Windows Secrets

Subscribers: Sign in | Join

Skip to content
  • Home
  • In Brief
  • Newsletters
    • Current
    • LangaList Plus
    • Patch Watch
    • Wacky Web Week
    • Security Baseline
    • Ultimate Utilities List
  • E-Books
  • Lounge
  • About us
    • Refunds
    • Privacy Policy
    • Advertise
  • Contact Us
  • Advertise
  • Your Account
    • Upgrade
    • Preferences
    • Bonus Download
    • Unsubscribe
  • FAQ
Windows Secrets > A refresher course on Facebook privacy controls

Windows Secrets Newsletter • Issue 370 • 2013-01-17 • Circulation: over 400,000


ADVERTISEMENT
Windows Secrets' top tips for Windows 7
Windows Secrets' top tips for Windows 7

Got PC Troubles? The Windows 7 Guides, vol 1 - 3, cover the sometimes confusing task of installing, optimizing, troubleshooting, backing-up, and effectively using Windows 7. No matter what your skill level, you'll find this collection of e-books will save you time and money - and hopefully relieves a good bit of the stress that comes with maintaining your own system. Get all three guides today.

The Windows 7 Guides (vol 1 - 3)

Table of contents 
  • Top Story: A refresher course on Facebook privacy controls
  • Lounge Life: Don’t know what you’ve got till it’s gone
  • Wacky Web Week: Eight bits of animal lore — contradicted
  • LangaList Plus: No-reformat reinstalls for all Windows versions
  • Woody's Windows: Zapping System Progressive Protection
  • Best Practices: Devices to give Wi-Fi networks a boost
  • Patch Watch: Microsoft releases critical patch for IE

ADVERTISEMENT
3 easy steps to fix Windows problems
3 easy steps to fix Windows problems

Tired of your PC crashing and freezing? Not only does Reimage Repair software detect and remove viruses from your PC, it also gives you 24 hours a day support, unlimited and exclusive service throughout the year. Why leave your PC unprotected when you can get full repair and even improve the overall performance of your PC? 3 easy steps – scan, register and repair and you’re set!

Reimage Online PC repair
Clean and thorough uninstall every time
Clean and thorough uninstall every time

Did you know the standard Windows add/remove program uninstalls an application but does not remove leftover files and registry entries? Over time these leftovers can build up and slow down your computer. Uninstalling programs with My Uninstaller Pro is the safe and easy way to remove applications and their leftovers. Windows Secrets readers, get it now for only $17.97 (40% off).

My Uninstaller Pro

 
Top Story

A refresher course on Facebook privacy controls

Patrick Marshall
By Patrick Marshall on January 17, 2013 in Top Story

With over a billion active users recording the minutiae of their activities, purchases, travel plans, and other personal information, Facebook is a potential treasure trove for hackers and marketers trolling for data.

Facebook’s privacy settings seem to be a constantly moving target, so it’s important to review them from time to time. Here’s what you need to know.

The challenge of understanding Facebook privacy

Since its inception, Facebook has been — and often still is — criticized for its privacy controls. Well-publicized hacks of Facebook pages belonging to founder Mark Zuckerberg and the French president back in January 2011 didn’t help. For many users, Facebook privacy controls were either lacking or too difficult to wade through.

Fortunately, Facebook’s latest privacy-control enhancements are more accessible to the social site’s users. Unfortunately, many of the controls are disabled by default or set at their lowest threshold. And there’s still a bewildering array of privacy settings, scattered in different locations, that determine who can access information you’ve posted.

There’s one other frequently misunderstood fact about Facebook privacy: Because friends of your friends can see some of the things you post and tag — even if you’ve set more restrictive settings — you’re never sure just who is seeing what.

Review and change privacy via Privacy Shortcuts

Reviewing your Facebook privacy settings is important for understanding and controlling what personal information others — individuals and companies — can access on your page. The basic privacy settings are now easily accessed via the new Privacy Shortcuts tools, found under the lock icon to the right of your sign-in name.

Click the lock, and you’ll get a drop-down list of options, starting with one of the most basic settings: Who can see my stuff? Click its down-arrow, and the first configuration option is Who can see my future posts? (see Figure 1).

Privacy shortcuts

Figure 1. Facebook's Privacy Shortcuts gives you quick access to basic privacy settings.



This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login.

A refresher course on Facebook privacy controls
Feedback welcome: Have a question or comment about this story? Post your thoughts, praise, or constructive criticisms in the WS Columns forum.

 
Lounge Life

Don’t know what you’ve got till it’s gone

Kathleen Atkins
By Kathleen Atkins on January 17, 2013 in Lounge Life

It should be no surprise to learn that people love some fonts and hate others.

Oddly, it turns out that people can be just as particular about their screen cursors. In the Windows 7 forum, Lounge member Gromek laments the paucity of cursor-icon choices. He’s looked everywhere, he thinks, for a better cursor — one he knows used to exist in XP. Fellow Loungers offer their insights.

The following links are this week’s most interesting Lounge threads, including several new questions for which you might have answers:

Office Applications    
General Productivity Periods missing in file names
Word Processing Table of Contents problem *
Spreadsheets

This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login. The Lounge Life column is a digest of the best of the WS Lounge discussion board. Kathleen Atkins is Associate Editor of Windows Secrets.


 
Wacky Web Week

Eight bits of animal lore — contradicted

alt text

What do lemmings, daddy longlegs, ostriches, baby birds, goldfish, dogs, bats, and frogs have in common?

They all are victims of widely shared misconceptions professed by millions of human beings. Setting the record straight, this rapid-fire mini-lecture begins with the persistent myth of the suicidal lemming. Fortunately, the truth is far more interesting than the fable. Play the video

...

This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login.


 
LangaList Plus

No-reformat reinstalls for all Windows versions

Fred Langa
By Fred Langa on January 17, 2013 in LangaList Plus

When Windows goes badly wrong, rebuilding the operating system without reformatting and reinstalling apps and data can save hours of work.

A fast, nondestructive Windows reinstall is a manual process in XP, Vista, and Win7, but it’s built in and fully automatic in Windows 8.

Reader seeks no-reformat reinstall for Win8

A nondestructive Windows reinstall completely refreshes the operating system but retains your user accounts, data, passwords, and/or installed programs. This type of repair takes a fraction of the time required for a standard, full reinstall — and it’s much, much easier to do.

I’ve covered nondestructive reinstalls for previous versions of Windows in several earlier stories. See, for example, the July 14, 2011, Top Story, “Win7’s no-reformat, nondestructive reinstall.” The process for Vista is nearly identical. For Windows XP, check out the 2006 InformationWeek article, “XP’s no-reformat, nondestructive total-rebuild option.”

Reader William Searle wondered about this capability in Windows 8.

  • “Is there a Win8 version of the ‘no-reformat, nondestructive reinstall?'”

Indeed there is, William. Microsoft made it easier than ever and built it right into the operating system; it’s nondestructive for your settings and user data and for native Win8 apps downloaded through the app store. (From-disc apps, however, might still have to be reinstalled the old-fashioned way.)



This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login.

Fred Langa is senior editor. His LangaList Newsletter merged with Windows Secrets on Nov. 16, 2006. Prior to that, Fred was editor of Byte Magazine (1987 to 1991) and editorial director of CMP Media (1991 to 1996), overseeing Windows Magazine and others.

 
Woody's Windows

Zapping System Progressive Protection

Woody Leonhard
By Woody Leonhard on January 17, 2013 in Woody's Windows

Over the holiday break, three people sent me panic messages asking about an antivirus product that was demanding money to fix their computers.

If my admittedly small sample is any indication, the venerable and virulent “System Progressive Protection” rogueware is back with new infection methods to delight us all. Oh boy.

System Progressive Protection’s persuasive ways

System Progressive Protection — SPP to its friends — presents some truly scary statistics to personal-computer users unfortunate enough to fall under its sway. It reports finding dozens — even hundreds — of Trojans, dialers, pernicious autoruns, spyware, and the like on a system. In truth, it’s probably the only thing infecting the machine. Of course, your only “solution” is to send money to the purveyors of System Progressive Protection so their bogus program can “activate” and rid the computer of the creepy-crawlies it “found.”

That’s the scam. In practice, if you send money, you’re giving the con artists both your credit-card number and the keys to your PC.

Yes, it’s the old rogue-anti-malware shtick. But recently, SPP’s infection vectors have become considerably more subtle — and the demands more outrageous. It’s particularly galling to see an SPP scan flag dozens of rogue applications on a completely clean machine (a bit of the pot calling the kettle black).

Less sophisticated rogue-malware scanners typically perform an ersatz scan and threaten fire and brimstone if you don’t activate the “scanner” by sending money. Most bogus scanners turn belly-up when confronted by a quick run of Microsoft Security Essentials, Malwarebytes, or some other legitimate AV product.

That’s not the case with this new version of SPP. It digs deep into Windows, making it resistant to nearly every type of malware-scanning software I’ve used. Manual disinfection methods that work on earlier versions of SPP might be ineffective with the latest incarnation. I haven’t yet seen a detailed analysis of this new version, but it appears to burrow in and run as a rootkit (Wikipedia definition) — a particularly tenacious type of infection.



This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login.

Woody Leonhard is a Windows Secrets senior editor and a senior contributing editor at InfoWorld. His latest book, the comprehensive 1,080-page Windows 8 All-In-One For Dummies, delves into all the Win8 nooks and crannies. His many writings tell it like it is — whether Microsoft likes it or not.

 
Best Practices

Devices to give Wi-Fi networks a boost

Ryan Pierson
By Ryan Pierson on January 17, 2013 in Best Practices

One of the common challenges of Wi-Fi is getting good coverage throughout your home or small business.

There are numerous devices for extending a Wi-Fi network, but picking the best device can be confusing.

Most of the confusion stems from terminology — different devices have different applications, but their names are often used interchangeably. For example, an access point is often thought of as an open wireless modem or router, accessed by the public. But the term is also applied to devices that supply wireless connectivity to a modem that doesn’t natively support it. “Access point” can also be used to describe a device that simply extends the range of a wireless network.

To help sort through this labeling morass, I’ll take you through the common wireless devices and software options, and I’ll describe how each can help get you a better Wi-Fi signal.

Bridges, boosters, access points, and more

The typical home or small-business net is made up of various devices performing one or more tasks. To make things more confusing, a single device can play different roles in a network, depending on how it’s configured. Here are some key elements in a small network:

  • Wireless bridge: This device provides a link between wired and wireless network segments. In a small network, the bridge is built into the router, which typically has both a wireless transmitter and Ethernet ports. In corporate/enterprise applications, wireless bridges can be standalone devices used to divide a large network into segments for better management.

    Windows has a built-in bridging option that lets you link different connections through your PC. You could, for example, use the bridge to connect two PCs via an Ethernet cable, giving Internet access to both through one system’s Wi-Fi transceiver.

    Setting up bridging within Windows is relatively easy. In the Control Panel, select Network and Sharing Center. Click the Change adapter settings link in the left sidebar (see Figure 1). Next, you’ll see a list of available wired and wireless connections. Select the two segments you want to bridge; right-click. Select Bridge Connections; a new listing — Network Bridge — should appear, as shown in Figure 2.

    Change adapter settings

    Figure 1. The Change adapter settings link takes you to a list of available network connections.



    This article is part of our premium content. Join Now.

    Already a paid subscriber? Click here to login.

    Ryan Matthew Pierson has worked as a broadcaster, writer, and producer for media outlets ranging from small local radio stations to internationally syndicated programs. He presently serves as a content producer for the Chris Pirillo site and LockerGnome.

 
Patch Watch

Microsoft releases critical patch for IE

Susan Bradley
By Susan Bradley on January 17, 2013 in Patch Watch

When there’s an out-of-cycle update from Microsoft, it’s almost always one we want to install quickly.

This special edition of Patch Watch has two critical fixes that should be added to Windows workstations without delay.

MS13-008 (2799329)

Critical zero-day patch for Internet Explorer

In the Jan. 10 Patch Watch, I recommended that Internet Explorer 6, 7, or 8 users install fixit 50971 to block a new exploit that’s already attacking PCs. At that time, there was no patch available. But there is now; this past Monday, Microsoft released an out-of-cycle patch, KB 2799329, rated critical for all client versions of Windows using IE 6 through 8. PCs running IE 9 and 10 are unaffected.

An important note: According to the FAQ in MS Security Bulletin MS13-008, cumulative update KB 2761465 (MS12-077) must be installed before installing KB 2799329. In Windows Update, click the View update history link, look for KB 2761465, and confirm it’s on your system.

- What to do: Install KB 2799329 (MS13-008 ) as soon as possible. If you installed fixit 50971, remove it after installing the patch by running its companion fixit: 50972. Removing it should restore any lost browser speed you might have encountered.

Java: Use it if you must; lose it if you can

Like browsers, Java is one of those apps you really need to keep updated. But, unlike a browser, you might be better off living without Java. So before installing Java 7 Update 11, consider whether any of your applications or computing tasks needs Java to run. If you’re not sure, uninstall Java completely from your Windows workstation and see whether anything breaks.

In some cases, you can keep Java on your system but disable it in your browser. An easy way to do this is through the Java Control Panel, which should reside in your Windows Control Panel. If you don’t see Java’s control panel, it’s because you’re not running Java 7 Update 10 or 11. Proceed to the Oracle Java download page and install Version 7 Update 11. Be sure to untick any offered — but unwanted — accessory apps, such as the McAfee security software Oracle tried to foist on me.



This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login.

Susan Bradley is a Small Business Server and Security MVP, a title awarded by Microsoft to independent experts who do not work for the company. She's also a partner in a California CPA firm.

YOUR SUBSCRIPTION

The Windows Secrets Newsletter is published twice a week on Tuesdays and Thursdays – with a few days skipped for holidays and the occasional vacation.

Publisher: Windows Secrets | Penton | 1166 Avenue of the Americas | New York, NY 10036

Editor: Tracey Capen. Senior editor: Fred Langa. Regular contributors: Susan Bradley, Michael Lasky, Patrick Marshall, Lincoln Spector.

Trademarks: Microsoft and Windows are registered trademarks of Microsoft Corporation. The Windows Secrets series of books is published by Wiley Publishing Inc. The Windows Secrets Newsletter, WindowsSecrets.com, Support Alert, LangaList, LangaList Plus, WinFind, Security Baseline, Patch Watch, Perimeter Scan, Wacky Web Week, the Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of WindowsSecrets.com. All other marks are the trademarks or service marks of their respective owners.

Copyright © 2016 by WindowsSecrets.com. All rights reserved.


HOW TO SUBSCRIBE: Anyone may subscribe to this newsletter by visiting our free signup page.

HOW TO UNSUBSCRIBE: To unsubscribe from the Windows Secrets Newsletter,
  • Visit our Unsubscribe page.
Copyright © 2019 by WindowsSecrets.com. All rights reserved.

Table of contents

Connect with us Follow us on Twitter Connect with us on Facebook Connect with us on Google+ View our RSS Feeds
  • Home|
  • Newsletter|
  • About Us|
  • Contact Us|
  • Advertise|
  • Unsubscribe|
  • FAQ|
  • Sitemap|
Trademarks: Microsoft and Windows are registered trademarks of Microsoft Corporation. The Windows Secrets series of books is published by Wiley Publishing Inc. The Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Patch Watch, Perimeter Scan, Wacky Web Week, the Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of iNET Interactive. All other marks are the trademarks or service marks of their respective owners.
Hosting and Cloud
  • Web Hosting Talk
  • HostingCon
  • WHIR
  • Hosting Catalog
  • Hottest Hosts
Data Centers
  • Data Center Knowledge
  • Data Center World
  • AFCOM
Web Development
  • Hot Scripts
  • DB Forums
Performance Marketing
  • ABestWeb
Consumer Tech
  • Windows Secrets
  • Overclockers
  • Mac Forums
Informa
  • Privacy Policy
  • Terms of Services
  • Advertise
Hosting By:
LiquidWeb
Powered by Penton
Copyright © Penton
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X