"Mohearn" "acutrona" and "tommyd111" each won a FREE full one-year
subscription to the LangaList Plus! edition by using the "Recommend To A Friend"
form at http://langa.com/recommend.htm
(Tap tap tap) Is this thing on? Can you hear me down in back? <g>
Hi Fred. In your newsletter,
James spoke about a workaround he found while having problems dealing with a
restore and the use of the "make files private" function. As I use an NTFS
partition, I have chosen to encrypt the ‘My Documents’ folder for my standard
login on Win2K (Properties/Advanced/Encrypt contents to secure data). The plan
was that even if my PC ended up being stolen, no one would be able to read that
portion of my disk. I ‘double encrypt’ the more sensitive stuff using blowfish
encryption software and a blowfish encryption password safe. However, your
comments about the ability to work around most Windows system security tools has
me concerned. I know that even when I’m logged in as an administrator I can’t
read any of the contents of this folder. Just how secure is the encryption
offered by Windows users who are taking advantage of this option?
Fred, I have a Dell Dimension 8000
purchased Nov 2004 which had XP Pro pre-installed. Having had a bout of the
dreaded "flashing amber light" Dell sent a technician to my home to replace
various hardware items. Unfortunately the techie installed XP Home on the new
hard drive which I didn’t notice for a few days and though I have received
plenty of advice from Dell and via your site about re-installing XP Pro, having
read the item at Subject dated2005-08-08 on your site. I am loathe to attempt
Fred – Just a simple testimonial for "Adware
Away" to remedy very nasty variants of browser hijackers. I have spent hours not
only searching for "geek" sites to get rid of a hijacker, but also additional
hours with all kinds of potential solutions advanced by many experts. I went to
the registry, I went to Windows Services, I went everywhere one might think to
go….trying to figure out what the various "experts" were suggesting. But in
less than 5 minutes after stumbling across "Adware Away" (
http://www.adwareaway.com ). I now have
a fully restored start page, search page, and home page set once again to MY
preference instead of some nasty adware forced-page. I would recommend it HIGHLY
for those suffering from the absolute plague of many different kinds of
hijackers. It really works and it’s quite simple to use. It’s free for as long
as you need it and, of course, "purchasable" thereafter. Although I have solved
my vexing hijacker issue, I will definitely register and forward them the
purchase price, as I am forever grateful for such a wonderful and easy solution.
Keep up your good work with the Newsletter and wizardry you are so well known
for. —Chris G. Echsner
I am a relatively new subscriber to
LangaList. I often get the message "ending the program ShellconHiddenWindow"
when I turn off my computer. I don’t know what this is. I can’t find it
anywhere. Do you have any ideas as to what it
Hi, Fred. Is there a way to configure the
Recycle Bin so that it frees up disk space as needed, rather than waiting until
newer items are deleted (to permanently delete older items)? If it worked that
way, there would be no reason not to use a large Recycle Bin, if I understand it
correctly. Thanks. —Russell A. Dewey, PhD
Well over 4,000 of your fellow readers have "loaded the code." Have you?
Check out http://langa.com/code.htm for
Hi Fred, I just came across this article in
Yahoo-news ("Spyware Researchers Discover ID Theft Ring"
Fred… First, thanks for the Plus newsletter – a “must-read” for this non-techie! Second, a request for help! Here’s the story: Four colleagues and myself regularly exchange documents using email. When I use Outlook (2003 edition) to send them a message and use the “insert file” command to attach a file, some of my colleagues get the file, some don’t. If one of those colleagues that DID receive the file forwards my email to the others, they get the file!
However, if I’m working on a file (in Word or Acrobat, for example) and then use the “email this file” command in that program, then ALL my colleagues get the file!
I realize that there could be a multitude of reasons behind the problem and I may not have given you enough facts to go on, but can you shed any light on this one? —Bob Hogg