find the
Backup utility in the VALUEADD folder on
WinXP Home's installation CD-ROM.
Insert WinXP Home's installation CD-
ROM in your system's optical drive and use
Windows Explorer to find the Ntbackup.msi
file. Assuming the optical drive is assigned
to drive letter D, for example, you'd navigate
to D:\VALUEADD\MSFT\NTBACKUP to
find Ntbackup.msi. Double-click the file
to start a wizard that will install the Backup
utility. Follow the wizard's instructions and
click Finish to complete the process.
Note that the Automated System Recovery
Wizard feature that Backup uses in WinXP
Pro isn't supported in WinXP Home. In the
event of a catastrophic failure that requires
complete restoration, you must recover man-
ually using a recent full system backup cre-
ated by the Backup utility. For more details
see the Microsoft Knowledge Base article at
support.microsoft.com/kb/302700/EN-US.
Online
QLast week, a friend received a virus-con-
taining email message listing my primary
email address (using a mindspring.com domain)
as the sender. Only one person received the mes-
sage — not a bunch of people in my address
book. This week, my secondary email address
(also using a mindspring.com domain) theoreti-
cally sent a virus-containing message to my "map
society" email address (has a cummingmap
society.org domain), which also downloads to
Outlook Express, and the virus and email were
automatically deleted by my Norton Antivirus
application. I am running WinXP with SP2 and
Norton Internet Security, which includes Norton
Antivirus (and is updated regularly). In addition,
Norton Antivirus screens all of my incoming and
outgoing email from Outlook Express. I have per-
formed a full system scan twice, and the software
didn't detect any viruses.
I know miscreants can send emails and make
them look like they are from me, but I'm won-
dering where the latest two messages came
from. It seems peculiar that both were made to
look like they were from me and sent to
someone I know (to a friend in the first case and
to myself in the second case) rather than to one
of the other 6 billion people on the planet. And
if these messages did originate from my soft-
ware, why didn't they go to lots of the email ad-
dresses listed in my Address Book? Is there
something I can or should do to prevent this
from happening again? After the first instance, I
confidently told my friend that the message
didn't come from my computer. But after the
second instance, even though I still don't think
the message originated from my computer, I
can't say so confidently. (Unfortunately, we were
unable to check the message headers in either
case.) Can you offer an explanation?
A There are a couple of possibilities that
come to mind regarding your email prob-
lems. The first is that someone could be
sending out virus -infested emails using random
102 November 2005 / www.smartcomputing.com
Tech Support
Q&A
return addresses from Mindspring. Because
Mindspring is a large, well-known ISP (Internet
service provider), this explanation is certainly
plausible. Many spammers forge sender ad-
dresses using familiar domain names.
The other possibility is that someone with a
virus on his system has your email addresses in
his Address Book, and the virus is randomly
choosing from the addresses on this system
when picking one to use as a "sender." This
isn't the most common methodology used by
virus writers, but it isn't unheard of, either.
Because both emails were sent to accounts
familiar to you, our suspicion is that this is the
most likely case.
Viruses (and forged spam) can cause quite a
few problems, especially when it appears to
your friends that you're responsible. However,
there isn't a foolproof way to determine who
sent whom an email message, and email forgery
is trivial for those with the inclination for mis-
chief. As long as you have antivirus software
running on your computer, and you update
your virus definitions routinely, we think you
can sleep soundly in the knowledge that you're
not spreading viruses.
Software
QMy PC runs Windows Me. (And yes, I like this
OS [operating system], regardless of its reputa-
tion.) The problem is that although I keep deleting
the My eBooks subfolder in My Documents, it
keeps reappearing. How do I permanently delete it?
A The My eBooks subfolder isn't a default cre-
ation of Windows (regardless of the OS ver-
sion); it's a feature from Adobe that appears when
you install Adobe's Acrobat Reader program (ver-
sions 5.0 and newer). The solution: Open
Windows Explorer and navigate to C:\PRO-
GRAM FILES\ADOBE\ACROBAT 6.0\READER.
Note that if you've installed Acrobat Reader
somewhere else, or if you're using version 5.0, the
path may be slightly different. If there isn't a
folder called C:\PROGRAM FILES\ADOBE\AC-
ROBAT 6.0\READER\OPTIONAL, create one.
Now select the Plug-ins folder at C:\PROGRAM
FILES\ADOBE\ACROBAT6.0\READER\PLUG-
INS, select the Ebooks.api file, and then drag and
drop it to the Optional folder. Next, navigate to
C:\MY DOCUMENTS and delete the My eBooks
subfolder. The subfolder shouldn't appear again
after following these steps.
If you ever do decide to use Acrobat Reader to
read ebooks, you can move the Ebooks.api file
back from the Optional folder to the Plug- ins
folder. Otherwise, if you're sure you'll never need
My eBooks, you can delete the Ebooks.api file.
Windows
Ql went to Gibson Research (www.grc.com),
and the site advised me to use its tool to dis-
able UPnP (Universal Plug and Play) from WinXP.
So, I downloaded the tool, but every time I try to
disable UPnP, my hourglass cursor icon appears
and won't go away, so I had to push the CTRL-
ALT-DELETE keys. I understand that Gibson
Research is a reputable Web site, and it did send
me a Zip file containing its UPnP disabling tool,
but that didn't work, either. From its site informa-
tion, I learned that the FBI requested that the
UPnP file be disabled from WinXP but changed
that request later on. Is UPnP an issue anymore? If
so, what should I do about it?
A Microsoft included UPnP in WinXP, but it's
also available for Win98 and WinMe. The
idea behind UPnP is to allow devices on a net-
work to easily find each other. This means that if
you connect a printer that supports UPnP to your
network, your computer will automatically recog-
nize and be able to use the printer. Other net-
work-capable devices, such as scanners, also can
take advantage of this technology.
When Microsoft first released its implementa-
tion of UPnP, there were flaws in it that would
allow someone on your network to potentially
take over your computer. Because this was a
pretty serious vulnerability, coupled with the
fact that UPnP was enabled by default, the FBI
decided to issue a warning. However, despite
some of the hyperbole about this vulnerability,
we don't believe that it remains a serious issue.
The first reason for our optimism is that
Microsoft has already issued a patch for the vul-
nerability. The patch corrects the flaw in
Microsoft's UPnP implementation, while still
allowing the UPnP service to function. The
second reason for our optimism is that WinXP
SP2 now includes a more robust software-based
Smart Computing / November 2005 103
Tech Support
Q&A
firewall. With either a software- or hardware-
based firewall in place, outsiders wouldn't
be able to attack your computer. And with
Microsoft's patch in place, they would fail if
they somehow were able to bypass your firewall.
We're not sure why the utility you down-
loaded failed to work on your computer. It
might be having a conflict with an antivirus ap-
plication or some security setting on your
system. However, if you still feel that you want
to disable UPnP, here are the steps that should
do the trick: Open the Start menu, choose
Control Panel, click Performance And Main-
tenance, click Administrative Tools, and
double-click Services. When a window opens
displaying the services (programs that run con-
tinuously) currently running on your com-
puter, scroll down to SSDP Discovery Service
and double-click it. Click the Stop button to
stop this service, select Disabled from the
Startup Type drop-down menu, and click OK.
Next, select the Universal Plug And Play entry
from the same list of services and stop it, as
well. Select Disabled from its Startup Type
drop-down menu and click OK.
The only problem with disabling UPnP in this
manner is that subsequent patches and service
packs from Microsoft may re -enable the two ser-
vices you just disabled. Our recommendation
for any security concerns regarding Windows is
to keep your system patched via Windows
Update, install an antivirus application and keep
it current, and set up a firewall either on your
computer or between your computer and the
Internet. You also might want to consider in-
stalling and regularly updating an antispyware
application. Although these safety suggestions
won't prevent every type of attack, they will help
you avoid the most common security issues that
lurk on the Internet.
Hardware
Ql can't delete files that I have burned to CD-
RWs (CD-rewriteables). When I try to delete
a file on the CD-RW, I get an error message
stating that the file is "Read-Only/' so I can't
delete it, but I can add files to the CD-RW. Also,
when I change the attributes in Properties, they
all immediately change back. Isn't the purpose of
a CD-RW to be able to rewrite the data on it? I
have tried to use Microsoft's Writing Wizard and
Nero 6.0 with the same frustrating results.
A CD -RWs are intended for reuse, but not in
the manner you describe. When you write
data to a CD-RW, it creates a "session" that
stores your data and then blocks off that portion
of the disc. When you add new data to a CD-
RW, it creates an additional session with the new
data. Eventually, the entire disc becomes full, and
you either use a new disc for storage or you erase
all the sessions on the existing disc. If you choose
to erase all the sessions on a CD-RW, you can use
it as if it were a new disc.
From your explanation, it seems like you want
to use a CD-RW as you would use a floppy
diskette or a hard drive. To do so, you'll need
additional software that supports packet writing.
The most popular packet-writing software is
InCD. The latest version of Nero is Nero 6
Reloaded, and this package includes InCD 4.
Because you already own a copy of Nero 6, you
can upgrade to Nero 6 Reloaded for free. Simply
go to www.nero.com/eng/Nero_6.html and click
the Update icon. You'll want to download all
four of the update packages, and after installing
them, you'll be able to use your CD-RWs just
like you'd use floppies.
Online
QMy problem is that all of my incoming
email messages are in duplicate. I'm using
Outlook Express 6 on a WinXP computer, which
has a 1.6GHz processor, 512MB of RAM, and a
40GB hard drive. I have looked at various op-
tions in Outlook Express, but I can't figure out
how to avoid receiving messages in duplicate.
How can I fix this?
A Email has become such an integral part of
our computer usage that problems like this
can quickly exasperate the most patient users
among us. Troubleshooting this problem will re-
quire a bit of patience on your part, as well as the
assistance of your ISP. You didn't specify what
type of email service you're using, but we'll
assume that it's POP (Post Office Protocol), the
most common variety.
The first step is checking with your ISP to
see if you are receiving duplicate messages via
the email server. If you find out that your
mailbox on the email server has 10 messages,
104 November 2005 / www.smartcomputing.com
Tech Support
Q&A
for example, but you receive 20 messages
when you download your email, your ISP is
probably off the hook for this problem.
However, if it looks like your ISP is receiving
the duplicates before you even retrieve your
email with Outlook Express, you'll have to
depend on one of its employees to trou-
bleshoot the problem.
If the problem doesn't lie with your ISP, then
it's probably due to a corrupted file that
Outlook Express uses. When Outlook Express
downloads your email, it also keeps track of
which messages it has received and tells the
email server to delete the original message. This
file that Outlook Express uses to keep track of
these details is Pop3uidl.dbx.
Sometimes Pop3uidl.dbx becomes cor-
rupted or damaged and requires that you
delete the original file. To do so close Outlook
Express and then search for Pop3uidl.dbx by
clicking Start, Search, and All Files And
Folders. After you type Pop3uidl.dbx in the
All Or Part Of The File Name field, be sure to
click the button next to More Advanced
Options, so you can select the Search Hidden
Files And Folders checkbox. When you finish,
click the Search button.
In the search results listed in the right pane,
right-click Pop3uidl.dbx and click Delete.
Then, restart Outlook Express, so it creates a
noncorrupt Pop3uidl.dbx version that should
prevent duplicate email messages from being
delivered to your inbox. Depending on how
much email you receive, you may have to pe-
riodically re-create this file using the steps
we've outlined.
Windows
Ql have a Compaq PC running WinXP Pro. I
have checked Microsoft's site for update
numbers given in Smart Computing and have been
unable to find several of these updates. However,
there are many updates dating back to February
2002 and all are for the same problem. According
to Microsoft, I need 41 updates. So what's with
these updates that I can never find? Why doesn't
the latest update supersede the early updates?
A When Microsoft discovers a problem with
Windows or receives notifications from
customers about a problem, it has an elaborate
process in place to create a patch for the
problem. In many cases, it also will create a
patch for the sake of adding features to
Windows and other Microsoft applications.
First, Microsoft's support staff has to eval-
uate the scope of the problem and devise a
strategy for rectifying it. Next, the staff has to
develop a patch that fixes the problem. After
developing the patch, the staff has to test it to
see if it has any unanticipated side effects. If it
does, staff representatives have to rewrite the
patch and continue testing.
Then, depending on the severity of the
problem, Microsoft may still release a patch
knowing that it might "break" other parts of
Windows or other Microsoft applications.
If the problem is a critical bug that might ex-
pose millions of users to problems, Microsoft
might decide that the collateral damage of any
potential side effects is worth the trouble of in-
stalling the patch.
If a patch has side effects that cause too much
trouble, Microsoft will revise the patch and re-
lease a new patch. In the process, Microsoft also
may make the old patch unavailable so that
users don't experience the unwanted side ef-
fects. This scenario accounts for a large number
of out- of- circulation patches.
The other reason why an update might be un-
available is because Microsoft decided to incor-
porate that particular update into a service pack.
After all, Microsoft would rather have its cus-
tomers update their computers with a specific
service pack than worry about hundreds of indi-
vidual updates. Although service packs contain a
multitude of patches and updates, it's easier to
perform testing for a service pack than to try and
simulate all the various combinations that could
be created with the individual updates.
Our recommendation is to trust Microsoft's
Windows Update Web site (windowsupdate
.microsoft.com). If the site tells you that you
need an update, go ahead and install the up-
date. We routinely configure our system so
that Windows Update automatically down-
loads updates as they become available, and
then we install these updates when we receive
notifications about them. There are rare in-
stances when an update is temporarily un-
available, but that type of delay is usually
resolved within a day or two.
Smart Computing / November 2005 105
Tech Support
FAQ
Questions
Answers to users' most common questions about
Hard Drive Upgrades
p A ^v Is it better to add a second hard drive or just
l/\ v/ shift my data to a larger hard drive?
That's really a matter of personal preference because
both choices provide certain advantages and disadvantages.
Replacing an existing drive with a larger one often makes
your "housekeeping" tasks easier because there are fewer
drives to keep track of. However, replacing your hard drive
also requires you to either duplicate your current OS (oper-
ating system), applications, and files to the new drive first
(using a disk- imaging utility such as Acronis True Image or
Norton Ghost) or reinstall your OS and applications, as
well as copy and transfer all your files. On the other hand,
even though installing a second hard drive gives you an-
other drive letter to manage, it is usually quicker and easier
to get running because there is nothing to restore.
In addition, installing a second hard drive can provide
more overall space. For example, let's assume you want to
install a 200GB hard drive. If you use it to replace your ex-
isting 100GB hard drive, you'll end up with just 200GB.
Alternatively, if you use the 200GB drive as your second
hard drive and add it to your existing 100GB drive, you'll
then have a total of 300GB. If you don't mind working with
an extra drive letter, opt for the second hard drive.
Q A ^v Someone told me that I'm not supposed to
l/\ Vy put a hard drive and an optical drive on the
same cable. Is that true?
It's a matter of the internal ATAPI (Advanced Tech-
nology Attachment Packet Interface) drive interface. Some
years ago, PCs had a hard time switching interface speeds
from the fast ATA/100 or ATA/133 scheme used for hard
drives to the slow ATA/33 (or slower) interface scheme
often used by optical drives at the time. The end result was
that the interface would either "lock down" to the slower
speed (reducing the performance of the hard drive) or it
would "lock up" to the higher hard drive interface speed
(resulting in data loss and an inability to "see" the optical
drive). Today, most internal optical drives are compatible
with high-speed ATAPI interfaces, and the PCs themselves
are typically much "smarter" about switching speeds. This
means you should be able to use a hard drive and an optical
drive on the same controller channel, but it's not an
arrangement we'd recommend. Because a channel can only
read or write to one device at a time, it's still usually better
to separate hard drives and optical drives, letting the hard
drive use the first (primary) drive controller channel and
letting the optical drive use the second (secondary) con-
troller channel. By keeping these drives separate, you'll
avoid communications problems and allow the PC to talk
to both drives simultaneously. This is a huge benefit in sev-
eral situations, including tasks that involve burning data,
music, or video to discs from files on the hard drive.
p A /~>k My current hard drive is only 80GB. Can I re-
r/\ V^ place it with a huge 200GB or 250GB drive?
You should. Most newer PCs running Windows XP
under NTFS (NT file system) should tolerate a huge hard
drive without any trouble. Some older PCs may require a
BIOS (Basic Input/Output System) update, a new PCI
(Peripheral Component Interconnect) drive controller
card, or drive overlay software (such as Maxtor's MaxBlast
utility) to fully support a larger hard drive. Thus, it's a
good idea to contact your PC's manufacturer first or look
for advice on the topic via its site. As with any hardware
upgrade, you should compare the new hard drive's system
requirements with your particular PC model and compo-
nents before making a purchase decision.
p A /~>k I installed a second hard drive, but Windows
l/\ V^ doesn't see it. What am I doing wrong?
Virtually all iterations of Windows 98 and newer OSes
should recognize the presence of a new hard drive and re-
port its drive letter. If an icon representing the new hard
drive doesn't appear in the My Computer window, chances
are good you missed an important step during the installa-
tion and/or preparation process. Shut down your system
and verify that you have installed the new hard drive cor-
rectly alongside your first hard drive. In particular, check
the 40-pin ATAPI signal cable and make sure the drive's
jumpers are set correctly (usually, you'd set the second hard
drive as the secondary or "slave" drive). SATA (Serial ATA)
drives typically don't need jumpers set, so you should just
make sure that the cable terminates at the correct SATA
port on your motherboard. You also may need to change
the system setup (via the BIOS) to recognize the presence
of a new physical drive. (See your PC's documentation.)
Plus, follow the drive manufacturer's installation instruc-
tions to partition and format the hard drive for your OS.
Recheck the documentation accompanying your new hard
drive to make sure you've fully prepared the drive for use.
106 November 2005 / www.smartcomputing.com
Tech Support
ACTION EDITOR
Are you having trouble
finding a product or
getting adequate service
from a manufacturer? If
so, we want to help solve
your problem. Send us
a description of the
product you're seeking
or the problem you're
having with customer
service. In billing dis-
putes, include relevant
information (such as ac-
count numbers or screen
names for online ser-
vices) and photocopies
of checks. Include your
phone number in case
we need to contact you.
Letters may be edited
for length and clarity;
volume prohibits
individual replies.
Write to:
Action Editor
P.O. Box 85380
Lincoln, NE 68501-5380
Or send email to:
actioneditor@smart
computing.com
Or fax us at:
(402)479-2104
Return Policy Problems &
Hard Drive Shenanigans
/ ordered a new system from Dell,
which finally arrived in June 2004.
Unfortunately, I was hospitalized when
the system arrived and was unable to set
it up. I finally got around to configuring the
system in September of that year, only to
find that the computer wasn't working prop-
erly. I called Dell immediately and inquired
about the possibility of returning the system
or getting a complete replacement. I was
told the 30-day return period had long since
expired, so my only option was to send the
system in for repairs. Since then, the system
remains unstable, and my frequent support
calls to Dell haven't resolved the situation.
The fact that I was hospitalized and could not
test the system within the 30-day return period
doesn't seem to be of any concern to Dell.
Marc Soslow
Pompano Beach, Fla.
Because Marc's computer wasn't working
at all, we called him for more information
about his problem. We noted his Service Tag
and Express Service Code and sent an email
to our public relations contact at Dell. Dell's
Advanced Support Team took a closer look
at Marc's support record and decided to
authorize a system exchange, thereby re-
placing Marc's ailing system with a new one.
Needless to say, Marc was more than happy
with the outcome.
/ work in a computer repair shop, and I'm
having a hard time dealing with Gateway on
behalf of a customer. The customer originally
brought his computer to us because it refused
to boot. We did some diagnostic work and
discovered the motherboard was faulty.
Because the system was still under warranty,
we shipped the system to Gateway for repairs.
While arranging to ship the system, I told
Gateway that I planned to pull the hard drive
out to help protect the data on the drive. The
representative I spoke to convinced me to
leave the hard drive intact so that Gateway
could make sure the system booted properly.
I reluctantly agreed to leave the hard drive
installed, thinking it might expedite the
process and help ensure that the system
would be ready to go for the customer when I
received it from Gateway. The representative
noted on the work order that the hard drive
was not to be touched. After receiving the
system back from Gateway and returning it
to the customer, I learned that none of the
customer's applications or personal data was
present. Gateway had completely reformatted
the hard drive, leaving us without a recent
backup. I've called Gateway several times
about this, but its representatives just get
defensive and claim that Gateway isn't
responsible for data loss according to the
terms of the company's warranty.
Name Withheld Upon Request
We contacted Gateway's public relations
department and asked a representative to
take a closer look at this issue. From a legal
standpoint, Gateway may be correct in
stating that it isn't responsible for any lost
data, but reformatting the hard drive
seemed a bit extreme for what was sup-
posed to be a motherboard problem. A
short time later, we heard back from our
reader, and he said that his client received
an apology from Gateway along with
$250 in compensation. Of course, it's hard
to put a price on your personal data, so
that's why it's always a good idea to back
up your system and data before sending
your computer in for repairs (in addition
to making backups part of your regular
computing routine).
Smart Computing / November 2005 107
E d
t o r i a I
License
King Of The Software Hill
\-%
So, there I was, peacefully
eating my breakfast (strawberry
yogurt topped with a delicious
spoonful of Purina Editor Chow),
reading my email, and calmly
thinking about the day ahead. It
wasn't going to be a very difficult
day. I'm an editor, after all. How
tough could it be? I mean, it's not
like I actually work for a living.
But then I run across the
semiweekly let's-bash-Microsoft
email. A reader notes (somewhat
petulantly, I think) that Microsoft
A) is too big, B) creates buggy soft-
ware that's vulnerable to security exploits,
C) has stomped all of its competition into the ground, and
D) has sold 95% of computer users a bill of goods on an op-
erating system that's mediocre at best.
The reader has some excellent points, of course. Microsoft
is a juggernaut, a monolithic presence looming malevolently
over software and hardware developers alike. Much of its
software is buggy, and much of it is vulnerable to crackers.
But the thing is that all software is buggy. Subject any ap-
plication to harsh, real-world use by millions of people run-
ning hundreds of thousands of different configurations, and
sooner or later, that software will misbehave. And complex,
low-level software such as an operating system will misbe-
have even more often and more spectacularly.
Similarly, all operating system software is subject to mali-
cious attack. Windows is probably not much more vulner-
able than Linux would be if it were trying to buffer the user
from the system's complexities as Windows attempts to do.
Windows is simply more popular and therefore a much
more inviting target.
Still, one can certainly argue that Microsoft could — and
should — do a better job of writing more stable, more secure
software. And it's obvious that some of Microsoft's business
and marketing strategies smack of tyrannical arrogance.
But the idea that people have been bamboozled, tricked
into buying an inferior, confusing operating system is just
plain silly. Folks, Microsoft fought that war back in the
1980s and early '90s. It won fair and square.
Many of us were soldiers in that war. Remember the par-
ticipants? Arrayed against one another in the first operating
system battle were such valiant warriors as the Commodore
PET, C64, and VIC 20; the Adam; the Apple Ile/c/g and the
(eminently forgettable) Apple III; the Atari; the TRS 80; the
TI 99/4a; and the "luggable" KayPro
and Osborne machines. Out of all the
participants, Microsoft (a small
company at that time) won the
hearts and minds (and wallets) of
computer buyers all over the
world with a command-line oper-
ating system called MS-DOS.
Then along came the great
GUI (graphical user interface)
battle. We know that Mac and
Windows were the ones standing
i>r-> at the end, but we forget that
there were lots of contenders.
There was IBM's OS/2 Presentation
Manager; the Amiga Workbench; VisiCorp's
VisiOn; Tandy's DeskMate; GEM from Digital Research;
GEOS; the Acorn (whose GUI was, for some odd reason,
called Arthur); and even Steve Jobs' own NeXTStep.
People who bemoan the fact that Microsoft has no com-
petitors tend to forget that, at one time, there were dozens
of them. Microsoft beat them at their own game by pro-
viding an elegant (for the time), functional, affordable user
interface that ran on the largest number of machines. In
other words, it won. Again.
Will it win next time? Well, various implementations of
Linux are definitely making inroads. Is this the year that the
GUI championship belt will change hands?
I don't think so. Linux is much easier to use than it was,
but it's not yet ready for the masses. Joe User (and also Joe
Columnist) would love to see someone provide some com-
petition for Microsoft, but no operating system — no matter
how secure and stable — will capture any sizable piece of the
market so long as it takes a 140 -page manual just to explain
how to install it.
And A Quick Note Of Thanks
Hundreds of you have written, called, and emailed to offer
condolences on the loss of my daughter Rachel. (See
"Editorial License" in the September issue.) Thank you all so
very much for your kind words. The family and I appreciate
them more than you know. II
by Rod Scher
Rod Scher \
teacher. He:
vare develope
cation editor
nd a recovering Engh
reads this column. Contact Rod at rod-scher@smartcomputing.com.
108 November 2005 / www.smartcomputing.com
20GB or
40GB HDD
To Go!
EZPnP OffSF
New designs and features that
include: LCD display, file
verification and disc spanning
Choose direct transfer
from your media
card to either HDD,
DVD, or CD 4
Battery operated
or AC adapter
No computer needed!
It's fast, it's easy, it's ...
DigiMagiji
1-800-828-6475
www.ezpnp-usa.co
CD BURNER
EZPnP™ and EZDiaiMagic™ are trademarks of EZPnP Technologies Corp.
All other trademarks mentioned herein are property of their respective owi
Nero PhotoShow Elite
Treasure your unforgettable moments with Nero PhotoShow Elite, the easy and com-
plete photo experience. Capture, organize, manage and edit your photos. Make
musical photo slideshows with multiple effects, Clip Art, captions and text. Share with
your family and friends online or burn CDs or VCDs. Order custom photo accessories
of your favorite photos. All this with unprecedented ease!
WWW.NER0PH0T05H0W.COM
Available online or at the participating retailers:
Tn
iri|'!
amazon.com
Buy.com